, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:45:58 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000600)={&(0x7f0000000540), 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x34, 0x3f7, 0x0, 0x0, 0x0, {0xd, 0xd, './file0/file0', './file0/file0'}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000040}, 0x4004055) 20:45:58 executing program 2: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$WPAN_SECURITY(r0, 0x0, 0x1, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='bic\x00', 0x4) 20:45:58 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="cfcc9e95e1da1400010009"], 0x1c}}, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r3, &(0x7f0000000300)={&(0x7f0000000200), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r4, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_NETNS_FD={0x8}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r4, 0x200, 0x70bd26, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x8800) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) (async) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="cfcc9e95e1da1400010009"], 0x1c}}, 0x0) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) (async) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r3, &(0x7f0000000300)={&(0x7f0000000200), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r4, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_NETNS_FD={0x8}]}, 0x1c}}, 0x0) (async) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r4, 0x200, 0x70bd26, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x8800) (async) 20:45:58 executing program 2: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$WPAN_SECURITY(r0, 0x0, 0x1, 0x0, 0x0) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) (async) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='bic\x00', 0x4) 20:45:58 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000600)={&(0x7f0000000540), 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x34, 0x3f7, 0x0, 0x0, 0x0, {0xd, 0xd, './file0/file0', './file0/file0'}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000040}, 0x4004055) 20:45:58 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/35, 0x23, 0x0, &(0x7f00000000c0)=""/91, 0x5b}, &(0x7f0000000180)=0x40) (async) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x129a81, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="bc0292187d1422fb22bdcc6ad13167a5262d90b68ae50ccc5e4ba815d7916573ed3397b45226fc2cd3e8bbabe8f94ad37d7880e9ec4c202e5ecca66e64a1a7eda31862911a781ce915cbe1117db6f5e979acff900dd343879eceb4befe9081bc2231f9f7d9a3fff336d50d3d000fdaf1635299d3ae242fcd76e5cecbc44294e7886b5ae6fa943f309ee7817cd2229666bb613f8de7dd0f73a7bd17448bf5594025a88bfcd152fd028e4e6232c926ae9799ff", 0xb2, 0x20000040, 0x0, 0x0) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x8) (async) write$char_usb(r0, 0x0, 0x0) (async) setsockopt$CAN_RAW_FD_FRAMES(r0, 0x65, 0x5, &(0x7f0000000040)=0x1, 0x4) 20:45:58 executing program 4: bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:45:58 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="cfcc9e95e1da1400010009"], 0x1c}}, 0x0) (async) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="cfcc9e95e1da1400010009"], 0x1c}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r3, &(0x7f0000000300)={&(0x7f0000000200), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r4, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_NETNS_FD={0x8}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r4, 0x200, 0x70bd26, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x8800) 20:45:58 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/35, 0x23, 0x0, &(0x7f00000000c0)=""/91, 0x5b}, &(0x7f0000000180)=0x40) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x129a81, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="bc0292187d1422fb22bdcc6ad13167a5262d90b68ae50ccc5e4ba815d7916573ed3397b45226fc2cd3e8bbabe8f94ad37d7880e9ec4c202e5ecca66e64a1a7eda31862911a781ce915cbe1117db6f5e979acff900dd343879eceb4befe9081bc2231f9f7d9a3fff336d50d3d000fdaf1635299d3ae242fcd76e5cecbc44294e7886b5ae6fa943f309ee7817cd2229666bb613f8de7dd0f73a7bd17448bf5594025a88bfcd152fd028e4e6232c926ae9799ff", 0xb2, 0x20000040, 0x0, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x8) write$char_usb(r0, 0x0, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r0, 0x65, 0x5, &(0x7f0000000040)=0x1, 0x4) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/35, 0x23, 0x0, &(0x7f00000000c0)=""/91, 0x5b}, &(0x7f0000000180)=0x40) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x129a81, 0x0) (async) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="bc0292187d1422fb22bdcc6ad13167a5262d90b68ae50ccc5e4ba815d7916573ed3397b45226fc2cd3e8bbabe8f94ad37d7880e9ec4c202e5ecca66e64a1a7eda31862911a781ce915cbe1117db6f5e979acff900dd343879eceb4befe9081bc2231f9f7d9a3fff336d50d3d000fdaf1635299d3ae242fcd76e5cecbc44294e7886b5ae6fa943f309ee7817cd2229666bb613f8de7dd0f73a7bd17448bf5594025a88bfcd152fd028e4e6232c926ae9799ff", 0xb2, 0x20000040, 0x0, 0x0) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x8) (async) write$char_usb(r0, 0x0, 0x0) (async) setsockopt$CAN_RAW_FD_FRAMES(r0, 0x65, 0x5, &(0x7f0000000040)=0x1, 0x4) (async) 20:45:58 executing program 4: bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:45:58 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'ip_vti0\x00', &(0x7f0000000080)={'gre0\x00', 0x0, 0x700, 0x0, 0x7, 0x401, {{0x3a, 0x4, 0x3, 0x1a, 0xe8, 0x65, 0x0, 0x5, 0x4, 0x0, @remote, @local, {[@cipso={0x86, 0x60, 0xffffffffffffffff, [{0x0, 0xa, "2b081988f63780ac"}, {0x6, 0xa, "7524f8844cd2592b"}, {0x7, 0xa, "db2a4f1361d1c0f2"}, {0x7, 0xa, "c2082d9b971d0bd1"}, {0x6, 0xe, "80a73bdea070a69cad953a87"}, {0x5, 0x10, "891272a2607299565606c3124ecd"}, {0x5, 0x5, "2684ef"}, {0x6, 0x2}, {0x2, 0xd, "bb52f9e8257d4d6ea3a762"}]}, @cipso={0x86, 0x2a, 0x2, [{0x5, 0x11, "8cf82958b708cfbea0952fe2cfa669"}, {0x0, 0x6, 'hYc`'}, {0x7, 0x9, "5cbed282d80d15"}, {0x7, 0x4, "a59a"}]}, @cipso={0x86, 0x1a, 0x1, [{0x0, 0x9, "ed8c7cbc95af31"}, {0x6, 0xb, "c5cc366d32b8363d2e"}]}, @timestamp={0x44, 0x24, 0x68, 0x0, 0x9, [0x9, 0x1000, 0x6db156b7, 0xffffffd1, 0xfffffffa, 0x80000001, 0x4, 0x8]}, @noop, @ssrr={0x89, 0x7, 0xbe, [@multicast1]}, @ra={0x94, 0x4}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'ip_vti0\x00', &(0x7f0000000240)={'tunl0\x00', 0x0, 0x700, 0x40, 0x4, 0xfffffffe, {{0x44, 0x4, 0x1, 0x0, 0x110, 0x68, 0x0, 0x80, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp={0x44, 0x14, 0x3d, 0x0, 0x4, [0x19f, 0x4, 0x1, 0x1]}, @timestamp_prespec={0x44, 0x54, 0x58, 0x3, 0x6, [{@broadcast, 0xfffffefa}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3}, {@empty, 0x1}, {@dev={0xac, 0x14, 0x14, 0xf}, 0x80000001}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x925}, {@loopback, 0x2}, {@remote, 0x4}, {@remote, 0xccd}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x6}, {@remote, 0x22}]}, @cipso={0x86, 0x27, 0x1, [{0x2, 0x12, "3fae35c604487bd3e70c9c5926eab684"}, {0x5, 0x3, "a1"}, {0x0, 0x7, "61a64b4dd7"}, {0x7, 0x5, "611b6c"}]}, @timestamp_addr={0x44, 0x4c, 0x8b, 0x1, 0x8, [{@multicast2, 0x20}, {@loopback, 0x40}, {@empty, 0x8}, {@private=0xa010101, 0x6}, {@local}, {@rand_addr=0x64010102, 0x9}, {@loopback, 0x410bea6f}, {@dev={0xac, 0x14, 0x14, 0xb}, 0xf7b}, {@empty, 0x7}]}, @timestamp={0x44, 0x20, 0xa7, 0x0, 0x4, [0x2, 0x8, 0x200, 0x1, 0x8, 0xfff, 0xa6]}]}}}}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000003c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f0000000400)=[0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}], 0x10, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000c40)={&(0x7f00000006c0)={0x574, 0x0, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10000}}, {0x8, 0x6, r0}}}]}}, {{0x8, 0x1, r1}, {0xf0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x144, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0xc6}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xffff4460}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8}, {0xb8, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}]}}, {{0x8}, {0x1c4, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x2985}}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x91, 0xb1, 0x80, 0x8}, {0x4, 0x55, 0x1, 0x7ff}, {0x9, 0x4, 0x0, 0x3}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x84, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x54, 0x4, [{0x3, 0x0, 0x1, 0xfb8a}, {0x5, 0x44, 0x3, 0x3f}, {0xbe, 0x2, 0x20, 0x2}, {0x8, 0x9, 0x80, 0x400}, {0x9, 0x2, 0x1, 0x8}, {0xfc0, 0x7, 0x8}, {0x7, 0x8e, 0x8, 0x1f}, {0x4, 0x18, 0x9, 0x40}, {0x7fff, 0x0, 0x81, 0x7ff}, {0x6, 0x6, 0x5, 0x40}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}]}, 0x574}}, 0x0) 20:45:58 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000140)={0x0, 0x0, @a}, 0x48, 0xfffffffffffffffc) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000100)="75924999d8b992c7f1ab11f75ecf7851", 0x10) 20:45:58 executing program 4: bpf$BPF_BTF_LOAD(0x17, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:45:58 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) remap_file_pages(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x6, 0x0, 0x800) rt_sigaction(0x1a, &(0x7f0000000100)={&(0x7f0000000040)="f342ae6726470f7fb1b7fe0000c4c17c280b67de2f6466430f71e732400f014e00c4617de79ea184500cc401ed5c20c4615d606781c441b1f89305000000", 0x10000002, &(0x7f0000000080)="c442950346ec420f4f5b5dc40315697abe008f69d8985c59f5c423a578a4e50000000000c462fd1c87f3ffffffc46179286209c4a1d8560067460f01d82ef242a5", {[0x9]}}, &(0x7f00000001c0)={&(0x7f0000000140)="43dca80c000000c4a17a2c1420c422f2f7216766440f38dbb35cdb0000f265d8c4c441fde69cc400000000c481b455660cdde0c443c17bdbf3f30f01d9", 0x0, &(0x7f0000000180)="4577000f2b24a48fa9f89546cdf240aff3440f5e800b000000f2470f587f04f3a566f30f1c7afd26e3b5c421e9f9480f"}, 0x8, &(0x7f0000000200)) prctl$PR_SET_SECUREBITS(0x1c, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000240)={0x4, 0x6, 0x15ff, 0x1f, 0x9, 0x1, 0x338, 0x9}, &(0x7f0000000280)={0x0, 0x7ff, 0x7, 0x7fffffffffffffff, 0x57, 0x6980000000000, 0x9, 0xffffffffffffff80}, &(0x7f00000002c0)={0x1, 0x5, 0x9, 0x3, 0x1, 0x1, 0x9, 0x7}, &(0x7f0000000340)={r0, r1+60000000}, &(0x7f00000003c0)={&(0x7f0000000380)={[0x4]}, 0x8}) epoll_create(0xff) 20:45:58 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000600)={&(0x7f0000000540), 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x34, 0x3f7, 0x0, 0x0, 0x0, {0xd, 0xd, './file0/file0', './file0/file0'}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000040}, 0x4004055) 20:45:58 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000140)={0x0, 0x0, @a}, 0x48, 0xfffffffffffffffc) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000100)="75924999d8b992c7f1ab11f75ecf7851", 0x10) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000140)={0x0, 0x0, @a}, 0x48, 0xfffffffffffffffc) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18}, './file0\x00'}) (async) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000100)="75924999d8b992c7f1ab11f75ecf7851", 0x10) (async) 20:45:58 executing program 4: bpf$BPF_BTF_LOAD(0x18, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:45:58 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'ip_vti0\x00', &(0x7f0000000080)={'gre0\x00', 0x0, 0x700, 0x0, 0x7, 0x401, {{0x3a, 0x4, 0x3, 0x1a, 0xe8, 0x65, 0x0, 0x5, 0x4, 0x0, @remote, @local, {[@cipso={0x86, 0x60, 0xffffffffffffffff, [{0x0, 0xa, "2b081988f63780ac"}, {0x6, 0xa, "7524f8844cd2592b"}, {0x7, 0xa, "db2a4f1361d1c0f2"}, {0x7, 0xa, "c2082d9b971d0bd1"}, {0x6, 0xe, "80a73bdea070a69cad953a87"}, {0x5, 0x10, "891272a2607299565606c3124ecd"}, {0x5, 0x5, "2684ef"}, {0x6, 0x2}, {0x2, 0xd, "bb52f9e8257d4d6ea3a762"}]}, @cipso={0x86, 0x2a, 0x2, [{0x5, 0x11, "8cf82958b708cfbea0952fe2cfa669"}, {0x0, 0x6, 'hYc`'}, {0x7, 0x9, "5cbed282d80d15"}, {0x7, 0x4, "a59a"}]}, @cipso={0x86, 0x1a, 0x1, [{0x0, 0x9, "ed8c7cbc95af31"}, {0x6, 0xb, "c5cc366d32b8363d2e"}]}, @timestamp={0x44, 0x24, 0x68, 0x0, 0x9, [0x9, 0x1000, 0x6db156b7, 0xffffffd1, 0xfffffffa, 0x80000001, 0x4, 0x8]}, @noop, @ssrr={0x89, 0x7, 0xbe, [@multicast1]}, @ra={0x94, 0x4}]}}}}}) (async) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'ip_vti0\x00', &(0x7f0000000240)={'tunl0\x00', 0x0, 0x700, 0x40, 0x4, 0xfffffffe, {{0x44, 0x4, 0x1, 0x0, 0x110, 0x68, 0x0, 0x80, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp={0x44, 0x14, 0x3d, 0x0, 0x4, [0x19f, 0x4, 0x1, 0x1]}, @timestamp_prespec={0x44, 0x54, 0x58, 0x3, 0x6, [{@broadcast, 0xfffffefa}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3}, {@empty, 0x1}, {@dev={0xac, 0x14, 0x14, 0xf}, 0x80000001}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x925}, {@loopback, 0x2}, {@remote, 0x4}, {@remote, 0xccd}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x6}, {@remote, 0x22}]}, @cipso={0x86, 0x27, 0x1, [{0x2, 0x12, "3fae35c604487bd3e70c9c5926eab684"}, {0x5, 0x3, "a1"}, {0x0, 0x7, "61a64b4dd7"}, {0x7, 0x5, "611b6c"}]}, @timestamp_addr={0x44, 0x4c, 0x8b, 0x1, 0x8, [{@multicast2, 0x20}, {@loopback, 0x40}, {@empty, 0x8}, {@private=0xa010101, 0x6}, {@local}, {@rand_addr=0x64010102, 0x9}, {@loopback, 0x410bea6f}, {@dev={0xac, 0x14, 0x14, 0xb}, 0xf7b}, {@empty, 0x7}]}, @timestamp={0x44, 0x20, 0xa7, 0x0, 0x4, [0x2, 0x8, 0x200, 0x1, 0x8, 0xfff, 0xa6]}]}}}}}) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000003c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f0000000400)=[0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}], 0x10, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000c40)={&(0x7f00000006c0)={0x574, 0x0, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10000}}, {0x8, 0x6, r0}}}]}}, {{0x8, 0x1, r1}, {0xf0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x144, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0xc6}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xffff4460}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8}, {0xb8, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}]}}, {{0x8}, {0x1c4, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x2985}}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x91, 0xb1, 0x80, 0x8}, {0x4, 0x55, 0x1, 0x7ff}, {0x9, 0x4, 0x0, 0x3}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x84, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x54, 0x4, [{0x3, 0x0, 0x1, 0xfb8a}, {0x5, 0x44, 0x3, 0x3f}, {0xbe, 0x2, 0x20, 0x2}, {0x8, 0x9, 0x80, 0x400}, {0x9, 0x2, 0x1, 0x8}, {0xfc0, 0x7, 0x8}, {0x7, 0x8e, 0x8, 0x1f}, {0x4, 0x18, 0x9, 0x40}, {0x7fff, 0x0, 0x81, 0x7ff}, {0x6, 0x6, 0x5, 0x40}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}]}, 0x574}}, 0x0) 20:45:58 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000600)={&(0x7f0000000540), 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x34, 0x3f7, 0x0, 0x0, 0x0, {0xd, 0xd, './file0/file0', './file0/file0'}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000040}, 0x4004055) 20:45:58 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000140)={0x0, 0x0, @a}, 0x48, 0xfffffffffffffffc) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000140)={0x0, 0x0, @a}, 0x48, 0xfffffffffffffffc) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000100)="75924999d8b992c7f1ab11f75ecf7851", 0x10) 20:45:58 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000600)={&(0x7f0000000540), 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x34, 0x3f7, 0x0, 0x0, 0x0, {0xd, 0xd, './file0/file0', './file0/file0'}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000040}, 0x4004055) 20:45:58 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0100000000000000000001"], 0x1c}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000000c0)={'syztnl2\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x0, 0x7, 0x0, 0x5, {{0x13, 0x4, 0x1, 0x4, 0x4c, 0x65, 0x0, 0x0, 0x4, 0x0, @multicast1, @broadcast, {[@timestamp_addr={0x44, 0xc, 0x9d, 0x1, 0x5, [{@multicast1}]}, @rr={0x7, 0x27, 0x46, [@local, @local, @multicast1, @rand_addr=0x64010101, @loopback, @broadcast, @loopback, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @ra={0x94, 0x4, 0x1}]}}}}}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000100)={@remote, @multicast2, 0x0}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)={0x394, 0x0, 0x2, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x18000000}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x1b0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}]}}, {{0x8}, {0x144, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r3}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x10000}}}]}}]}, 0x394}, 0x1, 0x0, 0x0, 0x20008084}, 0x8040) 20:45:58 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'ip_vti0\x00', &(0x7f0000000080)={'gre0\x00', 0x0, 0x700, 0x0, 0x7, 0x401, {{0x3a, 0x4, 0x3, 0x1a, 0xe8, 0x65, 0x0, 0x5, 0x4, 0x0, @remote, @local, {[@cipso={0x86, 0x60, 0xffffffffffffffff, [{0x0, 0xa, "2b081988f63780ac"}, {0x6, 0xa, "7524f8844cd2592b"}, {0x7, 0xa, "db2a4f1361d1c0f2"}, {0x7, 0xa, "c2082d9b971d0bd1"}, {0x6, 0xe, "80a73bdea070a69cad953a87"}, {0x5, 0x10, "891272a2607299565606c3124ecd"}, {0x5, 0x5, "2684ef"}, {0x6, 0x2}, {0x2, 0xd, "bb52f9e8257d4d6ea3a762"}]}, @cipso={0x86, 0x2a, 0x2, [{0x5, 0x11, "8cf82958b708cfbea0952fe2cfa669"}, {0x0, 0x6, 'hYc`'}, {0x7, 0x9, "5cbed282d80d15"}, {0x7, 0x4, "a59a"}]}, @cipso={0x86, 0x1a, 0x1, [{0x0, 0x9, "ed8c7cbc95af31"}, {0x6, 0xb, "c5cc366d32b8363d2e"}]}, @timestamp={0x44, 0x24, 0x68, 0x0, 0x9, [0x9, 0x1000, 0x6db156b7, 0xffffffd1, 0xfffffffa, 0x80000001, 0x4, 0x8]}, @noop, @ssrr={0x89, 0x7, 0xbe, [@multicast1]}, @ra={0x94, 0x4}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'ip_vti0\x00', &(0x7f0000000240)={'tunl0\x00', 0x0, 0x700, 0x40, 0x4, 0xfffffffe, {{0x44, 0x4, 0x1, 0x0, 0x110, 0x68, 0x0, 0x80, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp={0x44, 0x14, 0x3d, 0x0, 0x4, [0x19f, 0x4, 0x1, 0x1]}, @timestamp_prespec={0x44, 0x54, 0x58, 0x3, 0x6, [{@broadcast, 0xfffffefa}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3}, {@empty, 0x1}, {@dev={0xac, 0x14, 0x14, 0xf}, 0x80000001}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x925}, {@loopback, 0x2}, {@remote, 0x4}, {@remote, 0xccd}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x6}, {@remote, 0x22}]}, @cipso={0x86, 0x27, 0x1, [{0x2, 0x12, "3fae35c604487bd3e70c9c5926eab684"}, {0x5, 0x3, "a1"}, {0x0, 0x7, "61a64b4dd7"}, {0x7, 0x5, "611b6c"}]}, @timestamp_addr={0x44, 0x4c, 0x8b, 0x1, 0x8, [{@multicast2, 0x20}, {@loopback, 0x40}, {@empty, 0x8}, {@private=0xa010101, 0x6}, {@local}, {@rand_addr=0x64010102, 0x9}, {@loopback, 0x410bea6f}, {@dev={0xac, 0x14, 0x14, 0xb}, 0xf7b}, {@empty, 0x7}]}, @timestamp={0x44, 0x20, 0xa7, 0x0, 0x4, [0x2, 0x8, 0x200, 0x1, 0x8, 0xfff, 0xa6]}]}}}}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000003c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f0000000400)=[0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}], 0x10, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000c40)={&(0x7f00000006c0)={0x574, 0x0, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10000}}, {0x8, 0x6, r0}}}]}}, {{0x8, 0x1, r1}, {0xf0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x144, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0xc6}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xffff4460}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8}, {0xb8, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}]}}, {{0x8}, {0x1c4, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x2985}}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x91, 0xb1, 0x80, 0x8}, {0x4, 0x55, 0x1, 0x7ff}, {0x9, 0x4, 0x0, 0x3}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x84, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x54, 0x4, [{0x3, 0x0, 0x1, 0xfb8a}, {0x5, 0x44, 0x3, 0x3f}, {0xbe, 0x2, 0x20, 0x2}, {0x8, 0x9, 0x80, 0x400}, {0x9, 0x2, 0x1, 0x8}, {0xfc0, 0x7, 0x8}, {0x7, 0x8e, 0x8, 0x1f}, {0x4, 0x18, 0x9, 0x40}, {0x7fff, 0x0, 0x81, 0x7ff}, {0x6, 0x6, 0x5, 0x40}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}]}, 0x574}}, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'ip_vti0\x00', &(0x7f0000000080)={'gre0\x00', 0x0, 0x700, 0x0, 0x7, 0x401, {{0x3a, 0x4, 0x3, 0x1a, 0xe8, 0x65, 0x0, 0x5, 0x4, 0x0, @remote, @local, {[@cipso={0x86, 0x60, 0xffffffffffffffff, [{0x0, 0xa, "2b081988f63780ac"}, {0x6, 0xa, "7524f8844cd2592b"}, {0x7, 0xa, "db2a4f1361d1c0f2"}, {0x7, 0xa, "c2082d9b971d0bd1"}, {0x6, 0xe, "80a73bdea070a69cad953a87"}, {0x5, 0x10, "891272a2607299565606c3124ecd"}, {0x5, 0x5, "2684ef"}, {0x6, 0x2}, {0x2, 0xd, "bb52f9e8257d4d6ea3a762"}]}, @cipso={0x86, 0x2a, 0x2, [{0x5, 0x11, "8cf82958b708cfbea0952fe2cfa669"}, {0x0, 0x6, 'hYc`'}, {0x7, 0x9, "5cbed282d80d15"}, {0x7, 0x4, "a59a"}]}, @cipso={0x86, 0x1a, 0x1, [{0x0, 0x9, "ed8c7cbc95af31"}, {0x6, 0xb, "c5cc366d32b8363d2e"}]}, @timestamp={0x44, 0x24, 0x68, 0x0, 0x9, [0x9, 0x1000, 0x6db156b7, 0xffffffd1, 0xfffffffa, 0x80000001, 0x4, 0x8]}, @noop, @ssrr={0x89, 0x7, 0xbe, [@multicast1]}, @ra={0x94, 0x4}]}}}}}) (async) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'ip_vti0\x00', &(0x7f0000000240)={'tunl0\x00', 0x0, 0x700, 0x40, 0x4, 0xfffffffe, {{0x44, 0x4, 0x1, 0x0, 0x110, 0x68, 0x0, 0x80, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp={0x44, 0x14, 0x3d, 0x0, 0x4, [0x19f, 0x4, 0x1, 0x1]}, @timestamp_prespec={0x44, 0x54, 0x58, 0x3, 0x6, [{@broadcast, 0xfffffefa}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3}, {@empty, 0x1}, {@dev={0xac, 0x14, 0x14, 0xf}, 0x80000001}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x925}, {@loopback, 0x2}, {@remote, 0x4}, {@remote, 0xccd}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x6}, {@remote, 0x22}]}, @cipso={0x86, 0x27, 0x1, [{0x2, 0x12, "3fae35c604487bd3e70c9c5926eab684"}, {0x5, 0x3, "a1"}, {0x0, 0x7, "61a64b4dd7"}, {0x7, 0x5, "611b6c"}]}, @timestamp_addr={0x44, 0x4c, 0x8b, 0x1, 0x8, [{@multicast2, 0x20}, {@loopback, 0x40}, {@empty, 0x8}, {@private=0xa010101, 0x6}, {@local}, {@rand_addr=0x64010102, 0x9}, {@loopback, 0x410bea6f}, {@dev={0xac, 0x14, 0x14, 0xb}, 0xf7b}, {@empty, 0x7}]}, @timestamp={0x44, 0x20, 0xa7, 0x0, 0x4, [0x2, 0x8, 0x200, 0x1, 0x8, 0xfff, 0xa6]}]}}}}}) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000003c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f0000000400)=[0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}], 0x10, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) (async) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000c40)={&(0x7f00000006c0)={0x574, 0x0, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10000}}, {0x8, 0x6, r0}}}]}}, {{0x8, 0x1, r1}, {0xf0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x144, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0xc6}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xffff4460}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8}, {0xb8, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}]}}, {{0x8}, {0x1c4, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x2985}}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x91, 0xb1, 0x80, 0x8}, {0x4, 0x55, 0x1, 0x7ff}, {0x9, 0x4, 0x0, 0x3}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x84, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x54, 0x4, [{0x3, 0x0, 0x1, 0xfb8a}, {0x5, 0x44, 0x3, 0x3f}, {0xbe, 0x2, 0x20, 0x2}, {0x8, 0x9, 0x80, 0x400}, {0x9, 0x2, 0x1, 0x8}, {0xfc0, 0x7, 0x8}, {0x7, 0x8e, 0x8, 0x1f}, {0x4, 0x18, 0x9, 0x40}, {0x7fff, 0x0, 0x81, 0x7ff}, {0x6, 0x6, 0x5, 0x40}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}]}, 0x574}}, 0x0) (async) 20:45:58 executing program 4: bpf$BPF_BTF_LOAD(0x19, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:45:58 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000600)={&(0x7f0000000540), 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x34, 0x3f7, 0x0, 0x0, 0x0, {0xd, 0xd, './file0/file0', './file0/file0'}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000040}, 0x4004055) 20:45:59 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) remap_file_pages(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x6, 0x0, 0x800) rt_sigaction(0x1a, &(0x7f0000000100)={&(0x7f0000000040)="f342ae6726470f7fb1b7fe0000c4c17c280b67de2f6466430f71e732400f014e00c4617de79ea184500cc401ed5c20c4615d606781c441b1f89305000000", 0x10000002, &(0x7f0000000080)="c442950346ec420f4f5b5dc40315697abe008f69d8985c59f5c423a578a4e50000000000c462fd1c87f3ffffffc46179286209c4a1d8560067460f01d82ef242a5", {[0x9]}}, &(0x7f00000001c0)={&(0x7f0000000140)="43dca80c000000c4a17a2c1420c422f2f7216766440f38dbb35cdb0000f265d8c4c441fde69cc400000000c481b455660cdde0c443c17bdbf3f30f01d9", 0x0, &(0x7f0000000180)="4577000f2b24a48fa9f89546cdf240aff3440f5e800b000000f2470f587f04f3a566f30f1c7afd26e3b5c421e9f9480f"}, 0x8, &(0x7f0000000200)) prctl$PR_SET_SECUREBITS(0x1c, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000240)={0x4, 0x6, 0x15ff, 0x1f, 0x9, 0x1, 0x338, 0x9}, &(0x7f0000000280)={0x0, 0x7ff, 0x7, 0x7fffffffffffffff, 0x57, 0x6980000000000, 0x9, 0xffffffffffffff80}, &(0x7f00000002c0)={0x1, 0x5, 0x9, 0x3, 0x1, 0x1, 0x9, 0x7}, &(0x7f0000000340)={r0, r1+60000000}, &(0x7f00000003c0)={&(0x7f0000000380)={[0x4]}, 0x8}) epoll_create(0xff) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) (async) remap_file_pages(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x6, 0x0, 0x800) (async) rt_sigaction(0x1a, &(0x7f0000000100)={&(0x7f0000000040)="f342ae6726470f7fb1b7fe0000c4c17c280b67de2f6466430f71e732400f014e00c4617de79ea184500cc401ed5c20c4615d606781c441b1f89305000000", 0x10000002, &(0x7f0000000080)="c442950346ec420f4f5b5dc40315697abe008f69d8985c59f5c423a578a4e50000000000c462fd1c87f3ffffffc46179286209c4a1d8560067460f01d82ef242a5", {[0x9]}}, &(0x7f00000001c0)={&(0x7f0000000140)="43dca80c000000c4a17a2c1420c422f2f7216766440f38dbb35cdb0000f265d8c4c441fde69cc400000000c481b455660cdde0c443c17bdbf3f30f01d9", 0x0, &(0x7f0000000180)="4577000f2b24a48fa9f89546cdf240aff3440f5e800b000000f2470f587f04f3a566f30f1c7afd26e3b5c421e9f9480f"}, 0x8, &(0x7f0000000200)) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) (async) clock_gettime(0x0, &(0x7f0000000300)) (async) pselect6(0x40, &(0x7f0000000240)={0x4, 0x6, 0x15ff, 0x1f, 0x9, 0x1, 0x338, 0x9}, &(0x7f0000000280)={0x0, 0x7ff, 0x7, 0x7fffffffffffffff, 0x57, 0x6980000000000, 0x9, 0xffffffffffffff80}, &(0x7f00000002c0)={0x1, 0x5, 0x9, 0x3, 0x1, 0x1, 0x9, 0x7}, &(0x7f0000000340)={r0, r1+60000000}, &(0x7f00000003c0)={&(0x7f0000000380)={[0x4]}, 0x8}) (async) epoll_create(0xff) (async) 20:45:59 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0100000000000000000001"], 0x1c}}, 0x0) (async) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0100000000000000000001"], 0x1c}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000000c0)={'syztnl2\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x0, 0x7, 0x0, 0x5, {{0x13, 0x4, 0x1, 0x4, 0x4c, 0x65, 0x0, 0x0, 0x4, 0x0, @multicast1, @broadcast, {[@timestamp_addr={0x44, 0xc, 0x9d, 0x1, 0x5, [{@multicast1}]}, @rr={0x7, 0x27, 0x46, [@local, @local, @multicast1, @rand_addr=0x64010101, @loopback, @broadcast, @loopback, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @ra={0x94, 0x4, 0x1}]}}}}}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000100)={@remote, @multicast2, 0x0}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)={0x394, 0x0, 0x2, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x18000000}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x1b0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}]}}, {{0x8}, {0x144, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r3}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x10000}}}]}}]}, 0x394}, 0x1, 0x0, 0x0, 0x20008084}, 0x8040) 20:45:59 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x3, 0x0, @auto=[0x3c, 0x24, 0x20, 0x38, 0x30]}, 0xd, 0xfffffffffffffffe) 20:45:59 executing program 4: bpf$BPF_BTF_LOAD(0x1a, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:45:59 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) recvmsg$can_raw(0xffffffffffffffff, &(0x7f00000021c0)={&(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000002180)=[{&(0x7f00000000c0)=""/4096, 0x1000}, {&(0x7f00000010c0)=""/4096, 0x1000}, {&(0x7f00000020c0)=""/156, 0x9c}], 0x3}, 0x0) 20:45:59 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000600)={&(0x7f0000000540), 0xfffffffffffffe70, &(0x7f00000005c0)={&(0x7f0000000580)={0xfffffffffffffe83, 0x3f7, 0x0, 0x0, 0x0, {0xd, 0xd, './file0/file0', './file0/file0'}, ["", ""]}, 0x34}}, 0x4004055) 20:45:59 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x3, 0x0, @auto=[0x3c, 0x24, 0x20, 0x38, 0x30]}, 0xd, 0xfffffffffffffffe) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x3, 0x0, @auto=[0x3c, 0x24, 0x20, 0x38, 0x30]}, 0xd, 0xfffffffffffffffe) 20:45:59 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0100000000000000000001"], 0x1c}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000000c0)={'syztnl2\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x0, 0x7, 0x0, 0x5, {{0x13, 0x4, 0x1, 0x4, 0x4c, 0x65, 0x0, 0x0, 0x4, 0x0, @multicast1, @broadcast, {[@timestamp_addr={0x44, 0xc, 0x9d, 0x1, 0x5, [{@multicast1}]}, @rr={0x7, 0x27, 0x46, [@local, @local, @multicast1, @rand_addr=0x64010101, @loopback, @broadcast, @loopback, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @ra={0x94, 0x4, 0x1}]}}}}}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000100)={@remote, @multicast2, 0x0}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)={0x394, 0x0, 0x2, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x18000000}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x1b0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}]}}, {{0x8}, {0x144, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r3}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x10000}}}]}}]}, 0x394}, 0x1, 0x0, 0x0, 0x20008084}, 0x8040) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) (async) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0100000000000000000001"], 0x1c}}, 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000000c0)={'syztnl2\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x0, 0x7, 0x0, 0x5, {{0x13, 0x4, 0x1, 0x4, 0x4c, 0x65, 0x0, 0x0, 0x4, 0x0, @multicast1, @broadcast, {[@timestamp_addr={0x44, 0xc, 0x9d, 0x1, 0x5, [{@multicast1}]}, @rr={0x7, 0x27, 0x46, [@local, @local, @multicast1, @rand_addr=0x64010101, @loopback, @broadcast, @loopback, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @ra={0x94, 0x4, 0x1}]}}}}}) (async) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000100)={@remote, @multicast2}, &(0x7f0000000140)=0xc) (async) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000180)) (async) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)={0x394, 0x0, 0x2, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x18000000}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x1b0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}]}}, {{0x8}, {0x144, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r3}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x10000}}}]}}]}, 0x394}, 0x1, 0x0, 0x0, 0x20008084}, 0x8040) (async) 20:45:59 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000600)={&(0x7f0000000540), 0xfffffffffffffe70, &(0x7f00000005c0)={&(0x7f0000000580)={0xfffffffffffffe83, 0x3f7, 0x0, 0x0, 0x0, {0xd, 0xd, './file0/file0', './file0/file0'}, ["", ""]}, 0x34}}, 0x0) 20:45:59 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) recvmsg$can_raw(0xffffffffffffffff, &(0x7f00000021c0)={&(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000002180)=[{&(0x7f00000000c0)=""/4096, 0x1000}, {&(0x7f00000010c0)=""/4096, 0x1000}, {&(0x7f00000020c0)=""/156, 0x9c}], 0x3}, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) recvmsg$can_raw(0xffffffffffffffff, &(0x7f00000021c0)={&(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000002180)=[{&(0x7f00000000c0)=""/4096, 0x1000}, {&(0x7f00000010c0)=""/4096, 0x1000}, {&(0x7f00000020c0)=""/156, 0x9c}], 0x3}, 0x0) (async) 20:45:59 executing program 4: bpf$BPF_BTF_LOAD(0x1b, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:45:59 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) (async, rerun: 64) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x3, 0x0, @auto=[0x3c, 0x24, 0x20, 0x38, 0x30]}, 0xd, 0xfffffffffffffffe) (rerun: 64) 20:45:59 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) remap_file_pages(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x6, 0x0, 0x800) rt_sigaction(0x1a, &(0x7f0000000100)={&(0x7f0000000040)="f342ae6726470f7fb1b7fe0000c4c17c280b67de2f6466430f71e732400f014e00c4617de79ea184500cc401ed5c20c4615d606781c441b1f89305000000", 0x10000002, &(0x7f0000000080)="c442950346ec420f4f5b5dc40315697abe008f69d8985c59f5c423a578a4e50000000000c462fd1c87f3ffffffc46179286209c4a1d8560067460f01d82ef242a5", {[0x9]}}, &(0x7f00000001c0)={&(0x7f0000000140)="43dca80c000000c4a17a2c1420c422f2f7216766440f38dbb35cdb0000f265d8c4c441fde69cc400000000c481b455660cdde0c443c17bdbf3f30f01d9", 0x0, &(0x7f0000000180)="4577000f2b24a48fa9f89546cdf240aff3440f5e800b000000f2470f587f04f3a566f30f1c7afd26e3b5c421e9f9480f"}, 0x8, &(0x7f0000000200)) prctl$PR_SET_SECUREBITS(0x1c, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000240)={0x4, 0x6, 0x15ff, 0x1f, 0x9, 0x1, 0x338, 0x9}, &(0x7f0000000280)={0x0, 0x7ff, 0x7, 0x7fffffffffffffff, 0x57, 0x6980000000000, 0x9, 0xffffffffffffff80}, &(0x7f00000002c0)={0x1, 0x5, 0x9, 0x3, 0x1, 0x1, 0x9, 0x7}, &(0x7f0000000340)={r0, r1+60000000}, &(0x7f00000003c0)={&(0x7f0000000380)={[0x4]}, 0x8}) epoll_create(0xff) 20:45:59 executing program 4: bpf$BPF_BTF_LOAD(0x1c, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:45:59 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000000, 0x810, 0xffffffffffffffff, 0x85f18000) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0100000000000000000001"], 0x1c}}, 0x0) 20:45:59 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x7, 0x400, 0x0, 0x42}, 0x14) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='highspeed\x00', 0xa) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0x80000001) socket$nl_audit(0x10, 0x3, 0x9) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000080)="8e2a281906832fd1b8d043e0655f7b71a69bccd1ea29057383792d17e51e763184ac0d64cc3a2831244dcd29e29318c01106f00c4f43f7d2429468a7ac06d354237bd9af189b45efb51d083e7a988f5c757ba49f21a5b15fdff01fba785aacb7cb571b87135ffc7a9362f25db064bc1a60b246f74633f4120df2ec8651ceb407ecf6ef2796ee1f4c7a4c5dddbe5b1dc894a7f17ea8de36a42c3c7037db1ec5a665b604c55b5fa23007873790cb43c84447ce4922d6e1ba1acca98fedb9193331d6a6f671dc29a3e8d14dd998af6eca1a0c29d9284f8fd6ecf989d56214fae50a82", 0xe1, r0}, 0x68) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r3, 0x0, 0x0) ioctl$NS_GET_PARENT(r3, 0xb702, 0x0) 20:45:59 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) (async, rerun: 32) remap_file_pages(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x6, 0x0, 0x800) (rerun: 32) rt_sigaction(0x1a, &(0x7f0000000100)={&(0x7f0000000040)="f342ae6726470f7fb1b7fe0000c4c17c280b67de2f6466430f71e732400f014e00c4617de79ea184500cc401ed5c20c4615d606781c441b1f89305000000", 0x10000002, &(0x7f0000000080)="c442950346ec420f4f5b5dc40315697abe008f69d8985c59f5c423a578a4e50000000000c462fd1c87f3ffffffc46179286209c4a1d8560067460f01d82ef242a5", {[0x9]}}, &(0x7f00000001c0)={&(0x7f0000000140)="43dca80c000000c4a17a2c1420c422f2f7216766440f38dbb35cdb0000f265d8c4c441fde69cc400000000c481b455660cdde0c443c17bdbf3f30f01d9", 0x0, &(0x7f0000000180)="4577000f2b24a48fa9f89546cdf240aff3440f5e800b000000f2470f587f04f3a566f30f1c7afd26e3b5c421e9f9480f"}, 0x8, &(0x7f0000000200)) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) (async, rerun: 32) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) (rerun: 32) pselect6(0x40, &(0x7f0000000240)={0x4, 0x6, 0x15ff, 0x1f, 0x9, 0x1, 0x338, 0x9}, &(0x7f0000000280)={0x0, 0x7ff, 0x7, 0x7fffffffffffffff, 0x57, 0x6980000000000, 0x9, 0xffffffffffffff80}, &(0x7f00000002c0)={0x1, 0x5, 0x9, 0x3, 0x1, 0x1, 0x9, 0x7}, &(0x7f0000000340)={r0, r1+60000000}, &(0x7f00000003c0)={&(0x7f0000000380)={[0x4]}, 0x8}) (async, rerun: 64) epoll_create(0xff) (rerun: 64) 20:45:59 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) recvmsg$can_raw(0xffffffffffffffff, &(0x7f00000021c0)={&(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000002180)=[{&(0x7f00000000c0)=""/4096, 0x1000}, {&(0x7f00000010c0)=""/4096, 0x1000}, {&(0x7f00000020c0)=""/156, 0x9c}], 0x3}, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) recvmsg$can_raw(0xffffffffffffffff, &(0x7f00000021c0)={&(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000002180)=[{&(0x7f00000000c0)=""/4096, 0x1000}, {&(0x7f00000010c0)=""/4096, 0x1000}, {&(0x7f00000020c0)=""/156, 0x9c}], 0x3}, 0x0) (async) 20:45:59 executing program 4: bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:45:59 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) (async) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x7, 0x400, 0x0, 0x42}, 0x14) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='highspeed\x00', 0xa) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0x80000001) (async, rerun: 64) socket$nl_audit(0x10, 0x3, 0x9) (rerun: 64) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000080)="8e2a281906832fd1b8d043e0655f7b71a69bccd1ea29057383792d17e51e763184ac0d64cc3a2831244dcd29e29318c01106f00c4f43f7d2429468a7ac06d354237bd9af189b45efb51d083e7a988f5c757ba49f21a5b15fdff01fba785aacb7cb571b87135ffc7a9362f25db064bc1a60b246f74633f4120df2ec8651ceb407ecf6ef2796ee1f4c7a4c5dddbe5b1dc894a7f17ea8de36a42c3c7037db1ec5a665b604c55b5fa23007873790cb43c84447ce4922d6e1ba1acca98fedb9193331d6a6f671dc29a3e8d14dd998af6eca1a0c29d9284f8fd6ecf989d56214fae50a82", 0xe1, r0}, 0x68) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) (async, rerun: 64) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) (rerun: 64) write$char_usb(r3, 0x0, 0x0) ioctl$NS_GET_PARENT(r3, 0xb702, 0x0) 20:45:59 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000000, 0x810, 0xffffffffffffffff, 0x85f18000) (async) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0100000000000000000001"], 0x1c}}, 0x0) 20:45:59 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffff9) prctl$PR_SET_SECUREBITS(0x1c, 0x42) 20:45:59 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000100)=ANY=[@ANYBLOB="030000000900000061626364656667737475767778797a30313233343536e57a3c82eeecf523e96abc926a1de0d1c3592e706e4ca5ceff48c92715cfb644a5cc97d6afbdd05219ad438a000000000000000000000045c69732663b096470b69c949ec7d77c270479ffa9c94e99157f8ea96504c57bf3c06bc698539e55ca4d29a1013e9c7f9679"], 0x29, 0xfffffffffffffffb) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f00000000c0), r0) 20:45:59 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000000, 0x810, 0xffffffffffffffff, 0x85f18000) (async) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0100000000000000000001"], 0x1c}}, 0x0) 20:46:00 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) remap_file_pages(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x6, 0x0, 0x800) rt_sigaction(0x1a, &(0x7f0000000100)={&(0x7f0000000040)="f342ae6726470f7fb1b7fe0000c4c17c280b67de2f6466430f71e732400f014e00c4617de79ea184500cc401ed5c20c4615d606781c441b1f89305000000", 0x10000002, &(0x7f0000000080)="c442950346ec420f4f5b5dc40315697abe008f69d8985c59f5c423a578a4e50000000000c462fd1c87f3ffffffc46179286209c4a1d8560067460f01d82ef242a5", {[0x9]}}, &(0x7f00000001c0)={&(0x7f0000000140)="43dca80c000000c4a17a2c1420c422f2f7216766440f38dbb35cdb0000f265d8c4c441fde69cc400000000c481b455660cdde0c443c17bdbf3f30f01d9", 0x0, &(0x7f0000000180)="4577000f2b24a48fa9f89546cdf240aff3440f5e800b000000f2470f587f04f3a566f30f1c7afd26e3b5c421e9f9480f"}, 0x8, &(0x7f0000000200)) prctl$PR_SET_SECUREBITS(0x1c, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000240)={0x4, 0x6, 0x15ff, 0x1f, 0x9, 0x1, 0x338, 0x9}, &(0x7f0000000280)={0x0, 0x7ff, 0x7, 0x7fffffffffffffff, 0x57, 0x6980000000000, 0x9, 0xffffffffffffff80}, &(0x7f00000002c0)={0x1, 0x5, 0x9, 0x3, 0x1, 0x1, 0x9, 0x7}, &(0x7f0000000340)={r0, r1+60000000}, &(0x7f00000003c0)={&(0x7f0000000380)={[0x4]}, 0x8}) epoll_create(0xff) 20:46:00 executing program 4: bpf$BPF_BTF_LOAD(0x1e, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:00 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) (async) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x7, 0x400, 0x0, 0x42}, 0x14) (async) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='highspeed\x00', 0xa) (async) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0x80000001) socket$nl_audit(0x10, 0x3, 0x9) (async) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000080)="8e2a281906832fd1b8d043e0655f7b71a69bccd1ea29057383792d17e51e763184ac0d64cc3a2831244dcd29e29318c01106f00c4f43f7d2429468a7ac06d354237bd9af189b45efb51d083e7a988f5c757ba49f21a5b15fdff01fba785aacb7cb571b87135ffc7a9362f25db064bc1a60b246f74633f4120df2ec8651ceb407ecf6ef2796ee1f4c7a4c5dddbe5b1dc894a7f17ea8de36a42c3c7037db1ec5a665b604c55b5fa23007873790cb43c84447ce4922d6e1ba1acca98fedb9193331d6a6f671dc29a3e8d14dd998af6eca1a0c29d9284f8fd6ecf989d56214fae50a82", 0xe1, r0}, 0x68) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) (async) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r3, 0x0, 0x0) ioctl$NS_GET_PARENT(r3, 0xb702, 0x0) 20:46:00 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffff9) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffff9) prctl$PR_SET_SECUREBITS(0x1c, 0x42) 20:46:00 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffff8) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000100)=ANY=[@ANYBLOB="030000000900000061626364656667737475767778797a30313233343536e57a3c82eeecf523e96abc926a1de0d1c3592e706e4ca5ceff48c92715cfb644a5cc97d6afbdd05219ad438a000000000000000000000045c69732663b096470b69c949ec7d77c270479ffa9c94e99157f8ea96504c57bf3c06bc698539e55ca4d29a1013e9c7f9679"], 0x29, 0xfffffffffffffffb) (async) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f00000000c0), r0) 20:46:00 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) r2 = gettid() syz_open_procfs$namespace(r2, 0x0) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYRES16, @ANYRES16=r1, @ANYBLOB="0100000000000000000001"], 0x1c}}, 0x0) 20:46:00 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) (async) r2 = gettid() syz_open_procfs$namespace(r2, 0x0) (async) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYRES16, @ANYRES16=r1, @ANYBLOB="0100000000000000000001"], 0x1c}}, 0x0) 20:46:00 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000100)=ANY=[@ANYBLOB="030000000900000061626364656667737475767778797a30313233343536e57a3c82eeecf523e96abc926a1de0d1c3592e706e4ca5ceff48c92715cfb644a5cc97d6afbdd05219ad438a000000000000000000000045c69732663b096470b69c949ec7d77c270479ffa9c94e99157f8ea96504c57bf3c06bc698539e55ca4d29a1013e9c7f9679"], 0x29, 0xfffffffffffffffb) (async) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f00000000c0), r0) 20:46:00 executing program 4: bpf$BPF_BTF_LOAD(0x21, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:00 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffff9) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffff9) prctl$PR_SET_SECUREBITS(0x1c, 0x42) 20:46:00 executing program 4: bpf$BPF_BTF_LOAD(0x22, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:00 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)={0x1, 0x0, @auto=[0x22, 0x40, 0x32, 0x3a, 0x30, 0x21]}, 0xe, 0xfffffffffffffff8) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 20:46:01 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) remap_file_pages(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x6, 0x0, 0x800) rt_sigaction(0x1a, &(0x7f0000000100)={&(0x7f0000000040)="f342ae6726470f7fb1b7fe0000c4c17c280b67de2f6466430f71e732400f014e00c4617de79ea184500cc401ed5c20c4615d606781c441b1f89305000000", 0x10000002, &(0x7f0000000080)="c442950346ec420f4f5b5dc40315697abe008f69d8985c59f5c423a578a4e50000000000c462fd1c87f3ffffffc46179286209c4a1d8560067460f01d82ef242a5", {[0x9]}}, &(0x7f00000001c0)={&(0x7f0000000140)="43dca80c000000c4a17a2c1420c422f2f7216766440f38dbb35cdb0000f265d8c4c441fde69cc400000000c481b455660cdde0c443c17bdbf3f30f01d9", 0x0, &(0x7f0000000180)="4577000f2b24a48fa9f89546cdf240aff3440f5e800b000000f2470f587f04f3a566f30f1c7afd26e3b5c421e9f9480f"}, 0x8, &(0x7f0000000200)) prctl$PR_SET_SECUREBITS(0x1c, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000240)={0x4, 0x6, 0x15ff, 0x1f, 0x9, 0x1, 0x338, 0x9}, &(0x7f0000000280)={0x0, 0x7ff, 0x7, 0x7fffffffffffffff, 0x57, 0x6980000000000, 0x9, 0xffffffffffffff80}, &(0x7f00000002c0)={0x1, 0x5, 0x9, 0x3, 0x1, 0x1, 0x9, 0x7}, &(0x7f0000000340)={r0, r1+60000000}, &(0x7f00000003c0)={&(0x7f0000000380)={[0x4]}, 0x8}) epoll_create(0xff) 20:46:01 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x30, 0xfffffffffffffffc) 20:46:01 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffff8) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x19c010, 0xffffffffffffffff, 0x10000000) 20:46:01 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)={0x1, 0x0, @auto=[0x22, 0x40, 0x32, 0x3a, 0x30, 0x21]}, 0xe, 0xfffffffffffffff8) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 20:46:01 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 64) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) (async, rerun: 64) r2 = gettid() syz_open_procfs$namespace(r2, 0x0) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYRES16, @ANYRES16=r1, @ANYBLOB="0100000000000000000001"], 0x1c}}, 0x0) 20:46:01 executing program 4: bpf$BPF_BTF_LOAD(0x23, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:01 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffff8) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffff8) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x19c010, 0xffffffffffffffff, 0x10000000) 20:46:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:01 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)={0x1, 0x0, @auto=[0x22, 0x40, 0x32, 0x3a, 0x30, 0x21]}, 0xe, 0xfffffffffffffff8) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 20:46:01 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x30, 0xfffffffffffffffc) 20:46:01 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffff8) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x19c010, 0xffffffffffffffff, 0x10000000) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffff8) (async) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x19c010, 0xffffffffffffffff, 0x10000000) (async) 20:46:01 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x30, 0xfffffffffffffffc) 20:46:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:02 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x10) prctl$PR_SET_SECUREBITS(0x1c, 0x21) sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="200000765a7c1a5ad7ff0c0000dcdf250800010000"], 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x1) 20:46:02 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000000), r1) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), r1) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="0100000000000000000001"], 0x1c}}, 0x0) 20:46:02 executing program 1: shmget(0x3, 0x3000, 0x20, &(0x7f0000ffd000/0x3000)=nil) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) 20:46:02 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) remap_file_pages(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x6, 0x0, 0x800) rt_sigaction(0x1a, &(0x7f0000000100)={&(0x7f0000000040)="f342ae6726470f7fb1b7fe0000c4c17c280b67de2f6466430f71e732400f014e00c4617de79ea184500cc401ed5c20c4615d606781c441b1f89305000000", 0x10000002, &(0x7f0000000080)="c442950346ec420f4f5b5dc40315697abe008f69d8985c59f5c423a578a4e50000000000c462fd1c87f3ffffffc46179286209c4a1d8560067460f01d82ef242a5", {[0x9]}}, &(0x7f00000001c0)={&(0x7f0000000140)="43dca80c000000c4a17a2c1420c422f2f7216766440f38dbb35cdb0000f265d8c4c441fde69cc400000000c481b455660cdde0c443c17bdbf3f30f01d9", 0x0, &(0x7f0000000180)="4577000f2b24a48fa9f89546cdf240aff3440f5e800b000000f2470f587f04f3a566f30f1c7afd26e3b5c421e9f9480f"}, 0x8, &(0x7f0000000200)) prctl$PR_SET_SECUREBITS(0x1c, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000240)={0x4, 0x6, 0x15ff, 0x1f, 0x9, 0x1, 0x338, 0x9}, &(0x7f0000000280)={0x0, 0x7ff, 0x7, 0x7fffffffffffffff, 0x57, 0x6980000000000, 0x9, 0xffffffffffffff80}, &(0x7f00000002c0)={0x1, 0x5, 0x9, 0x3, 0x1, 0x1, 0x9, 0x7}, &(0x7f0000000340)={r0, r1+60000000}, &(0x7f00000003c0)={&(0x7f0000000380)={[0x4]}, 0x8}) 20:46:02 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)={0x1, 0x0, @d}, 0x18, 0xfffffffffffffff8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan1\x00'}) 20:46:02 executing program 1: shmget(0x3, 0x3000, 0x20, &(0x7f0000ffd000/0x3000)=nil) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) shmget(0x3, 0x3000, 0x20, &(0x7f0000ffd000/0x3000)=nil) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) 20:46:02 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x10) prctl$PR_SET_SECUREBITS(0x1c, 0x21) sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="200000765a7c1a5ad7ff0c0000dcdf250800010000"], 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x1) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x10) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x21) (async) sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="200000765a7c1a5ad7ff0c0000dcdf250800010000"], 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x1) (async) 20:46:02 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) (async) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)={0x1, 0x0, @d}, 0x18, 0xfffffffffffffff8) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan1\x00'}) 20:46:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x3, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:02 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 64) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (rerun: 64) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000000), r1) (async) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), r1) (async) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="0100000000000000000001"], 0x1c}}, 0x0) 20:46:02 executing program 1: shmget(0x3, 0x3000, 0x20, &(0x7f0000ffd000/0x3000)=nil) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) 20:46:02 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)={0x1, 0x0, @d}, 0x18, 0xfffffffffffffff8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan1\x00'}) [ 1257.986579][ T3217] __nla_validate_parse: 46 callbacks suppressed [ 1257.986611][ T3217] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 20:46:02 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) remap_file_pages(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x6, 0x0, 0x800) rt_sigaction(0x1a, &(0x7f0000000100)={&(0x7f0000000040)="f342ae6726470f7fb1b7fe0000c4c17c280b67de2f6466430f71e732400f014e00c4617de79ea184500cc401ed5c20c4615d606781c441b1f89305000000", 0x10000002, &(0x7f0000000080)="c442950346ec420f4f5b5dc40315697abe008f69d8985c59f5c423a578a4e50000000000c462fd1c87f3ffffffc46179286209c4a1d8560067460f01d82ef242a5", {[0x9]}}, &(0x7f00000001c0)={&(0x7f0000000140)="43dca80c000000c4a17a2c1420c422f2f7216766440f38dbb35cdb0000f265d8c4c441fde69cc400000000c481b455660cdde0c443c17bdbf3f30f01d9", 0x0, &(0x7f0000000180)="4577000f2b24a48fa9f89546cdf240aff3440f5e800b000000f2470f587f04f3a566f30f1c7afd26e3b5c421e9f9480f"}, 0x8, &(0x7f0000000200)) prctl$PR_SET_SECUREBITS(0x1c, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) clock_gettime(0x0, &(0x7f0000000300)) 20:46:02 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x10) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x21) (async) sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="200000765a7c1a5ad7ff0c0000dcdf250800010000"], 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x1) 20:46:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x5, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:02 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)={0x3, 0x0, @b}, 0x48, 0xfffffffffffffffc) 20:46:02 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xe, 0x81, 0x5, 0x0, 0x810, 0x1, 0x40000000, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x3}, 0x48) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000000c0)=ANY=[@ANYBLOB="fa7e00000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) read$char_usb(0xffffffffffffffff, &(0x7f0000000040)=""/41, 0x29) 20:46:02 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000000), r1) (async) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), r1) (async) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="0100000000000000000001"], 0x1c}}, 0x0) 20:46:02 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0100000000000000000001"], 0x1c}}, 0x24040044) 20:46:02 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xe, 0x81, 0x5, 0x0, 0x810, 0x1, 0x40000000, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x3}, 0x48) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000000c0)=ANY=[@ANYBLOB="fa7e00000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) (async, rerun: 32) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) (async, rerun: 32) read$char_usb(0xffffffffffffffff, &(0x7f0000000040)=""/41, 0x29) 20:46:03 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)={0x3, 0x0, @b}, 0x48, 0xfffffffffffffffc) 20:46:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0xa, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:03 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) remap_file_pages(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x6, 0x0, 0x800) rt_sigaction(0x1a, &(0x7f0000000100)={&(0x7f0000000040)="f342ae6726470f7fb1b7fe0000c4c17c280b67de2f6466430f71e732400f014e00c4617de79ea184500cc401ed5c20c4615d606781c441b1f89305000000", 0x10000002, &(0x7f0000000080)="c442950346ec420f4f5b5dc40315697abe008f69d8985c59f5c423a578a4e50000000000c462fd1c87f3ffffffc46179286209c4a1d8560067460f01d82ef242a5", {[0x9]}}, &(0x7f00000001c0)={&(0x7f0000000140)="43dca80c000000c4a17a2c1420c422f2f7216766440f38dbb35cdb0000f265d8c4c441fde69cc400000000c481b455660cdde0c443c17bdbf3f30f01d9", 0x0, &(0x7f0000000180)="4577000f2b24a48fa9f89546cdf240aff3440f5e800b000000f2470f587f04f3a566f30f1c7afd26e3b5c421e9f9480f"}, 0x8, &(0x7f0000000200)) prctl$PR_SET_SECUREBITS(0x1c, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 20:46:03 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xe, 0x81, 0x5, 0x0, 0x810, 0x1, 0x40000000, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x3}, 0x48) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000000c0)=ANY=[@ANYBLOB="fa7e00000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) (async) read$char_usb(0xffffffffffffffff, &(0x7f0000000040)=""/41, 0x29) 20:46:03 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) remap_file_pages(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x6, 0x0, 0x800) rt_sigaction(0x1a, &(0x7f0000000100)={&(0x7f0000000040)="f342ae6726470f7fb1b7fe0000c4c17c280b67de2f6466430f71e732400f014e00c4617de79ea184500cc401ed5c20c4615d606781c441b1f89305000000", 0x10000002, &(0x7f0000000080)="c442950346ec420f4f5b5dc40315697abe008f69d8985c59f5c423a578a4e50000000000c462fd1c87f3ffffffc46179286209c4a1d8560067460f01d82ef242a5", {[0x9]}}, &(0x7f00000001c0)={&(0x7f0000000140)="43dca80c000000c4a17a2c1420c422f2f7216766440f38dbb35cdb0000f265d8c4c441fde69cc400000000c481b455660cdde0c443c17bdbf3f30f01d9", 0x0, &(0x7f0000000180)="4577000f2b24a48fa9f89546cdf240aff3440f5e800b000000f2470f587f04f3a566f30f1c7afd26e3b5c421e9f9480f"}, 0x8, &(0x7f0000000200)) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 20:46:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x10, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:03 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0100000000000000000001"], 0x1c}}, 0x24040044) 20:46:03 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)={0x3, 0x0, @b}, 0x48, 0xfffffffffffffffc) [ 1258.881243][ T3271] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 20:46:03 executing program 0: prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000040)='fscrypt-provisioning\x00') add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl1\x00', &(0x7f0000000080)={'sit0\x00', 0x0, 0x8000, 0x10, 0x2, 0x7f1, {{0x1f, 0x4, 0x1, 0x9, 0x7c, 0x65, 0x0, 0x2, 0x29, 0x0, @multicast2, @local, {[@ssrr={0x89, 0x27, 0xdb, [@local, @broadcast, @multicast1, @empty, @remote, @local, @private=0xa010100, @rand_addr=0x64010100, @local]}, @ssrr={0x89, 0xb, 0x96, [@multicast2, @private=0xa010100]}, @rr={0x7, 0x17, 0x18, [@local, @private=0xa010101, @broadcast, @broadcast, @empty]}, @timestamp_addr={0x44, 0x14, 0xa9, 0x1, 0x7, [{@broadcast, 0x3}, {@rand_addr=0x64010100, 0x9}]}, @generic={0x0, 0xa, "39c5b642450a1818"}]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f0000001500)=@base={0x12, 0x0, 0x0, 0xb853, 0x0, 0x1, 0x0, '\x00', r0}, 0x48) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000008, 0x100010, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0xd) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) 20:46:03 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) getrlimit(0xe, &(0x7f0000000040)) 20:46:03 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) remap_file_pages(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x6, 0x0, 0x800) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 20:46:03 executing program 0: prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000040)='fscrypt-provisioning\x00') add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl1\x00', &(0x7f0000000080)={'sit0\x00', 0x0, 0x8000, 0x10, 0x2, 0x7f1, {{0x1f, 0x4, 0x1, 0x9, 0x7c, 0x65, 0x0, 0x2, 0x29, 0x0, @multicast2, @local, {[@ssrr={0x89, 0x27, 0xdb, [@local, @broadcast, @multicast1, @empty, @remote, @local, @private=0xa010100, @rand_addr=0x64010100, @local]}, @ssrr={0x89, 0xb, 0x96, [@multicast2, @private=0xa010100]}, @rr={0x7, 0x17, 0x18, [@local, @private=0xa010101, @broadcast, @broadcast, @empty]}, @timestamp_addr={0x44, 0x14, 0xa9, 0x1, 0x7, [{@broadcast, 0x3}, {@rand_addr=0x64010100, 0x9}]}, @generic={0x0, 0xa, "39c5b642450a1818"}]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f0000001500)=@base={0x12, 0x0, 0x0, 0xb853, 0x0, 0x1, 0x0, '\x00', r0}, 0x48) (async) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000008, 0x100010, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0xd) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) 20:46:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x64, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:03 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) (async) getrlimit(0xe, &(0x7f0000000040)) 20:46:03 executing program 0: prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000040)='fscrypt-provisioning\x00') (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl1\x00', &(0x7f0000000080)={'sit0\x00', 0x0, 0x8000, 0x10, 0x2, 0x7f1, {{0x1f, 0x4, 0x1, 0x9, 0x7c, 0x65, 0x0, 0x2, 0x29, 0x0, @multicast2, @local, {[@ssrr={0x89, 0x27, 0xdb, [@local, @broadcast, @multicast1, @empty, @remote, @local, @private=0xa010100, @rand_addr=0x64010100, @local]}, @ssrr={0x89, 0xb, 0x96, [@multicast2, @private=0xa010100]}, @rr={0x7, 0x17, 0x18, [@local, @private=0xa010101, @broadcast, @broadcast, @empty]}, @timestamp_addr={0x44, 0x14, 0xa9, 0x1, 0x7, [{@broadcast, 0x3}, {@rand_addr=0x64010100, 0x9}]}, @generic={0x0, 0xa, "39c5b642450a1818"}]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f0000001500)=@base={0x12, 0x0, 0x0, 0xb853, 0x0, 0x1, 0x0, '\x00', r0}, 0x48) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000008, 0x100010, 0xffffffffffffffff, 0x0) (async) prctl$PR_SET_SECUREBITS(0x1c, 0xd) (async) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) 20:46:03 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 20:46:03 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x3, 0x0, @auto=[0x14, 0x2e, 0x1c, 0x2e, 0x15, 0x23, 0x10, 0x12]}, 0x10, 0xfffffffffffffff8) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0xa, 0x7, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x10001}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @exit, @map_idx={0x18, 0x4, 0x5, 0x0, 0xd}]}, &(0x7f00000001c0)='GPL\x00', 0x9, 0xd4, &(0x7f0000000200)=""/212, 0x41000, 0x1, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x4, 0x59, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000380)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x1000, &(0x7f0000000440)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_client}, {@cache_mmap}, {@access_uid={'access', 0x3d, 0xee00}}, {@access_any}, {@loose}, {@cache_mmap}, {@loose}], [{@smackfsdef={'smackfsdef', 0x3d, 'syz'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&\'\\$\xe5!-)*'}}]}}) 20:46:03 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0100000000000000000001"], 0x1c}}, 0x24040044) 20:46:03 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x3, 0x0, @auto=[0x14, 0x2e, 0x1c, 0x2e, 0x15, 0x23, 0x10, 0x12]}, 0x10, 0xfffffffffffffff8) (async, rerun: 64) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0xa, 0x7, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x10001}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @exit, @map_idx={0x18, 0x4, 0x5, 0x0, 0xd}]}, &(0x7f00000001c0)='GPL\x00', 0x9, 0xd4, &(0x7f0000000200)=""/212, 0x41000, 0x1, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x4, 0x59, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000380)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) (rerun: 64) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x1000, &(0x7f0000000440)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_client}, {@cache_mmap}, {@access_uid={'access', 0x3d, 0xee00}}, {@access_any}, {@loose}, {@cache_mmap}, {@loose}], [{@smackfsdef={'smackfsdef', 0x3d, 'syz'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&\'\\$\xe5!-)*'}}]}}) 20:46:03 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) (async) getrlimit(0xe, &(0x7f0000000040)) 20:46:03 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) [ 1258.990044][ T3292] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 20:46:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:03 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000140), 0x0, 0x0, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_UNTAG_MASK(0x4001, &(0x7f00000002c0)) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x1, 0x0, @b}, 0x48, 0xfffffffffffffffc) prctl$PR_SET_SECUREBITS(0x1c, 0x0) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/83, 0x53, 0x1, &(0x7f0000000200)=""/10, 0xa}, &(0x7f0000000280)=0x40) 20:46:03 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x3, 0x0, @auto=[0x14, 0x2e, 0x1c, 0x2e, 0x15, 0x23, 0x10, 0x12]}, 0x10, 0xfffffffffffffff8) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0xa, 0x7, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x10001}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @exit, @map_idx={0x18, 0x4, 0x5, 0x0, 0xd}]}, &(0x7f00000001c0)='GPL\x00', 0x9, 0xd4, &(0x7f0000000200)=""/212, 0x41000, 0x1, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x4, 0x59, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000380)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x1000, &(0x7f0000000440)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_client}, {@cache_mmap}, {@access_uid={'access', 0x3d, 0xee00}}, {@access_any}, {@loose}, {@cache_mmap}, {@loose}], [{@smackfsdef={'smackfsdef', 0x3d, 'syz'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&\'\\$\xe5!-)*'}}]}}) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x3, 0x0, @auto=[0x14, 0x2e, 0x1c, 0x2e, 0x15, 0x23, 0x10, 0x12]}, 0x10, 0xfffffffffffffff8) (async) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0xa, 0x7, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x10001}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @exit, @map_idx={0x18, 0x4, 0x5, 0x0, 0xd}]}, &(0x7f00000001c0)='GPL\x00', 0x9, 0xd4, &(0x7f0000000200)=""/212, 0x41000, 0x1, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x4, 0x59, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000380)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) (async) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x1000, &(0x7f0000000440)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_client}, {@cache_mmap}, {@access_uid={'access', 0x3d, 0xee00}}, {@access_any}, {@loose}, {@cache_mmap}, {@loose}], [{@smackfsdef={'smackfsdef', 0x3d, 'syz'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&\'\\$\xe5!-)*'}}]}}) (async) 20:46:03 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) getuid() mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, 0xffffffffffffffff, 0x8000000) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x8, 0x20010, 0xffffffffffffffff, 0xc2a0000) 20:46:03 executing program 5: mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 20:46:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:03 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000140), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async, rerun: 32) arch_prctl$ARCH_GET_UNTAG_MASK(0x4001, &(0x7f00000002c0)) (async, rerun: 32) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x1, 0x0, @b}, 0x48, 0xfffffffffffffffc) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/83, 0x53, 0x1, &(0x7f0000000200)=""/10, 0xa}, &(0x7f0000000280)=0x40) 20:46:03 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) getuid() mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, 0xffffffffffffffff, 0x8000000) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x8, 0x20010, 0xffffffffffffffff, 0xc2a0000) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) (async) getuid() (async) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, 0xffffffffffffffff, 0x8000000) (async) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x8, 0x20010, 0xffffffffffffffff, 0xc2a0000) (async) [ 1259.058350][ T3314] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 20:46:03 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) lsetxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)=@v1={0x1000000, [{0x0, 0x881}]}, 0xc, 0x2) r2 = gettid() syz_open_procfs$namespace(r2, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000000), r3) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), r3) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x100000e, 0xac5, 0x20) mincore(&(0x7f0000ffa000/0x5000)=nil, 0x5000, &(0x7f0000000100)=""/33) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0100000000000000000001", @ANYRES16=r2], 0x1c}}, 0x48884) 20:46:03 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xb, 0x0, 0x8, 0x0, 0x238, 0x1, 0x40, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x4}, 0x48) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) 20:46:03 executing program 5: mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 20:46:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x3, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:03 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000140), 0x0, 0x0, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_UNTAG_MASK(0x4001, &(0x7f00000002c0)) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x1, 0x0, @b}, 0x48, 0xfffffffffffffffc) prctl$PR_SET_SECUREBITS(0x1c, 0x0) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/83, 0x53, 0x1, &(0x7f0000000200)=""/10, 0xa}, &(0x7f0000000280)=0x40) add_key$fscrypt_provisioning(&(0x7f0000000140), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) arch_prctl$ARCH_GET_UNTAG_MASK(0x4001, &(0x7f00000002c0)) (async) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x1, 0x0, @b}, 0x48, 0xfffffffffffffffc) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) pipe2$watch_queue(&(0x7f0000000000), 0x80) (async) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/83, 0x53, 0x1, &(0x7f0000000200)=""/10, 0xa}, &(0x7f0000000280)=0x40) (async) 20:46:03 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) getuid() mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, 0xffffffffffffffff, 0x8000000) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x8, 0x20010, 0xffffffffffffffff, 0xc2a0000) (async) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x8, 0x20010, 0xffffffffffffffff, 0xc2a0000) 20:46:03 executing program 5: mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 20:46:03 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xb, 0x0, 0x8, 0x0, 0x238, 0x1, 0x40, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x4}, 0x48) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) 20:46:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x4, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:03 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) lsetxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)=@v1={0x1000000, [{0x0, 0x881}]}, 0xc, 0x2) (async) r2 = gettid() syz_open_procfs$namespace(r2, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000000), r3) (async) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), r3) (async) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x100000e, 0xac5, 0x20) (async) mincore(&(0x7f0000ffa000/0x5000)=nil, 0x5000, &(0x7f0000000100)=""/33) (async) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0100000000000000000001", @ANYRES16=r2], 0x1c}}, 0x48884) 20:46:03 executing program 5: add_key$fscrypt_provisioning(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 20:46:03 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xb, 0x0, 0x8, 0x0, 0x238, 0x1, 0x40, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x4}, 0x48) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) 20:46:03 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) prctl$PR_SET_IO_FLUSHER(0x39, 0x1) 20:46:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x5, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) [ 1259.166443][ T3359] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 20:46:03 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) 20:46:03 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) 20:46:03 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) prctl$PR_SET_IO_FLUSHER(0x39, 0x1) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) prctl$PR_SET_IO_FLUSHER(0x39, 0x1) (async) 20:46:03 executing program 5: add_key$fscrypt_provisioning(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 20:46:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x6, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:03 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) lsetxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)=@v1={0x1000000, [{0x0, 0x881}]}, 0xc, 0x2) r2 = gettid() syz_open_procfs$namespace(r2, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000000), r3) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), r3) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x100000e, 0xac5, 0x20) mincore(&(0x7f0000ffa000/0x5000)=nil, 0x5000, &(0x7f0000000100)=""/33) (async) mincore(&(0x7f0000ffa000/0x5000)=nil, 0x5000, &(0x7f0000000100)=""/33) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0100000000000000000001", @ANYRES16=r2], 0x1c}}, 0x48884) (async) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0100000000000000000001", @ANYRES16=r2], 0x1c}}, 0x48884) 20:46:03 executing program 5: add_key$fscrypt_provisioning(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 20:46:03 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) prctl$PR_SET_IO_FLUSHER(0x39, 0x1) 20:46:03 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) 20:46:03 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)={0x1, 0x0, @a}, 0x48, 0xffffffffffffffff) 20:46:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x7, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:03 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) 20:46:03 executing program 2: openat$vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x701c1, 0x0) open_tree(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80001) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = gettid() syz_open_procfs$namespace(r2, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r3, 0x0, 0x0) sendto$unix(r3, &(0x7f0000000080)="7679b7d86b8cf196dc0c1ea591755b", 0xf, 0x4000000, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) sendmsg$DEVLINK_CMD_RELOAD(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000280)={&(0x7f0000000840)=ANY=[@ANYBLOB="68010000", @ANYRES16=0x0, @ANYBLOB="120026bd7000fedbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=0x0, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008a00", @ANYRES32=r0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008b00", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c00040000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0002000000080001007063690011000200303030303a30303a31302e300000000008008c0001000000080001007063690011000200303030303a30303a31302e300000000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r2, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="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"/487], 0x168}, 0x1, 0x0, 0x0, 0x20000000}, 0x400c001) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) 20:46:03 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)={0x1, 0x0, @a}, 0x48, 0xffffffffffffffff) 20:46:03 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x1d, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:03 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)={0x1, 0x0, @a}, 0x48, 0xffffffffffffffff) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)={0x1, 0x0, @a}, 0x48, 0xffffffffffffffff) [ 1259.322251][ T3406] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 20:46:03 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) 20:46:03 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0000d9ef0cdf4f29bda201957d9b246a7da96901a0675114fc018e54b3071fb5b511553be0531ebd482a464edb913e85d14e1c608677c809cd3e7958ed7885945b70fa56dac179f4991e7cf72a05d5cad7e39f"], 0x1c}}, 0x0) 20:46:03 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x1d, 0xffffffffffffffff) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x1d, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:03 executing program 2: openat$vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x701c1, 0x0) (async) open_tree(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80001) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = gettid() syz_open_procfs$namespace(r2, 0x0) (async) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r3, 0x0, 0x0) (async, rerun: 32) sendto$unix(r3, &(0x7f0000000080)="7679b7d86b8cf196dc0c1ea591755b", 0xf, 0x4000000, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) (async, rerun: 32) sendmsg$DEVLINK_CMD_RELOAD(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000280)={&(0x7f0000000840)=ANY=[@ANYBLOB="68010000", @ANYRES16=0x0, @ANYBLOB="120026bd7000fedbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=0x0, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008a00", @ANYRES32=r0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008b00", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c00040000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0002000000080001007063690011000200303030303a30303a31302e300000000008008c0001000000080001007063690011000200303030303a30303a31302e300000000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r2, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="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"/487], 0x168}, 0x1, 0x0, 0x0, 0x20000000}, 0x400c001) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) 20:46:03 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) 20:46:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x8, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:03 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) syz_io_uring_setup(0x18a9, &(0x7f0000000040)={0x0, 0x1e30, 0x10, 0x0, 0x30a}, &(0x7f00000000c0), &(0x7f0000000100)) 20:46:03 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x1d, 0xffffffffffffffff) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x9, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) [ 1259.364328][ T3414] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 20:46:03 executing program 2: openat$vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x701c1, 0x0) (async) open_tree(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80001) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = gettid() syz_open_procfs$namespace(r2, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r3, 0x0, 0x0) (async) sendto$unix(r3, &(0x7f0000000080)="7679b7d86b8cf196dc0c1ea591755b", 0xf, 0x4000000, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) (async) sendmsg$DEVLINK_CMD_RELOAD(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000280)={&(0x7f0000000840)=ANY=[@ANYBLOB="68010000", @ANYRES16=0x0, @ANYBLOB="120026bd7000fedbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=0x0, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008a00", @ANYRES32=r0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008b00", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c00040000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0002000000080001007063690011000200303030303a30303a31302e300000000008008c0001000000080001007063690011000200303030303a30303a31302e300000000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r2, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="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"/487], 0x168}, 0x1, 0x0, 0x0, 0x20000000}, 0x400c001) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) 20:46:03 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0000d9ef0cdf4f29bda201957d9b246a7da96901a0675114fc018e54b3071fb5b511553be0531ebd482a464edb913e85d14e1c608677c809cd3e7958ed7885945b70fa56dac179f4991e7cf72a05d5cad7e39f"], 0x1c}}, 0x0) 20:46:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0xa, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:03 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) syz_io_uring_setup(0x18a9, &(0x7f0000000040)={0x0, 0x1e30, 0x10, 0x0, 0x30a}, &(0x7f00000000c0), &(0x7f0000000100)) 20:46:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:03 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040)={0x1, 0x1ff, 0x7, 0x0, 0x2001000}, 0x14) 20:46:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0xb, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:03 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x0, 0x0, @d}, 0x18, 0xfffffffffffffffd) 20:46:03 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0000d9ef0cdf4f29bda201957d9b246a7da96901a0675114fc018e54b3071fb5b511553be0531ebd482a464edb913e85d14e1c608677c809cd3e7958ed7885945b70fa56dac179f4991e7cf72a05d5cad7e39f"], 0x1c}}, 0x0) 20:46:03 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x0, 0x0, @d}, 0x18, 0xfffffffffffffffd) 20:46:03 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) syz_io_uring_setup(0x18a9, &(0x7f0000000040)={0x0, 0x1e30, 0x10, 0x0, 0x30a}, &(0x7f00000000c0), &(0x7f0000000100)) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) syz_io_uring_setup(0x18a9, &(0x7f0000000040)={0x0, 0x1e30, 0x10, 0x0, 0x30a}, &(0x7f00000000c0), &(0x7f0000000100)) (async) 20:46:03 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) (async) mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) (async) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040)={0x1, 0x1ff, 0x7, 0x0, 0x2001000}, 0x14) 20:46:03 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x0, 0x0, @d}, 0x18, 0xfffffffffffffffd) 20:46:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:03 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000340)={'wpan3\x00'}) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000000), r3) r4 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f0000000380)={'ip_vti0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESHEX=0x0, @ANYBLOB="000006ff000000000000000045000014"]}) sendmsg$NLBL_CALIPSO_C_ADD(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x4, 0x70bd25, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x24002814}, 0x20000841) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x58, 0x0, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x2}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @empty}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @local}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000804}, 0x4000) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="aad70000", @ANYRES16=r2, @ANYBLOB="0100000000000000000001"], 0x1c}}, 0x0) 20:46:03 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x889d) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x30, r2, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_SPORT={0x6}, @L2TP_ATTR_UDP_SPORT={0x6}, @L2TP_ATTR_COOKIE={0xc}]}, 0x30}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r2, 0x10, 0x70bd28, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x4040041) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) 20:46:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0xc, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:03 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) (async) mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040)={0x1, 0x1ff, 0x7, 0x0, 0x2001000}, 0x14) 20:46:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 20:46:03 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x889d) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x30, r2, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_SPORT={0x6}, @L2TP_ATTR_UDP_SPORT={0x6}, @L2TP_ATTR_COOKIE={0xc}]}, 0x30}}, 0x0) (async) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r2, 0x10, 0x70bd28, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x4040041) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) 20:46:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0xd, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:03 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000140)=ANY=[@ANYBLOB="01000000001500001f191f393d1823260200000000000000b58aab442336b9e2eea063874b9abf356b425fccb126fc55d35b577634bc5226bf7a97d0962977fbdb06dd13186a94103fa27ab2c8c5bbcb5ddbf85c41fb21ac9b97fc78714a2e503e6f54a0bea4089b196e30fdb8c20cdaf91497eb2402ec9644a60369c996251b9297a6a17567490a4ecab8fab9d36f7f4a3b8e4970452d235e80df185c412c69717db639b3381e5a0e2db6083ff9460174db53d0884efc44c5b1fe345dd587a7218fa4bc0ff2474d399476756848b61dc437b48f032670491940d4912d828718bbb6baceb2027296f3d3fa4e84cfb193f9b828706674235f"], 0x12, 0xfffffffffffffffa) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r0) 20:46:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0xe, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 20:46:03 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x889d) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x30, r2, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_SPORT={0x6}, @L2TP_ATTR_UDP_SPORT={0x6}, @L2TP_ATTR_COOKIE={0xc}]}, 0x30}}, 0x0) (async) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r2, 0x10, 0x70bd28, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x4040041) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) 20:46:03 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000140)=ANY=[@ANYBLOB="01000000001500001f191f393d1823260200000000000000b58aab442336b9e2eea063874b9abf356b425fccb126fc55d35b577634bc5226bf7a97d0962977fbdb06dd13186a94103fa27ab2c8c5bbcb5ddbf85c41fb21ac9b97fc78714a2e503e6f54a0bea4089b196e30fdb8c20cdaf91497eb2402ec9644a60369c996251b9297a6a17567490a4ecab8fab9d36f7f4a3b8e4970452d235e80df185c412c69717db639b3381e5a0e2db6083ff9460174db53d0884efc44c5b1fe345dd587a7218fa4bc0ff2474d399476756848b61dc437b48f032670491940d4912d828718bbb6baceb2027296f3d3fa4e84cfb193f9b828706674235f"], 0x12, 0xfffffffffffffffa) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r0) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000140)=ANY=[@ANYBLOB="01000000001500001f191f393d1823260200000000000000b58aab442336b9e2eea063874b9abf356b425fccb126fc55d35b577634bc5226bf7a97d0962977fbdb06dd13186a94103fa27ab2c8c5bbcb5ddbf85c41fb21ac9b97fc78714a2e503e6f54a0bea4089b196e30fdb8c20cdaf91497eb2402ec9644a60369c996251b9297a6a17567490a4ecab8fab9d36f7f4a3b8e4970452d235e80df185c412c69717db639b3381e5a0e2db6083ff9460174db53d0884efc44c5b1fe345dd587a7218fa4bc0ff2474d399476756848b61dc437b48f032670491940d4912d828718bbb6baceb2027296f3d3fa4e84cfb193f9b828706674235f"], 0x12, 0xfffffffffffffffa) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r0) (async) 20:46:03 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000340)={'wpan3\x00'}) (async) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000000), r3) (async) r4 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f0000000380)={'ip_vti0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESHEX=0x0, @ANYBLOB="000006ff000000000000000045000014"]}) (async) sendmsg$NLBL_CALIPSO_C_ADD(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x4, 0x70bd25, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x24002814}, 0x20000841) (async) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x58, 0x0, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x2}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @empty}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @local}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000804}, 0x4000) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="aad70000", @ANYRES16=r2, @ANYBLOB="0100000000000000000001"], 0x1c}}, 0x0) 20:46:03 executing program 2: syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x4d, 0xfffffffffffffffd) 20:46:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 20:46:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0xf, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:03 executing program 2: syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x4d, 0xfffffffffffffffd) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x4d, 0xfffffffffffffffd) 20:46:03 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000140)=ANY=[@ANYBLOB="01000000001500001f191f393d1823260200000000000000b58aab442336b9e2eea063874b9abf356b425fccb126fc55d35b577634bc5226bf7a97d0962977fbdb06dd13186a94103fa27ab2c8c5bbcb5ddbf85c41fb21ac9b97fc78714a2e503e6f54a0bea4089b196e30fdb8c20cdaf91497eb2402ec9644a60369c996251b9297a6a17567490a4ecab8fab9d36f7f4a3b8e4970452d235e80df185c412c69717db639b3381e5a0e2db6083ff9460174db53d0884efc44c5b1fe345dd587a7218fa4bc0ff2474d399476756848b61dc437b48f032670491940d4912d828718bbb6baceb2027296f3d3fa4e84cfb193f9b828706674235f"], 0x12, 0xfffffffffffffffa) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r0) 20:46:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000240)=""/5, 0x0, 0x5, 0x1}, 0x20) 20:46:03 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x889d) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8900000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, 0x0, 0x2, 0x70bd2c, 0x25dfdbfc, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @loopback}, @GTPA_TID={0xc, 0x3, 0x3}, @GTPA_TID={0xc, 0x3, 0x2}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_PEER_ADDRESS={0x8, 0x4, @local}, @GTPA_LINK={0x8}, @GTPA_NET_NS_FD={0x8, 0x7, r1}]}, 0x54}, 0x1, 0x0, 0x0, 0x40410}, 0x20004001) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@ipv6_getaddrlabel={0x70, 0x4a, 0x2, 0x70bd28, 0x25dfdbfe, {0xa, 0x0, 0x80, 0x0, r2, 0x800}, [@IFAL_LABEL={0x8, 0x2, 0x2}, @IFAL_LABEL={0x8, 0x2, 0xc}, @IFAL_LABEL={0x8}, @IFAL_LABEL={0x8, 0x2, 0x8}, @IFAL_ADDRESS={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @IFAL_LABEL={0x8, 0x2, 0x5}, @IFAL_LABEL={0x8, 0x2, 0x1}, @IFAL_LABEL={0x8, 0x2, 0x1}, @IFAL_LABEL={0x8, 0x2, 0x5}]}, 0x70}, 0x1, 0x0, 0x0, 0x894}, 0x4) 20:46:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x10, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:03 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000340)={'wpan3\x00'}) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) (async) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000000), r3) (async) r4 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f0000000380)={'ip_vti0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESHEX=0x0, @ANYBLOB="000006ff000000000000000045000014"]}) sendmsg$NLBL_CALIPSO_C_ADD(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x4, 0x70bd25, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x24002814}, 0x20000841) (async) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x58, 0x0, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x2}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @empty}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @local}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000804}, 0x4000) (async) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="aad70000", @ANYRES16=r2, @ANYBLOB="0100000000000000000001"], 0x1c}}, 0x0) 20:46:03 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)={0x0, 0x0, @a}, 0x48, 0xfffffffffffffff9) epoll_create1(0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:03 executing program 2: syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) (async, rerun: 64) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x4d, 0xfffffffffffffffd) (rerun: 64) 20:46:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000240)=""/5, 0x0, 0x5, 0x1}, 0x20) 20:46:03 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x889d) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) (async) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8900000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, 0x0, 0x2, 0x70bd2c, 0x25dfdbfc, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @loopback}, @GTPA_TID={0xc, 0x3, 0x3}, @GTPA_TID={0xc, 0x3, 0x2}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_PEER_ADDRESS={0x8, 0x4, @local}, @GTPA_LINK={0x8}, @GTPA_NET_NS_FD={0x8, 0x7, r1}]}, 0x54}, 0x1, 0x0, 0x0, 0x40410}, 0x20004001) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@ipv6_getaddrlabel={0x70, 0x4a, 0x2, 0x70bd28, 0x25dfdbfe, {0xa, 0x0, 0x80, 0x0, r2, 0x800}, [@IFAL_LABEL={0x8, 0x2, 0x2}, @IFAL_LABEL={0x8, 0x2, 0xc}, @IFAL_LABEL={0x8}, @IFAL_LABEL={0x8, 0x2, 0x8}, @IFAL_ADDRESS={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @IFAL_LABEL={0x8, 0x2, 0x5}, @IFAL_LABEL={0x8, 0x2, 0x1}, @IFAL_LABEL={0x8, 0x2, 0x1}, @IFAL_LABEL={0x8, 0x2, 0x5}]}, 0x70}, 0x1, 0x0, 0x0, 0x894}, 0x4) 20:46:03 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_LIST(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4880}, 0x4010) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000340), r2) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="010000000000000000000106a701004d1cadb50e7510be6f9b7ae0fb53402f000000ac368c98f874", @ANYRES32=r1], 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$NLBL_CALIPSO_C_ADD(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x20044000) 20:46:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x11, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:03 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)={0x0, 0x0, @a}, 0x48, 0xfffffffffffffff9) (async) epoll_create1(0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000240)=""/5, 0x0, 0x5, 0x1}, 0x20) 20:46:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x40, 0x40, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x5d, 0x5, 0x1}, 0x20) 20:46:03 executing program 2: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) socket$nl_audit(0x10, 0x3, 0x9) 20:46:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x12, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:03 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x889d) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8900000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, 0x0, 0x2, 0x70bd2c, 0x25dfdbfc, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @loopback}, @GTPA_TID={0xc, 0x3, 0x3}, @GTPA_TID={0xc, 0x3, 0x2}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_PEER_ADDRESS={0x8, 0x4, @local}, @GTPA_LINK={0x8}, @GTPA_NET_NS_FD={0x8, 0x7, r1}]}, 0x54}, 0x1, 0x0, 0x0, 0x40410}, 0x20004001) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@ipv6_getaddrlabel={0x70, 0x4a, 0x2, 0x70bd28, 0x25dfdbfe, {0xa, 0x0, 0x80, 0x0, r2, 0x800}, [@IFAL_LABEL={0x8, 0x2, 0x2}, @IFAL_LABEL={0x8, 0x2, 0xc}, @IFAL_LABEL={0x8}, @IFAL_LABEL={0x8, 0x2, 0x8}, @IFAL_ADDRESS={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @IFAL_LABEL={0x8, 0x2, 0x5}, @IFAL_LABEL={0x8, 0x2, 0x1}, @IFAL_LABEL={0x8, 0x2, 0x1}, @IFAL_LABEL={0x8, 0x2, 0x5}]}, 0x70}, 0x1, 0x0, 0x0, 0x894}, 0x4) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x889d) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) (async) write$char_usb(r1, 0x0, 0x0) (async) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8900000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, 0x0, 0x2, 0x70bd2c, 0x25dfdbfc, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @loopback}, @GTPA_TID={0xc, 0x3, 0x3}, @GTPA_TID={0xc, 0x3, 0x2}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_PEER_ADDRESS={0x8, 0x4, @local}, @GTPA_LINK={0x8}, @GTPA_NET_NS_FD={0x8, 0x7, r1}]}, 0x54}, 0x1, 0x0, 0x0, 0x40410}, 0x20004001) (async) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000001c0)) (async) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@ipv6_getaddrlabel={0x70, 0x4a, 0x2, 0x70bd28, 0x25dfdbfe, {0xa, 0x0, 0x80, 0x0, r2, 0x800}, [@IFAL_LABEL={0x8, 0x2, 0x2}, @IFAL_LABEL={0x8, 0x2, 0xc}, @IFAL_LABEL={0x8}, @IFAL_LABEL={0x8, 0x2, 0x8}, @IFAL_ADDRESS={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @IFAL_LABEL={0x8, 0x2, 0x5}, @IFAL_LABEL={0x8, 0x2, 0x1}, @IFAL_LABEL={0x8, 0x2, 0x1}, @IFAL_LABEL={0x8, 0x2, 0x5}]}, 0x70}, 0x1, 0x0, 0x0, 0x894}, 0x4) (async) 20:46:04 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)={0x0, 0x0, @a}, 0x48, 0xfffffffffffffff9) (async) epoll_create1(0x0) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:04 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_LIST(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4880}, 0x4010) (async) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) (async) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000340), r2) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="010000000000000000000106a701004d1cadb50e7510be6f9b7ae0fb53402f000000ac368c98f874", @ANYRES32=r1], 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x0) (async) sendmsg$NLBL_CALIPSO_C_ADD(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x20044000) 20:46:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x30, 0x30, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x4d, 0x5, 0x1}, 0x20) 20:46:04 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)={0x2, 0x0, @d}, 0x18, 0xfffffffffffffffd) [ 1259.823321][ T3569] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 20:46:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x25, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:04 executing program 2: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) (async) socket$nl_audit(0x10, 0x3, 0x9) 20:46:04 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) r0 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f00000026c0)) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) recvmsg$can_bcm(r1, &(0x7f0000002640)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000002500)=[{&(0x7f00000000c0)=""/230, 0xe6}, {&(0x7f00000001c0)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/80, 0x50}, {&(0x7f0000001240)=""/90, 0x5a}, {&(0x7f00000012c0)=""/90, 0x5a}, {&(0x7f0000001340)=""/157, 0x9d}, {&(0x7f0000001400)=""/4096, 0x1000}, {&(0x7f0000002400)=""/69, 0x45}, {&(0x7f0000002480)=""/89, 0x59}], 0x9, &(0x7f00000025c0)=""/77, 0x4d}, 0x101) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000002680)={0xffff}, 0x8) 20:46:04 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_LIST(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4880}, 0x4010) (async) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) (async) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000280), r0) (async) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000340), r2) (async) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="010000000000000000000106a701004d1cadb50e7510be6f9b7ae0fb53402f000000ac368c98f874", @ANYRES32=r1], 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$NLBL_CALIPSO_C_ADD(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x20044000) 20:46:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x24, 0x24, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x41, 0x5, 0x1}, 0x20) 20:46:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x48, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:04 executing program 2: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) (async) socket$nl_audit(0x10, 0x3, 0x9) 20:46:04 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)={0x2, 0x0, @d}, 0x18, 0xfffffffffffffffd) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)={0x2, 0x0, @d}, 0x18, 0xfffffffffffffffd) (async) 20:46:04 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) r0 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f00000026c0)) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) (async) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) (async) recvmsg$can_bcm(r1, &(0x7f0000002640)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000002500)=[{&(0x7f00000000c0)=""/230, 0xe6}, {&(0x7f00000001c0)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/80, 0x50}, {&(0x7f0000001240)=""/90, 0x5a}, {&(0x7f00000012c0)=""/90, 0x5a}, {&(0x7f0000001340)=""/157, 0x9d}, {&(0x7f0000001400)=""/4096, 0x1000}, {&(0x7f0000002400)=""/69, 0x45}, {&(0x7f0000002480)=""/89, 0x59}], 0x9, &(0x7f00000025c0)=""/77, 0x4d}, 0x101) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000002680)={0xffff}, 0x8) 20:46:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x4c, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:04 executing program 2: epoll_create(0xfff) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffff9) 20:46:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x1d, 0x5, 0x1}, 0x20) 20:46:04 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), r0) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000d17f000019504189a688b82a0003c020554686590266a4d4da3d8cca742c5756a1891b3275f2e0a7cbc36f2a9d84e08d9dcf77506a9384876e08908650", @ANYRES16=r1, @ANYBLOB='\x00'/11], 0x1c}}, 0x9004) syz_genetlink_get_family_id$nl802154(&(0x7f00000001c0), r0) socket$inet6_mptcp(0xa, 0x1, 0x106) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000200), r2) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000000), r3) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000280), r3) add_key$fscrypt_provisioning(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)={0x3, 0x0, @auto=[0x32, 0x28, 0x1e, 0x37, 0x3b, 0x2d, 0x30, 0x31, 0x36]}, 0x11, 0xfffffffffffffffd) syz_genetlink_get_family_id$nl802154(&(0x7f00000000c0), r2) 20:46:04 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)={0x2, 0x0, @d}, 0x18, 0xfffffffffffffffd) 20:46:04 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) r0 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f00000026c0)) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) recvmsg$can_bcm(r1, &(0x7f0000002640)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000002500)=[{&(0x7f00000000c0)=""/230, 0xe6}, {&(0x7f00000001c0)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/80, 0x50}, {&(0x7f0000001240)=""/90, 0x5a}, {&(0x7f00000012c0)=""/90, 0x5a}, {&(0x7f0000001340)=""/157, 0x9d}, {&(0x7f0000001400)=""/4096, 0x1000}, {&(0x7f0000002400)=""/69, 0x45}, {&(0x7f0000002480)=""/89, 0x59}], 0x9, &(0x7f00000025c0)=""/77, 0x4d}, 0x101) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000002680)={0xffff}, 0x8) 20:46:04 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), r0) (async) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000d17f000019504189a688b82a0003c020554686590266a4d4da3d8cca742c5756a1891b3275f2e0a7cbc36f2a9d84e08d9dcf77506a9384876e08908650", @ANYRES16=r1, @ANYBLOB='\x00'/11], 0x1c}}, 0x9004) (async) syz_genetlink_get_family_id$nl802154(&(0x7f00000001c0), r0) (async) socket$inet6_mptcp(0xa, 0x1, 0x106) (async) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000200), r2) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000000), r3) (async) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000280), r3) add_key$fscrypt_provisioning(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)={0x3, 0x0, @auto=[0x32, 0x28, 0x1e, 0x37, 0x3b, 0x2d, 0x30, 0x31, 0x36]}, 0x11, 0xfffffffffffffffd) (async) syz_genetlink_get_family_id$nl802154(&(0x7f00000000c0), r2) 20:46:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x51, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x61, 0x61]}}, &(0x7f0000000240)=""/5, 0x1c, 0x5, 0x1}, 0x20) 20:46:04 executing program 2: epoll_create(0xfff) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffff9) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffff9) 20:46:04 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x3, 0x0, @c}, 0x29, 0x0) 20:46:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x68, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:04 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), r0) (async) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000d17f000019504189a688b82a0003c020554686590266a4d4da3d8cca742c5756a1891b3275f2e0a7cbc36f2a9d84e08d9dcf77506a9384876e08908650", @ANYRES16=r1, @ANYBLOB='\x00'/11], 0x1c}}, 0x9004) (async) syz_genetlink_get_family_id$nl802154(&(0x7f00000001c0), r0) (async) socket$inet6_mptcp(0xa, 0x1, 0x106) (async) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000200), r2) (async) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000000), r3) (async) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000280), r3) (async) add_key$fscrypt_provisioning(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)={0x3, 0x0, @auto=[0x32, 0x28, 0x1e, 0x37, 0x3b, 0x2d, 0x30, 0x31, 0x36]}, 0x11, 0xfffffffffffffffd) (async) syz_genetlink_get_family_id$nl802154(&(0x7f00000000c0), r2) 20:46:04 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x3, 0x0, @c}, 0x29, 0x0) 20:46:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x61]}}, &(0x7f0000000240)=""/5, 0x1b, 0x5, 0x1}, 0x20) 20:46:04 executing program 2: epoll_create(0xfff) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffff9) 20:46:04 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x3, 0x0, @c}, 0x29, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x3, 0x0, @c}, 0x29, 0x0) (async) 20:46:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x6c, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:04 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x3, 0x0, @c}, 0x29, 0x0) 20:46:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/5, 0x1a, 0x5, 0x1}, 0x20) 20:46:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x74, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:04 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c490000", @ANYRES16=r1, @ANYBLOB="0100000000000000000001"], 0x1c}}, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000000), r2) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000000)={'wpan4\x00'}) 20:46:04 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) arch_prctl$ARCH_GET_UNTAG_MASK(0x4001, &(0x7f0000000080)) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) write$cgroup_freezer_state(r0, &(0x7f0000000040)='FROZEN\x00', 0x7) 20:46:04 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x3, 0x0, @c}, 0x29, 0x0) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x3, 0x0, @c}, 0x29, 0x0) 20:46:04 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x3, 0x0, @c}, 0x29, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x3, 0x0, @c}, 0x29, 0x0) (async) 20:46:04 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) mmap$usbmon(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000003, 0x110, 0xffffffffffffffff, 0x7) prctl$PR_SET_SECUREBITS(0x1c, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000140)='./file0\x00', 0x0, 0x4}, 0x10) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000000000061616161616161616161616161616161616161616161616161616161610101000000000000313131313131313131313131313131313131313131313131313131"], 0x48, 0xfffffffffffffffc) 20:46:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 20:46:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x7a, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:04 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) (async) arch_prctl$ARCH_GET_UNTAG_MASK(0x4001, &(0x7f0000000080)) (async, rerun: 32) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) (rerun: 32) write$char_usb(r0, 0x0, 0x0) write$cgroup_freezer_state(r0, &(0x7f0000000040)='FROZEN\x00', 0x7) 20:46:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0xa, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:04 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) mmap$usbmon(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000003, 0x110, 0xffffffffffffffff, 0x7) (async) mmap$usbmon(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000003, 0x110, 0xffffffffffffffff, 0x7) prctl$PR_SET_SECUREBITS(0x1c, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000140)='./file0\x00', 0x0, 0x4}, 0x10) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000000000061616161616161616161616161616161616161616161616161616161610101000000000000313131313131313131313131313131313131313131313131313131"], 0x48, 0xfffffffffffffffc) 20:46:04 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) (async, rerun: 32) arch_prctl$ARCH_GET_UNTAG_MASK(0x4001, &(0x7f0000000080)) (async, rerun: 32) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) write$cgroup_freezer_state(r0, &(0x7f0000000040)='FROZEN\x00', 0x7) 20:46:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 20:46:04 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) (async) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c490000", @ANYRES16=r1, @ANYBLOB="0100000000000000000001"], 0x1c}}, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000000), r2) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000000)={'wpan4\x00'}) (async) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000000)={'wpan4\x00'}) 20:46:04 executing program 1: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) sendmsg$802154_dgram(r0, &(0x7f0000000300)={&(0x7f0000000000)={0x24, @long={0x3, 0x1, {0xaaaaaaaaaaaa0102}}}, 0x14, &(0x7f00000002c0)={&(0x7f0000000200)="55d837b5d04cb5387e851a2656231a1f147da39963bba703e3d6a7d09b0d27cd242ddff3991892f1ca91dae8024236e6b3a440bb04efba126c9efdb302d28599b8203da9ef8df56b15f612367775c924decca0723eb20afbb32c655416019c46ced347c1283de1fc4bbe2dd233803e11ffc92d96d8b0068cb4dcfa16f46f6b69eccbf24ac064c327bd5a2e5a0122e30976cd3bbd41df828b28c57a", 0x9b}}, 0x8004) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ff6000/0x3000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000080)="012ade2d3a2abed5d7c4bd14fffa03fc4c95c11cb1a4fdec2d910c2d4e8c939371351cbfbdb97f0d2bf71ed4b66e96e852fa1c659ac3c4523fe31863701d1588bd4f8750a51c2a275a0409cb4da5736337ec86b63e5f901e133ab809189698fbfe687543b52d4c2e0d7d7d80e240926547ac1b85766d2fe63b1d9d4ac2a9d056fc0c9cbe2a388f772d384752ad23fd30e887274e0938cef3e55b7200c1675c13fa910f8f890cbf64cd5d0057892505d0c4cc45fa6793fc005dd70b2dbf2515502b14b0cde02492adc5de", 0xca, r0}, 0x68) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x8179785a, 0x0) 20:46:04 executing program 2: syz_open_dev$usbfs(&(0x7f00000000c0), 0x20, 0x4000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, &(0x7f0000000180)={&(0x7f0000000140)=@getneigh={0x14, 0x1e, 0x523, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", ""]}, 0x14}}, 0x8000) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) open_tree(r0, &(0x7f0000000080)='./file0\x00', 0x101) 20:46:04 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) mmap$usbmon(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000003, 0x110, 0xffffffffffffffff, 0x7) prctl$PR_SET_SECUREBITS(0x1c, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000140)='./file0\x00', 0x0, 0x4}, 0x10) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000000000061616161616161616161616161616161616161616161616161616161610101000000000000313131313131313131313131313131313131313131313131313131"], 0x48, 0xfffffffffffffffc) 20:46:04 executing program 1: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) sendmsg$802154_dgram(r0, &(0x7f0000000300)={&(0x7f0000000000)={0x24, @long={0x3, 0x1, {0xaaaaaaaaaaaa0102}}}, 0x14, &(0x7f00000002c0)={&(0x7f0000000200)="55d837b5d04cb5387e851a2656231a1f147da39963bba703e3d6a7d09b0d27cd242ddff3991892f1ca91dae8024236e6b3a440bb04efba126c9efdb302d28599b8203da9ef8df56b15f612367775c924decca0723eb20afbb32c655416019c46ced347c1283de1fc4bbe2dd233803e11ffc92d96d8b0068cb4dcfa16f46f6b69eccbf24ac064c327bd5a2e5a0122e30976cd3bbd41df828b28c57a", 0x9b}}, 0x8004) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ff6000/0x3000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000080)="012ade2d3a2abed5d7c4bd14fffa03fc4c95c11cb1a4fdec2d910c2d4e8c939371351cbfbdb97f0d2bf71ed4b66e96e852fa1c659ac3c4523fe31863701d1588bd4f8750a51c2a275a0409cb4da5736337ec86b63e5f901e133ab809189698fbfe687543b52d4c2e0d7d7d80e240926547ac1b85766d2fe63b1d9d4ac2a9d056fc0c9cbe2a388f772d384752ad23fd30e887274e0938cef3e55b7200c1675c13fa910f8f890cbf64cd5d0057892505d0c4cc45fa6793fc005dd70b2dbf2515502b14b0cde02492adc5de", 0xca, r0}, 0x68) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x8179785a, 0x0) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x8179785a, 0x0) 20:46:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x29, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 20:46:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x64, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:04 executing program 2: syz_open_dev$usbfs(&(0x7f00000000c0), 0x20, 0x4000) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, &(0x7f0000000180)={&(0x7f0000000140)=@getneigh={0x14, 0x1e, 0x523, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", ""]}, 0x14}}, 0x8000) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) (rerun: 64) open_tree(r0, &(0x7f0000000080)='./file0\x00', 0x101) 20:46:04 executing program 1: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) sendmsg$802154_dgram(r0, &(0x7f0000000300)={&(0x7f0000000000)={0x24, @long={0x3, 0x1, {0xaaaaaaaaaaaa0102}}}, 0x14, &(0x7f00000002c0)={&(0x7f0000000200)="55d837b5d04cb5387e851a2656231a1f147da39963bba703e3d6a7d09b0d27cd242ddff3991892f1ca91dae8024236e6b3a440bb04efba126c9efdb302d28599b8203da9ef8df56b15f612367775c924decca0723eb20afbb32c655416019c46ced347c1283de1fc4bbe2dd233803e11ffc92d96d8b0068cb4dcfa16f46f6b69eccbf24ac064c327bd5a2e5a0122e30976cd3bbd41df828b28c57a", 0x9b}}, 0x8004) (async) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ff6000/0x3000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000080)="012ade2d3a2abed5d7c4bd14fffa03fc4c95c11cb1a4fdec2d910c2d4e8c939371351cbfbdb97f0d2bf71ed4b66e96e852fa1c659ac3c4523fe31863701d1588bd4f8750a51c2a275a0409cb4da5736337ec86b63e5f901e133ab809189698fbfe687543b52d4c2e0d7d7d80e240926547ac1b85766d2fe63b1d9d4ac2a9d056fc0c9cbe2a388f772d384752ad23fd30e887274e0938cef3e55b7200c1675c13fa910f8f890cbf64cd5d0057892505d0c4cc45fa6793fc005dd70b2dbf2515502b14b0cde02492adc5de", 0xca, r0}, 0x68) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x8179785a, 0x0) 20:46:04 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c490000", @ANYRES16=r1, @ANYBLOB="0100000000000000000001"], 0x1c}}, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000000), r2) (async) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000000), r2) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000000)={'wpan4\x00'}) 20:46:04 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x5, 0x282500) prctl$PR_SET_SECUREBITS(0x1c, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000080), 0xffffffffffffffff) r1 = open_tree(r0, &(0x7f0000000240)='./file0\x00', 0x80000) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) prctl$PR_SET_IO_FLUSHER(0x39, 0x1) write$char_usb(r2, 0x0, 0x0) ioctl$NS_GET_PARENT(r2, 0xb702, 0x0) mmap$usbfs(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000004, 0x4000010, r2, 0x3) prctl$PR_SET_SECUREBITS(0x1c, 0x13) write$char_usb(r2, &(0x7f0000000840)="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", 0x1000) syz_open_dev$usbfs(&(0x7f0000000140), 0x9, 0x40000) add_key$fscrypt_provisioning(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000280)=ANY=[@ANYBLOB="3e03c4186161616161616161616161c8c361616161616161616161313131313131313131313131313131313131223131313131313131313131313100000000000000000000000000f492cad5d7d1b2e4f4a06e403485f8a7de0f69445ee2509c9f2605468c39cc009e8d4c3a30ead7322ccb3cf4"], 0x48, 0xfffffffffffffffe) 20:46:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/5, 0x1a, 0x5}, 0x20) 20:46:04 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x100053, 0x0) gettid() add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x1, 0x0, @auto=[0x39, 0x1a]}, 0xa, 0xfffffffffffffffd) 20:46:04 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x5, 0x282500) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000080), 0xffffffffffffffff) (async) r1 = open_tree(r0, &(0x7f0000000240)='./file0\x00', 0x80000) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) prctl$PR_SET_IO_FLUSHER(0x39, 0x1) (async) write$char_usb(r2, 0x0, 0x0) (async) ioctl$NS_GET_PARENT(r2, 0xb702, 0x0) (async) mmap$usbfs(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000004, 0x4000010, r2, 0x3) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x13) (async) write$char_usb(r2, &(0x7f0000000840)="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", 0x1000) syz_open_dev$usbfs(&(0x7f0000000140), 0x9, 0x40000) add_key$fscrypt_provisioning(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000280)=ANY=[@ANYBLOB="3e03c4186161616161616161616161c8c361616161616161616161313131313131313131313131313131313131223131313131313131313131313100000000000000000000000000f492cad5d7d1b2e4f4a06e403485f8a7de0f69445ee2509c9f2605468c39cc009e8d4c3a30ead7322ccb3cf4"], 0x48, 0xfffffffffffffffe) 20:46:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/5, 0x1a, 0x5}, 0x20) 20:46:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/5, 0x1a, 0x5}, 0x20) 20:46:04 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x100053, 0x0) gettid() (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x1, 0x0, @auto=[0x39, 0x1a]}, 0xa, 0xfffffffffffffffd) 20:46:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x69, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:04 executing program 2: syz_open_dev$usbfs(&(0x7f00000000c0), 0x20, 0x4000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, &(0x7f0000000180)={&(0x7f0000000140)=@getneigh={0x14, 0x1e, 0x523, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", ""]}, 0x14}}, 0x8000) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) open_tree(r0, &(0x7f0000000080)='./file0\x00', 0x101) syz_open_dev$usbfs(&(0x7f00000000c0), 0x20, 0x4000) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, &(0x7f0000000180)={&(0x7f0000000140)=@getneigh={0x14, 0x1e, 0x523, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", ""]}, 0x14}}, 0x8000) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18}, './file0\x00'}) (async) open_tree(r0, &(0x7f0000000080)='./file0\x00', 0x101) (async) 20:46:04 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x5, 0x282500) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async, rerun: 64) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000080), 0xffffffffffffffff) (async, rerun: 64) r1 = open_tree(r0, &(0x7f0000000240)='./file0\x00', 0x80000) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f00000001c0), &(0x7f0000000200)=0x4) (async) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) (async) prctl$PR_SET_IO_FLUSHER(0x39, 0x1) write$char_usb(r2, 0x0, 0x0) ioctl$NS_GET_PARENT(r2, 0xb702, 0x0) (async) mmap$usbfs(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000004, 0x4000010, r2, 0x3) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x13) (async, rerun: 32) write$char_usb(r2, &(0x7f0000000840)="bfce894966d626cfc6c12069dbca6f9278007110a237a29079dc94b30386c6deaeeea8ca9307d6f77114a8d8765f3d9e24fecb178ab2cc318d55c3547b6353ebbbd7296251a90a5984123b2b09ec46964f29a704c61dc9c51ba9ec6c7dc790ca7c4c6650f786fc6f1fd89443f53b86ecffd7c84f919e363b75ebe45cb56a50f392e056d521c5fbe6d21e1348f251da26c87a735a51f0ac42a20f60d75067cc99c98f3e3d40cc34de033e8c1c469f3a6b143a2d760fc2e2204918e26864538154a0af1947d4fc773ecec80f5435983196ed5eb8b2d1b11948515ab8a2f2fd0e3c3b1bab0258aa3a5d67827a30da3f43ee004a005a94c689db93597ebcb26fb094639deb2b8dcfa33a54d742072d0a6f40c569fb301d56b72d9a505d97d80850d7c1a058ba18a9578f69ac5dd64173278200378091a56a3cd7a03bded318ade3e876229f590795f1f8e9687e7afa35e8c22c4de3145b5be08ebe50df210cbd9664041351f6fdcbc709a675d658d0cb31e20b787712422ed40aef0e845be62e937adc262e9d9daa01ef3fc0efb64718d13f9db03db716cdc4331fe84ac0c11977c3409a75253dfa0203d551e38e032cd785a851eb02afea46f472649138487469f1e06da1f2569ee8f1e9b84c27e208f9cee12431af96bb6ad87d7e7c256ebe21e07021171de89a1a07e2e90ae76c5a13020459bfe26dd2e4d80f8dd4742349be7419ef1461c4be060f71d3df63b080ded6904362e0bd57a47a0c07bb37a89b4aa4c6bd10da3f869b1510ebedfdbddd4fdd108ea1f64865e4877940de89a27e67fa9f7115e3fef079fc872c42e9f33547cdea9aeb1f72ed5d78a7b04dbcfa2a5ea791b59649eb812ba650deb9baec7b4f0e657523f42e9f5c41e53a29d9df96a9dfd1b4420a1a1926451f98e7fbbb24cdb879a83db85069db8f4502146a1a9a048d17c7128e60212648455b1454ac08b0c7ece79e3c4307c01eacc1be615594f653d10fa2e288ac5966cd07a78673cf6168c8a9bd33908dd95edcce14029233fb8baf38f9537492a23cf690c66e7749e5ea5be37c690d95dcbd1642c05a4e39f3dd924396ffaea2b0e8169ca91b135db5d2af46652324a6de5028543b44b732d57e85a98a37dd349673431c5bf1d0d93238027e70e28b59cfec70c98edffbcc1a8bf8bc90faa183c34b09f471b8c9e56c6845a0cba9a988cc0d5505e8f458a4c9aa6ad6c579ee1528b250e9b77bc6696b23108ce5b4a0a2afc6f6ad7592c33d5210afbe303c9e852fc6ed42116a4d0619aa175246e87556f0c681fe6b00a89e0c44da1801454d4161c5f7c37d0f9f025d30dafadc6eea41afe599257d2011426cb4db3dde9c080a106794831a8e2c877702cc4921e5115db7487451628eb507493d8ef6475ade927c181ecb855c1b6473993cecef102038c5c22541518888ee0c2584d009b9631098b20ffad1c48725be9c2f7e4545e9f597234ca8d4f2907d4e963f5138bbc10d97c809757b1e4cb101b6a2b75921f3470d13f1bf42caaff1b9a2591a9c587da560b1d57ab0fa390fcf1fe4b79ffdcc855bd2d8de699402875a855759028f67b0983ee035699974377a59edcdb783d0939035ba0b206016110d31e12166243a3bb8bfb1e3ab336f131a639e50b578a2820da906ccccb3e9b400b91b2c3545d9ee5378f3c3e75e35f06cf7dec6377433abba087545807739feaaeee57144c7ef15e7ffc452df699c6051d12aff320c3c644bf6a1bd5df925d66748b60e533cfe38a3d6e15c4d1db282bfc3e5ccae97c3b921c21b3336a0f61ff18a614f7b503147810b1d3996fd9138b6f90d230d4cc0242f4573cd5b27597e7990abd161cef1435b642af42f48c1f1e6173ffd84c9489b6c73971e770e51483db0ee9b0bcdb3958403a4b82eb91394db1485d583a9ee5a6377f496d4fe332dec62627ab64ea07d6d726f82f97df1b75a09ccbd7c27364601c0921b7921cb4ab50003770594b76707d35216fcf03a494910b05104f17d0a2828883fc3a6ff8a9e12202f4b56fb65ce179d78849698551d465ae7d6dfcda5fba87edbb84003ff9bd7cda33f268a5b5e0af22dc046e0a422bb7acb25e4699fdbdead3ae4a2a6ef7100905a3cd0926b2a3938b228aa003f807e9afdf7c992efff25d54c5cf6bcbfc79adbe711fcd8257f19869843d6a35350cc843dbd6591e12d1a309a5aa73ffded9137ebbf1557d18bc3c88e5c88aed08045d9cdb7722ca88cd0b68c82e4500b2f750d8657635cc5b38a3f1d7a9273c4e1799dddac2b067857a945f541b7a820b960e58f8fe7ba860c7271c65b5b24f2c91ce0a8c0a04337a0ba1b447489fa404e9a5a05793e35cd0e0a360e3ac6d2cc0058b75c98f8dcc47af99394e0ace2f4eba32a4caa8197debcfea2393afcb5cfa983c9bf2d18dc5738a6f5070c871ef2da759f5c773d9066e4dbdde7742d777d5988a5842610ba1a911815128ed757eed503dce0ef6020215f8dc2596d54b5c152105145d3de529f1431050566115f01f99cabd042d0b7e567f2e8bcab92e629b6a561135b44a7932ef55f060f7cd44d41363dc904ad7b78e1f16d0f03f60891cf179069f8fc7aa2c72d812588825f161837542d09b6aad07f6d2c03aa356710ce1541bc1e1b1c7e87cebe76bd70b2644e42c9182edd73888475e3dbf2d2ef5e19c783f2db500ce9cb803fcdedb4da9d8275ee4176b2e39f9bcaae4a8c357be1588d97dfcec2d9a141a528ad1c8b0e0f7ceff4c22a4c8e60c81fb2c14ef440bd097178aef698dbfa55b09577376e29a2310cfd800dcd9549caa729ee84fe3f78fca7331c84ad84912776f7570940772d7d5d00ab19de77c1ede42e1203c820a1fe8655e0d26d6b494ae8cd85ff6dde54d3723f9c9bcf4420b6b2a98a9cfe677d47538481b01076b28ee5cda1fdae9281008349a039e5a0059d20231f4cf021f609bc0163ad6e4d57568f2b52b2aae67a915f72cc398a67a5dc00e0a9d088c1e094b3344bf69ca5aaf554b989f967f42eaba9fc53b9f7409c980e67014c60c40331d380867ebfbfa0a2b40f3d8332d0ddf051b24308322197ad940e9c559c845ae35b42a5b4a25b6f6f5157302edd40aa566514ee422b878d2c80c3a2409050f08919cda0ee31c4e50a0e14f378f715fa1eee000896b11ee76cc777f1d35c60f3be12b4bd2051043604e5eb9d787f3f8d1256acac5bb97a929c5d84311edb0c788535ba99a3f5a3f2bb81780fbee5bc0c4429d2ff62694b2747ec210781b43c88d79d326cb577267dc7abb9b611baf142f2e6b0fcbf40765a8e6ccd42cf752ceb0aa60870b1f4ff321eb333b1f7a4dff7fae69cf1c3ce90ace518e899a6686b398ae3a445ab8c297bd7e10546bb2f89bb7c3f84761cad810c9cde11651ce090aad40cbc5898618a6e91f714777e20ad063a6f9c8434fa37a09210c413348cc39ff580baaa3f82d5e8c52eba961eb5b29d9237884c5b5f72dadc9c55026596ed0fc0972233095fa90f5ceaf68013f2f49e335232fb7e61b9485aedea07c668552fc1a2e1dc58a29aea68ac9564a5adf9e269ac532a7003f19f01b22f78d3f360971baa357b6e345abc38c40aa1bd2ceb89677af7e5e531566c116d42c704ffa3c57dbdd8c9983d63a1d8dd645875ab576e94d51e40394bc1f125f19a3eb45032ede9250335a943d29dd086c3d68246a3a9490b51224f29b6ed164cc536791845dd7d4fc76e5f2e17da94b29de70785bc3facca804014f0ade02d806ba24522acd10f01c13486926010f2697f0e14ae62912e1eadf63e3867278fb41760679f17b7c23cd24af381518e2fbe6276bd1a0655ff674df334a727b2e8a5d88a1fe0954750c6837ee80009672f96264f6a59c598b8bcebdb2a4afb421dc3ec43e0d8f62672b3d9b0ba3d025cfd6a2b6e3a9745458074e6e90f7a3a487e7648ea012a08dc3eab5108cdcb7361f158e35e55149eb7fd309978a6f6c2863cfb674a310d1d74a3341ae616aa17617b2661bbbe19fac1b47ec56e7ab625d0694fce37b4d69f158048923e923e81c5d7108f12bdf3dd454395d25eee24d66efa55b7e1b28fbf29de03a4f418f31c716e8f5c841c36248a07504f29d8ab565ec6b5b91f9c430d93dcde3735b73b6d748ce7377d5c36649fb7c0fd8075fcecee7cc0ac4e84409a6c37378f5eeb3e6b85dac3660e054696129d5f2e9618832d37a6175709df29539138a3adf97f5e23ff93eeeb93baa99b1287d53c9f2c6a0da54640fc4330fa049aa47515833cb4b98d39323a6b638ede30950e380dabf2de956dc17d60fafe363bc63a1e266ce562ff77380d66a0b3c79a14c6f8ad6740a550fd475b48f543235e4e1f63a3d750061e71337b7b3d26ac50c7d5309948d0f3724f662e28241449bc63955a1e1115a18d7cfeb474e4aeb908c1d473034283de8278068962061e8af9f07910409348e00e3305f7750e9d1826a3d6e98a266f602edeb1576084bffba147df19e7663c4d2e3c2b0e2fcbf3b2a269fa1f7180792d92662625ebcd8f234ec5bbf5a7c3479abd743f962e9527e9e4778859de88a12b81d2a0fadf264b24146164ce8dc52f5dc1e944ff5e8e9b68ff5bb8e3c2e92c3f5080fe9030b6667aab134809c3318c7a000fc54f10f2928b32b8516b53bba4dc49415192a20a7b45a16c68592b8efd800e53cf383b7b015336a2142e53cd94974ba44fc32d4635fa18609745e0ae70a7d4e62496c5a2badbdb1b3afb8dedd39224e15d765c54334d1e04a086ebd74b2df0dc7ad468bf6a59c930497f6a984b5d2004c4e9b59eec8bf7b413dd40ceb6e4cfdb5b65df76a4d5872989f2b73655cf1d0a9a5029822b12bb5bbebdff343ed0db54406d15797e81b0200d4e949e8c0cb67d0a62c3066b0833eafc39b1af013e04a3f539e2dfabd567e39819e3cc9ab594122c2149bd5450c8e81c7d71d2a4139a112e2516164bd52b64b18ea6391b8e2477a3649ba29c2f45de92ee9bfd56a1cb38b77ced671a06326b11c87fc01e7af6c0bb14d3508cffc36a47b056912729b60ca75f98e9a18de2019afe71aebb342725abd81864ce928bd94f0daeb2f0932a3990e37dd6e24781ed9d36714abc16ee15e367c7c0a755805130bd3842a760cc561cc8daea3264e22d3cad32ddb5e09ab25adacf66f6a520044f70ec4ffb4ad558112b896866879fbdacc144807306e21737a45b229a0324a78c2cc9083c73405186168d4f2f7cd9918c5705d028b01f4183689229c23be5457b2b5fa93f1988b5317e4771bf74ca085dff7c348d84b60b2c5740016aa4c5e1f4d8ac2cada9e89a0aa22fe6d67bf49fd1a7a4e032d2f24c688ea9d612ed1d0b7e99f5e3864aca4f85d3308f553e983ffd046e142ae907f25da2497c8a69cced60b88cc65adbef3657eaaafb3a71774bc32639f8bda9fb57068786e30db5ef47cf28c4a10b7d1d6c250a67b4ccceee44bd11f7dbf1411329cac099e4508d5bcaf76068fdc5bc25b364f359594cda0dd2bd8479dc1ef0a21de8bed3552fd4d04b86673b2f5ec33369eb9556d0ba2c483432a33d80e646ef241b3e72bf637fe737028d6fb52848ed06aefd4715fd761e5ea21a1a9d9b60549ec7e26ac19d4d807918772e50fd188d9a15ec27fc838c6b2fc5e5c4aa075f1d4d9ee71d34fdb628dee59ecd32195d6012700ccee5d6f2cd4ed3ac0f01fbcbb383ea33255bf892d7b25cd0dbe2b10d2732b97e082857c20d2a59123781ef3dc7d4b148d99b9888299579aeb370522f8cfd2c4082f551f24c6406", 0x1000) (async, rerun: 32) syz_open_dev$usbfs(&(0x7f0000000140), 0x9, 0x40000) (async) add_key$fscrypt_provisioning(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000280)=ANY=[@ANYBLOB="3e03c4186161616161616161616161c8c361616161616161616161313131313131313131313131313131313131223131313131313131313131313100000000000000000000000000f492cad5d7d1b2e4f4a06e403485f8a7de0f69445ee2509c9f2605468c39cc009e8d4c3a30ead7322ccb3cf4"], 0x48, 0xfffffffffffffffe) 20:46:04 executing program 5: mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 20:46:04 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 20:46:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x5f5e0ff, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:04 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x100053, 0x0) gettid() add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x1, 0x0, @auto=[0x39, 0x1a]}, 0xa, 0xfffffffffffffffd) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x1, 0x0, @auto=[0x39, 0x1a]}, 0xa, 0xfffffffffffffffd) 20:46:04 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x1b) clock_getres(0x1, &(0x7f00000000c0)) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000100)={0x2, 0x0, @a}, 0x48, 0xfffffffffffffffc) 20:46:04 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)={0x1, 0x0, @b}, 0x48, 0xfffffffffffffffe) 20:46:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:04 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 20:46:04 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)={0x1, 0x0, @b}, 0x48, 0xfffffffffffffffe) 20:46:04 executing program 1: mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000000, 0x110, 0xffffffffffffffff, 0x10000000) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)="a0877048360d3713ec6152f32e1b4f4ec880fa6498ce807048b688901d1603a0ba2a417a46f84b1051e0a15ba7f86e0e0fdcfab77d888a2461805026415b5b", &(0x7f0000000180)=@tcp6, 0x146ace58e0b4b6ca}, 0x20) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000100)=ANY=[@ANYBLOB="03000000000000006162636465666768696a6b6c00000100000022ac391eb02dd04063b4a48e466ab9488dcdabdf9418bd70fd6de3bf4f45cd7ccc952020672c41c74a41ea7d2e8f33433bc604a4ab20484e2f33b40000"], 0x18, 0xfffffffffffffffb) mremap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 20:46:04 executing program 5: mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 20:46:04 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x1b) (async) clock_getres(0x1, &(0x7f00000000c0)) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000100)={0x2, 0x0, @a}, 0x48, 0xfffffffffffffffc) 20:46:04 executing program 1: mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000000, 0x110, 0xffffffffffffffff, 0x10000000) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)="a0877048360d3713ec6152f32e1b4f4ec880fa6498ce807048b688901d1603a0ba2a417a46f84b1051e0a15ba7f86e0e0fdcfab77d888a2461805026415b5b", &(0x7f0000000180)=@tcp6, 0x146ace58e0b4b6ca}, 0x20) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000100)=ANY=[@ANYBLOB="03000000000000006162636465666768696a6b6c00000100000022ac391eb02dd04063b4a48e466ab9488dcdabdf9418bd70fd6de3bf4f45cd7ccc952020672c41c74a41ea7d2e8f33433bc604a4ab20484e2f33b40000"], 0x18, 0xfffffffffffffffb) mremap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 20:46:04 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 20:46:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:04 executing program 5: mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 20:46:04 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x1b) clock_getres(0x1, &(0x7f00000000c0)) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000100)={0x2, 0x0, @a}, 0x48, 0xfffffffffffffffc) 20:46:04 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)={0x1, 0x0, @b}, 0x48, 0xfffffffffffffffe) 20:46:04 executing program 3: mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 20:46:04 executing program 1: mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000000, 0x110, 0xffffffffffffffff, 0x10000000) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)="a0877048360d3713ec6152f32e1b4f4ec880fa6498ce807048b688901d1603a0ba2a417a46f84b1051e0a15ba7f86e0e0fdcfab77d888a2461805026415b5b", &(0x7f0000000180)=@tcp6, 0x146ace58e0b4b6ca}, 0x20) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000100)=ANY=[@ANYBLOB="03000000000000006162636465666768696a6b6c00000100000022ac391eb02dd04063b4a48e466ab9488dcdabdf9418bd70fd6de3bf4f45cd7ccc952020672c41c74a41ea7d2e8f33433bc604a4ab20484e2f33b40000"], 0x18, 0xfffffffffffffffb) (async) mremap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 20:46:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x3, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:04 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x2c983, 0x0) pipe2$watch_queue(&(0x7f00000001c0), 0x80) setsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f0000000040), 0x4) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200), 0x608302, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x309881, 0x0) write$char_usb(r1, 0x0, 0x0) syz_io_uring_setup(0x33cb, &(0x7f00000000c0)={0x0, 0x1360, 0x4, 0x80002, 0xffffffff, 0x0, r1}, &(0x7f0000000140), &(0x7f0000000180)) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:04 executing program 5: mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) 20:46:04 executing program 5: mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) 20:46:04 executing program 3: mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 20:46:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:04 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x2c983, 0x0) pipe2$watch_queue(&(0x7f00000001c0), 0x80) (async) setsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f0000000040), 0x4) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200), 0x608302, 0x0) (async) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x309881, 0x0) write$char_usb(r1, 0x0, 0x0) (async) syz_io_uring_setup(0x33cb, &(0x7f00000000c0)={0x0, 0x1360, 0x4, 0x80002, 0xffffffff, 0x0, r1}, &(0x7f0000000140), &(0x7f0000000180)) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:04 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000140)=ANY=[@ANYBLOB="01000000000000006161616161616161616161616161616161e217429c5e0f80616161616161613eec00000000000031313131313131313131313131d2f8313131313131313131313131213131313100"/90], 0x48, 0x0) 20:46:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x5, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:04 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x2c983, 0x0) pipe2$watch_queue(&(0x7f00000001c0), 0x80) (async) setsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f0000000040), 0x4) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200), 0x608302, 0x0) (async) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x309881, 0x0) write$char_usb(r1, 0x0, 0x0) syz_io_uring_setup(0x33cb, &(0x7f00000000c0)={0x0, 0x1360, 0x4, 0x80002, 0xffffffff, 0x0, r1}, &(0x7f0000000140), &(0x7f0000000180)) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:04 executing program 3: mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 20:46:04 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000140)=ANY=[@ANYBLOB="01000000000000006161616161616161616161616161616161e217429c5e0f80616161616161613eec00000000000031313131313131313131313131d2f8313131313131313131313131213131313100"/90], 0x48, 0x0) 20:46:04 executing program 5: mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) 20:46:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x6, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:04 executing program 5: prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000040)='fscrypt-provisioning\x00') add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl1\x00', &(0x7f0000000080)={'sit0\x00', 0x0, 0x8000, 0x10, 0x2, 0x7f1, {{0x1f, 0x4, 0x1, 0x9, 0x7c, 0x65, 0x0, 0x2, 0x29, 0x0, @multicast2, @local, {[@ssrr={0x89, 0x27, 0xdb, [@local, @broadcast, @multicast1, @empty, @remote, @local, @private=0xa010100, @rand_addr=0x64010100, @local]}, @ssrr={0x89, 0xb, 0x96, [@multicast2, @private=0xa010100]}, @rr={0x7, 0x17, 0x18, [@local, @private=0xa010101, @broadcast, @broadcast, @empty]}, @timestamp_addr={0x44, 0x14, 0xa9, 0x1, 0x7, [{@broadcast, 0x3}, {@rand_addr=0x64010100, 0x9}]}, @generic={0x0, 0xa, "39c5b642450a1818"}]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f0000001500)=@base={0x12, 0x0, 0x0, 0xb853, 0x0, 0x1, 0x0, '\x00', r0}, 0x48) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000008, 0x100010, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0xd) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) 20:46:04 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x2) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)={0x1, 0x0, @a}, 0x48, 0x0) 20:46:04 executing program 3: add_key$fscrypt_provisioning(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 20:46:04 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000140)=ANY=[@ANYBLOB="01000000000000006161616161616161616161616161616161e217429c5e0f80616161616161613eec00000000000031313131313131313131313131d2f8313131313131313131313131213131313100"/90], 0x48, 0x0) 20:46:04 executing program 3: add_key$fscrypt_provisioning(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 20:46:04 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000140)={'syz', 0x0}, &(0x7f00000000c0)={0x3, 0x0, @b}, 0x48, 0xfffffffffffffff9) 20:46:04 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x2) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)={0x1, 0x0, @a}, 0x48, 0x0) 20:46:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x7, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:04 executing program 5: prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000040)='fscrypt-provisioning\x00') add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl1\x00', &(0x7f0000000080)={'sit0\x00', 0x0, 0x8000, 0x10, 0x2, 0x7f1, {{0x1f, 0x4, 0x1, 0x9, 0x7c, 0x65, 0x0, 0x2, 0x29, 0x0, @multicast2, @local, {[@ssrr={0x89, 0x27, 0xdb, [@local, @broadcast, @multicast1, @empty, @remote, @local, @private=0xa010100, @rand_addr=0x64010100, @local]}, @ssrr={0x89, 0xb, 0x96, [@multicast2, @private=0xa010100]}, @rr={0x7, 0x17, 0x18, [@local, @private=0xa010101, @broadcast, @broadcast, @empty]}, @timestamp_addr={0x44, 0x14, 0xa9, 0x1, 0x7, [{@broadcast, 0x3}, {@rand_addr=0x64010100, 0x9}]}, @generic={0x0, 0xa, "39c5b642450a1818"}]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f0000001500)=@base={0x12, 0x0, 0x0, 0xb853, 0x0, 0x1, 0x0, '\x00', r0}, 0x48) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000008, 0x100010, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0xd) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) 20:46:04 executing program 3: add_key$fscrypt_provisioning(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 20:46:04 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000140)={'syz', 0x0}, &(0x7f00000000c0)={0x3, 0x0, @b}, 0x48, 0xfffffffffffffff9) 20:46:04 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async, rerun: 64) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async, rerun: 64) prctl$PR_SET_SECUREBITS(0x1c, 0x2) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)={0x1, 0x0, @a}, 0x48, 0x0) 20:46:04 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) 20:46:04 executing program 5: prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000040)='fscrypt-provisioning\x00') add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl1\x00', &(0x7f0000000080)={'sit0\x00', 0x0, 0x8000, 0x10, 0x2, 0x7f1, {{0x1f, 0x4, 0x1, 0x9, 0x7c, 0x65, 0x0, 0x2, 0x29, 0x0, @multicast2, @local, {[@ssrr={0x89, 0x27, 0xdb, [@local, @broadcast, @multicast1, @empty, @remote, @local, @private=0xa010100, @rand_addr=0x64010100, @local]}, @ssrr={0x89, 0xb, 0x96, [@multicast2, @private=0xa010100]}, @rr={0x7, 0x17, 0x18, [@local, @private=0xa010101, @broadcast, @broadcast, @empty]}, @timestamp_addr={0x44, 0x14, 0xa9, 0x1, 0x7, [{@broadcast, 0x3}, {@rand_addr=0x64010100, 0x9}]}, @generic={0x0, 0xa, "39c5b642450a1818"}]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f0000001500)=@base={0x12, 0x0, 0x0, 0xb853, 0x0, 0x1, 0x0, '\x00', r0}, 0x48) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000008, 0x100010, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0xd) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) 20:46:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x8, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:04 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) 20:46:04 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) 20:46:04 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000140)={'syz', 0x0}, &(0x7f00000000c0)={0x3, 0x0, @b}, 0x48, 0xfffffffffffffff9) 20:46:04 executing program 5: prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000040)='fscrypt-provisioning\x00') add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl1\x00', &(0x7f0000000080)={'sit0\x00', 0x0, 0x8000, 0x10, 0x2, 0x7f1, {{0x1f, 0x4, 0x1, 0x9, 0x7c, 0x65, 0x0, 0x2, 0x29, 0x0, @multicast2, @local, {[@ssrr={0x89, 0x27, 0xdb, [@local, @broadcast, @multicast1, @empty, @remote, @local, @private=0xa010100, @rand_addr=0x64010100, @local]}, @ssrr={0x89, 0xb, 0x96, [@multicast2, @private=0xa010100]}, @rr={0x7, 0x17, 0x18, [@local, @private=0xa010101, @broadcast, @broadcast, @empty]}, @timestamp_addr={0x44, 0x14, 0xa9, 0x1, 0x7, [{@broadcast, 0x3}, {@rand_addr=0x64010100, 0x9}]}, @generic={0x0, 0xa, "39c5b642450a1818"}]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f0000001500)=@base={0x12, 0x0, 0x0, 0xb853, 0x0, 0x1, 0x0, '\x00', r0}, 0x48) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000008, 0x100010, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0xd) 20:46:04 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) mmap$xdp(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000009, 0x100010, r0, 0x80000000) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x9, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:05 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) 20:46:05 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) 20:46:05 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000000000006162636465666768696a6b6c6d6e6f707172737475767778797a38313233343536"], 0x29, 0xfffffffffffffff8) 20:46:05 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) 20:46:05 executing program 5: prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000040)='fscrypt-provisioning\x00') add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl1\x00', &(0x7f0000000080)={'sit0\x00', 0x0, 0x8000, 0x10, 0x2, 0x7f1, {{0x1f, 0x4, 0x1, 0x9, 0x7c, 0x65, 0x0, 0x2, 0x29, 0x0, @multicast2, @local, {[@ssrr={0x89, 0x27, 0xdb, [@local, @broadcast, @multicast1, @empty, @remote, @local, @private=0xa010100, @rand_addr=0x64010100, @local]}, @ssrr={0x89, 0xb, 0x96, [@multicast2, @private=0xa010100]}, @rr={0x7, 0x17, 0x18, [@local, @private=0xa010101, @broadcast, @broadcast, @empty]}, @timestamp_addr={0x44, 0x14, 0xa9, 0x1, 0x7, [{@broadcast, 0x3}, {@rand_addr=0x64010100, 0x9}]}, @generic={0x0, 0xa, "39c5b642450a1818"}]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f0000001500)=@base={0x12, 0x0, 0x0, 0xb853, 0x0, 0x1, 0x0, '\x00', r0}, 0x48) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000008, 0x100010, 0xffffffffffffffff, 0x0) 20:46:05 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) (async) mmap$xdp(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000009, 0x100010, r0, 0x80000000) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xa, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:05 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) 20:46:05 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000000000006162636465666768696a6b6c6d6e6f707172737475767778797a38313233343536"], 0x29, 0xfffffffffffffff8) 20:46:05 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) mmap$xdp(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000009, 0x100010, r0, 0x80000000) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:05 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) 20:46:05 executing program 5: prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000040)='fscrypt-provisioning\x00') add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl1\x00', &(0x7f0000000080)={'sit0\x00', 0x0, 0x8000, 0x10, 0x2, 0x7f1, {{0x1f, 0x4, 0x1, 0x9, 0x7c, 0x65, 0x0, 0x2, 0x29, 0x0, @multicast2, @local, {[@ssrr={0x89, 0x27, 0xdb, [@local, @broadcast, @multicast1, @empty, @remote, @local, @private=0xa010100, @rand_addr=0x64010100, @local]}, @ssrr={0x89, 0xb, 0x96, [@multicast2, @private=0xa010100]}, @rr={0x7, 0x17, 0x18, [@local, @private=0xa010101, @broadcast, @broadcast, @empty]}, @timestamp_addr={0x44, 0x14, 0xa9, 0x1, 0x7, [{@broadcast, 0x3}, {@rand_addr=0x64010100, 0x9}]}, @generic={0x0, 0xa, "39c5b642450a1818"}]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f0000001500)=@base={0x12, 0x0, 0x0, 0xb853, 0x0, 0x1, 0x0, '\x00', r0}, 0x48) 20:46:05 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) remap_file_pages(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x6, 0x0, 0x800) rt_sigaction(0x1a, &(0x7f0000000100)={&(0x7f0000000040)="f342ae6726470f7fb1b7fe0000c4c17c280b67de2f6466430f71e732400f014e00c4617de79ea184500cc401ed5c20c4615d606781c441b1f89305000000", 0x10000002, &(0x7f0000000080)="c442950346ec420f4f5b5dc40315697abe008f69d8985c59f5c423a578a4e50000000000c462fd1c87f3ffffffc46179286209c4a1d8560067460f01d82ef242a5", {[0x9]}}, &(0x7f00000001c0)={&(0x7f0000000140)="43dca80c000000c4a17a2c1420c422f2f7216766440f38dbb35cdb0000f265d8c4c441fde69cc400000000c481b455660cdde0c443c17bdbf3f30f01d9", 0x0, &(0x7f0000000180)="4577000f2b24a48fa9f89546cdf240aff3440f5e800b000000f2470f587f04f3a566f30f1c7afd26e3b5c421e9f9480f"}, 0x8, &(0x7f0000000200)) prctl$PR_SET_SECUREBITS(0x1c, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 20:46:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xb, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:05 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000000000006162636465666768696a6b6c6d6e6f707172737475767778797a38313233343536"], 0x29, 0xfffffffffffffff8) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000000000006162636465666768696a6b6c6d6e6f707172737475767778797a38313233343536"], 0x29, 0xfffffffffffffff8) (async) 20:46:05 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffff9) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:05 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) 20:46:05 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)={0x4, 0x0, @b}, 0x48, 0xfffffffffffffffe) socket$nl_route(0x10, 0x3, 0x0) getgroups(0x7, &(0x7f0000000040)=[0x0, 0x0, 0xee01, 0xee00, 0xee01, 0xee01, 0xee00]) getgid() socket$nl_route(0x10, 0x3, 0x0) 20:46:05 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) remap_file_pages(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x6, 0x0, 0x800) rt_sigaction(0x1a, &(0x7f0000000100)={&(0x7f0000000040)="f342ae6726470f7fb1b7fe0000c4c17c280b67de2f6466430f71e732400f014e00c4617de79ea184500cc401ed5c20c4615d606781c441b1f89305000000", 0x10000002, &(0x7f0000000080)="c442950346ec420f4f5b5dc40315697abe008f69d8985c59f5c423a578a4e50000000000c462fd1c87f3ffffffc46179286209c4a1d8560067460f01d82ef242a5", {[0x9]}}, &(0x7f00000001c0)={&(0x7f0000000140)="43dca80c000000c4a17a2c1420c422f2f7216766440f38dbb35cdb0000f265d8c4c441fde69cc400000000c481b455660cdde0c443c17bdbf3f30f01d9", 0x0, &(0x7f0000000180)="4577000f2b24a48fa9f89546cdf240aff3440f5e800b000000f2470f587f04f3a566f30f1c7afd26e3b5c421e9f9480f"}, 0x8, &(0x7f0000000200)) prctl$PR_SET_SECUREBITS(0x1c, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000240)={0x4, 0x6, 0x15ff, 0x1f, 0x9, 0x1, 0x338, 0x9}, &(0x7f0000000280)={0x0, 0x7ff, 0x7, 0x7fffffffffffffff, 0x57, 0x6980000000000, 0x9, 0xffffffffffffff80}, &(0x7f00000002c0)={0x1, 0x5, 0x9, 0x3, 0x1, 0x1, 0x9, 0x7}, &(0x7f0000000340)={r0, r1+60000000}, &(0x7f00000003c0)={&(0x7f0000000380)={[0x4]}, 0x8}) 20:46:05 executing program 5: prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000040)='fscrypt-provisioning\x00') add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000001500)=@base={0x12, 0x0, 0x0, 0xb853, 0x0, 0x1}, 0x48) 20:46:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xc, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:05 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) setsockopt$inet_dccp_buf(r0, 0x21, 0x80, &(0x7f0000000040)="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", 0x1000) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) 20:46:05 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)={0x4, 0x0, @b}, 0x48, 0xfffffffffffffffe) socket$nl_route(0x10, 0x3, 0x0) (async) getgroups(0x7, &(0x7f0000000040)=[0x0, 0x0, 0xee01, 0xee00, 0xee01, 0xee01, 0xee00]) (async) getgid() (async) socket$nl_route(0x10, 0x3, 0x0) 20:46:05 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffff9) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:05 executing program 5: prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000040)='fscrypt-provisioning\x00') bpf$MAP_CREATE(0x0, &(0x7f0000001500)=@base={0x12, 0x0, 0x0, 0xb853, 0x0, 0x1}, 0x48) 20:46:05 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) setsockopt$inet_dccp_buf(r0, 0x21, 0x80, &(0x7f0000000040)="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", 0x1000) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) (async) write$char_usb(r0, 0x0, 0x0) (async) setsockopt$inet_dccp_buf(r0, 0x21, 0x80, &(0x7f0000000040)="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", 0x1000) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) (async) 20:46:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:05 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)={0x4, 0x0, @b}, 0x48, 0xfffffffffffffffe) socket$nl_route(0x10, 0x3, 0x0) getgroups(0x7, &(0x7f0000000040)=[0x0, 0x0, 0xee01, 0xee00, 0xee01, 0xee01, 0xee00]) getgid() socket$nl_route(0x10, 0x3, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)={0x4, 0x0, @b}, 0x48, 0xfffffffffffffffe) (async) socket$nl_route(0x10, 0x3, 0x0) (async) getgroups(0x7, &(0x7f0000000040)=[0x0, 0x0, 0xee01, 0xee00, 0xee01, 0xee01, 0xee00]) (async) getgid() (async) socket$nl_route(0x10, 0x3, 0x0) (async) 20:46:05 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffff9) prctl$PR_SET_SECUREBITS(0x1c, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffff9) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) 20:46:05 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) (async) setsockopt$inet_dccp_buf(r0, 0x21, 0x80, &(0x7f0000000040)="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", 0x1000) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) 20:46:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:05 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000001500)=@base={0x12, 0x0, 0x0, 0xb853, 0x0, 0x1}, 0x48) 20:46:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xe, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:05 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000100), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_GET_DUMPABLE(0x3) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x3, 0x0, @auto=[0x20, 0x2c, 0x2a, 0x10, 0x1b, 0x1b]}, 0xe, 0xfffffffffffffff8) getsockopt$WPAN_WANTACK(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000140)=0x4) mmap$xdp(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x8, 0x30, 0xffffffffffffffff, 0x100000000) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000180)=""/45) 20:46:05 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000080)='^\x00') r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000000), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000000), r1) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000100), r0) sendmsg$NLBL_CALIPSO_C_LIST(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r2, 0x4, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x40400c0}, 0xc816) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000040), r0) 20:46:05 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x3, &(0x7f0000000080)={@loopback, @private}, &(0x7f00000000c0)=0xc) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) syz_open_dev$usbfs(&(0x7f0000000040), 0x7796, 0x882) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:06 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000100), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_GET_DUMPABLE(0x3) (async) prctl$PR_GET_DUMPABLE(0x3) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x3, 0x0, @auto=[0x20, 0x2c, 0x2a, 0x10, 0x1b, 0x1b]}, 0xe, 0xfffffffffffffff8) getsockopt$WPAN_WANTACK(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000140)=0x4) mmap$xdp(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x8, 0x30, 0xffffffffffffffff, 0x100000000) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000180)=""/45) (async) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000180)=""/45) 20:46:06 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) (async) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000080)='^\x00') r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000000), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000000), r1) (async) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000100), r0) sendmsg$NLBL_CALIPSO_C_LIST(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r2, 0x4, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x40400c0}, 0xc816) (async, rerun: 32) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000040), r0) (rerun: 32) 20:46:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xf, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:06 executing program 5: bpf$MAP_CREATE(0x0, 0x0, 0x0) 20:46:06 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x3, &(0x7f0000000080)={@loopback, @private}, &(0x7f00000000c0)=0xc) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) syz_open_dev$usbfs(&(0x7f0000000040), 0x7796, 0x882) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:06 executing program 5: bpf$MAP_CREATE(0x0, 0x0, 0x0) [ 1261.867590][ T26] audit: type=1400 audit(1691786766.000:272): avc: denied { write } for pid=4024 comm="syz-executor.0" name="001" dev="devtmpfs" ino=131 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 20:46:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x10, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:06 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000100), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_GET_DUMPABLE(0x3) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x3, 0x0, @auto=[0x20, 0x2c, 0x2a, 0x10, 0x1b, 0x1b]}, 0xe, 0xfffffffffffffff8) (async) getsockopt$WPAN_WANTACK(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000140)=0x4) (async) mmap$xdp(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x8, 0x30, 0xffffffffffffffff, 0x100000000) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000180)=""/45) 20:46:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:06 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000080)='^\x00') (async) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000000), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000000), r1) (async, rerun: 32) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000100), r0) (rerun: 32) sendmsg$NLBL_CALIPSO_C_LIST(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r2, 0x4, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x40400c0}, 0xc816) (async) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000040), r0) 20:46:06 executing program 5: bpf$MAP_CREATE(0x0, 0x0, 0x0) 20:46:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x11, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:06 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) select(0xffffffffffffff66, &(0x7f0000000040)={0x7, 0x1, 0x1000, 0x9, 0x8000, 0xc6d4, 0x4, 0x5}, &(0x7f0000000080)={0x2, 0x9, 0x100000001, 0x6, 0xfd, 0x6, 0xffffffffffffff6c, 0x100}, &(0x7f00000000c0)={0x2, 0x7fff, 0x0, 0x1, 0x6c, 0x5, 0x9646, 0x1}, &(0x7f0000000100)) arch_prctl$ARCH_SHSTK_DISABLE(0x5002, 0x0) pselect6(0x40, &(0x7f0000000140)={0x7f, 0x1008, 0x66ab, 0x5a, 0xff, 0x28, 0x3, 0x6}, &(0x7f0000000180)={0x2, 0x20, 0x4, 0x400, 0xffff, 0x8001, 0x3, 0x101}, &(0x7f00000001c0)={0x2, 0xd9c2, 0xda6d, 0x3edb, 0x401, 0xffffffffffffffff, 0x41, 0xf7}, &(0x7f0000000200), &(0x7f00000002c0)={&(0x7f0000000240)={[0x9]}, 0x8}) 20:46:06 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x3, &(0x7f0000000080)={@loopback, @private}, &(0x7f00000000c0)=0xc) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) syz_open_dev$usbfs(&(0x7f0000000040), 0x7796, 0x882) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 20:46:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x12, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:06 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000001500)=@base={0x0, 0x0, 0x0, 0xb853, 0x0, 0x1}, 0x48) 20:46:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 20:46:06 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) select(0xffffffffffffff66, &(0x7f0000000040)={0x7, 0x1, 0x1000, 0x9, 0x8000, 0xc6d4, 0x4, 0x5}, &(0x7f0000000080)={0x2, 0x9, 0x100000001, 0x6, 0xfd, 0x6, 0xffffffffffffff6c, 0x100}, &(0x7f00000000c0)={0x2, 0x7fff, 0x0, 0x1, 0x6c, 0x5, 0x9646, 0x1}, &(0x7f0000000100)) arch_prctl$ARCH_SHSTK_DISABLE(0x5002, 0x0) pselect6(0x40, &(0x7f0000000140)={0x7f, 0x1008, 0x66ab, 0x5a, 0xff, 0x28, 0x3, 0x6}, &(0x7f0000000180)={0x2, 0x20, 0x4, 0x400, 0xffff, 0x8001, 0x3, 0x101}, &(0x7f00000001c0)={0x2, 0xd9c2, 0xda6d, 0x3edb, 0x401, 0xffffffffffffffff, 0x41, 0xf7}, &(0x7f0000000200), &(0x7f00000002c0)={&(0x7f0000000240)={[0x9]}, 0x8}) 20:46:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x25, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:06 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000001500)=@base={0x0, 0x0, 0x0, 0xb853, 0x0, 0x1}, 0x48) 20:46:06 executing program 0: prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xffffffffffffffe4, 0xfffffffffffffffb) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) mmap$usbfs(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x110, r0, 0x101) 20:46:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 20:46:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x48, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:06 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) select(0xffffffffffffff66, &(0x7f0000000040)={0x7, 0x1, 0x1000, 0x9, 0x8000, 0xc6d4, 0x4, 0x5}, &(0x7f0000000080)={0x2, 0x9, 0x100000001, 0x6, 0xfd, 0x6, 0xffffffffffffff6c, 0x100}, &(0x7f00000000c0)={0x2, 0x7fff, 0x0, 0x1, 0x6c, 0x5, 0x9646, 0x1}, &(0x7f0000000100)) (async) select(0xffffffffffffff66, &(0x7f0000000040)={0x7, 0x1, 0x1000, 0x9, 0x8000, 0xc6d4, 0x4, 0x5}, &(0x7f0000000080)={0x2, 0x9, 0x100000001, 0x6, 0xfd, 0x6, 0xffffffffffffff6c, 0x100}, &(0x7f00000000c0)={0x2, 0x7fff, 0x0, 0x1, 0x6c, 0x5, 0x9646, 0x1}, &(0x7f0000000100)) arch_prctl$ARCH_SHSTK_DISABLE(0x5002, 0x0) pselect6(0x40, &(0x7f0000000140)={0x7f, 0x1008, 0x66ab, 0x5a, 0xff, 0x28, 0x3, 0x6}, &(0x7f0000000180)={0x2, 0x20, 0x4, 0x400, 0xffff, 0x8001, 0x3, 0x101}, &(0x7f00000001c0)={0x2, 0xd9c2, 0xda6d, 0x3edb, 0x401, 0xffffffffffffffff, 0x41, 0xf7}, &(0x7f0000000200), &(0x7f00000002c0)={&(0x7f0000000240)={[0x9]}, 0x8}) 20:46:06 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000001500)=@base={0x0, 0x0, 0x0, 0xb853, 0x0, 0x1}, 0x48) 20:46:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000240)=""/5, 0x0, 0x5, 0x1}, 0x20) 20:46:06 executing program 0: prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xffffffffffffffe4, 0xfffffffffffffffb) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) mmap$usbfs(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x110, r0, 0x101) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xffffffffffffffe4, 0xfffffffffffffffb) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18}, './file0\x00'}) (async) mmap$usbfs(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x110, r0, 0x101) (async) 20:46:06 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x400) syz_io_uring_setup(0x5526, &(0x7f0000000080)={0x0, 0xedcf, 0x8, 0x2, 0x17d, 0x0, r0}, &(0x7f0000000100), &(0x7f0000000140)) r1 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0x5, &(0x7f0000000180)=""/155, &(0x7f0000000240)=0x9b) 20:46:06 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000001500)=@base={0x12, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 20:46:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000240)=""/5, 0x0, 0x5, 0x1}, 0x20) 20:46:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:06 executing program 0: prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xffffffffffffffe4, 0xfffffffffffffffb) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) mmap$usbfs(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x110, r0, 0x101) 20:46:06 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000001500)=@base={0x12, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 20:46:06 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x400) syz_io_uring_setup(0x5526, &(0x7f0000000080)={0x0, 0xedcf, 0x8, 0x2, 0x17d, 0x0, r0}, &(0x7f0000000100), &(0x7f0000000140)) (async) r1 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0x5, &(0x7f0000000180)=""/155, &(0x7f0000000240)=0x9b) 20:46:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x51, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:06 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffff8) getrlimit(0x8, &(0x7f00000001c0)) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/time\x00') ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000080)) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x6) socket$nl_route(0x10, 0x3, 0x0) setrlimit(0xa, &(0x7f0000000100)={0x3, 0x6}) 20:46:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000240)=""/5, 0x0, 0x5, 0x1}, 0x20) 20:46:06 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000001500)=@base={0x12, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 20:46:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x68, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:06 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x400) syz_io_uring_setup(0x5526, &(0x7f0000000080)={0x0, 0xedcf, 0x8, 0x2, 0x17d, 0x0, r0}, &(0x7f0000000100), &(0x7f0000000140)) (async) r1 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0x5, &(0x7f0000000180)=""/155, &(0x7f0000000240)=0x9b) 20:46:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x40, 0x40, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x5d, 0x5, 0x1}, 0x20) 20:46:06 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffff8) (async) getrlimit(0x8, &(0x7f00000001c0)) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/time\x00') ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000080)) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x6) (async) socket$nl_route(0x10, 0x3, 0x0) (async) setrlimit(0xa, &(0x7f0000000100)={0x3, 0x6}) 20:46:06 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x400) syz_io_uring_setup(0x5526, &(0x7f0000000080)={0x0, 0xedcf, 0x8, 0x2, 0x17d, 0x0, r0}, &(0x7f0000000100), &(0x7f0000000140)) r1 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0x5, &(0x7f0000000180)=""/155, &(0x7f0000000240)=0x9b) 20:46:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:06 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000100)=ANY=[@ANYBLOB="0300000000000000616263e465666768696a7475767778797a30313233343536607d9870833955e51d90a91eab98db58ec4eba672851a367c2fcc8378e553f46f7cc2f817ec565"], 0x29, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) prctl$PR_SET_IO_FLUSHER(0x39, 0x1) 20:46:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x30, 0x30, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x4d, 0x5, 0x1}, 0x20) 20:46:06 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffff8) getrlimit(0x8, &(0x7f00000001c0)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/time\x00') (async) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/time\x00') ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000080)) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x6) (async) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x6) socket$nl_route(0x10, 0x3, 0x0) setrlimit(0xa, &(0x7f0000000100)={0x3, 0x6}) 20:46:06 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async, rerun: 64) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000100)=ANY=[@ANYBLOB="0300000000000000616263e465666768696a7475767778797a30313233343536607d9870833955e51d90a91eab98db58ec4eba672851a367c2fcc8378e553f46f7cc2f817ec565"], 0x29, 0xffffffffffffffff) (rerun: 64) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) prctl$PR_SET_IO_FLUSHER(0x39, 0x1) 20:46:06 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x400) syz_io_uring_setup(0x5526, &(0x7f0000000080)={0x0, 0xedcf, 0x8, 0x2, 0x17d, 0x0, r0}, &(0x7f0000000100), &(0x7f0000000140)) r1 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0x5, &(0x7f0000000180)=""/155, &(0x7f0000000240)=0x9b) 20:46:06 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffb) 20:46:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x41, 0x5, 0x1}, 0x20) 20:46:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x74, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:06 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffb) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffb) (async) 20:46:06 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) getsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000140)=0x48) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040), 0x4) 20:46:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:06 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000100)=ANY=[@ANYBLOB="0300000000000000616263e465666768696a7475767778797a30313233343536607d9870833955e51d90a91eab98db58ec4eba672851a367c2fcc8378e553f46f7cc2f817ec565"], 0x29, 0xffffffffffffffff) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) prctl$PR_SET_IO_FLUSHER(0x39, 0x1) 20:46:06 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x400) syz_io_uring_setup(0x5526, &(0x7f0000000080)={0x0, 0xedcf, 0x8, 0x2, 0x17d, 0x0, r0}, &(0x7f0000000100), &(0x7f0000000140)) r1 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0x5, &(0x7f0000000180)=""/155, &(0x7f0000000240)=0x9b) 20:46:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x1d, 0x5, 0x1}, 0x20) 20:46:06 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffb) 20:46:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x300, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:06 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffa) 20:46:06 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) (async, rerun: 64) getsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000140)=0x48) (async, rerun: 64) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040), 0x4) 20:46:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x500, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x61, 0x61]}}, &(0x7f0000000240)=""/5, 0x1c, 0x5, 0x1}, 0x20) 20:46:06 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) mlockall(0x0) quotactl$Q_SYNC(0xffffffff80000100, 0x0, 0x0, 0x0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000040)) 20:46:06 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffa) 20:46:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x600, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:06 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x400) syz_io_uring_setup(0x5526, &(0x7f0000000080)={0x0, 0xedcf, 0x8, 0x2, 0x17d, 0x0, r0}, &(0x7f0000000100), &(0x7f0000000140)) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000180)=""/155, &(0x7f0000000240)=0x9b) 20:46:06 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) (async) getsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000140)=0x48) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040), 0x4) 20:46:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x61]}}, &(0x7f0000000240)=""/5, 0x1b, 0x5, 0x1}, 0x20) 20:46:06 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x400) syz_io_uring_setup(0x5526, &(0x7f0000000080)={0x0, 0xedcf, 0x8, 0x2, 0x17d, 0x0, r0}, &(0x7f0000000100), &(0x7f0000000140)) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000180)=""/155, &(0x7f0000000240)=0x9b) 20:46:06 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffa) 20:46:06 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) socket$inet(0x2, 0x1, 0x9) sendmsg$802154_dgram(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f0000000040)={0x24, @none={0x0, 0x2}}, 0x14, &(0x7f0000001080)={&(0x7f0000000080)="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", 0x1000}, 0x1, 0x0, 0x0, 0x811}, 0x4085) 20:46:06 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) mlockall(0x0) quotactl$Q_SYNC(0xffffffff80000100, 0x0, 0x0, 0x0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000040)) 20:46:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x700, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:06 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)={0x6118a0d731fae004, 0x0, @b}, 0x48, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffc) add_key$fscrypt_provisioning(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000002c0)={0x0, 0x0, @auto=[0x10, 0x3d, 0x3f]}, 0xb, 0xfffffffffffffff8) 20:46:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/5, 0x1a, 0x5, 0x1}, 0x20) 20:46:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x900, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:06 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x400) syz_io_uring_setup(0x5526, &(0x7f0000000080)={0x0, 0xedcf, 0x8, 0x2, 0x17d, 0x0, r0}, &(0x7f0000000100), &(0x7f0000000140)) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000180)=""/155, &(0x7f0000000240)=0x9b) 20:46:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 20:46:06 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)={0x6118a0d731fae004, 0x0, @b}, 0x48, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffc) add_key$fscrypt_provisioning(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000002c0)={0x0, 0x0, @auto=[0x10, 0x3d, 0x3f]}, 0xb, 0xfffffffffffffff8) (async) add_key$fscrypt_provisioning(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000002c0)={0x0, 0x0, @auto=[0x10, 0x3d, 0x3f]}, 0xb, 0xfffffffffffffff8) 20:46:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 20:46:06 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)={0x6118a0d731fae004, 0x0, @b}, 0x48, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffc) add_key$fscrypt_provisioning(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000002c0)={0x0, 0x0, @auto=[0x10, 0x3d, 0x3f]}, 0xb, 0xfffffffffffffff8) 20:46:06 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) mlockall(0x0) quotactl$Q_SYNC(0xffffffff80000100, 0x0, 0x0, 0x0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000040)) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) mlockall(0x0) (async) quotactl$Q_SYNC(0xffffffff80000100, 0x0, 0x0, 0x0) (async) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000040)) (async) 20:46:06 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x400) r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x5, &(0x7f0000000180)=""/155, &(0x7f0000000240)=0x9b) 20:46:06 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) socket$inet(0x2, 0x1, 0x9) sendmsg$802154_dgram(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f0000000040)={0x24, @none={0x0, 0x2}}, 0x14, &(0x7f0000001080)={&(0x7f0000000080)="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", 0x1000}, 0x1, 0x0, 0x0, 0x811}, 0x4085) (async) sendmsg$802154_dgram(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f0000000040)={0x24, @none={0x0, 0x2}}, 0x14, &(0x7f0000001080)={&(0x7f0000000080)="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", 0x1000}, 0x1, 0x0, 0x0, 0x811}, 0x4085) 20:46:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xa00, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 20:46:06 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f00000000c0), 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0xfffffdfffffffffd) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000000), r1) syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), r1) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000400000/0xc00000)=nil, &(0x7f00000000c0)="6d54b543aae3a4b089dcc04def5c30f15d2f13271f948c4110f9f3389dbab18f44d576f059b2cdf5fdc0dd019b0697a953adfd356f87486b982c6faecc4715b834f463a5508780095eee56adcfc65fc39acbfe1760cccf3c924810581fac27f73a0144fe58ac75978c2e191eb685e2075b1af03072d2820a521e3f831e6a920282ae2c8269eb05ee01181e023db85329c6a04a80f2b5875bf5a5b3205ce5f6944ce82e6f0f235e13a48267ba7b6b", 0xae, r0}, 0x68) 20:46:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/5, 0x1a, 0x5}, 0x20) 20:46:06 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) (async) socket$inet(0x2, 0x1, 0x9) (async) sendmsg$802154_dgram(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f0000000040)={0x24, @none={0x0, 0x2}}, 0x14, &(0x7f0000001080)={&(0x7f0000000080)="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", 0x1000}, 0x1, 0x0, 0x0, 0x811}, 0x4085) 20:46:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xb00, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/5, 0x1a, 0x5}, 0x20) 20:46:06 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f00000000c0), 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0xfffffdfffffffffd) (async) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0xfffffdfffffffffd) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000000), r1) syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), r1) (async) syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), r1) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000400000/0xc00000)=nil, &(0x7f00000000c0)="6d54b543aae3a4b089dcc04def5c30f15d2f13271f948c4110f9f3389dbab18f44d576f059b2cdf5fdc0dd019b0697a953adfd356f87486b982c6faecc4715b834f463a5508780095eee56adcfc65fc39acbfe1760cccf3c924810581fac27f73a0144fe58ac75978c2e191eb685e2075b1af03072d2820a521e3f831e6a920282ae2c8269eb05ee01181e023db85329c6a04a80f2b5875bf5a5b3205ce5f6944ce82e6f0f235e13a48267ba7b6b", 0xae, r0}, 0x68) (async) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000400000/0xc00000)=nil, &(0x7f00000000c0)="6d54b543aae3a4b089dcc04def5c30f15d2f13271f948c4110f9f3389dbab18f44d576f059b2cdf5fdc0dd019b0697a953adfd356f87486b982c6faecc4715b834f463a5508780095eee56adcfc65fc39acbfe1760cccf3c924810581fac27f73a0144fe58ac75978c2e191eb685e2075b1af03072d2820a521e3f831e6a920282ae2c8269eb05ee01181e023db85329c6a04a80f2b5875bf5a5b3205ce5f6944ce82e6f0f235e13a48267ba7b6b", 0xae, r0}, 0x68) 20:46:06 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000040), 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000780)={'wlan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)) 20:46:06 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x5, &(0x7f0000000180)=""/155, &(0x7f0000000240)=0x9b) 20:46:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xc00, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/5, 0x1a, 0x5}, 0x20) 20:46:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xd00, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:06 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f00000000c0), 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0xfffffdfffffffffd) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000000), r1) syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), r1) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000400000/0xc00000)=nil, &(0x7f00000000c0)="6d54b543aae3a4b089dcc04def5c30f15d2f13271f948c4110f9f3389dbab18f44d576f059b2cdf5fdc0dd019b0697a953adfd356f87486b982c6faecc4715b834f463a5508780095eee56adcfc65fc39acbfe1760cccf3c924810581fac27f73a0144fe58ac75978c2e191eb685e2075b1af03072d2820a521e3f831e6a920282ae2c8269eb05ee01181e023db85329c6a04a80f2b5875bf5a5b3205ce5f6944ce82e6f0f235e13a48267ba7b6b", 0xae, r0}, 0x68) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) (async) write$char_usb(r0, 0x0, 0x0) (async) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f00000000c0), 0x0) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0xfffffdfffffffffd) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000000), r1) (async) syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), r1) (async) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000400000/0xc00000)=nil, &(0x7f00000000c0)="6d54b543aae3a4b089dcc04def5c30f15d2f13271f948c4110f9f3389dbab18f44d576f059b2cdf5fdc0dd019b0697a953adfd356f87486b982c6faecc4715b834f463a5508780095eee56adcfc65fc39acbfe1760cccf3c924810581fac27f73a0144fe58ac75978c2e191eb685e2075b1af03072d2820a521e3f831e6a920282ae2c8269eb05ee01181e023db85329c6a04a80f2b5875bf5a5b3205ce5f6944ce82e6f0f235e13a48267ba7b6b", 0xae, r0}, 0x68) (async) 20:46:06 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x5, &(0x7f0000000180)=""/155, &(0x7f0000000240)=0x9b) 20:46:06 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) select(0xffffffffffffff66, &(0x7f0000000040)={0x7, 0x1, 0x1000, 0x9, 0x8000, 0xc6d4, 0x4, 0x5}, &(0x7f0000000080)={0x2, 0x9, 0x100000001, 0x6, 0xfd, 0x6, 0xffffffffffffff6c, 0x100}, &(0x7f00000000c0)={0x2, 0x7fff, 0x0, 0x1, 0x6c, 0x5, 0x9646, 0x1}, &(0x7f0000000100)) arch_prctl$ARCH_SHSTK_DISABLE(0x5002, 0x0) pselect6(0x40, &(0x7f0000000140)={0x7f, 0x1008, 0x66ab, 0x5a, 0xff, 0x28, 0x3, 0x6}, &(0x7f0000000180)={0x2, 0x20, 0x4, 0x400, 0xffff, 0x8001, 0x3, 0x101}, &(0x7f00000001c0)={0x2, 0xd9c2, 0xda6d, 0x3edb, 0x401, 0xffffffffffffffff, 0x41, 0xf7}, &(0x7f0000000200), &(0x7f00000002c0)={&(0x7f0000000240)={[0x9]}, 0x8}) 20:46:06 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffff9) 20:46:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xe00, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:06 executing program 5: socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000180)=""/155, &(0x7f0000000240)=0x9b) 20:46:06 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) select(0xffffffffffffff66, &(0x7f0000000040)={0x7, 0x1, 0x1000, 0x9, 0x8000, 0xc6d4, 0x4, 0x5}, &(0x7f0000000080)={0x2, 0x9, 0x100000001, 0x6, 0xfd, 0x6, 0xffffffffffffff6c, 0x100}, &(0x7f00000000c0)={0x2, 0x7fff, 0x0, 0x1, 0x6c, 0x5, 0x9646, 0x1}, &(0x7f0000000100)) arch_prctl$ARCH_SHSTK_DISABLE(0x5002, 0x0) pselect6(0x40, &(0x7f0000000140)={0x7f, 0x1008, 0x66ab, 0x5a, 0xff, 0x28, 0x3, 0x6}, &(0x7f0000000180)={0x2, 0x20, 0x4, 0x400, 0xffff, 0x8001, 0x3, 0x101}, &(0x7f00000001c0)={0x2, 0xd9c2, 0xda6d, 0x3edb, 0x401, 0xffffffffffffffff, 0x41, 0xf7}, &(0x7f0000000200), &(0x7f00000002c0)={&(0x7f0000000240)={[0x9]}, 0x8}) 20:46:06 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) pipe2$9p(&(0x7f0000000040), 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) r0 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000780)={'wlan0\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)) 20:46:06 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffff9) (async) 20:46:06 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000100)={0x3, 0x0, @auto=[0x1c, 0x38, 0x3f, 0x15, 0x32, 0x1e, 0x34, 0x1a, 0x2a, 0x28, 0x11, 0x25, 0x2b, 0x1d, 0x1c, 0x38, 0x31, 0x34]}, 0x1a, 0xfffffffffffffff8) 20:46:06 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000100)={0x3, 0x0, @auto=[0x1c, 0x38, 0x3f, 0x15, 0x32, 0x1e, 0x34, 0x1a, 0x2a, 0x28, 0x11, 0x25, 0x2b, 0x1d, 0x1c, 0x38, 0x31, 0x34]}, 0x1a, 0xfffffffffffffff8) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000100)={0x3, 0x0, @auto=[0x1c, 0x38, 0x3f, 0x15, 0x32, 0x1e, 0x34, 0x1a, 0x2a, 0x28, 0x11, 0x25, 0x2b, 0x1d, 0x1c, 0x38, 0x31, 0x34]}, 0x1a, 0xfffffffffffffff8) (async) 20:46:06 executing program 5: socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000180)=""/155, &(0x7f0000000240)=0x9b) 20:46:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xf00, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:06 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) select(0xffffffffffffff66, &(0x7f0000000040)={0x7, 0x1, 0x1000, 0x9, 0x8000, 0xc6d4, 0x4, 0x5}, &(0x7f0000000080)={0x2, 0x9, 0x100000001, 0x6, 0xfd, 0x6, 0xffffffffffffff6c, 0x100}, &(0x7f00000000c0)={0x2, 0x7fff, 0x0, 0x1, 0x6c, 0x5, 0x9646, 0x1}, &(0x7f0000000100)) arch_prctl$ARCH_SHSTK_DISABLE(0x5002, 0x0) pselect6(0x40, &(0x7f0000000140)={0x7f, 0x1008, 0x66ab, 0x5a, 0xff, 0x28, 0x3, 0x6}, &(0x7f0000000180)={0x2, 0x20, 0x4, 0x400, 0xffff, 0x8001, 0x3, 0x101}, &(0x7f00000001c0)={0x2, 0xd9c2, 0xda6d, 0x3edb, 0x401, 0xffffffffffffffff, 0x41, 0xf7}, &(0x7f0000000200), &(0x7f00000002c0)={&(0x7f0000000240)={[0x9]}, 0x8}) 20:46:07 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffff9) 20:46:07 executing program 5: socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000180)=""/155, &(0x7f0000000240)=0x9b) 20:46:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x1100, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:07 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000100)={0x3, 0x0, @auto=[0x1c, 0x38, 0x3f, 0x15, 0x32, 0x1e, 0x34, 0x1a, 0x2a, 0x28, 0x11, 0x25, 0x2b, 0x1d, 0x1c, 0x38, 0x31, 0x34]}, 0x1a, 0xfffffffffffffff8) 20:46:07 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) pipe2$9p(&(0x7f0000000040), 0x0) (async, rerun: 64) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async, rerun: 64) r0 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000780)={'wlan0\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)) 20:46:07 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) select(0xffffffffffffff66, &(0x7f0000000040)={0x7, 0x1, 0x1000, 0x9, 0x8000, 0xc6d4, 0x4, 0x5}, &(0x7f0000000080)={0x2, 0x9, 0x100000001, 0x6, 0xfd, 0x6, 0xffffffffffffff6c, 0x100}, &(0x7f00000000c0)={0x2, 0x7fff, 0x0, 0x1, 0x6c, 0x5, 0x9646, 0x1}, &(0x7f0000000100)) arch_prctl$ARCH_SHSTK_DISABLE(0x5002, 0x0) 20:46:07 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0x4) 20:46:07 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) 20:46:07 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x0, &(0x7f0000000180)=""/155, &(0x7f0000000240)=0x9b) 20:46:07 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000300)=ANY=[@ANYBLOB="e3000063f300000018010008", @ANYRES32=r0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file0\x00']) open_tree(r1, &(0x7f0000000340)='./file0\x00', 0x8101) recvmsg$can_raw(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/109, 0x6d}, {&(0x7f00000000c0)=""/120, 0x78}], 0x2, &(0x7f0000000180)=""/249, 0xf9}, 0x141) socket$can_raw(0x1d, 0x3, 0x1) open_tree(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x1001) 20:46:07 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) select(0xffffffffffffff66, &(0x7f0000000040)={0x7, 0x1, 0x1000, 0x9, 0x8000, 0xc6d4, 0x4, 0x5}, &(0x7f0000000080)={0x2, 0x9, 0x100000001, 0x6, 0xfd, 0x6, 0xffffffffffffff6c, 0x100}, &(0x7f00000000c0)={0x2, 0x7fff, 0x0, 0x1, 0x6c, 0x5, 0x9646, 0x1}, &(0x7f0000000100)) 20:46:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x1200, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:07 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x0, &(0x7f0000000180)=""/155, &(0x7f0000000240)=0x9b) 20:46:07 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) 20:46:07 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0x4) 20:46:07 executing program 3: select(0xffffffffffffff66, &(0x7f0000000040)={0x7, 0x1, 0x1000, 0x9, 0x8000, 0xc6d4, 0x4, 0x5}, &(0x7f0000000080)={0x2, 0x9, 0x100000001, 0x6, 0xfd, 0x6, 0xffffffffffffff6c, 0x100}, &(0x7f00000000c0)={0x2, 0x7fff, 0x0, 0x1, 0x6c, 0x5, 0x9646, 0x1}, &(0x7f0000000100)) 20:46:07 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000300)=ANY=[@ANYBLOB="e3000063f300000018010008", @ANYRES32=r0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file0\x00']) (async) open_tree(r1, &(0x7f0000000340)='./file0\x00', 0x8101) recvmsg$can_raw(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/109, 0x6d}, {&(0x7f00000000c0)=""/120, 0x78}], 0x2, &(0x7f0000000180)=""/249, 0xf9}, 0x141) socket$can_raw(0x1d, 0x3, 0x1) (async) open_tree(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x1001) 20:46:07 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x0, &(0x7f0000000180)=""/155, &(0x7f0000000240)=0x9b) 20:46:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x2500, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:07 executing program 3: select(0x0, 0x0, &(0x7f0000000080)={0x2, 0x9, 0x100000001, 0x6, 0xfd, 0x6, 0xffffffffffffff6c, 0x100}, &(0x7f00000000c0)={0x2, 0x7fff, 0x0, 0x1, 0x6c, 0x5, 0x9646, 0x1}, &(0x7f0000000100)) 20:46:07 executing program 3: select(0x0, 0x0, &(0x7f0000000080)={0x2, 0x9, 0x100000001, 0x6, 0xfd, 0x6, 0xffffffffffffff6c, 0x100}, &(0x7f00000000c0)={0x2, 0x7fff, 0x0, 0x1, 0x6c, 0x5, 0x9646, 0x1}, &(0x7f0000000100)) 20:46:07 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) 20:46:07 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x5, 0x0, &(0x7f0000000240)) 20:46:07 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000002c0)) (async) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000300)=ANY=[@ANYBLOB="e3000063f300000018010008", @ANYRES32=r0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file0\x00']) (async) open_tree(r1, &(0x7f0000000340)='./file0\x00', 0x8101) (async) recvmsg$can_raw(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/109, 0x6d}, {&(0x7f00000000c0)=""/120, 0x78}], 0x2, &(0x7f0000000180)=""/249, 0xf9}, 0x141) (async) socket$can_raw(0x1d, 0x3, 0x1) (async) open_tree(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x1001) 20:46:07 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0x4) socket$inet_dccp(0x2, 0x6, 0x0) (async) getsockopt$inet_dccp_int(r0, 0x21, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0x4) (async) 20:46:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x4800, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:07 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x5, 0x0, 0x0) 20:46:07 executing program 3: select(0x0, 0x0, &(0x7f0000000080)={0x2, 0x9, 0x100000001, 0x6, 0xfd, 0x6, 0xffffffffffffff6c, 0x100}, &(0x7f00000000c0)={0x2, 0x7fff, 0x0, 0x1, 0x6c, 0x5, 0x9646, 0x1}, &(0x7f0000000100)) 20:46:07 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x5, 0x0, 0x0) 20:46:07 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffb) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:07 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) mmap$IORING_OFF_CQ_RING(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x100001a, 0x8010, r0, 0x8000000) add_key$fscrypt_provisioning(&(0x7f0000000140), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x1, 0x0, @c}, 0x29, 0xffffffffffffffff) syz_open_dev$usbfs(&(0x7f0000000100), 0x80, 0x181001) 20:46:07 executing program 3: select(0xffffffffffffff66, &(0x7f0000000040)={0x0, 0x1, 0x1000, 0x9, 0x8000, 0xc6d4, 0x4, 0x5}, &(0x7f0000000080)={0x2, 0x9, 0x100000001, 0x6, 0xfd, 0x6, 0xffffffffffffff6c, 0x100}, &(0x7f00000000c0)={0x2, 0x7fff, 0x0, 0x1, 0x6c, 0x5, 0x9646, 0x1}, &(0x7f0000000100)) 20:46:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c00, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:07 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) mmap$IORING_OFF_CQ_RING(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x100001a, 0x8010, r0, 0x8000000) (async, rerun: 32) add_key$fscrypt_provisioning(&(0x7f0000000140), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x1, 0x0, @c}, 0x29, 0xffffffffffffffff) (async, rerun: 32) syz_open_dev$usbfs(&(0x7f0000000100), 0x80, 0x181001) 20:46:07 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffb) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:07 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x5, 0x0, 0x0) 20:46:07 executing program 2: ptrace$ARCH_SHSTK_UNLOCK(0x1e, 0xffffffffffffffff, 0x0, 0x5004) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01002dbd7000fedbdf2501"], 0x28}}, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)={0x1, 0x0, @auto=[0x37, 0x2b, 0x23, 0x11, 0x25, 0x27]}, 0xe, 0xfffffffffffffffd) 20:46:07 executing program 3: select(0xffffffffffffff66, &(0x7f0000000040)={0x0, 0x0, 0x1000, 0x9, 0x8000, 0xc6d4, 0x4, 0x5}, &(0x7f0000000080)={0x2, 0x9, 0x100000001, 0x6, 0xfd, 0x6, 0xffffffffffffff6c, 0x100}, &(0x7f00000000c0)={0x2, 0x7fff, 0x0, 0x1, 0x6c, 0x5, 0x9646, 0x1}, &(0x7f0000000100)) 20:46:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x5100, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:07 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffb) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:07 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x3, &(0x7f0000000080)={@loopback, @private}, &(0x7f00000000c0)=0xc) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) syz_open_dev$usbfs(&(0x7f0000000040), 0x7796, 0x882) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:07 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) mmap$IORING_OFF_CQ_RING(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x100001a, 0x8010, r0, 0x8000000) (async) add_key$fscrypt_provisioning(&(0x7f0000000140), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x1, 0x0, @c}, 0x29, 0xffffffffffffffff) syz_open_dev$usbfs(&(0x7f0000000100), 0x80, 0x181001) 20:46:07 executing program 3: select(0xffffffffffffff66, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x9, 0x8000, 0xc6d4, 0x4, 0x5}, &(0x7f0000000080)={0x2, 0x9, 0x100000001, 0x6, 0xfd, 0x6, 0xffffffffffffff6c, 0x100}, &(0x7f00000000c0)={0x2, 0x7fff, 0x0, 0x1, 0x6c, 0x5, 0x9646, 0x1}, &(0x7f0000000100)) 20:46:07 executing program 2: ptrace$ARCH_SHSTK_UNLOCK(0x1e, 0xffffffffffffffff, 0x0, 0x5004) r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01002dbd7000fedbdf2501"], 0x28}}, 0x0) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) add_key$fscrypt_provisioning(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)={0x1, 0x0, @auto=[0x37, 0x2b, 0x23, 0x11, 0x25, 0x27]}, 0xe, 0xfffffffffffffffd) [ 1263.154430][ T4402] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 20:46:07 executing program 3: select(0xffffffffffffff66, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8000, 0xc6d4, 0x4, 0x5}, &(0x7f0000000080)={0x2, 0x9, 0x100000001, 0x6, 0xfd, 0x6, 0xffffffffffffff6c, 0x100}, &(0x7f00000000c0)={0x2, 0x7fff, 0x0, 0x1, 0x6c, 0x5, 0x9646, 0x1}, &(0x7f0000000100)) 20:46:07 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x30) 20:46:07 executing program 3: select(0xffffffffffffff66, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0xc6d4, 0x4, 0x5}, &(0x7f0000000080)={0x2, 0x9, 0x100000001, 0x6, 0xfd, 0x6, 0xffffffffffffff6c, 0x100}, &(0x7f00000000c0)={0x2, 0x7fff, 0x0, 0x1, 0x6c, 0x5, 0x9646, 0x1}, &(0x7f0000000100)) 20:46:07 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x6800, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:07 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x3, &(0x7f0000000080)={@loopback, @private}, &(0x7f00000000c0)=0xc) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) syz_open_dev$usbfs(&(0x7f0000000040), 0x7796, 0x882) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:07 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x30) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x30) 20:46:07 executing program 3: select(0xffffffffffffff66, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5}, &(0x7f0000000080)={0x2, 0x9, 0x100000001, 0x6, 0xfd, 0x6, 0xffffffffffffff6c, 0x100}, &(0x7f00000000c0)={0x2, 0x7fff, 0x0, 0x1, 0x6c, 0x5, 0x9646, 0x1}, &(0x7f0000000100)) 20:46:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c00, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:07 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) [ 1263.235283][ T4422] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 20:46:07 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x30) 20:46:07 executing program 2: ptrace$ARCH_SHSTK_UNLOCK(0x1e, 0xffffffffffffffff, 0x0, 0x5004) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01002dbd7000fedbdf2501"], 0x28}}, 0x0) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) add_key$fscrypt_provisioning(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)={0x1, 0x0, @auto=[0x37, 0x2b, 0x23, 0x11, 0x25, 0x27]}, 0xe, 0xfffffffffffffffd) 20:46:07 executing program 3: select(0xffffffffffffff66, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, &(0x7f0000000080)={0x2, 0x9, 0x100000001, 0x6, 0xfd, 0x6, 0xffffffffffffff6c, 0x100}, &(0x7f00000000c0)={0x2, 0x7fff, 0x0, 0x1, 0x6c, 0x5, 0x9646, 0x1}, &(0x7f0000000100)) 20:46:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x7400, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:07 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x3, &(0x7f0000000080)={@loopback, @private}, &(0x7f00000000c0)=0xc) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) syz_open_dev$usbfs(&(0x7f0000000040), 0x7796, 0x882) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:07 executing program 3: select(0xffffffffffffff66, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x9, 0x100000001, 0x6, 0xfd, 0x6, 0xffffffffffffff6c, 0x100}, &(0x7f00000000c0)={0x2, 0x7fff, 0x0, 0x1, 0x6c, 0x5, 0x9646, 0x1}, &(0x7f0000000100)) 20:46:07 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a00, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:07 executing program 3: select(0x40, &(0x7f0000000040), 0x0, &(0x7f00000000c0)={0x2, 0x7fff, 0x0, 0x1, 0x6c, 0x5, 0x9646, 0x1}, &(0x7f0000000100)) 20:46:07 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void, @val={0xc}}}, [@NL80211_ATTR_IFINDEX={0x8}]}, 0x30}}, 0x0) r2 = gettid() sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x68, r1, 0x100, 0x70bd2c, 0x25dfdbff, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x9, 0x7f}}, @NL80211_ATTR_PID={0x8, 0x52, r2}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x8, 0x39}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x20}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x0, 0x76}}, @NL80211_ATTR_NETNS_FD={0x8}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0xc23da47c2bf80c93) 20:46:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x1000000, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) [ 1263.332289][ T4454] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 20:46:07 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void, @val={0xc}}}, [@NL80211_ATTR_IFINDEX={0x8}]}, 0x30}}, 0x0) (async) r2 = gettid() sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x68, r1, 0x100, 0x70bd2c, 0x25dfdbff, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x9, 0x7f}}, @NL80211_ATTR_PID={0x8, 0x52, r2}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x8, 0x39}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x20}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x0, 0x76}}, @NL80211_ATTR_NETNS_FD={0x8}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0xc23da47c2bf80c93) 20:46:07 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x3, &(0x7f0000000080)={@loopback, @private}, &(0x7f00000000c0)=0xc) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) syz_open_dev$usbfs(&(0x7f0000000040), 0x7796, 0x882) 20:46:07 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffe) 20:46:07 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void, @val={0xc}}}, [@NL80211_ATTR_IFINDEX={0x8}]}, 0x30}}, 0x0) r2 = gettid() sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x68, r1, 0x100, 0x70bd2c, 0x25dfdbff, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x9, 0x7f}}, @NL80211_ATTR_PID={0x8, 0x52, r2}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x8, 0x39}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x20}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x0, 0x76}}, @NL80211_ATTR_NETNS_FD={0x8}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0xc23da47c2bf80c93) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) (async) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void, @val={0xc}}}, [@NL80211_ATTR_IFINDEX={0x8}]}, 0x30}}, 0x0) (async) gettid() (async) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x68, r1, 0x100, 0x70bd2c, 0x25dfdbff, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x9, 0x7f}}, @NL80211_ATTR_PID={0x8, 0x52, r2}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x8, 0x39}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x20}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x0, 0x76}}, @NL80211_ATTR_NETNS_FD={0x8}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0xc23da47c2bf80c93) (async) 20:46:07 executing program 3: select(0x40, &(0x7f0000000040), 0x0, &(0x7f00000000c0)={0x2, 0x7fff, 0x0, 0x1, 0x6c, 0x5, 0x9646, 0x1}, &(0x7f0000000100)) 20:46:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000000, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:07 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffe) (async) 20:46:07 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffe) 20:46:07 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x33, 0xfffffffffffffff8) prctl$PR_SET_SECUREBITS(0x1c, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)=ANY=[@ANYBLOB="020000000000000061616161616161616161616161616161080000006161616161616161616161613131313131313131313131313131313131313131313131313131313131000000"], 0x48, 0xfffffffffffffff9) 20:46:07 executing program 1: madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x9) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffb) 20:46:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x3000000, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:07 executing program 3: select(0x40, &(0x7f0000000040), 0x0, &(0x7f00000000c0)={0x2, 0x7fff, 0x0, 0x1, 0x6c, 0x5, 0x9646, 0x1}, &(0x7f0000000100)) 20:46:07 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x3, &(0x7f0000000080)={@loopback, @private}, &(0x7f00000000c0)=0xc) syz_open_dev$usbfs(&(0x7f0000000040), 0x7796, 0x882) 20:46:07 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x33, 0xfffffffffffffff8) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)=ANY=[@ANYBLOB="020000000000000061616161616161616161616161616161080000006161616161616161616161613131313131313131313131313131313131313131313131313131313131000000"], 0x48, 0xfffffffffffffff9) 20:46:07 executing program 1: madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x9) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffb) 20:46:07 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffff9) 20:46:07 executing program 3: select(0xffffffffffffff66, &(0x7f0000000040), &(0x7f0000000080)={0x0, 0x9, 0x100000001, 0x6, 0xfd, 0x6, 0xffffffffffffff6c, 0x100}, &(0x7f00000000c0)={0x2, 0x7fff, 0x0, 0x1, 0x6c, 0x5, 0x9646, 0x1}, &(0x7f0000000100)) 20:46:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000000, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:07 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x33, 0xfffffffffffffff8) prctl$PR_SET_SECUREBITS(0x1c, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)=ANY=[@ANYBLOB="020000000000000061616161616161616161616161616161080000006161616161616161616161613131313131313131313131313131313131313131313131313131313131000000"], 0x48, 0xfffffffffffffff9) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)=ANY=[@ANYBLOB="020000000000000061616161616161616161616161616161080000006161616161616161616161613131313131313131313131313131313131313131313131313131313131000000"], 0x48, 0xfffffffffffffff9) 20:46:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x5000000, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:07 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffff9) 20:46:07 executing program 1: madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x9) (async, rerun: 32) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffb) (rerun: 32) 20:46:07 executing program 3: select(0xffffffffffffff66, &(0x7f0000000040), &(0x7f0000000080)={0x0, 0x0, 0x100000001, 0x6, 0xfd, 0x6, 0xffffffffffffff6c, 0x100}, &(0x7f00000000c0)={0x2, 0x7fff, 0x0, 0x1, 0x6c, 0x5, 0x9646, 0x1}, &(0x7f0000000100)) 20:46:07 executing program 5: socket$inet_dccp(0x2, 0x6, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x7796, 0x882) 20:46:07 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0xc2f42c979859f3f6) 20:46:07 executing program 3: select(0xffffffffffffff66, &(0x7f0000000040), &(0x7f0000000080)={0x0, 0x0, 0x0, 0x6, 0xfd, 0x6, 0xffffffffffffff6c, 0x100}, &(0x7f00000000c0)={0x2, 0x7fff, 0x0, 0x1, 0x6c, 0x5, 0x9646, 0x1}, &(0x7f0000000100)) 20:46:07 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffffffffffffead, 0xfffffffffffffffd) 20:46:07 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffff9) 20:46:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x6000000, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:07 executing program 3: select(0xffffffffffffff66, &(0x7f0000000040), &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xfd, 0x6, 0xffffffffffffff6c, 0x100}, &(0x7f00000000c0)={0x2, 0x7fff, 0x0, 0x1, 0x6c, 0x5, 0x9646, 0x1}, &(0x7f0000000100)) 20:46:07 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040), 0x7796, 0x882) 20:46:07 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffffffffffffead, 0xfffffffffffffffd) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffffffffffffead, 0xfffffffffffffffd) (async) 20:46:07 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0xc2f42c979859f3f6) (async) prctl$PR_SET_SECUREBITS(0x1c, 0xc2f42c979859f3f6) 20:46:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x889d) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x889d) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000240), r1) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfffffffc}}, './file0\x00'}) r4 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) r5 = gettid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x18000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="a8000000", @ANYRES16=r2, @ANYBLOB="00012abd7000fbdbdf252500000008000100706330303a31302e300000000008008a00"/46, @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008a00", @ANYRES32=r4, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r5, @ANYBLOB], 0xa8}, 0x1, 0x0, 0x0, 0x24000000}, 0x4048080) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) 20:46:07 executing program 3: select(0xffffffffffffff66, &(0x7f0000000040), &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xffffffffffffff6c, 0x100}, &(0x7f00000000c0)={0x2, 0x7fff, 0x0, 0x1, 0x6c, 0x5, 0x9646, 0x1}, &(0x7f0000000100)) 20:46:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x7000000, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x889d) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x889d) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000240), r1) (async) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfffffffc}}, './file0\x00'}) r4 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) (async) r5 = gettid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x18000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="a8000000", @ANYRES16=r2, @ANYBLOB="00012abd7000fbdbdf252500000008000100706330303a31302e300000000008008a00"/46, @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008a00", @ANYRES32=r4, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r5, @ANYBLOB], 0xa8}, 0x1, 0x0, 0x0, 0x24000000}, 0x4048080) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) 20:46:07 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async, rerun: 64) prctl$PR_SET_SECUREBITS(0x1c, 0xc2f42c979859f3f6) (rerun: 64) 20:46:07 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffffffffffffead, 0xfffffffffffffffd) 20:46:07 executing program 3: select(0xffffffffffffff66, &(0x7f0000000040), &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff6c, 0x100}, &(0x7f00000000c0)={0x2, 0x7fff, 0x0, 0x1, 0x6c, 0x5, 0x9646, 0x1}, &(0x7f0000000100)) 20:46:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x889d) socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x889d) (async) sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x889d) syz_genetlink_get_family_id$devlink(&(0x7f0000000240), r1) (async) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000240), r1) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfffffffc}}, './file0\x00'}) r4 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) r5 = gettid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x18000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="a8000000", @ANYRES16=r2, @ANYBLOB="00012abd7000fbdbdf252500000008000100706330303a31302e300000000008008a00"/46, @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008a00", @ANYRES32=r4, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r5, @ANYBLOB], 0xa8}, 0x1, 0x0, 0x0, 0x24000000}, 0x4048080) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) 20:46:07 executing program 5: syz_open_dev$usbfs(0x0, 0x7796, 0x882) 20:46:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x8000000, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:07 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffffffffffffca4, 0xfffffffffffffffc) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:07 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs2/binder0\x00', 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)={0x1, 0x0, @b}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_provisioning(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)=ANY=[@ANYBLOB="030000000000000061616161616161616161616161616161616161616117e16af0c1b010116161613131313131313131313131313131313131313131313131313131313131313131"], 0x48, 0x0) 20:46:07 executing program 5: syz_open_dev$usbfs(0x0, 0x7796, 0x882) 20:46:07 executing program 3: select(0xffffffffffffff66, &(0x7f0000000040), &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, &(0x7f00000000c0)={0x2, 0x7fff, 0x0, 0x1, 0x6c, 0x5, 0x9646, 0x1}, &(0x7f0000000100)) 20:46:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x9000000, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:07 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffffffffffffca4, 0xfffffffffffffffc) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffffffffffffca4, 0xfffffffffffffffc) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:07 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan0\x00'}) 20:46:07 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffffffffffffca4, 0xfffffffffffffffc) prctl$PR_SET_SECUREBITS(0x1c, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffffffffffffca4, 0xfffffffffffffffc) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) 20:46:07 executing program 3: select(0xffffffffffffff66, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)={0x2, 0x7fff, 0x0, 0x1, 0x6c, 0x5, 0x9646, 0x1}, &(0x7f0000000100)) 20:46:07 executing program 5: syz_open_dev$usbfs(0x0, 0x7796, 0x882) 20:46:07 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) (async, rerun: 64) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan0\x00'}) (rerun: 64) 20:46:07 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async, rerun: 32) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs2/binder0\x00', 0x0, 0x0) (async, rerun: 32) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)={0x1, 0x0, @b}, 0x48, 0xfffffffffffffffc) (async) add_key$fscrypt_provisioning(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)=ANY=[@ANYBLOB="030000000000000061616161616161616161616161616161616161616117e16af0c1b010116161613131313131313131313131313131313131313131313131313131313131313131"], 0x48, 0x0) 20:46:07 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan0\x00'}) 20:46:07 executing program 3: select(0x40, &(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000000100)) 20:46:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xa000000, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:07 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040), 0x0, 0x882) 20:46:07 executing program 3: select(0x40, &(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000000100)) 20:46:07 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x1) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'syztnl2\x00', &(0x7f0000000040)={'ip_vti0\x00', 0x0, 0x8, 0x7, 0x1ff, 0x8, {{0x3d, 0x4, 0x2, 0x1, 0xf4, 0x66, 0x0, 0xfe, 0x29, 0x0, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@rr={0x7, 0x13, 0x94, [@multicast2, @loopback, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp_prespec={0x44, 0x14, 0x5, 0x3, 0xc, [{@multicast1, 0x2}, {@local, 0x10000}]}, @timestamp_addr={0x44, 0x54, 0x90, 0x1, 0xa, [{@private=0xa010100, 0x4}, {@dev={0xac, 0x14, 0x14, 0x13}, 0xffffffff}, {@private=0xa010100, 0x2}, {@local, 0xffffffff}, {@multicast1, 0x3}, {@local, 0x3}, {@multicast1, 0x7ff}, {@loopback, 0x9}, {@remote, 0x401}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}]}, @ssrr={0x89, 0x1f, 0xd1, [@broadcast, @multicast1, @loopback, @multicast2, @empty, @local, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @timestamp_prespec={0x44, 0x44, 0x74, 0x3, 0x0, [{@empty, 0x2}, {@multicast1, 0x80}, {@local, 0xe0c6}, {@remote, 0x1000}, {@broadcast, 0x97ca}, {@multicast2, 0x6}, {@local, 0x4}, {@remote, 0x12}]}]}}}}}) 20:46:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x1000) syz_genetlink_get_family_id$gtp(&(0x7f0000000000), r1) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x889d) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r0) 20:46:08 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040), 0x0, 0x882) 20:46:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xb000000, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:08 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs2/binder0\x00', 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)={0x1, 0x0, @b}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_provisioning(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)=ANY=[@ANYBLOB="030000000000000061616161616161616161616161616161616161616117e16af0c1b010116161613131313131313131313131313131313131313131313131313131313131313131"], 0x48, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs2/binder0\x00', 0x0, 0x0) (async) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)={0x1, 0x0, @b}, 0x48, 0xfffffffffffffffc) (async) add_key$fscrypt_provisioning(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)=ANY=[@ANYBLOB="030000000000000061616161616161616161616161616161616161616117e16af0c1b010116161613131313131313131313131313131313131313131313131313131313131313131"], 0x48, 0x0) (async) 20:46:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x1000) (async) r1 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x1000) syz_genetlink_get_family_id$gtp(&(0x7f0000000000), r1) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x889d) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r0) 20:46:08 executing program 3: select(0x40, &(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000000100)) 20:46:08 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x1) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'syztnl2\x00', &(0x7f0000000040)={'ip_vti0\x00', 0x0, 0x8, 0x7, 0x1ff, 0x8, {{0x3d, 0x4, 0x2, 0x1, 0xf4, 0x66, 0x0, 0xfe, 0x29, 0x0, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@rr={0x7, 0x13, 0x94, [@multicast2, @loopback, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp_prespec={0x44, 0x14, 0x5, 0x3, 0xc, [{@multicast1, 0x2}, {@local, 0x10000}]}, @timestamp_addr={0x44, 0x54, 0x90, 0x1, 0xa, [{@private=0xa010100, 0x4}, {@dev={0xac, 0x14, 0x14, 0x13}, 0xffffffff}, {@private=0xa010100, 0x2}, {@local, 0xffffffff}, {@multicast1, 0x3}, {@local, 0x3}, {@multicast1, 0x7ff}, {@loopback, 0x9}, {@remote, 0x401}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}]}, @ssrr={0x89, 0x1f, 0xd1, [@broadcast, @multicast1, @loopback, @multicast2, @empty, @local, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @timestamp_prespec={0x44, 0x44, 0x74, 0x3, 0x0, [{@empty, 0x2}, {@multicast1, 0x80}, {@local, 0xe0c6}, {@remote, 0x1000}, {@broadcast, 0x97ca}, {@multicast2, 0x6}, {@local, 0x4}, {@remote, 0x12}]}]}}}}}) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x1) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'syztnl2\x00', &(0x7f0000000040)={'ip_vti0\x00', 0x0, 0x8, 0x7, 0x1ff, 0x8, {{0x3d, 0x4, 0x2, 0x1, 0xf4, 0x66, 0x0, 0xfe, 0x29, 0x0, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@rr={0x7, 0x13, 0x94, [@multicast2, @loopback, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp_prespec={0x44, 0x14, 0x5, 0x3, 0xc, [{@multicast1, 0x2}, {@local, 0x10000}]}, @timestamp_addr={0x44, 0x54, 0x90, 0x1, 0xa, [{@private=0xa010100, 0x4}, {@dev={0xac, 0x14, 0x14, 0x13}, 0xffffffff}, {@private=0xa010100, 0x2}, {@local, 0xffffffff}, {@multicast1, 0x3}, {@local, 0x3}, {@multicast1, 0x7ff}, {@loopback, 0x9}, {@remote, 0x401}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}]}, @ssrr={0x89, 0x1f, 0xd1, [@broadcast, @multicast1, @loopback, @multicast2, @empty, @local, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @timestamp_prespec={0x44, 0x44, 0x74, 0x3, 0x0, [{@empty, 0x2}, {@multicast1, 0x80}, {@local, 0xe0c6}, {@remote, 0x1000}, {@broadcast, 0x97ca}, {@multicast2, 0x6}, {@local, 0x4}, {@remote, 0x12}]}]}}}}}) (async) 20:46:08 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040), 0x0, 0x882) 20:46:08 executing program 3: select(0xffffffffffffff66, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x7fff, 0x0, 0x1, 0x6c, 0x5, 0x9646, 0x1}, &(0x7f0000000100)) 20:46:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xc000000, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:08 executing program 1: sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200c000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xfa09}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000}, 0x805) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000810}, 0x20040010) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) 20:46:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x1000) syz_genetlink_get_family_id$gtp(&(0x7f0000000000), r1) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x889d) (async, rerun: 64) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r0) (rerun: 64) 20:46:08 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040), 0x7796, 0x0) 20:46:08 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x1) (async, rerun: 32) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'syztnl2\x00', &(0x7f0000000040)={'ip_vti0\x00', 0x0, 0x8, 0x7, 0x1ff, 0x8, {{0x3d, 0x4, 0x2, 0x1, 0xf4, 0x66, 0x0, 0xfe, 0x29, 0x0, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@rr={0x7, 0x13, 0x94, [@multicast2, @loopback, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp_prespec={0x44, 0x14, 0x5, 0x3, 0xc, [{@multicast1, 0x2}, {@local, 0x10000}]}, @timestamp_addr={0x44, 0x54, 0x90, 0x1, 0xa, [{@private=0xa010100, 0x4}, {@dev={0xac, 0x14, 0x14, 0x13}, 0xffffffff}, {@private=0xa010100, 0x2}, {@local, 0xffffffff}, {@multicast1, 0x3}, {@local, 0x3}, {@multicast1, 0x7ff}, {@loopback, 0x9}, {@remote, 0x401}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}]}, @ssrr={0x89, 0x1f, 0xd1, [@broadcast, @multicast1, @loopback, @multicast2, @empty, @local, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @timestamp_prespec={0x44, 0x44, 0x74, 0x3, 0x0, [{@empty, 0x2}, {@multicast1, 0x80}, {@local, 0xe0c6}, {@remote, 0x1000}, {@broadcast, 0x97ca}, {@multicast2, 0x6}, {@local, 0x4}, {@remote, 0x12}]}]}}}}}) (rerun: 32) 20:46:08 executing program 3: select(0xffffffffffffff66, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x6c, 0x5, 0x9646, 0x1}, &(0x7f0000000100)) 20:46:08 executing program 1: sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200c000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xfa09}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000}, 0x805) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000810}, 0x20040010) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) 20:46:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xd000000, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:08 executing program 5: madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x9) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffb) 20:46:08 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0xa) 20:46:08 executing program 3: select(0xffffffffffffff66, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x6c, 0x5, 0x9646, 0x1}, &(0x7f0000000100)) 20:46:08 executing program 3: select(0xffffffffffffff66, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9646, 0x1}, &(0x7f0000000100)) 20:46:08 executing program 2: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan1\x00'}) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) 20:46:08 executing program 1: sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200c000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x8, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xfa09}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000}, 0x805) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000810}, 0x20040010) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) 20:46:08 executing program 5: madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x9) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffb) 20:46:08 executing program 2: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan1\x00'}) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) 20:46:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xe000000, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:08 executing program 5: madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x9) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffb) 20:46:08 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0xa) 20:46:08 executing program 3: select(0xffffffffffffff66, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9646, 0x1}, &(0x7f0000000100)) 20:46:08 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) pipe2$9p(&(0x7f0000000140), 0x80800) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000040)={@initdev, @multicast2}, &(0x7f00000000c0)=0xc) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) r1 = socket(0x2b, 0x800, 0x3) getsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000080), &(0x7f0000000100)=0x4) socket$inet6_sctp(0xa, 0x1, 0x84) 20:46:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xf000000, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:08 executing program 2: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan1\x00'}) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) 20:46:08 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) prctl$PR_SET_SECUREBITS(0x1c, 0xa) 20:46:08 executing program 5: madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x9) 20:46:08 executing program 3: select(0xffffffffffffff66, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, &(0x7f0000000100)) 20:46:08 executing program 5: madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) 20:46:08 executing program 3: select(0xffffffffffffff66, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) 20:46:08 executing program 0: pipe2$watch_queue(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$l2tp(&(0x7f0000000200), r0) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x2280f7c3d9d7a776, 0x0, @a}, 0x48, 0xfffffffffffffff9) 20:46:08 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) (async) pipe2$9p(&(0x7f0000000140), 0x80800) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000040)={@initdev, @multicast2}, &(0x7f00000000c0)=0xc) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) r1 = socket(0x2b, 0x800, 0x3) getsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000080), &(0x7f0000000100)=0x4) socket$inet6_sctp(0xa, 0x1, 0x84) 20:46:08 executing program 3: select(0x40, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), 0x0) 20:46:08 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000140)=@gcm_256={{0x502}, "7fbf690dbbbd0e5f", "e3078be18755a6b934e155053cc04d484d5775b7cafd85676c58c2a8af45d8bd", "553d2001", "4a1a8b13e360dd77"}, 0x38) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000000000000616263646d6e6f70717273747576777c797a3031323334"], 0x29, 0xfffffffffffffff9) 20:46:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x10000000, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:08 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000140)=@gcm_256={{0x502}, "7fbf690dbbbd0e5f", "e3078be18755a6b934e155053cc04d484d5775b7cafd85676c58c2a8af45d8bd", "553d2001", "4a1a8b13e360dd77"}, 0x38) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000000000000616263646d6e6f70717273747576777c797a3031323334"], 0x29, 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) (async) write$char_usb(r0, 0x0, 0x0) (async) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000140)=@gcm_256={{0x502}, "7fbf690dbbbd0e5f", "e3078be18755a6b934e155053cc04d484d5775b7cafd85676c58c2a8af45d8bd", "553d2001", "4a1a8b13e360dd77"}, 0x38) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000000000000616263646d6e6f70717273747576777c797a3031323334"], 0x29, 0xfffffffffffffff9) (async) 20:46:08 executing program 5: madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) 20:46:08 executing program 0: pipe2$watch_queue(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$l2tp(&(0x7f0000000200), r0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000200), r0) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x2280f7c3d9d7a776, 0x0, @a}, 0x48, 0xfffffffffffffff9) 20:46:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x11000000, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:08 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) (async) pipe2$9p(&(0x7f0000000140), 0x80800) (async, rerun: 64) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000040)={@initdev, @multicast2}, &(0x7f00000000c0)=0xc) (rerun: 64) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) r1 = socket(0x2b, 0x800, 0x3) getsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000080), &(0x7f0000000100)=0x4) (async) socket$inet6_sctp(0xa, 0x1, 0x84) 20:46:08 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000140)=@gcm_256={{0x502}, "7fbf690dbbbd0e5f", "e3078be18755a6b934e155053cc04d484d5775b7cafd85676c58c2a8af45d8bd", "553d2001", "4a1a8b13e360dd77"}, 0x38) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000000000000616263646d6e6f70717273747576777c797a3031323334"], 0x29, 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) (async) write$char_usb(r0, 0x0, 0x0) (async) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000140)=@gcm_256={{0x502}, "7fbf690dbbbd0e5f", "e3078be18755a6b934e155053cc04d484d5775b7cafd85676c58c2a8af45d8bd", "553d2001", "4a1a8b13e360dd77"}, 0x38) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000000000000616263646d6e6f70717273747576777c797a3031323334"], 0x29, 0xfffffffffffffff9) (async) 20:46:08 executing program 5: madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) 20:46:08 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)={0x3, 0x0, @auto=[0x3b, 0x38, 0x36, 0x33, 0x25, 0x25]}, 0xe, 0xffffffffffffffff) 20:46:08 executing program 0: pipe2$watch_queue(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$l2tp(&(0x7f0000000200), r0) (async, rerun: 32) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) (async, rerun: 32) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x2280f7c3d9d7a776, 0x0, @a}, 0x48, 0xfffffffffffffff9) 20:46:09 executing program 3: select(0x40, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), 0x0) 20:46:09 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x3, &(0x7f0000000080)={@loopback, @private}, &(0x7f00000000c0)=0xc) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) syz_open_dev$usbfs(&(0x7f0000000040), 0x7796, 0x882) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:09 executing program 2: getitimer(0x1, &(0x7f0000000040)) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) r0 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000780)={'wlan0\x00'}) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, 0x3f7, 0x800, 0x70bd2b, 0x25dfdbfe, {0x7, 0x7, './file0', './file0'}, ["", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x8}, 0x20000000) 20:46:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x12000000, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:09 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)={0x3, 0x0, @auto=[0x3b, 0x38, 0x36, 0x33, 0x25, 0x25]}, 0xe, 0xffffffffffffffff) 20:46:09 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)=ANY=[@ANYBLOB="02c4000000006e6f7071027374c2f7833c165a6775767778797a"], 0x29, 0xfffffffffffffffe) socket$inet_sctp(0x2, 0x5, 0x84) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:09 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)={0x3, 0x0, @auto=[0x3b, 0x38, 0x36, 0x33, 0x25, 0x25]}, 0xe, 0xffffffffffffffff) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)={0x3, 0x0, @auto=[0x3b, 0x38, 0x36, 0x33, 0x25, 0x25]}, 0xe, 0xffffffffffffffff) 20:46:09 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)=ANY=[@ANYBLOB="02c4000000006e6f7071027374c2f7833c165a6775767778797a"], 0x29, 0xfffffffffffffffe) socket$inet_sctp(0x2, 0x5, 0x84) (async) socket$inet_sctp(0x2, 0x5, 0x84) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x25000000, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:09 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xffffffffffffffff) 20:46:09 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)=ANY=[@ANYBLOB="02c4000000006e6f7071027374c2f7833c165a6775767778797a"], 0x29, 0xfffffffffffffffe) socket$inet_sctp(0x2, 0x5, 0x84) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x48000000, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:10 executing program 3: select(0x40, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), 0x0) 20:46:10 executing program 2: getitimer(0x1, &(0x7f0000000040)) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) r0 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000780)={'wlan0\x00'}) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, 0x3f7, 0x800, 0x70bd2b, 0x25dfdbfe, {0x7, 0x7, './file0', './file0'}, ["", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x8}, 0x20000000) getitimer(0x1, &(0x7f0000000040)) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) (async) socket$nl_audit(0x10, 0x3, 0x9) (async) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000780)={'wlan0\x00'}) (async) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, 0x3f7, 0x800, 0x70bd2b, 0x25dfdbfe, {0x7, 0x7, './file0', './file0'}, ["", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x8}, 0x20000000) (async) 20:46:10 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x3, &(0x7f0000000080)={@loopback, @private}, &(0x7f00000000c0)=0xc) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) syz_open_dev$usbfs(&(0x7f0000000040), 0x7796, 0x882) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c000000, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:10 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@window={0x3, 0x800, 0xf29a}, @window={0x3, 0x2, 0xf801}, @sack_perm, @mss={0x2, 0x3}, @timestamp, @window={0x3, 0x6, 0x74c}], 0x6) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:10 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) 20:46:10 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@window={0x3, 0x800, 0xf29a}, @window={0x3, 0x2, 0xf801}, @sack_perm, @mss={0x2, 0x3}, @timestamp, @window={0x3, 0x6, 0x74c}], 0x6) prctl$PR_SET_SECUREBITS(0x1c, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@window={0x3, 0x800, 0xf29a}, @window={0x3, 0x2, 0xf801}, @sack_perm, @mss={0x2, 0x3}, @timestamp, @window={0x3, 0x6, 0x74c}], 0x6) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) 20:46:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x51000000, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:10 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xffffffffffffffff) 20:46:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x68000000, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:10 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x3, &(0x7f0000000080)={@loopback, @private}, &(0x7f00000000c0)=0xc) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) syz_open_dev$usbfs(&(0x7f0000000040), 0x7796, 0x882) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:10 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@window={0x3, 0x800, 0xf29a}, @window={0x3, 0x2, 0xf801}, @sack_perm, @mss={0x2, 0x3}, @timestamp, @window={0x3, 0x6, 0x74c}], 0x6) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:10 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x3, &(0x7f0000000080)={@loopback, @private}, &(0x7f00000000c0)=0xc) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) syz_open_dev$usbfs(&(0x7f0000000040), 0x7796, 0x882) 20:46:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c000000, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:10 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfe91, 0xfffffffffffffffd) 20:46:10 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0xa, 0x3b) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:10 executing program 2: getitimer(0x1, &(0x7f0000000040)) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) (async) r0 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000780)={'wlan0\x00'}) (async) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, 0x3f7, 0x800, 0x70bd2b, 0x25dfdbfe, {0x7, 0x7, './file0', './file0'}, ["", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x8}, 0x20000000) 20:46:10 executing program 3: select(0x40, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), 0x0) 20:46:10 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfe91, 0xfffffffffffffffd) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfe91, 0xfffffffffffffffd) (async) 20:46:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x74000000, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:10 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0xa, 0x3b) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a000000, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:10 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfe91, 0xfffffffffffffffd) 20:46:10 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x3, &(0x7f0000000080)={@loopback, @private}, &(0x7f00000000c0)=0xc) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) 20:46:10 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0xa, 0x3b) prctl$PR_SET_SECUREBITS(0x1c, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) socket$inet(0x2, 0xa, 0x3b) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) 20:46:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:10 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6) 20:46:10 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x3, &(0x7f0000000080)={@loopback, @private}, &(0x7f00000000c0)=0xc) 20:46:10 executing program 2: r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x5c, r0, 0x200, 0x70bd28, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, 0xffffffffffffffff}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8}}]}, 0x5c}, 0x1, 0x0, 0x0, 0xc040}, 0x90) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000340)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x58, 0x0, 0x1, 0x70bd2c, 0x25dfdbfc, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @rand_addr=0x64010102}, @GTPA_MS_ADDRESS={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @GTPA_NET_NS_FD={0x8, 0x7, r1}, @GTPA_PEER_ADDRESS={0x8, 0x4, @private=0xa010101}, @GTPA_PEER_ADDRESS={0x8, 0x4, @local}, @GTPA_TID={0xc, 0x3, 0x1}, @GTPA_MS_ADDRESS={0x8, 0x5, @multicast2}, @GTPA_FLOW={0x6}]}, 0x58}, 0x1, 0x0, 0x0, 0x24000004}, 0x40) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) sendmsg$AUDIT_MAKE_EQUIV(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd26, 0x25dfdbfe, {0x7, 0x7, './file0', './file0'}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x41) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) setpriority(0x0, 0x0, 0x2) 20:46:11 executing program 3: select(0x40, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), 0x0) 20:46:11 executing program 0: r0 = gettid() syz_open_procfs$namespace(r0, 0x0) ptrace$poke(0x5, r0, &(0x7f0000000040), 0x3) syz_open_procfs$namespace(r0, &(0x7f0000000300)='ns/ipc\x00') add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = gettid() getsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f0000000340), &(0x7f0000000380)=0x4) syz_open_procfs$namespace(r1, 0x0) r2 = syz_open_procfs$userns(r0, &(0x7f00000000c0)) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x144, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x2}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r0}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x4}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r1}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x4}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r2}}]}, 0x144}, 0x1, 0x0, 0x0, 0x4000801}, 0x20000010) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:11 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6) 20:46:11 executing program 5: getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000080)={@loopback, @private}, &(0x7f00000000c0)=0xc) 20:46:11 executing program 2: r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x5c, r0, 0x200, 0x70bd28, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, 0xffffffffffffffff}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8}}]}, 0x5c}, 0x1, 0x0, 0x0, 0xc040}, 0x90) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000340)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x58, 0x0, 0x1, 0x70bd2c, 0x25dfdbfc, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @rand_addr=0x64010102}, @GTPA_MS_ADDRESS={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @GTPA_NET_NS_FD={0x8, 0x7, r1}, @GTPA_PEER_ADDRESS={0x8, 0x4, @private=0xa010101}, @GTPA_PEER_ADDRESS={0x8, 0x4, @local}, @GTPA_TID={0xc, 0x3, 0x1}, @GTPA_MS_ADDRESS={0x8, 0x5, @multicast2}, @GTPA_FLOW={0x6}]}, 0x58}, 0x1, 0x0, 0x0, 0x24000004}, 0x40) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) sendmsg$AUDIT_MAKE_EQUIV(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd26, 0x25dfdbfe, {0x7, 0x7, './file0', './file0'}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x41) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) (async) setpriority(0x0, 0x0, 0x2) 20:46:11 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6) 20:46:11 executing program 5: getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000080)={@loopback, @private}, &(0x7f00000000c0)=0xc) 20:46:11 executing program 0: r0 = gettid() syz_open_procfs$namespace(r0, 0x0) (async, rerun: 32) ptrace$poke(0x5, r0, &(0x7f0000000040), 0x3) (rerun: 32) syz_open_procfs$namespace(r0, &(0x7f0000000300)='ns/ipc\x00') add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) r1 = gettid() (async) getsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f0000000340), &(0x7f0000000380)=0x4) syz_open_procfs$namespace(r1, 0x0) r2 = syz_open_procfs$userns(r0, &(0x7f00000000c0)) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x144, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x2}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r0}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x4}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r1}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x4}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r2}}]}, 0x144}, 0x1, 0x0, 0x0, 0x4000801}, 0x20000010) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x51, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:11 executing program 2: r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x5c, r0, 0x200, 0x70bd28, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, 0xffffffffffffffff}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8}}]}, 0x5c}, 0x1, 0x0, 0x0, 0xc040}, 0x90) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000340)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x58, 0x0, 0x1, 0x70bd2c, 0x25dfdbfc, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @rand_addr=0x64010102}, @GTPA_MS_ADDRESS={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @GTPA_NET_NS_FD={0x8, 0x7, r1}, @GTPA_PEER_ADDRESS={0x8, 0x4, @private=0xa010101}, @GTPA_PEER_ADDRESS={0x8, 0x4, @local}, @GTPA_TID={0xc, 0x3, 0x1}, @GTPA_MS_ADDRESS={0x8, 0x5, @multicast2}, @GTPA_FLOW={0x6}]}, 0x58}, 0x1, 0x0, 0x0, 0x24000004}, 0x40) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) sendmsg$AUDIT_MAKE_EQUIV(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd26, 0x25dfdbfe, {0x7, 0x7, './file0', './file0'}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x41) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) (async) setpriority(0x0, 0x0, 0x2) 20:46:11 executing program 5: getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000080)={@loopback, @private}, &(0x7f00000000c0)=0xc) 20:46:12 executing program 3: select(0x40, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), 0x0) 20:46:12 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) 20:46:12 executing program 0: r0 = gettid() syz_open_procfs$namespace(r0, 0x0) (async, rerun: 64) ptrace$poke(0x5, r0, &(0x7f0000000040), 0x3) (rerun: 64) syz_open_procfs$namespace(r0, &(0x7f0000000300)='ns/ipc\x00') (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) r1 = gettid() getsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f0000000340), &(0x7f0000000380)=0x4) (async) syz_open_procfs$namespace(r1, 0x0) r2 = syz_open_procfs$userns(r0, &(0x7f00000000c0)) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x144, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x2}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r0}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x4}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r1}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x4}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r2}}]}, 0x144}, 0x1, 0x0, 0x0, 0x4000801}, 0x20000010) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:12 executing program 5: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000080)={@loopback, @private}, &(0x7f00000000c0)=0xc) 20:46:12 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:12 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xffffffffffffffff) 20:46:12 executing program 5: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000080)={@loopback, @private}, &(0x7f00000000c0)=0xc) 20:46:12 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) (async) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) 20:46:12 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5f5e0ff, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:12 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xffffffffffffffff) 20:46:12 executing program 0: r0 = socket(0xb, 0x5, 0x6) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000500), 0x501000, 0x0) setsockopt$WPAN_WANTLQI(r2, 0x0, 0x3, &(0x7f0000000540)=0x3ffffc, 0x1f) mmap$xdp(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0xa, 0x10, r1, 0x80000000) recvmsg$can_bcm(r0, &(0x7f0000000400)={&(0x7f0000000040)=@pppol2tpin6, 0x80, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/184, 0xb8}, {&(0x7f0000000180)=""/250, 0xfa}, {&(0x7f0000000280)=""/211, 0xd3}], 0x3, &(0x7f00000003c0)=""/63, 0x3f}, 0x10001) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) pipe2$watch_queue(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000004, 0x810, r3, 0x1e005000) 20:46:12 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) 20:46:13 executing program 3: 20:46:13 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0xa, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:13 executing program 5: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000080)={@loopback, @private}, &(0x7f00000000c0)=0xc) 20:46:13 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xffffffffffffffff) 20:46:13 executing program 0: r0 = socket(0xb, 0x5, 0x6) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async, rerun: 32) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000500), 0x501000, 0x0) (rerun: 32) setsockopt$WPAN_WANTLQI(r2, 0x0, 0x3, &(0x7f0000000540)=0x3ffffc, 0x1f) (async, rerun: 32) mmap$xdp(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0xa, 0x10, r1, 0x80000000) (async, rerun: 32) recvmsg$can_bcm(r0, &(0x7f0000000400)={&(0x7f0000000040)=@pppol2tpin6, 0x80, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/184, 0xb8}, {&(0x7f0000000180)=""/250, 0xfa}, {&(0x7f0000000280)=""/211, 0xd3}], 0x3, &(0x7f00000003c0)=""/63, 0x3f}, 0x10001) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) pipe2$watch_queue(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000004, 0x810, r3, 0x1e005000) 20:46:13 executing program 1: getitimer(0x3, &(0x7f00000000c0)) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)=ANY=[@ANYBLOB="00000033d08557ec6f1b75"], 0xb, 0xfffffffffffffff9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x3ff, 0x8, 0x2, 0x75d7ef6f, 0x1}, 0x14) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) socket$inet_smc(0x2b, 0x1, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)={0x1, 0x0, @b}, 0x48, 0xfffffffffffffffe) 20:46:13 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000000080)={@loopback, @private}, &(0x7f00000000c0)=0xc) 20:46:13 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0xc, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:13 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = gettid() syz_open_procfs$namespace(r1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='htcp\x00', 0x5) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) setpriority(0x0, r1, 0xb14) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r4, 0x0, 0x0) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, 0x0, 0x4, 0x70bd27, 0x25dfdbff, {}, [@NL802154_ATTR_NETNS_FD={0x8, 0x1d, r4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='westwood\x00', 0x9) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r5, 0x0, 0x0) getsockopt$inet_tcp_buf(r5, 0x6, 0xd, &(0x7f0000000080)=""/226, &(0x7f0000000180)=0xe2) 20:46:13 executing program 1: getitimer(0x3, &(0x7f00000000c0)) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)=ANY=[@ANYBLOB="00000033d08557ec6f1b75"], 0xb, 0xfffffffffffffff9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x3ff, 0x8, 0x2, 0x75d7ef6f, 0x1}, 0x14) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) socket$inet_smc(0x2b, 0x1, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)={0x1, 0x0, @b}, 0x48, 0xfffffffffffffffe) getitimer(0x3, &(0x7f00000000c0)) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) socket$inet_smc(0x2b, 0x1, 0x0) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) (async) write$char_usb(r1, 0x0, 0x0) (async) add_key$fscrypt_provisioning(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)=ANY=[@ANYBLOB="00000033d08557ec6f1b75"], 0xb, 0xfffffffffffffff9) (async) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x3ff, 0x8, 0x2, 0x75d7ef6f, 0x1}, 0x14) (async) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) (async) socket$inet_smc(0x2b, 0x1, 0x0) (async) add_key$fscrypt_provisioning(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)={0x1, 0x0, @b}, 0x48, 0xfffffffffffffffe) (async) 20:46:13 executing program 3: 20:46:13 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x51, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:13 executing program 0: r0 = socket(0xb, 0x5, 0x6) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000500), 0x501000, 0x0) setsockopt$WPAN_WANTLQI(r2, 0x0, 0x3, &(0x7f0000000540)=0x3ffffc, 0x1f) (async) mmap$xdp(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0xa, 0x10, r1, 0x80000000) (async) recvmsg$can_bcm(r0, &(0x7f0000000400)={&(0x7f0000000040)=@pppol2tpin6, 0x80, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/184, 0xb8}, {&(0x7f0000000180)=""/250, 0xfa}, {&(0x7f0000000280)=""/211, 0xd3}], 0x3, &(0x7f00000003c0)=""/63, 0x3f}, 0x10001) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) pipe2$watch_queue(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000004, 0x810, r3, 0x1e005000) 20:46:13 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000000080)={@loopback, @private}, &(0x7f00000000c0)=0xc) 20:46:13 executing program 3: 20:46:13 executing program 1: getitimer(0x3, &(0x7f00000000c0)) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) r0 = socket$inet_smc(0x2b, 0x1, 0x0) (async) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)=ANY=[@ANYBLOB="00000033d08557ec6f1b75"], 0xb, 0xfffffffffffffff9) (async) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x3ff, 0x8, 0x2, 0x75d7ef6f, 0x1}, 0x14) (async) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) (async) socket$inet_smc(0x2b, 0x1, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)={0x1, 0x0, @b}, 0x48, 0xfffffffffffffffe) 20:46:13 executing program 3: select(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) 20:46:13 executing program 2: socket$inet_smc(0x2b, 0x1, 0x0) (async) r0 = socket$inet_smc(0x2b, 0x1, 0x0) gettid() (async) r1 = gettid() syz_open_procfs$namespace(r1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='htcp\x00', 0x5) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) setpriority(0x0, r1, 0xb14) (async) setpriority(0x0, r1, 0xb14) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) (async) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r4, 0x0, 0x0) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, 0x0, 0x4, 0x70bd27, 0x25dfdbff, {}, [@NL802154_ATTR_NETNS_FD={0x8, 0x1d, r4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) (async) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, 0x0, 0x4, 0x70bd27, 0x25dfdbff, {}, [@NL802154_ATTR_NETNS_FD={0x8, 0x1d, r4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='westwood\x00', 0x9) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r5, 0x0, 0x0) getsockopt$inet_tcp_buf(r5, 0x6, 0xd, &(0x7f0000000080)=""/226, &(0x7f0000000180)=0xe2) 20:46:13 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000000080)={@loopback, @private}, &(0x7f00000000c0)=0xc) 20:46:13 executing program 0: r0 = add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)=ANY=[@ANYRES32=r0], 0x18, 0xfffffffffffffffb) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)={0xffffffffffffffff}, 0x4) setsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f0000000100)=[{{0x0, 0x0, 0x1}, {0x4, 0x1}}, {{0x2, 0x1, 0x0, 0x1}, {0x0, 0x1, 0x1}}, {{0x3, 0x1}, {0x1, 0x1, 0x1}}, {{0x0, 0x1, 0x0, 0x1}, {0x2, 0x1, 0x1}}], 0x20) prctl$PR_SET_MM(0x23, 0x7, &(0x7f0000ffb000/0x4000)=nil) set_mempolicy_home_node(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000300)={&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/245, 0xf5, 0x0, &(0x7f0000000240)=""/180, 0xb4}, &(0x7f0000000340)=0x40) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000000, 0x12, r1, 0x10000000) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) 20:46:13 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x64, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:13 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) ioctl$NS_GET_NSTYPE(0xffffffffffffffff, 0xb703, 0x0) 20:46:13 executing program 0: r0 = add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)=ANY=[@ANYRES32=r0], 0x18, 0xfffffffffffffffb) (async) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)={0xffffffffffffffff}, 0x4) (async) setsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f0000000100)=[{{0x0, 0x0, 0x1}, {0x4, 0x1}}, {{0x2, 0x1, 0x0, 0x1}, {0x0, 0x1, 0x1}}, {{0x3, 0x1}, {0x1, 0x1, 0x1}}, {{0x0, 0x1, 0x0, 0x1}, {0x2, 0x1, 0x1}}], 0x20) prctl$PR_SET_MM(0x23, 0x7, &(0x7f0000ffb000/0x4000)=nil) (async) set_mempolicy_home_node(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000300)={&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/245, 0xf5, 0x0, &(0x7f0000000240)=""/180, 0xb4}, &(0x7f0000000340)=0x40) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) (async) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000000, 0x12, r1, 0x10000000) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) 20:46:13 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x5f5e0ff, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:13 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = gettid() syz_open_procfs$namespace(r1, 0x0) (async) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='htcp\x00', 0x5) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) (async) setpriority(0x0, r1, 0xb14) (async) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) (async) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r4, 0x0, 0x0) (async) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, 0x0, 0x4, 0x70bd27, 0x25dfdbff, {}, [@NL802154_ATTR_NETNS_FD={0x8, 0x1d, r4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='westwood\x00', 0x9) (async) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r5, 0x0, 0x0) (async) getsockopt$inet_tcp_buf(r5, 0x6, 0xd, &(0x7f0000000080)=""/226, &(0x7f0000000180)=0xe2) 20:46:13 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x3, 0x0, &(0x7f00000000c0)) 20:46:13 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) ioctl$NS_GET_NSTYPE(0xffffffffffffffff, 0xb703, 0x0) 20:46:13 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) r0 = add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)=ANY=[@ANYRES32=r0], 0x18, 0xfffffffffffffffb) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)=ANY=[@ANYRES32=r0], 0x18, 0xfffffffffffffffb) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)={0xffffffffffffffff}, 0x4) setsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f0000000100)=[{{0x0, 0x0, 0x1}, {0x4, 0x1}}, {{0x2, 0x1, 0x0, 0x1}, {0x0, 0x1, 0x1}}, {{0x3, 0x1}, {0x1, 0x1, 0x1}}, {{0x0, 0x1, 0x0, 0x1}, {0x2, 0x1, 0x1}}], 0x20) prctl$PR_SET_MM(0x23, 0x7, &(0x7f0000ffb000/0x4000)=nil) set_mempolicy_home_node(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0) (async) set_mempolicy_home_node(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000300)={&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/245, 0xf5, 0x0, &(0x7f0000000240)=""/180, 0xb4}, &(0x7f0000000340)=0x40) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) (async) write$char_usb(r1, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000000, 0x12, r1, 0x10000000) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) 20:46:14 executing program 3: select(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) 20:46:14 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)={0x1, 0x0, @a}, 0x48, 0xfffffffffffffffe) 20:46:14 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x3, 0x0, 0x0) 20:46:14 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x3, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:14 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) ioctl$NS_GET_NSTYPE(0xffffffffffffffff, 0xb703, 0x0) (async) ioctl$NS_GET_NSTYPE(0xffffffffffffffff, 0xb703, 0x0) 20:46:14 executing program 0: prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x80, 0x7, 0x9, 0xfffffffb, {{0x7, 0x4, 0x1, 0x2, 0x1c, 0x65, 0x0, 0x0, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, {[@ra={0x94, 0x4}, @noop]}}}}}) 20:46:14 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)={0x1, 0x0, @a}, 0x48, 0xfffffffffffffffe) 20:46:14 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x3, 0x0, 0x0) 20:46:14 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x889d) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7}}, './file0\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r1) 20:46:14 executing program 0: prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x80, 0x7, 0x9, 0xfffffffb, {{0x7, 0x4, 0x1, 0x2, 0x1c, 0x65, 0x0, 0x0, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, {[@ra={0x94, 0x4}, @noop]}}}}}) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x80, 0x7, 0x9, 0xfffffffb, {{0x7, 0x4, 0x1, 0x2, 0x1c, 0x65, 0x0, 0x0, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, {[@ra={0x94, 0x4}, @noop]}}}}}) (async) 20:46:14 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)={0x1, 0x0, @a}, 0x48, 0xfffffffffffffffe) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)={0x1, 0x0, @a}, 0x48, 0xfffffffffffffffe) 20:46:14 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x6, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:15 executing program 3: select(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) 20:46:15 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0xa, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:15 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffe) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) 20:46:15 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x889d) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7}}, './file0\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r1) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x889d) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r0) (async) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7}}, './file0\x00'}) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r1) (async) 20:46:15 executing program 0: prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x80, 0x7, 0x9, 0xfffffffb, {{0x7, 0x4, 0x1, 0x2, 0x1c, 0x65, 0x0, 0x0, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, {[@ra={0x94, 0x4}, @noop]}}}}}) 20:46:15 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x3, 0x0, 0x0) 20:46:15 executing program 0: r0 = syz_genetlink_get_family_id$gtp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x38, r0, 0xf10, 0x70bd2b, 0x25dfdbfc, {}, [@GTPA_VERSION={0x8}, @GTPA_FLOW={0x6, 0x6, 0x2}, @GTPA_FLOW={0x6, 0x6, 0x2}, @GTPA_TID={0xc}]}, 0x38}, 0x1, 0x0, 0x0, 0x8004}, 0x2000) r1 = open_tree(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x81000) setsockopt$CAN_RAW_ERR_FILTER(r1, 0x65, 0x2, &(0x7f0000000240)=0x7f, 0x4) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f00000000c0)={@multicast1, @multicast1, 0x0}, &(0x7f0000000100)=0xc) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="04002dbd7000ffdbdf250200000008000100", @ANYRES32=r2, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x90}, 0x4000000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000440)={{0x1, 0x1, 0x18, r1, {0x80000000}}, './file0\x00'}) mount_setattr(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x8000, &(0x7f0000000480)={0x8, 0x100004, 0x1c0000, {r3}}, 0x20) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) r4 = open_tree(r1, &(0x7f0000000280)='./file0\x00', 0x88500) setsockopt$inet_dccp_buf(r1, 0x21, 0xf, &(0x7f00000003c0)="509c2a26be39214ed26d6d2454cf27a48529d55dceb50deb4462aea0c33d2e42", 0x20) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r4, 0x0) 20:46:15 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0xf, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:15 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffe) (async) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) 20:46:15 executing program 5: r0 = socket$inet(0x2, 0xa, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffe) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) 20:46:15 executing program 0: r0 = syz_genetlink_get_family_id$gtp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x38, r0, 0xf10, 0x70bd2b, 0x25dfdbfc, {}, [@GTPA_VERSION={0x8}, @GTPA_FLOW={0x6, 0x6, 0x2}, @GTPA_FLOW={0x6, 0x6, 0x2}, @GTPA_TID={0xc}]}, 0x38}, 0x1, 0x0, 0x0, 0x8004}, 0x2000) r1 = open_tree(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x81000) setsockopt$CAN_RAW_ERR_FILTER(r1, 0x65, 0x2, &(0x7f0000000240)=0x7f, 0x4) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f00000000c0)={@multicast1, @multicast1, 0x0}, &(0x7f0000000100)=0xc) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="04002dbd7000ffdbdf250200000008000100", @ANYRES32=r2, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x90}, 0x4000000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000440)={{0x1, 0x1, 0x18, r1, {0x80000000}}, './file0\x00'}) mount_setattr(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x8000, &(0x7f0000000480)={0x8, 0x100004, 0x1c0000, {r3}}, 0x20) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) r4 = open_tree(r1, &(0x7f0000000280)='./file0\x00', 0x88500) setsockopt$inet_dccp_buf(r1, 0x21, 0xf, &(0x7f00000003c0)="509c2a26be39214ed26d6d2454cf27a48529d55dceb50deb4462aea0c33d2e42", 0x20) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r4, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), 0xffffffffffffffff) (async) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x38, r0, 0xf10, 0x70bd2b, 0x25dfdbfc, {}, [@GTPA_VERSION={0x8}, @GTPA_FLOW={0x6, 0x6, 0x2}, @GTPA_FLOW={0x6, 0x6, 0x2}, @GTPA_TID={0xc}]}, 0x38}, 0x1, 0x0, 0x0, 0x8004}, 0x2000) (async) open_tree(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x81000) (async) setsockopt$CAN_RAW_ERR_FILTER(r1, 0x65, 0x2, &(0x7f0000000240)=0x7f, 0x4) (async) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f00000000c0)={@multicast1, @multicast1}, &(0x7f0000000100)=0xc) (async) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="04002dbd7000ffdbdf250200000008000100", @ANYRES32=r2, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x90}, 0x4000000) (async) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000440)={{0x1, 0x1, 0x18, r1, {0x80000000}}, './file0\x00'}) (async) mount_setattr(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x8000, &(0x7f0000000480)={0x8, 0x100004, 0x1c0000, {r3}}, 0x20) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) open_tree(r1, &(0x7f0000000280)='./file0\x00', 0x88500) (async) setsockopt$inet_dccp_buf(r1, 0x21, 0xf, &(0x7f00000003c0)="509c2a26be39214ed26d6d2454cf27a48529d55dceb50deb4462aea0c33d2e42", 0x20) (async) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r4, 0x0) (async) [ 1271.160855][ T26] audit: type=1400 audit(1691786775.290:273): avc: denied { ioctl } for pid=5035 comm="syz-executor.2" path="socket:[709121]" dev="sockfs" ino=709121 ioctlcmd=0x8905 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 20:46:15 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x889d) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7}}, './file0\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r1) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x889d) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r0) (async) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7}}, './file0\x00'}) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r1) (async) 20:46:16 executing program 3: select(0x40, &(0x7f0000000040), 0x0, &(0x7f00000000c0), 0x0) 20:46:16 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x10, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:16 executing program 0: r0 = syz_genetlink_get_family_id$gtp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x38, r0, 0xf10, 0x70bd2b, 0x25dfdbfc, {}, [@GTPA_VERSION={0x8}, @GTPA_FLOW={0x6, 0x6, 0x2}, @GTPA_FLOW={0x6, 0x6, 0x2}, @GTPA_TID={0xc}]}, 0x38}, 0x1, 0x0, 0x0, 0x8004}, 0x2000) (async) r1 = open_tree(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x81000) setsockopt$CAN_RAW_ERR_FILTER(r1, 0x65, 0x2, &(0x7f0000000240)=0x7f, 0x4) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f00000000c0)={@multicast1, @multicast1, 0x0}, &(0x7f0000000100)=0xc) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="04002dbd7000ffdbdf250200000008000100", @ANYRES32=r2, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x90}, 0x4000000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000440)={{0x1, 0x1, 0x18, r1, {0x80000000}}, './file0\x00'}) mount_setattr(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x8000, &(0x7f0000000480)={0x8, 0x100004, 0x1c0000, {r3}}, 0x20) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) r4 = open_tree(r1, &(0x7f0000000280)='./file0\x00', 0x88500) (async) setsockopt$inet_dccp_buf(r1, 0x21, 0xf, &(0x7f00000003c0)="509c2a26be39214ed26d6d2454cf27a48529d55dceb50deb4462aea0c33d2e42", 0x20) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r4, 0x0) 20:46:16 executing program 5: r0 = socket$inet(0x2, 0xa, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffe) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) 20:46:16 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffe) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) 20:46:16 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) 20:46:16 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) (async) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) 20:46:16 executing program 5: r0 = socket$inet(0x2, 0xa, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffe) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) 20:46:16 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x11, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x889d) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="1400000094e16d31b5c4db962ca73264478e244c1bf35aced06064d36f4f056d8fcb329b2887940a075ac7aebb740d3c8a242060121bf51a18ada473ee451c5b5ee579d4c8c8dc3a55a5a535e54ceed93ecd", @ANYRES16=r1, @ANYBLOB="200026bd7000fddbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x4085}, 0x28800) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xffffffffffffffff) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x10) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x40010, r2, 0x3684a000) 20:46:16 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) write$char_usb(0xffffffffffffffff, &(0x7f0000000040)="31acfebd669145472055327c2bf614630f27038f0e3dd2d6e09f9a832e2c7d15afae311cb70e1b4eec881b4af5aee0a65dd592139af3ed40f5522adb190677ef8fa1736f06ef7e52ca841e9fc4355d92fbd3220db5681a5a9e81d89d7d1030cf34b7c512106f4e1f9eb07d20d3d80b129f51c0d5b88448efb41dcf00", 0x7c) getsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:16 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x12, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:17 executing program 3: select(0x40, &(0x7f0000000040), 0x0, &(0x7f00000000c0), 0x0) 20:46:17 executing program 5: r0 = socket$inet(0x2, 0xa, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) 20:46:17 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) (async) write$char_usb(r0, 0x0, 0x0) (async) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) (async) 20:46:17 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) write$char_usb(0xffffffffffffffff, &(0x7f0000000040)="31acfebd669145472055327c2bf614630f27038f0e3dd2d6e09f9a832e2c7d15afae311cb70e1b4eec881b4af5aee0a65dd592139af3ed40f5522adb190677ef8fa1736f06ef7e52ca841e9fc4355d92fbd3220db5681a5a9e81d89d7d1030cf34b7c512106f4e1f9eb07d20d3d80b129f51c0d5b88448efb41dcf00", 0x7c) getsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) (async) getsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x19, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x889d) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="1400000094e16d31b5c4db962ca73264478e244c1bf35aced06064d36f4f056d8fcb329b2887940a075ac7aebb740d3c8a242060121bf51a18ada473ee451c5b5ee579d4c8c8dc3a55a5a535e54ceed93ecd", @ANYRES16=r1, @ANYBLOB="200026bd7000fddbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x4085}, 0x28800) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xffffffffffffffff) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x10) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x40010, r2, 0x3684a000) 20:46:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0xc3, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:17 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) write$char_usb(0xffffffffffffffff, &(0x7f0000000040)="31acfebd669145472055327c2bf614630f27038f0e3dd2d6e09f9a832e2c7d15afae311cb70e1b4eec881b4af5aee0a65dd592139af3ed40f5522adb190677ef8fa1736f06ef7e52ca841e9fc4355d92fbd3220db5681a5a9e81d89d7d1030cf34b7c512106f4e1f9eb07d20d3d80b129f51c0d5b88448efb41dcf00", 0x7c) getsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) (async, rerun: 32) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (rerun: 32) 20:46:17 executing program 5: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) 20:46:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x889d) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="1400000094e16d31b5c4db962ca73264478e244c1bf35aced06064d36f4f056d8fcb329b2887940a075ac7aebb740d3c8a242060121bf51a18ada473ee451c5b5ee579d4c8c8dc3a55a5a535e54ceed93ecd", @ANYRES16=r1, @ANYBLOB="200026bd7000fddbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x4085}, 0x28800) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x10) (async) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x10) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x40010, r2, 0x3684a000) (async) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x40010, r2, 0x3684a000) 20:46:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x3fc, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:17 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xffffffffffffffff) socket$can_bcm(0x1d, 0x2, 0x2) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) mlockall(0x6) 20:46:17 executing program 3: select(0x40, &(0x7f0000000040), 0x0, &(0x7f00000000c0), 0x0) 20:46:17 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) 20:46:17 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xffffffffffffffff) socket$can_bcm(0x1d, 0x2, 0x2) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) (async) mlockall(0x6) 20:46:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x40000000, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:17 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) socket$inet6_sctp(0xa, 0x1, 0x84) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder1\x00', 0x802, 0x0) 20:46:17 executing program 5: ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) 20:46:17 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) (async) socket$inet6_sctp(0xa, 0x1, 0x84) (async) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder1\x00', 0x802, 0x0) 20:46:17 executing program 5: ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) 20:46:17 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) (async) ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) 20:46:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x2, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:17 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) socket$can_bcm(0x1d, 0x2, 0x2) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) mlockall(0x6) 20:46:17 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) socket$inet6_sctp(0xa, 0x1, 0x84) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder1\x00', 0x802, 0x0) (async) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder1\x00', 0x802, 0x0) 20:46:18 executing program 3: select(0x40, &(0x7f0000000040), &(0x7f0000000080), 0x0, 0x0) 20:46:18 executing program 5: ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) 20:46:18 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) (async) ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) 20:46:18 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) 20:46:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x3, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:18 executing program 2: socket$can_raw(0x1d, 0x3, 0x1) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) setsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f0000000100)=[{{0x4}, {0x1, 0x1}}, {{0x4}, {0x3, 0x1, 0x0, 0x1}}], 0x10) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x0, 0x0, @c}, 0x29, 0xffffffffffffffff) 20:46:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x5, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:18 executing program 5: r0 = socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) 20:46:18 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) 20:46:18 executing program 2: socket$can_raw(0x1d, 0x3, 0x1) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) setsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f0000000100)=[{{0x4}, {0x1, 0x1}}, {{0x4}, {0x3, 0x1, 0x0, 0x1}}], 0x10) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x0, 0x0, @c}, 0x29, 0xffffffffffffffff) 20:46:18 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) 20:46:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0xa, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:19 executing program 3: select(0x40, &(0x7f0000000040), &(0x7f0000000080), 0x0, 0x0) 20:46:19 executing program 2: socket$can_raw(0x1d, 0x3, 0x1) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) setsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f0000000100)=[{{0x4}, {0x1, 0x1}}, {{0x4}, {0x3, 0x1, 0x0, 0x1}}], 0x10) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x0, 0x0, @c}, 0x29, 0xffffffffffffffff) 20:46:19 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x10, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:19 executing program 5: r0 = socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) 20:46:19 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) socket$unix(0x1, 0x5, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)={0x1, 0x0, @auto=[0x2d, 0x19, 0x16, 0x12, 0x33, 0x1e]}, 0xe, 0xfffffffffffffffb) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000180)=0x7fff, 0x4) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) getsockopt$WPAN_WANTACK(r1, 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 20:46:19 executing program 0: add_key$fscrypt_provisioning(&(0x7f00000000c0), 0x0, 0x0, 0x27, 0xfffffffffffffff9) prctl$PR_SET_SECUREBITS(0x1c, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0xdee, 0x0}, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r0}, 0x4) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000180)=[@window={0x3, 0x0, 0x4}], 0x1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)={0x2, 0x0, @d}, 0x18, 0xfffffffffffffffc) 20:46:19 executing program 0: add_key$fscrypt_provisioning(&(0x7f00000000c0), 0x0, 0x0, 0x27, 0xfffffffffffffff9) prctl$PR_SET_SECUREBITS(0x1c, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0xdee, 0x0}, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r0}, 0x4) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000180)=[@window={0x3, 0x0, 0x4}], 0x1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)={0x2, 0x0, @d}, 0x18, 0xfffffffffffffffc) add_key$fscrypt_provisioning(&(0x7f00000000c0), 0x0, 0x0, 0x27, 0xfffffffffffffff9) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0xdee}, 0x8) (async) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r0}, 0x4) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) (async) write$char_usb(r1, 0x0, 0x0) (async) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000180)=[@window={0x3, 0x0, 0x4}], 0x1) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)={0x2, 0x0, @d}, 0x18, 0xfffffffffffffffc) (async) 20:46:19 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x64, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:19 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) socket$unix(0x1, 0x5, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)={0x1, 0x0, @auto=[0x2d, 0x19, 0x16, 0x12, 0x33, 0x1e]}, 0xe, 0xfffffffffffffffb) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000180)=0x7fff, 0x4) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) getsockopt$WPAN_WANTACK(r1, 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) socket$unix(0x1, 0x5, 0x0) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)={0x1, 0x0, @auto=[0x2d, 0x19, 0x16, 0x12, 0x33, 0x1e]}, 0xe, 0xfffffffffffffffb) (async) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) (async) open_tree(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000) (async) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000180)=0x7fff, 0x4) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) (async) write$char_usb(r1, 0x0, 0x0) (async) getsockopt$WPAN_WANTACK(r1, 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) (async) 20:46:19 executing program 2: recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000001240)={&(0x7f0000000040)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f0000000200)=[{&(0x7f00000000c0)=""/133, 0x85}, {&(0x7f0000000180)=""/80, 0x50}], 0x2, &(0x7f0000000240)=""/4096, 0x1000}, 0x10100) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) socket$inet_dccp(0x2, 0x6, 0x0) add_key$fscrypt_provisioning(&(0x7f0000001280), &(0x7f00000012c0)={'syz', 0x0}, &(0x7f0000001300)={0x1, 0x0, @a}, 0x48, 0xfffffffffffffffd) 20:46:19 executing program 2: recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000001240)={&(0x7f0000000040)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f0000000200)=[{&(0x7f00000000c0)=""/133, 0x85}, {&(0x7f0000000180)=""/80, 0x50}], 0x2, &(0x7f0000000240)=""/4096, 0x1000}, 0x10100) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) (async, rerun: 64) socket$inet_dccp(0x2, 0x6, 0x0) (async, rerun: 64) add_key$fscrypt_provisioning(&(0x7f0000001280), &(0x7f00000012c0)={'syz', 0x0}, &(0x7f0000001300)={0x1, 0x0, @a}, 0x48, 0xfffffffffffffffd) 20:46:19 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x3ed, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:20 executing program 3: select(0x40, &(0x7f0000000040), &(0x7f0000000080), 0x0, 0x0) 20:46:20 executing program 5: r0 = socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) 20:46:20 executing program 0: add_key$fscrypt_provisioning(&(0x7f00000000c0), 0x0, 0x0, 0x27, 0xfffffffffffffff9) prctl$PR_SET_SECUREBITS(0x1c, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0xdee, 0x0}, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r0}, 0x4) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) (async) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000180)=[@window={0x3, 0x0, 0x4}], 0x1) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)={0x2, 0x0, @d}, 0x18, 0xfffffffffffffffc) 20:46:20 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) socket$unix(0x1, 0x5, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)={0x1, 0x0, @auto=[0x2d, 0x19, 0x16, 0x12, 0x33, 0x1e]}, 0xe, 0xfffffffffffffffb) (async) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) (async) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000180)=0x7fff, 0x4) (async) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) (async, rerun: 32) getsockopt$WPAN_WANTACK(r1, 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) (rerun: 32) 20:46:20 executing program 2: recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000001240)={&(0x7f0000000040)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f0000000200)=[{&(0x7f00000000c0)=""/133, 0x85}, {&(0x7f0000000180)=""/80, 0x50}], 0x2, &(0x7f0000000240)=""/4096, 0x1000}, 0x10100) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) socket$inet_dccp(0x2, 0x6, 0x0) (async, rerun: 64) add_key$fscrypt_provisioning(&(0x7f0000001280), &(0x7f00000012c0)={'syz', 0x0}, &(0x7f0000001300)={0x1, 0x0, @a}, 0x48, 0xfffffffffffffffd) (rerun: 64) 20:46:20 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x3f3, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:20 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x3f4, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:20 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) 20:46:20 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x0, 0x0, @auto=[0x1a, 0x3b, 0x19, 0x33, 0x11, 0x1c]}, 0xe, 0xffffffffffffffff) 20:46:20 executing program 5: socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) 20:46:20 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x40002, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r0, 0xe43ba000) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100), 0x40000, 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000780)={'wlan0\x00'}) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x1802081, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@version_9p2000}, {@version_u}], [{@obj_role={'obj_role', 0x3d, '/dev/vsock\x00'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@hash}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@permit_directio}]}}) 20:46:20 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) 20:46:21 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) (async) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x40002, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r0, 0xe43ba000) (async) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100), 0x40000, 0x0) (async) r2 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000780)={'wlan0\x00'}) (async) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x1802081, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@version_9p2000}, {@version_u}], [{@obj_role={'obj_role', 0x3d, '/dev/vsock\x00'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@hash}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@permit_directio}]}}) 20:46:21 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x0, 0x0, @auto=[0x1a, 0x3b, 0x19, 0x33, 0x11, 0x1c]}, 0xe, 0xffffffffffffffff) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x0, 0x0, @auto=[0x1a, 0x3b, 0x19, 0x33, 0x11, 0x1c]}, 0xe, 0xffffffffffffffff) 20:46:21 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x3f5, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:21 executing program 5: socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) 20:46:21 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) 20:46:21 executing program 3: getitimer(0x3, &(0x7f00000000c0)) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)=ANY=[@ANYBLOB="00000033d08557ec6f1b75"], 0xb, 0xfffffffffffffff9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x3ff, 0x8, 0x2, 0x75d7ef6f, 0x1}, 0x14) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) socket$inet_smc(0x2b, 0x1, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)={0x1, 0x0, @b}, 0x48, 0xfffffffffffffffe) 20:46:21 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x3f6, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:21 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x0, 0x0, @auto=[0x1a, 0x3b, 0x19, 0x33, 0x11, 0x1c]}, 0xe, 0xffffffffffffffff) 20:46:21 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x80, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x20010, r0, 0x10000000) 20:46:21 executing program 5: socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) 20:46:21 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, &(0x7f0000000080)=[0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:21 executing program 5: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, 0x0) 20:46:21 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x40002, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r0, 0xe43ba000) (async) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100), 0x40000, 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000780)={'wlan0\x00'}) (async) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x1802081, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@version_9p2000}, {@version_u}], [{@obj_role={'obj_role', 0x3d, '/dev/vsock\x00'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@hash}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@permit_directio}]}}) 20:46:21 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x80, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x20010, r0, 0x10000000) (async) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x20010, r0, 0x10000000) 20:46:21 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, &(0x7f0000000080)=[0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) prctl$PR_SET_SECUREBITS(0x1c, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) (async) write$char_usb(r0, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, &(0x7f0000000080)=[0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) 20:46:21 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x3f8, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:21 executing program 3: getitimer(0x3, &(0x7f00000000c0)) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)=ANY=[@ANYBLOB="00000033d08557ec6f1b75"], 0xb, 0xfffffffffffffff9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x3ff, 0x8, 0x2, 0x75d7ef6f, 0x1}, 0x14) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) socket$inet_smc(0x2b, 0x1, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)={0x1, 0x0, @b}, 0x48, 0xfffffffffffffffe) 20:46:21 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) (async) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x80, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x20010, r0, 0x10000000) 20:46:21 executing program 5: select(0x40, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), 0x0) 20:46:21 executing program 3: getitimer(0x3, &(0x7f00000000c0)) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)=ANY=[@ANYBLOB="00000033d08557ec6f1b75"], 0xb, 0xfffffffffffffff9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x3ff, 0x8, 0x2, 0x75d7ef6f, 0x1}, 0x14) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) socket$inet_smc(0x2b, 0x1, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)={0x1, 0x0, @b}, 0x48, 0xfffffffffffffffe) 20:46:21 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, &(0x7f0000000080)=[0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:21 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1000000, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:21 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) socket$can_raw(0x1d, 0x3, 0x1) 20:46:21 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffc) 20:46:21 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) socket$can_raw(0x1d, 0x3, 0x1) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) socket$can_raw(0x1d, 0x3, 0x1) (async) 20:46:21 executing program 3: getitimer(0x3, &(0x7f00000000c0)) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)=ANY=[@ANYBLOB="00000033d08557ec6f1b75"], 0xb, 0xfffffffffffffff9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x3ff, 0x8, 0x2, 0x75d7ef6f, 0x1}, 0x14) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) socket$inet_smc(0x2b, 0x1, 0x0) 20:46:21 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x2, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:21 executing program 0: clock_gettime(0x5, &(0x7f0000000200)={0x0, 0x0}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_LINK_TIMEOUT={0xf, 0x2, 0x0, 0x0, 0x0, &(0x7f0000000240)={r0, r1+60000000}, 0x1, 0x1, 0x1}) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000780)={'wlan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000002c0)={'vcan0\x00'}) prctl$PR_SET_SECUREBITS(0x1c, 0x0) rt_sigaction(0xc, &(0x7f00000000c0)={&(0x7f0000000040)="d8f90faef93e43982ec1c10265650f69236766440f1edd660f38f6eec441c55c7789c422652f0cf1c48365490cd77f", 0x40000001, &(0x7f0000000080)="65f30fab7b008f48d0a2f427c402c596ce3e26660fc6e5008fc9e09ab9799e9fe40f1ef8c461781191f500000066660f3820f0c4a27d597b00c7f8ab000000", {[0x6]}}, &(0x7f0000000180)={&(0x7f0000000100)="0f5b7000c4e285aff52ef3400f1c01c422a10bc1f3dad90f4a3af2a53e26673e660f65a981c8ffffc481185618f20f1ad7", 0x0, &(0x7f0000000140)="41def2c462e9b74d0c440f0f37bbc4823d027024c423b1690332c44209df5e003e0ff6bcf10eba1d8feec481b9d25ed5c4e251f7d5"}, 0x8, &(0x7f00000001c0)) 20:46:21 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffc) 20:46:21 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) socket$can_raw(0x1d, 0x3, 0x1) 20:46:22 executing program 5: select(0x40, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), 0x0) 20:46:22 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x4, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:22 executing program 3: getitimer(0x3, &(0x7f00000000c0)) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)=ANY=[@ANYBLOB="00000033d08557ec6f1b75"], 0xb, 0xfffffffffffffff9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x3ff, 0x8, 0x2, 0x75d7ef6f, 0x1}, 0x14) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 20:46:22 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffc) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffc) 20:46:22 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffa) 20:46:22 executing program 0: clock_gettime(0x5, &(0x7f0000000200)={0x0, 0x0}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_LINK_TIMEOUT={0xf, 0x2, 0x0, 0x0, 0x0, &(0x7f0000000240)={r0, r1+60000000}, 0x1, 0x1, 0x1}) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000780)={'wlan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000002c0)={'vcan0\x00'}) prctl$PR_SET_SECUREBITS(0x1c, 0x0) rt_sigaction(0xc, &(0x7f00000000c0)={&(0x7f0000000040)="d8f90faef93e43982ec1c10265650f69236766440f1edd660f38f6eec441c55c7789c422652f0cf1c48365490cd77f", 0x40000001, &(0x7f0000000080)="65f30fab7b008f48d0a2f427c402c596ce3e26660fc6e5008fc9e09ab9799e9fe40f1ef8c461781191f500000066660f3820f0c4a27d597b00c7f8ab000000", {[0x6]}}, &(0x7f0000000180)={&(0x7f0000000100)="0f5b7000c4e285aff52ef3400f1c01c422a10bc1f3dad90f4a3af2a53e26673e660f65a981c8ffffc481185618f20f1ad7", 0x0, &(0x7f0000000140)="41def2c462e9b74d0c440f0f37bbc4823d027024c423b1690332c44209df5e003e0ff6bcf10eba1d8feec481b9d25ed5c4e251f7d5"}, 0x8, &(0x7f00000001c0)) clock_gettime(0x5, &(0x7f0000000200)) (async) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_LINK_TIMEOUT={0xf, 0x2, 0x0, 0x0, 0x0, &(0x7f0000000240)={r0, r1+60000000}, 0x1, 0x1, 0x1}) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) socket$nl_audit(0x10, 0x3, 0x9) (async) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000780)={'wlan0\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000002c0)={'vcan0\x00'}) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) rt_sigaction(0xc, &(0x7f00000000c0)={&(0x7f0000000040)="d8f90faef93e43982ec1c10265650f69236766440f1edd660f38f6eec441c55c7789c422652f0cf1c48365490cd77f", 0x40000001, &(0x7f0000000080)="65f30fab7b008f48d0a2f427c402c596ce3e26660fc6e5008fc9e09ab9799e9fe40f1ef8c461781191f500000066660f3820f0c4a27d597b00c7f8ab000000", {[0x6]}}, &(0x7f0000000180)={&(0x7f0000000100)="0f5b7000c4e285aff52ef3400f1c01c422a10bc1f3dad90f4a3af2a53e26673e660f65a981c8ffffc481185618f20f1ad7", 0x0, &(0x7f0000000140)="41def2c462e9b74d0c440f0f37bbc4823d027024c423b1690332c44209df5e003e0ff6bcf10eba1d8feec481b9d25ed5c4e251f7d5"}, 0x8, &(0x7f00000001c0)) (async) 20:46:22 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x5, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:22 executing program 2: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0xff}, 0x8) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) 20:46:22 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffa) 20:46:22 executing program 3: getitimer(0x3, &(0x7f00000000c0)) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) socket$inet_smc(0x2b, 0x1, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)=ANY=[@ANYBLOB="00000033d08557ec6f1b75"], 0xb, 0xfffffffffffffff9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000100)={0x3ff, 0x8, 0x2, 0x75d7ef6f, 0x1}, 0x14) 20:46:22 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0xa, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:22 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffa) 20:46:23 executing program 5: select(0x40, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), 0x0) 20:46:23 executing program 2: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0xff}, 0x8) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0xff}, 0x8) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) (async) 20:46:23 executing program 3: getitimer(0x3, &(0x7f00000000c0)) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) socket$inet_smc(0x2b, 0x1, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)=ANY=[@ANYBLOB="00000033d08557ec6f1b75"], 0xb, 0xfffffffffffffff9) 20:46:23 executing program 0: clock_gettime(0x5, &(0x7f0000000200)={0x0, 0x0}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_LINK_TIMEOUT={0xf, 0x2, 0x0, 0x0, 0x0, &(0x7f0000000240)={r0, r1+60000000}, 0x1, 0x1, 0x1}) (async, rerun: 32) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (rerun: 32) r2 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000780)={'wlan0\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000002c0)={'vcan0\x00'}) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) rt_sigaction(0xc, &(0x7f00000000c0)={&(0x7f0000000040)="d8f90faef93e43982ec1c10265650f69236766440f1edd660f38f6eec441c55c7789c422652f0cf1c48365490cd77f", 0x40000001, &(0x7f0000000080)="65f30fab7b008f48d0a2f427c402c596ce3e26660fc6e5008fc9e09ab9799e9fe40f1ef8c461781191f500000066660f3820f0c4a27d597b00c7f8ab000000", {[0x6]}}, &(0x7f0000000180)={&(0x7f0000000100)="0f5b7000c4e285aff52ef3400f1c01c422a10bc1f3dad90f4a3af2a53e26673e660f65a981c8ffffc481185618f20f1ad7", 0x0, &(0x7f0000000140)="41def2c462e9b74d0c440f0f37bbc4823d027024c423b1690332c44209df5e003e0ff6bcf10eba1d8feec481b9d25ed5c4e251f7d5"}, 0x8, &(0x7f00000001c0)) 20:46:23 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:23 executing program 1: getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000040)={@private, @multicast2, 0x0}, &(0x7f0000000080)=0xc) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_deladdr={0x18, 0x15, 0x400, 0x70bd28, 0x25dfdbfe, {0x2, 0x80, 0x9, 0xfe, r0}}, 0x18}, 0x1, 0x0, 0x0, 0x4008009}, 0x400c004) 20:46:23 executing program 2: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0xff}, 0x8) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) 20:46:23 executing program 3: getitimer(0x3, &(0x7f00000000c0)) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) socket$inet_smc(0x2b, 0x1, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) 20:46:23 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x2, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:23 executing program 1: getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000040)={@private, @multicast2, 0x0}, &(0x7f0000000080)=0xc) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_deladdr={0x18, 0x15, 0x400, 0x70bd28, 0x25dfdbfe, {0x2, 0x80, 0x9, 0xfe, r0}}, 0x18}, 0x1, 0x0, 0x0, 0x4008009}, 0x400c004) 20:46:23 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x3, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:23 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) getsockopt$inet_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000140)=""/252, &(0x7f0000000240)=0xfc) syz_open_dev$char_usb(0xc, 0xb4, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) getsockopt$inet_dccp_buf(r1, 0x21, 0xf, &(0x7f0000000300)=""/168, &(0x7f00000000c0)=0xa8) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000280)=ANY=[@ANYBLOB="01000061616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131e5f123a27132610a2350b62a2b09082786eb44d34afc2371bc900f16a5395a3867db12e1ebde26b9339fa455df993a5c03a9ebc124914499186ae76e80b8"], 0x48, 0xfffffffffffffffa) 20:46:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0xa, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:24 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000140)={'syz', 0x3}, &(0x7f00000000c0)={0x3, 0x0, @a}, 0x48, 0xfffffffffffffff8) 20:46:24 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x4, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:24 executing program 3: getitimer(0x3, &(0x7f00000000c0)) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) socket$inet_smc(0x2b, 0x1, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) 20:46:24 executing program 1: getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000040)={@private, @multicast2, 0x0}, &(0x7f0000000080)=0xc) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_deladdr={0x18, 0x15, 0x400, 0x70bd28, 0x25dfdbfe, {0x2, 0x80, 0x9, 0xfe, r0}}, 0x18}, 0x1, 0x0, 0x0, 0x4008009}, 0x400c004) 20:46:24 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) (async) getsockopt$inet_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000140)=""/252, &(0x7f0000000240)=0xfc) syz_open_dev$char_usb(0xc, 0xb4, 0x0) (async) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) (async) getsockopt$inet_dccp_buf(r1, 0x21, 0xf, &(0x7f0000000300)=""/168, &(0x7f00000000c0)=0xa8) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000280)=ANY=[@ANYBLOB="01000061616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131e5f123a27132610a2350b62a2b09082786eb44d34afc2371bc900f16a5395a3867db12e1ebde26b9339fa455df993a5c03a9ebc124914499186ae76e80b8"], 0x48, 0xfffffffffffffffa) 20:46:24 executing program 3: getitimer(0x3, &(0x7f00000000c0)) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) socket$inet_smc(0x2b, 0x1, 0x0) 20:46:24 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x5, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:24 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 20:46:24 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000140)={'syz', 0x3}, &(0x7f00000000c0)={0x3, 0x0, @a}, 0x48, 0xfffffffffffffff8) 20:46:24 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) getsockopt$inet_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000140)=""/252, &(0x7f0000000240)=0xfc) syz_open_dev$char_usb(0xc, 0xb4, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) getsockopt$inet_dccp_buf(r1, 0x21, 0xf, &(0x7f0000000300)=""/168, &(0x7f00000000c0)=0xa8) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000280)=ANY=[@ANYBLOB="01000061616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131e5f123a27132610a2350b62a2b09082786eb44d34afc2371bc900f16a5395a3867db12e1ebde26b9339fa455df993a5c03a9ebc124914499186ae76e80b8"], 0x48, 0xfffffffffffffffa) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) (async) write$char_usb(r0, 0x0, 0x0) (async) getsockopt$inet_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000140)=""/252, &(0x7f0000000240)=0xfc) (async) syz_open_dev$char_usb(0xc, 0xb4, 0x0) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) (async) write$char_usb(r1, 0x0, 0x0) (async) getsockopt$inet_dccp_buf(r1, 0x21, 0xf, &(0x7f0000000300)=""/168, &(0x7f00000000c0)=0xa8) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000280)=ANY=[@ANYBLOB="01000061616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131e5f123a27132610a2350b62a2b09082786eb44d34afc2371bc900f16a5395a3867db12e1ebde26b9339fa455df993a5c03a9ebc124914499186ae76e80b8"], 0x48, 0xfffffffffffffffa) (async) 20:46:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0xa, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:24 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 20:46:24 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x6, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:24 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffff9) prctl$PR_SET_SECUREBITS(0x1c, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x7ff) 20:46:24 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000140)={'syz', 0x3}, &(0x7f00000000c0)={0x3, 0x0, @a}, 0x48, 0xfffffffffffffff8) 20:46:24 executing program 3: getitimer(0x3, &(0x7f00000000c0)) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) 20:46:24 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) socket$nl_route(0x10, 0x3, 0x0) 20:46:24 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x100, 0x70bd2a, 0x25dfdbff, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000c0}, 0x804) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x20400, 0x0) 20:46:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0xa, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:24 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffff9) prctl$PR_SET_SECUREBITS(0x1c, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x7ff) 20:46:24 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x7, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:24 executing program 3: getitimer(0x3, &(0x7f00000000c0)) 20:46:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 20:46:24 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x7, 0x0, @a}, 0x48, 0xfffffffffffffffc) 20:46:24 executing program 3: getitimer(0x0, &(0x7f00000000c0)) 20:46:24 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 64) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000080), 0xffffffffffffffff) (rerun: 64) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x100, 0x70bd2a, 0x25dfdbff, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000c0}, 0x804) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x20400, 0x0) 20:46:24 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x8, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:24 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffff9) prctl$PR_SET_SECUREBITS(0x1c, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x7ff) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffff9) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) syz_open_dev$char_usb(0xc, 0xb4, 0x7ff) (async) 20:46:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 20:46:24 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x7, 0x0, @a}, 0x48, 0xfffffffffffffffc) 20:46:24 executing program 3: getitimer(0x0, &(0x7f00000000c0)) 20:46:24 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) prctl$PR_SET_SECUREBITS(0x1c, 0x2d) prctl$PR_SET_SECUREBITS(0x1c, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000040)=@ccm_128={{0x304}, "6bdaff879bb044e6", "ae929cb0901c3f9635f3e29d41ea274c", "b0d20ba2", "1b1b3b33290125f1"}, 0x28) 20:46:24 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x9, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:24 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x2d) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x2) (async) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000040)=@ccm_128={{0x304}, "6bdaff879bb044e6", "ae929cb0901c3f9635f3e29d41ea274c", "b0d20ba2", "1b1b3b33290125f1"}, 0x28) 20:46:24 executing program 3: getitimer(0x0, &(0x7f00000000c0)) 20:46:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 20:46:24 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) (async) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x100, 0x70bd2a, 0x25dfdbff, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000c0}, 0x804) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x20400, 0x0) 20:46:24 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x7, 0x0, @a}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x7, 0x0, @a}, 0x48, 0xfffffffffffffffc) (async) 20:46:24 executing program 3: getitimer(0x3, 0x0) 20:46:24 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) prctl$PR_SET_SECUREBITS(0x1c, 0x2d) prctl$PR_SET_SECUREBITS(0x1c, 0x2) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000040)=@ccm_128={{0x304}, "6bdaff879bb044e6", "ae929cb0901c3f9635f3e29d41ea274c", "b0d20ba2", "1b1b3b33290125f1"}, 0x28) 20:46:24 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0xa, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000240)=""/5, 0x0, 0x5, 0x1}, 0x20) 20:46:24 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) 20:46:24 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0xb, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:24 executing program 2: socket$unix(0x1, 0x5, 0x0) 20:46:24 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) prctl$PR_SET_SECUREBITS(0x1c, 0x2d) prctl$PR_SET_SECUREBITS(0x1c, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000040)=@ccm_128={{0x304}, "6bdaff879bb044e6", "ae929cb0901c3f9635f3e29d41ea274c", "b0d20ba2", "1b1b3b33290125f1"}, 0x28) 20:46:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000240)=""/5, 0x0, 0x5, 0x1}, 0x20) 20:46:24 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) prctl$PR_SET_SECUREBITS(0x1c, 0x2d) prctl$PR_SET_SECUREBITS(0x1c, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000040)=@ccm_128={{0x304}, "6bdaff879bb044e6", "ae929cb0901c3f9635f3e29d41ea274c", "b0d20ba2", "1b1b3b33290125f1"}, 0x28) 20:46:24 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) getsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f0000000100), &(0x7f0000000140)=0x4) lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)=@v3={0x3000000, [{0xfffffff8, 0x101}, {0x3, 0x7e}], 0xffffffffffffffff}, 0x18, 0x2) 20:46:24 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0xc, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:24 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) 20:46:24 executing program 2: socket$unix(0x1, 0x5, 0x0) socket$unix(0x1, 0x5, 0x0) (async) 20:46:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000240)=""/5, 0x0, 0x5, 0x1}, 0x20) 20:46:24 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) getsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f0000000100), &(0x7f0000000140)=0x4) (async) lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)=@v3={0x3000000, [{0xfffffff8, 0x101}, {0x3, 0x7e}], 0xffffffffffffffff}, 0x18, 0x2) 20:46:24 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0xd, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:24 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) 20:46:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x5d, 0x5, 0x1}, 0x20) 20:46:24 executing program 2: socket$unix(0x1, 0x5, 0x0) 20:46:24 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) prctl$PR_SET_SECUREBITS(0x1c, 0x2d) prctl$PR_SET_SECUREBITS(0x1c, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000040)=@ccm_128={{0x304}, "6bdaff879bb044e6", "ae929cb0901c3f9635f3e29d41ea274c", "b0d20ba2", "1b1b3b33290125f1"}, 0x28) 20:46:24 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) getsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f0000000100), &(0x7f0000000140)=0x4) lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)=@v3={0x3000000, [{0xfffffff8, 0x101}, {0x3, 0x7e}], 0xffffffffffffffff}, 0x18, 0x2) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) getsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f0000000100), &(0x7f0000000140)=0x4) (async) lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)=@v3={0x3000000, [{0xfffffff8, 0x101}, {0x3, 0x7e}], 0xffffffffffffffff}, 0x18, 0x2) (async) 20:46:24 executing program 1: ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) getsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x6, &(0x7f0000000140), &(0x7f0000000080)=0x4) 20:46:24 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0xe, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:24 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) prctl$PR_SET_SECUREBITS(0x1c, 0x2d) prctl$PR_SET_SECUREBITS(0x1c, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) 20:46:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x5d, 0x5, 0x1}, 0x20) 20:46:24 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x0, 0x0, @d}, 0x18, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:24 executing program 1: ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) getsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x6, &(0x7f0000000140), &(0x7f0000000080)=0x4) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) getsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x6, &(0x7f0000000140), &(0x7f0000000080)=0x4) (async) 20:46:24 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) prctl$PR_SET_SECUREBITS(0x1c, 0x2d) prctl$PR_SET_SECUREBITS(0x1c, 0x2) openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) 20:46:24 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x0, 0x0, @d}, 0x18, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x0, 0x0, @d}, 0x18, 0x0) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) 20:46:24 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0xf, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:24 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffb) socket$xdp(0x2c, 0x3, 0x0) 20:46:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x5d, 0x5, 0x1}, 0x20) 20:46:24 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x10, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:24 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffb) socket$xdp(0x2c, 0x3, 0x0) 20:46:24 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) prctl$PR_SET_SECUREBITS(0x1c, 0x2d) prctl$PR_SET_SECUREBITS(0x1c, 0x2) 20:46:24 executing program 1: ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) getsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x6, &(0x7f0000000140), &(0x7f0000000080)=0x4) 20:46:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x59, 0x5, 0x1}, 0x20) 20:46:24 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x0, 0x0, @d}, 0x18, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x0, 0x0, @d}, 0x18, 0x0) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) 20:46:24 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x11, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:24 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) prctl$PR_SET_SECUREBITS(0x1c, 0x2) 20:46:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x59, 0x5, 0x1}, 0x20) 20:46:24 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffb) (async) socket$xdp(0x2c, 0x3, 0x0) 20:46:24 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x10, &(0x7f0000000040), 0x4) 20:46:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x59, 0x5, 0x1}, 0x20) 20:46:24 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) socket$inet_dccp(0x2, 0x6, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:24 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) prctl$PR_SET_SECUREBITS(0x1c, 0x2) 20:46:24 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x12, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:24 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x10, &(0x7f0000000040), 0x4) 20:46:24 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x25, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:24 executing program 2: r0 = gettid() r1 = gettid() r2 = gettid() syz_open_procfs$namespace(r2, 0x0) ptrace$ARCH_SHSTK_UNLOCK(0x1e, r2, 0x2, 0x5004) syz_open_procfs$namespace(r1, &(0x7f0000000200)='ns/time_for_children\x00') syz_open_procfs$namespace(r1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb014f00180000000000000014c67a5d48a60604000000005bf8bcc2c1382c925f5f6100"/49], &(0x7f00000000c0)=""/85, 0x31, 0x55, 0x1}, 0x20) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x30, r6, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void, @val={0xc}}}, [@NL80211_ATTR_IFINDEX={0x8}]}, 0x30}}, 0x0) r7 = gettid() ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) r9 = gettid() ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r4, {0x4}}, './file0\x00'}) r11 = socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000", @ANYRES16=r12, @ANYBLOB="010026bd0000fddbdf2576"], 0x14}}, 0x0) r13 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r13, 0x0, 0x0) sendmsg$DEVLINK_CMD_RELOAD(r10, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0xa8, r12, 0x100, 0x70bd2d, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r13}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r7}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r7}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r2}}]}, 0xa8}, 0x1, 0x0, 0x0, 0x810}, 0x48010) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80800}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x64, r6, 0x4, 0x70bd2b, 0x25dfdbfe, {{}, {@val={0x8, 0x1, 0x6b}, @void, @void}}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x8}, @NL80211_ATTR_PID={0x8, 0x52, r7}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x48}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r8}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x36, 0x35}}, @NL80211_ATTR_PID={0x8, 0x52, r9}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x0, 0x24}}]}, 0x64}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) ptrace$ARCH_SHSTK_UNLOCK(0x1e, r1, 0x2, 0x5004) syz_open_procfs$userns(r0, &(0x7f0000000000)) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) 20:46:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x5d, 0x5, 0x1}, 0x20) 20:46:24 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) socket$inet_dccp(0x2, 0x6, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:24 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x10, &(0x7f0000000040), 0x4) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x10, &(0x7f0000000040), 0x4) (async) 20:46:24 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) prctl$PR_SET_SECUREBITS(0x1c, 0x2) 20:46:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x5d, 0x5, 0x1}, 0x20) 20:46:24 executing program 2: r0 = gettid() r1 = gettid() (async) r2 = gettid() syz_open_procfs$namespace(r2, 0x0) ptrace$ARCH_SHSTK_UNLOCK(0x1e, r2, 0x2, 0x5004) (async) syz_open_procfs$namespace(r1, &(0x7f0000000200)='ns/time_for_children\x00') (async, rerun: 32) syz_open_procfs$namespace(r1, 0x0) (async, rerun: 32) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb014f00180000000000000014c67a5d48a60604000000005bf8bcc2c1382c925f5f6100"/49], &(0x7f00000000c0)=""/85, 0x31, 0x55, 0x1}, 0x20) (async) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x30, r6, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void, @val={0xc}}}, [@NL80211_ATTR_IFINDEX={0x8}]}, 0x30}}, 0x0) r7 = gettid() ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) r9 = gettid() (async) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r4, {0x4}}, './file0\x00'}) r11 = socket$nl_generic(0x10, 0x3, 0x10) (async) r12 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000", @ANYRES16=r12, @ANYBLOB="010026bd0000fddbdf2576"], 0x14}}, 0x0) (async, rerun: 32) r13 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) (rerun: 32) write$char_usb(r13, 0x0, 0x0) sendmsg$DEVLINK_CMD_RELOAD(r10, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0xa8, r12, 0x100, 0x70bd2d, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r13}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r7}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r7}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r2}}]}, 0xa8}, 0x1, 0x0, 0x0, 0x810}, 0x48010) (async, rerun: 32) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80800}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x64, r6, 0x4, 0x70bd2b, 0x25dfdbfe, {{}, {@val={0x8, 0x1, 0x6b}, @void, @void}}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x8}, @NL80211_ATTR_PID={0x8, 0x52, r7}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x48}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r8}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x36, 0x35}}, @NL80211_ATTR_PID={0x8, 0x52, r9}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x0, 0x24}}]}, 0x64}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) (async, rerun: 32) ptrace$ARCH_SHSTK_UNLOCK(0x1e, r1, 0x2, 0x5004) syz_open_procfs$userns(r0, &(0x7f0000000000)) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) 20:46:24 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) socket$inet_dccp(0x2, 0x6, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:24 executing program 3: prctl$PR_SET_SECUREBITS(0x1c, 0x2d) prctl$PR_SET_SECUREBITS(0x1c, 0x2) 20:46:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x5d, 0x5, 0x1}, 0x20) 20:46:24 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=@ipmr_newroute={0x70, 0x18, 0x108, 0x70bd29, 0x25dfdbfc, {0x80, 0x14, 0x10, 0x4, 0xfe, 0x1, 0x0, 0x1, 0x2000}, [@RTA_IP_PROTO={0x5, 0x1b, 0x11}, @RTA_SRC={0x8, 0x2, @empty}, @RTA_PRIORITY={0x8, 0x6, 0x1000}, @RTA_DPORT={0x6, 0x1d, 0x4e21}, @RTA_PREFSRC={0x8, 0x7, @empty}, @RTA_ENCAP={0x18, 0x16, 0x0, 0x1, @LWTUNNEL_IP6_SRC={0x14, 0x3, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}}, @RTA_ENCAP={0xc, 0x16, 0x0, 0x1, @SEG6_LOCAL_OIF={0x8, 0x7, 0x8}}, @RTA_IP_PROTO={0x5, 0x1b, 0x11}]}, 0x70}, 0x1, 0x0, 0x0, 0x40}, 0x4) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r2, 0x0, 0x0) pipe2$watch_queue(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r4, 0x0, 0x0) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r5, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x8, 0x40010, r5, 0x8000000) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r6, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1b, 0x6, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7fff}, [@map_idx_val={0x18, 0x1, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x1}, @ldst={0x2, 0x1, 0x2, 0x3, 0x1, 0x20, 0xfffffffffffffffc}]}, &(0x7f00000001c0)='GPL\x00', 0x7, 0x0, 0x0, 0x41000, 0x1f, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000240)={0x1, 0xe, 0x5, 0x8}, 0x10, 0x0, r0, 0x0, &(0x7f0000000300)=[r1, 0x1, r2, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff, r6]}, 0x80) 20:46:24 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x48, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:24 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x4c, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:24 executing program 2: r0 = gettid() (async) r1 = gettid() (async) r2 = gettid() syz_open_procfs$namespace(r2, 0x0) ptrace$ARCH_SHSTK_UNLOCK(0x1e, r2, 0x2, 0x5004) (async) syz_open_procfs$namespace(r1, &(0x7f0000000200)='ns/time_for_children\x00') syz_open_procfs$namespace(r1, 0x0) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) (async) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb014f00180000000000000014c67a5d48a60604000000005bf8bcc2c1382c925f5f6100"/49], &(0x7f00000000c0)=""/85, 0x31, 0x55, 0x1}, 0x20) (async) r5 = socket$nl_generic(0x10, 0x3, 0x10) (async) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x30, r6, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void, @val={0xc}}}, [@NL80211_ATTR_IFINDEX={0x8}]}, 0x30}}, 0x0) (async) r7 = gettid() ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) r9 = gettid() ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r4, {0x4}}, './file0\x00'}) (async) r11 = socket$nl_generic(0x10, 0x3, 0x10) (async) r12 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000", @ANYRES16=r12, @ANYBLOB="010026bd0000fddbdf2576"], 0x14}}, 0x0) (async) r13 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r13, 0x0, 0x0) sendmsg$DEVLINK_CMD_RELOAD(r10, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0xa8, r12, 0x100, 0x70bd2d, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r13}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r7}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r7}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r2}}]}, 0xa8}, 0x1, 0x0, 0x0, 0x810}, 0x48010) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80800}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x64, r6, 0x4, 0x70bd2b, 0x25dfdbfe, {{}, {@val={0x8, 0x1, 0x6b}, @void, @void}}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x8}, @NL80211_ATTR_PID={0x8, 0x52, r7}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x48}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r8}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x36, 0x35}}, @NL80211_ATTR_PID={0x8, 0x52, r9}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x0, 0x24}}]}, 0x64}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) (async) ptrace$ARCH_SHSTK_UNLOCK(0x1e, r1, 0x2, 0x5004) (async) syz_open_procfs$userns(r0, &(0x7f0000000000)) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) 20:46:24 executing program 3: prctl$PR_SET_SECUREBITS(0x1c, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x2) 20:46:24 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=@ipmr_newroute={0x70, 0x18, 0x108, 0x70bd29, 0x25dfdbfc, {0x80, 0x14, 0x10, 0x4, 0xfe, 0x1, 0x0, 0x1, 0x2000}, [@RTA_IP_PROTO={0x5, 0x1b, 0x11}, @RTA_SRC={0x8, 0x2, @empty}, @RTA_PRIORITY={0x8, 0x6, 0x1000}, @RTA_DPORT={0x6, 0x1d, 0x4e21}, @RTA_PREFSRC={0x8, 0x7, @empty}, @RTA_ENCAP={0x18, 0x16, 0x0, 0x1, @LWTUNNEL_IP6_SRC={0x14, 0x3, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}}, @RTA_ENCAP={0xc, 0x16, 0x0, 0x1, @SEG6_LOCAL_OIF={0x8, 0x7, 0x8}}, @RTA_IP_PROTO={0x5, 0x1b, 0x11}]}, 0x70}, 0x1, 0x0, 0x0, 0x40}, 0x4) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r2, 0x0, 0x0) pipe2$watch_queue(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r4, 0x0, 0x0) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r5, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x8, 0x40010, r5, 0x8000000) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r6, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1b, 0x6, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7fff}, [@map_idx_val={0x18, 0x1, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x1}, @ldst={0x2, 0x1, 0x2, 0x3, 0x1, 0x20, 0xfffffffffffffffc}]}, &(0x7f00000001c0)='GPL\x00', 0x7, 0x0, 0x0, 0x41000, 0x1f, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000240)={0x1, 0xe, 0x5, 0x8}, 0x10, 0x0, r0, 0x0, &(0x7f0000000300)=[r1, 0x1, r2, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff, r6]}, 0x80) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=@ipmr_newroute={0x70, 0x18, 0x108, 0x70bd29, 0x25dfdbfc, {0x80, 0x14, 0x10, 0x4, 0xfe, 0x1, 0x0, 0x1, 0x2000}, [@RTA_IP_PROTO={0x5, 0x1b, 0x11}, @RTA_SRC={0x8, 0x2, @empty}, @RTA_PRIORITY={0x8, 0x6, 0x1000}, @RTA_DPORT={0x6, 0x1d, 0x4e21}, @RTA_PREFSRC={0x8, 0x7, @empty}, @RTA_ENCAP={0x18, 0x16, 0x0, 0x1, @LWTUNNEL_IP6_SRC={0x14, 0x3, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}}, @RTA_ENCAP={0xc, 0x16, 0x0, 0x1, @SEG6_LOCAL_OIF={0x8, 0x7, 0x8}}, @RTA_IP_PROTO={0x5, 0x1b, 0x11}]}, 0x70}, 0x1, 0x0, 0x0, 0x40}, 0x4) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) (async) write$char_usb(r0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)={{0x1, 0x1, 0x18}, './file0\x00'}) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) (async) write$char_usb(r2, 0x0, 0x0) (async) pipe2$watch_queue(&(0x7f00000002c0), 0x80) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) (async) write$char_usb(r4, 0x0, 0x0) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) (async) write$char_usb(r5, 0x0, 0x0) (async) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x8, 0x40010, r5, 0x8000000) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) (async) write$char_usb(r6, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1b, 0x6, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7fff}, [@map_idx_val={0x18, 0x1, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x1}, @ldst={0x2, 0x1, 0x2, 0x3, 0x1, 0x20, 0xfffffffffffffffc}]}, &(0x7f00000001c0)='GPL\x00', 0x7, 0x0, 0x0, 0x41000, 0x1f, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000240)={0x1, 0xe, 0x5, 0x8}, 0x10, 0x0, r0, 0x0, &(0x7f0000000300)=[r1, 0x1, r2, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff, r6]}, 0x80) (async) 20:46:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x45, 0x5, 0x1}, 0x20) 20:46:24 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000100)={0x0, 0x0, @auto=[0x15, 0x33, 0x2f, 0x24, 0x37]}, 0xd, 0xfffffffffffffff8) add_key$fscrypt_provisioning(&(0x7f00000000c0), &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)={0x0, 0x0, @d}, 0x18, 0xfffffffffffffff8) 20:46:24 executing program 3: prctl$PR_SET_SECUREBITS(0x1c, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x2) 20:46:24 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000100)={0x0, 0x0, @auto=[0x15, 0x33, 0x2f, 0x24, 0x37]}, 0xd, 0xfffffffffffffff8) add_key$fscrypt_provisioning(&(0x7f00000000c0), &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)={0x0, 0x0, @d}, 0x18, 0xfffffffffffffff8) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000100)={0x0, 0x0, @auto=[0x15, 0x33, 0x2f, 0x24, 0x37]}, 0xd, 0xfffffffffffffff8) (async) add_key$fscrypt_provisioning(&(0x7f00000000c0), &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)={0x0, 0x0, @d}, 0x18, 0xfffffffffffffff8) (async) 20:46:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x45, 0x5, 0x1}, 0x20) 20:46:24 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xffffffffffffffff) 20:46:24 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x51, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:24 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=@ipmr_newroute={0x70, 0x18, 0x108, 0x70bd29, 0x25dfdbfc, {0x80, 0x14, 0x10, 0x4, 0xfe, 0x1, 0x0, 0x1, 0x2000}, [@RTA_IP_PROTO={0x5, 0x1b, 0x11}, @RTA_SRC={0x8, 0x2, @empty}, @RTA_PRIORITY={0x8, 0x6, 0x1000}, @RTA_DPORT={0x6, 0x1d, 0x4e21}, @RTA_PREFSRC={0x8, 0x7, @empty}, @RTA_ENCAP={0x18, 0x16, 0x0, 0x1, @LWTUNNEL_IP6_SRC={0x14, 0x3, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}}, @RTA_ENCAP={0xc, 0x16, 0x0, 0x1, @SEG6_LOCAL_OIF={0x8, 0x7, 0x8}}, @RTA_IP_PROTO={0x5, 0x1b, 0x11}]}, 0x70}, 0x1, 0x0, 0x0, 0x40}, 0x4) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=@ipmr_newroute={0x70, 0x18, 0x108, 0x70bd29, 0x25dfdbfc, {0x80, 0x14, 0x10, 0x4, 0xfe, 0x1, 0x0, 0x1, 0x2000}, [@RTA_IP_PROTO={0x5, 0x1b, 0x11}, @RTA_SRC={0x8, 0x2, @empty}, @RTA_PRIORITY={0x8, 0x6, 0x1000}, @RTA_DPORT={0x6, 0x1d, 0x4e21}, @RTA_PREFSRC={0x8, 0x7, @empty}, @RTA_ENCAP={0x18, 0x16, 0x0, 0x1, @LWTUNNEL_IP6_SRC={0x14, 0x3, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}}, @RTA_ENCAP={0xc, 0x16, 0x0, 0x1, @SEG6_LOCAL_OIF={0x8, 0x7, 0x8}}, @RTA_IP_PROTO={0x5, 0x1b, 0x11}]}, 0x70}, 0x1, 0x0, 0x0, 0x40}, 0x4) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) (async) write$char_usb(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r2, 0x0, 0x0) (async) write$char_usb(r2, 0x0, 0x0) pipe2$watch_queue(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r4, 0x0, 0x0) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r5, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x8, 0x40010, r5, 0x8000000) openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) (async) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r6, 0x0, 0x0) (async) write$char_usb(r6, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1b, 0x6, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7fff}, [@map_idx_val={0x18, 0x1, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x1}, @ldst={0x2, 0x1, 0x2, 0x3, 0x1, 0x20, 0xfffffffffffffffc}]}, &(0x7f00000001c0)='GPL\x00', 0x7, 0x0, 0x0, 0x41000, 0x1f, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000240)={0x1, 0xe, 0x5, 0x8}, 0x10, 0x0, r0, 0x0, &(0x7f0000000300)=[r1, 0x1, r2, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff, r6]}, 0x80) 20:46:24 executing program 3: prctl$PR_SET_SECUREBITS(0x1c, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x2) 20:46:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x45, 0x5, 0x1}, 0x20) 20:46:24 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000100)={0x0, 0x0, @auto=[0x15, 0x33, 0x2f, 0x24, 0x37]}, 0xd, 0xfffffffffffffff8) (async) add_key$fscrypt_provisioning(&(0x7f00000000c0), &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)={0x0, 0x0, @d}, 0x18, 0xfffffffffffffff8) 20:46:24 executing program 3: prctl$PR_SET_SECUREBITS(0x1c, 0x2d) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:24 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x68, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:24 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffffffffffffdba, 0xffffffffffffffff) 20:46:24 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xffffffffffffffff) 20:46:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x0, 0xa, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:25 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffffffffffffdba, 0xffffffffffffffff) 20:46:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x44, 0x44, 0x5, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x1}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x61, 0x5, 0x1}, 0x20) 20:46:25 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)=ANY=[@ANYBLOB="02c4000000006e6f7071027374c2f7833c165a6775767778797a"], 0x29, 0xfffffffffffffffe) socket$inet_sctp(0x2, 0x5, 0x84) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:25 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x6c, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:25 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xffffffffffffffff) 20:46:25 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffffffffffffdba, 0xffffffffffffffff) 20:46:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x44, 0x44, 0x5, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x1}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x61, 0x5, 0x1}, 0x20) 20:46:25 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)=ANY=[@ANYBLOB="02c4000000006e6f7071027374c2f7833c165a6775767778797a"], 0x29, 0xfffffffffffffffe) socket$inet_sctp(0x2, 0x5, 0x84) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:25 executing program 1: getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)=""/245, &(0x7f0000000100)=0xf5) 20:46:25 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x74, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x44, 0x44, 0x5, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x1}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x61, 0x5, 0x1}, 0x20) 20:46:25 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)=ANY=[@ANYBLOB="02c4000000006e6f7071027374c2f7833c165a6775767778797a"], 0x29, 0xfffffffffffffffe) socket$inet_sctp(0x2, 0x5, 0x84) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:25 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x7a, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:25 executing program 1: getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)=""/245, &(0x7f0000000100)=0xf5) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)=""/245, &(0x7f0000000100)=0xf5) (async) 20:46:25 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)=ANY=[@ANYBLOB="02c4000000006e6f7071027374c2f7833c165a6775767778797a"], 0x29, 0xfffffffffffffffe) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x44, 0x44, 0x5, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x1}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x61, 0x5, 0x1}, 0x20) 20:46:25 executing program 1: getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)=""/245, &(0x7f0000000100)=0xf5) 20:46:25 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, &(0x7f00000000c0)=[0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000003c0)={'team0\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000400)={@remote, @dev, 0x0}, &(0x7f0000000440)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000480)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000005c0)={'tunl0\x00', &(0x7f00000004c0)={'ip_vti0\x00', 0x0, 0x700, 0x10, 0x1, 0x1, {{0x2e, 0x4, 0x2, 0x7, 0xb8, 0x64, 0x0, 0x7, 0x29, 0x0, @rand_addr=0x64010101, @remote, {[@cipso={0x86, 0x32, 0x1, [{0x5, 0x12, "ab786a1bbea94fa9e420019d42ac366b"}, {0x5, 0xb, "d74cb95fb75f51192c"}, {0x7, 0x3, '-'}, {0x4, 0xc, "83b6c202fc444220ae70"}]}, @ra={0x94, 0x4, 0x1}, @noop, @timestamp_addr={0x44, 0x14, 0x86, 0x1, 0x3, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4d6}, {@remote, 0xfffffffb}]}, @ssrr={0x89, 0x1f, 0x90, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x9, @empty, @dev={0xac, 0x14, 0x14, 0x21}, @private=0xa010102, @private=0xa010101]}, @generic={0x89, 0x11, "5ef5a14e33bb45ded9c80b0b7e911c"}, @cipso={0x86, 0x26, 0xffffffffffffffff, [{0x0, 0x3, "f5"}, {0x0, 0x5, "0b8e73"}, {0x1, 0x5, 'd\t}'}, {0x7, 0x2}, {0x2, 0x11, "856a1704f2111daa3f4e75b029b1d1"}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'vxcan1\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000740)={'tunl0\x00', &(0x7f0000000640)={'sit0\x00', 0x0, 0x8000, 0x700, 0x0, 0xff, {{0x2c, 0x4, 0x3, 0x1a, 0xb0, 0x66, 0x0, 0x7f, 0x29, 0x0, @empty, @remote, {[@timestamp_addr={0x44, 0x24, 0xa, 0x1, 0x0, [{@multicast2, 0x4}, {@loopback, 0x8001}, {@dev={0xac, 0x14, 0x14, 0x26}, 0x1}, {@broadcast, 0x81}]}, @ra={0x94, 0x4}, @generic={0x94, 0xb, "f4f0244ca63c256c4c"}, @cipso={0x86, 0x45, 0x2, [{0x2, 0xd, "7e7fcb9a58b099e43c19e8"}, {0x5, 0x6, "07194c0c"}, {0x2, 0x2}, {0x6, 0xa, "ec851b95476001c7"}, {0x6, 0xf, "632ccb80a700bb81e9cffa575d"}, {0x2, 0x11, "de75a3c5b930fde6afac4a0dcf72a5"}]}, @noop, @rr={0x7, 0x1b, 0xb7, [@remote, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x37}]}, @generic={0x88, 0x7, "54c62d223c"}]}}}}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000c80)={&(0x7f0000000780)=ANY=[@ANYBLOB="cc040000", @ANYRES16=0x0, @ANYBLOB="200025bd7000fddbdf250200000008000100", @ANYRES32=0x0, @ANYBLOB="ac0102803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r1, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000050003000300000008000400ffffff7f40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b00000008000400f7b7000008000600", @ANYRES32=r2, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000000000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b0000000800040008000000080007000000000038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000500030003000000080004000100000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="080007000000000008000100", @ANYRES32=r3, @ANYBLOB="3c00028038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004000000000008000100", @ANYRES32=r4, @ANYBLOB="3c01028038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000500030003000000080004000600000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000002000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000200000008000600", @ANYRES32=r5, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004004348000008000600", @ANYRES32=r6, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000000010008000600", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="b000028038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000050003000300000008000400040000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r7, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000050003000300000008000400f7ffffff08000100", @ANYRES32=0x0, @ANYBLOB="7800028038000100240001006d636173745f72656a6f696ea1bd925f696e74657276616c0000000000000000000000050003000300000008000400008000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00028038000100240001006e6f746966795f70656572735f696e74657276616c000000000000000000000005000300030000000800040040780f00"], 0x4cc}}, 0x0) 20:46:25 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x5, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x44, 0x44, 0x5, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x1}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x61, 0x5, 0x1}, 0x20) 20:46:25 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:25 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x9a00) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18}, './file0\x00'}) 20:46:25 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffb) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x889d) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f00000005c0)={0x5c, r2, 0x1, 0x0, 0x0, {}, [{{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}]}, 0x5c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, &(0x7f0000000100)=[0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan1\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000004c0)={'erspan0\x00', &(0x7f0000000400)={'tunl0\x00', 0x0, 0x700, 0x10, 0x5, 0x10000, {{0x25, 0x4, 0x0, 0x23, 0x94, 0x64, 0x0, 0x0, 0x0, 0x0, @rand_addr=0x64010100, @broadcast, {[@cipso={0x86, 0x26, 0x1, [{0x1, 0x10, "d1e5c017e1ede899d5f4a83ab1a3"}, {0x4, 0x8, "f8d4b2c21325"}, {0x5, 0x8, "d5e8c4a862a6"}]}, @ssrr={0x89, 0x23, 0xce, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @broadcast, @dev={0xac, 0x14, 0x14, 0x3a}, @loopback, @broadcast, @multicast2, @empty]}, @cipso={0x86, 0x34, 0x0, [{0x6, 0x5, "6d12bf"}, {0x6, 0x10, "225129504b364923d3be0c41074e"}, {0x1, 0xc, "20c81ceb7cca37304648"}, {0x2, 0xd, "a12054f83057dd6d5985db"}]}, @noop]}}}}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000540)={'vcan0\x00', 0x0}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000d80), 0xffffffffffffffff) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000580)={0x748, r2, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x180, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x200}}, {0x8}}}, {0x7c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x4c, 0x4, [{0xf063, 0x3f, 0x1f, 0x1ff}, {0x401, 0x6, 0x66, 0x80000001}, {0x3, 0x81, 0x2, 0x3df}, {0x400, 0x5, 0x80, 0x561}, {0x75, 0x7, 0x9, 0x4}, {0x1f, 0x7f, 0x3, 0x28}, {0x3, 0x4, 0x2b, 0xfffff6be}, {0x81, 0x5, 0x4, 0x7}, {0x7f, 0x3, 0x6a, 0x4}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x200}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}, {0x8}}}]}}, {{0x8}, {0x138, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xffff}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r5}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}]}}, {{0x8, 0x1, r6}, {0x1a0, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1f}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7fffffff}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}]}}, {{0x8}, {0x1b4, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r7}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8001}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}]}}]}, 0x748}, 0x1, 0x0, 0x0, 0x4050}, 0xc00c801) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:25 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x2, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x44, 0x44, 0x5, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x1}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x61, 0x5, 0x1}, 0x20) 20:46:25 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, &(0x7f00000000c0)=[0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) (async) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) (async) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000003c0)={'team0\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000400)={@remote, @dev, 0x0}, &(0x7f0000000440)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000480)={'team0\x00', 0x0}) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000005c0)={'tunl0\x00', &(0x7f00000004c0)={'ip_vti0\x00', 0x0, 0x700, 0x10, 0x1, 0x1, {{0x2e, 0x4, 0x2, 0x7, 0xb8, 0x64, 0x0, 0x7, 0x29, 0x0, @rand_addr=0x64010101, @remote, {[@cipso={0x86, 0x32, 0x1, [{0x5, 0x12, "ab786a1bbea94fa9e420019d42ac366b"}, {0x5, 0xb, "d74cb95fb75f51192c"}, {0x7, 0x3, '-'}, {0x4, 0xc, "83b6c202fc444220ae70"}]}, @ra={0x94, 0x4, 0x1}, @noop, @timestamp_addr={0x44, 0x14, 0x86, 0x1, 0x3, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4d6}, {@remote, 0xfffffffb}]}, @ssrr={0x89, 0x1f, 0x90, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x9, @empty, @dev={0xac, 0x14, 0x14, 0x21}, @private=0xa010102, @private=0xa010101]}, @generic={0x89, 0x11, "5ef5a14e33bb45ded9c80b0b7e911c"}, @cipso={0x86, 0x26, 0xffffffffffffffff, [{0x0, 0x3, "f5"}, {0x0, 0x5, "0b8e73"}, {0x1, 0x5, 'd\t}'}, {0x7, 0x2}, {0x2, 0x11, "856a1704f2111daa3f4e75b029b1d1"}]}]}}}}}) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'vxcan1\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000740)={'tunl0\x00', &(0x7f0000000640)={'sit0\x00', 0x0, 0x8000, 0x700, 0x0, 0xff, {{0x2c, 0x4, 0x3, 0x1a, 0xb0, 0x66, 0x0, 0x7f, 0x29, 0x0, @empty, @remote, {[@timestamp_addr={0x44, 0x24, 0xa, 0x1, 0x0, [{@multicast2, 0x4}, {@loopback, 0x8001}, {@dev={0xac, 0x14, 0x14, 0x26}, 0x1}, {@broadcast, 0x81}]}, @ra={0x94, 0x4}, @generic={0x94, 0xb, "f4f0244ca63c256c4c"}, @cipso={0x86, 0x45, 0x2, [{0x2, 0xd, "7e7fcb9a58b099e43c19e8"}, {0x5, 0x6, "07194c0c"}, {0x2, 0x2}, {0x6, 0xa, "ec851b95476001c7"}, {0x6, 0xf, "632ccb80a700bb81e9cffa575d"}, {0x2, 0x11, "de75a3c5b930fde6afac4a0dcf72a5"}]}, @noop, @rr={0x7, 0x1b, 0xb7, [@remote, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x37}]}, @generic={0x88, 0x7, "54c62d223c"}]}}}}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000c80)={&(0x7f0000000780)=ANY=[@ANYBLOB="cc040000", @ANYRES16=0x0, @ANYBLOB="200025bd7000fddbdf250200000008000100", @ANYRES32=0x0, @ANYBLOB="ac0102803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r1, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000050003000300000008000400ffffff7f40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b00000008000400f7b7000008000600", @ANYRES32=r2, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000000000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b0000000800040008000000080007000000000038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000500030003000000080004000100000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="080007000000000008000100", @ANYRES32=r3, @ANYBLOB="3c00028038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004000000000008000100", @ANYRES32=r4, @ANYBLOB="3c01028038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000500030003000000080004000600000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000002000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000200000008000600", @ANYRES32=r5, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004004348000008000600", @ANYRES32=r6, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000000010008000600", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="b000028038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000050003000300000008000400040000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r7, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000050003000300000008000400f7ffffff08000100", @ANYRES32=0x0, @ANYBLOB="7800028038000100240001006d636173745f72656a6f696ea1bd925f696e74657276616c0000000000000000000000050003000300000008000400008000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00028038000100240001006e6f746966795f70656572735f696e74657276616c000000000000000000000005000300030000000800040040780f00"], 0x4cc}}, 0x0) 20:46:25 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:25 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffb) socket$nl_generic(0x10, 0x3, 0x10) (async) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x889d) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f00000005c0)={0x5c, r2, 0x1, 0x0, 0x0, {}, [{{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}]}, 0x5c}}, 0x0) (async) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f00000005c0)={0x5c, r2, 0x1, 0x0, 0x0, {}, [{{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}]}, 0x5c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)) (async) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, &(0x7f0000000100)=[0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, &(0x7f0000000100)=[0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan1\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan1\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000004c0)={'erspan0\x00', &(0x7f0000000400)={'tunl0\x00', 0x0, 0x700, 0x10, 0x5, 0x10000, {{0x25, 0x4, 0x0, 0x23, 0x94, 0x64, 0x0, 0x0, 0x0, 0x0, @rand_addr=0x64010100, @broadcast, {[@cipso={0x86, 0x26, 0x1, [{0x1, 0x10, "d1e5c017e1ede899d5f4a83ab1a3"}, {0x4, 0x8, "f8d4b2c21325"}, {0x5, 0x8, "d5e8c4a862a6"}]}, @ssrr={0x89, 0x23, 0xce, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @broadcast, @dev={0xac, 0x14, 0x14, 0x3a}, @loopback, @broadcast, @multicast2, @empty]}, @cipso={0x86, 0x34, 0x0, [{0x6, 0x5, "6d12bf"}, {0x6, 0x10, "225129504b364923d3be0c41074e"}, {0x1, 0xc, "20c81ceb7cca37304648"}, {0x2, 0xd, "a12054f83057dd6d5985db"}]}, @noop]}}}}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000540)={'vcan0\x00', 0x0}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000d80), 0xffffffffffffffff) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000580)={0x748, r2, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x180, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x200}}, {0x8}}}, {0x7c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x4c, 0x4, [{0xf063, 0x3f, 0x1f, 0x1ff}, {0x401, 0x6, 0x66, 0x80000001}, {0x3, 0x81, 0x2, 0x3df}, {0x400, 0x5, 0x80, 0x561}, {0x75, 0x7, 0x9, 0x4}, {0x1f, 0x7f, 0x3, 0x28}, {0x3, 0x4, 0x2b, 0xfffff6be}, {0x81, 0x5, 0x4, 0x7}, {0x7f, 0x3, 0x6a, 0x4}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x200}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}, {0x8}}}]}}, {{0x8}, {0x138, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xffff}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r5}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}]}}, {{0x8, 0x1, r6}, {0x1a0, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1f}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7fffffff}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}]}}, {{0x8}, {0x1b4, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r7}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8001}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}]}}]}, 0x748}, 0x1, 0x0, 0x0, 0x4050}, 0xc00c801) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:25 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x9a00) (async) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x9a00) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18}, './file0\x00'}) 20:46:25 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x3, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x44, 0x44, 0x5, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x61, 0x5, 0x1}, 0x20) 20:46:25 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:25 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffb) (async, rerun: 64) r0 = socket$nl_generic(0x10, 0x3, 0x10) (rerun: 64) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x889d) (async, rerun: 32) r1 = socket$nl_generic(0x10, 0x3, 0x10) (rerun: 32) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f00000005c0)={0x5c, r2, 0x1, 0x0, 0x0, {}, [{{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}]}, 0x5c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, &(0x7f0000000100)=[0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan1\x00', 0x0}) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000004c0)={'erspan0\x00', &(0x7f0000000400)={'tunl0\x00', 0x0, 0x700, 0x10, 0x5, 0x10000, {{0x25, 0x4, 0x0, 0x23, 0x94, 0x64, 0x0, 0x0, 0x0, 0x0, @rand_addr=0x64010100, @broadcast, {[@cipso={0x86, 0x26, 0x1, [{0x1, 0x10, "d1e5c017e1ede899d5f4a83ab1a3"}, {0x4, 0x8, "f8d4b2c21325"}, {0x5, 0x8, "d5e8c4a862a6"}]}, @ssrr={0x89, 0x23, 0xce, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @broadcast, @dev={0xac, 0x14, 0x14, 0x3a}, @loopback, @broadcast, @multicast2, @empty]}, @cipso={0x86, 0x34, 0x0, [{0x6, 0x5, "6d12bf"}, {0x6, 0x10, "225129504b364923d3be0c41074e"}, {0x1, 0xc, "20c81ceb7cca37304648"}, {0x2, 0xd, "a12054f83057dd6d5985db"}]}, @noop]}}}}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000540)={'vcan0\x00', 0x0}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000d80), 0xffffffffffffffff) (async) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000580)={0x748, r2, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x180, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x200}}, {0x8}}}, {0x7c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x4c, 0x4, [{0xf063, 0x3f, 0x1f, 0x1ff}, {0x401, 0x6, 0x66, 0x80000001}, {0x3, 0x81, 0x2, 0x3df}, {0x400, 0x5, 0x80, 0x561}, {0x75, 0x7, 0x9, 0x4}, {0x1f, 0x7f, 0x3, 0x28}, {0x3, 0x4, 0x2b, 0xfffff6be}, {0x81, 0x5, 0x4, 0x7}, {0x7f, 0x3, 0x6a, 0x4}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x200}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}, {0x8}}}]}}, {{0x8}, {0x138, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xffff}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r5}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}]}}, {{0x8, 0x1, r6}, {0x1a0, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1f}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7fffffff}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}]}}, {{0x8}, {0x1b4, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r7}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8001}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}]}}]}, 0x748}, 0x1, 0x0, 0x0, 0x4050}, 0xc00c801) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:25 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, &(0x7f00000000c0)=[0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, &(0x7f00000000c0)=[0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000003c0)={'team0\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000400)={@remote, @dev}, &(0x7f0000000440)=0xc) (async) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000400)={@remote, @dev, 0x0}, &(0x7f0000000440)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000480)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000005c0)={'tunl0\x00', &(0x7f00000004c0)={'ip_vti0\x00', 0x0, 0x700, 0x10, 0x1, 0x1, {{0x2e, 0x4, 0x2, 0x7, 0xb8, 0x64, 0x0, 0x7, 0x29, 0x0, @rand_addr=0x64010101, @remote, {[@cipso={0x86, 0x32, 0x1, [{0x5, 0x12, "ab786a1bbea94fa9e420019d42ac366b"}, {0x5, 0xb, "d74cb95fb75f51192c"}, {0x7, 0x3, '-'}, {0x4, 0xc, "83b6c202fc444220ae70"}]}, @ra={0x94, 0x4, 0x1}, @noop, @timestamp_addr={0x44, 0x14, 0x86, 0x1, 0x3, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4d6}, {@remote, 0xfffffffb}]}, @ssrr={0x89, 0x1f, 0x90, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x9, @empty, @dev={0xac, 0x14, 0x14, 0x21}, @private=0xa010102, @private=0xa010101]}, @generic={0x89, 0x11, "5ef5a14e33bb45ded9c80b0b7e911c"}, @cipso={0x86, 0x26, 0xffffffffffffffff, [{0x0, 0x3, "f5"}, {0x0, 0x5, "0b8e73"}, {0x1, 0x5, 'd\t}'}, {0x7, 0x2}, {0x2, 0x11, "856a1704f2111daa3f4e75b029b1d1"}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'vxcan1\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000740)={'tunl0\x00', &(0x7f0000000640)={'sit0\x00', 0x0, 0x8000, 0x700, 0x0, 0xff, {{0x2c, 0x4, 0x3, 0x1a, 0xb0, 0x66, 0x0, 0x7f, 0x29, 0x0, @empty, @remote, {[@timestamp_addr={0x44, 0x24, 0xa, 0x1, 0x0, [{@multicast2, 0x4}, {@loopback, 0x8001}, {@dev={0xac, 0x14, 0x14, 0x26}, 0x1}, {@broadcast, 0x81}]}, @ra={0x94, 0x4}, @generic={0x94, 0xb, "f4f0244ca63c256c4c"}, @cipso={0x86, 0x45, 0x2, [{0x2, 0xd, "7e7fcb9a58b099e43c19e8"}, {0x5, 0x6, "07194c0c"}, {0x2, 0x2}, {0x6, 0xa, "ec851b95476001c7"}, {0x6, 0xf, "632ccb80a700bb81e9cffa575d"}, {0x2, 0x11, "de75a3c5b930fde6afac4a0dcf72a5"}]}, @noop, @rr={0x7, 0x1b, 0xb7, [@remote, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x37}]}, @generic={0x88, 0x7, "54c62d223c"}]}}}}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000c80)={&(0x7f0000000780)=ANY=[@ANYBLOB="cc040000", @ANYRES16=0x0, @ANYBLOB="200025bd7000fddbdf250200000008000100", @ANYRES32=0x0, @ANYBLOB="ac0102803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r1, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000050003000300000008000400ffffff7f40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b00000008000400f7b7000008000600", @ANYRES32=r2, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000000000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b0000000800040008000000080007000000000038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000500030003000000080004000100000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="080007000000000008000100", @ANYRES32=r3, @ANYBLOB="3c00028038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004000000000008000100", @ANYRES32=r4, @ANYBLOB="3c01028038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000500030003000000080004000600000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000002000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000200000008000600", @ANYRES32=r5, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004004348000008000600", @ANYRES32=r6, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000000010008000600", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="b000028038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000050003000300000008000400040000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r7, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000050003000300000008000400f7ffffff08000100", @ANYRES32=0x0, @ANYBLOB="7800028038000100240001006d636173745f72656a6f696ea1bd925f696e74657276616c0000000000000000000000050003000300000008000400008000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00028038000100240001006e6f746966795f70656572735f696e74657276616c000000000000000000000005000300030000000800040040780f00"], 0x4cc}}, 0x0) 20:46:25 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x9a00) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18}, './file0\x00'}) 20:46:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x44, 0x44, 0x5, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x61, 0x5, 0x1}, 0x20) 20:46:25 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x5, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:25 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x200, 0x0) write$char_usb(r0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080)="b6d303d775b62df941ff6daac115847536b6fb13e60d741536ccd156ce196bd5b13ef5bbee9a39cc06e585a331323a84f89a5a551d46390bd5744502d797c3bf156dda2f2e757726815095a25efe01b2902a1ebb6c611ed5d68a29d9fee28b785d0ea2995513fd952f84aa5a31", &(0x7f0000000100)=@buf="ffd38d9e534dcb455a004ec8cbb72dff3e73d7d652bb245cffa171682560c5c87dbec8d647880b35e0325967eae8e6a9eee0261ae348ffcd706949c14c33b2888866ae850045447baf247d2afd63cb017ae67b3bd13bdd02f1922da1b943f6636b48a62def68d0e021724aa8f6c5d48b9a7cabd742666735b7037223880095b161b50cb08f8a6fa9dd2a1e93204cfdb27d29df0a0ab7bd659c1c9db45e1e2fa9346f6a456bcabf9af891dbff72037ed17e227e275da6f88c3f8e709455e6a43f3858f6de7b3497d15320988a51544acadad7a2ab20a66ef1504d84875be8fe7ffc7a7ab5911a998c11265076699d13"}, 0x20) 20:46:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x44, 0x44, 0x5, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x61, 0x5, 0x1}, 0x20) 20:46:25 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x44, 0x0, 0x89e889366c3714d0, 0x70bd28, 0x25dfdbfc, {}, [@GTPA_TID={0xc, 0x3, 0x3}, @GTPA_TID={0xc, 0x3, 0x1}, @GTPA_VERSION={0x8}, @GTPA_NET_NS_FD={0x8, 0x7, r0}, @GTPA_NET_NS_FD={0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000040}, 0x80) getitimer(0x4, &(0x7f0000000040)) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) 20:46:25 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)=ANY=[@ANYBLOB="02c4000000006e6f7071027374c2f7833c165a6775767778797a"], 0x29, 0xfffffffffffffffe) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:25 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x200, 0x0) write$char_usb(r0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080)="b6d303d775b62df941ff6daac115847536b6fb13e60d741536ccd156ce196bd5b13ef5bbee9a39cc06e585a331323a84f89a5a551d46390bd5744502d797c3bf156dda2f2e757726815095a25efe01b2902a1ebb6c611ed5d68a29d9fee28b785d0ea2995513fd952f84aa5a31", &(0x7f0000000100)=@buf="ffd38d9e534dcb455a004ec8cbb72dff3e73d7d652bb245cffa171682560c5c87dbec8d647880b35e0325967eae8e6a9eee0261ae348ffcd706949c14c33b2888866ae850045447baf247d2afd63cb017ae67b3bd13bdd02f1922da1b943f6636b48a62def68d0e021724aa8f6c5d48b9a7cabd742666735b7037223880095b161b50cb08f8a6fa9dd2a1e93204cfdb27d29df0a0ab7bd659c1c9db45e1e2fa9346f6a456bcabf9af891dbff72037ed17e227e275da6f88c3f8e709455e6a43f3858f6de7b3497d15320988a51544acadad7a2ab20a66ef1504d84875be8fe7ffc7a7ab5911a998c11265076699d13"}, 0x20) 20:46:25 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) (async) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x44, 0x0, 0x89e889366c3714d0, 0x70bd28, 0x25dfdbfc, {}, [@GTPA_TID={0xc, 0x3, 0x3}, @GTPA_TID={0xc, 0x3, 0x1}, @GTPA_VERSION={0x8}, @GTPA_NET_NS_FD={0x8, 0x7, r0}, @GTPA_NET_NS_FD={0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000040}, 0x80) (async) getitimer(0x4, &(0x7f0000000040)) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) 20:46:25 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x6, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:25 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18}, './file0\x00'}) 20:46:25 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)=ANY=[@ANYBLOB="02c4000000006e6f7071027374c2f7833c165a6775767778797a"], 0x29, 0xfffffffffffffffe) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x0, 0xa, 0x0, 0x6, 0x4, [{}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:25 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x200, 0x0) write$char_usb(r0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080)="b6d303d775b62df941ff6daac115847536b6fb13e60d741536ccd156ce196bd5b13ef5bbee9a39cc06e585a331323a84f89a5a551d46390bd5744502d797c3bf156dda2f2e757726815095a25efe01b2902a1ebb6c611ed5d68a29d9fee28b785d0ea2995513fd952f84aa5a31", &(0x7f0000000100)=@buf="ffd38d9e534dcb455a004ec8cbb72dff3e73d7d652bb245cffa171682560c5c87dbec8d647880b35e0325967eae8e6a9eee0261ae348ffcd706949c14c33b2888866ae850045447baf247d2afd63cb017ae67b3bd13bdd02f1922da1b943f6636b48a62def68d0e021724aa8f6c5d48b9a7cabd742666735b7037223880095b161b50cb08f8a6fa9dd2a1e93204cfdb27d29df0a0ab7bd659c1c9db45e1e2fa9346f6a456bcabf9af891dbff72037ed17e227e275da6f88c3f8e709455e6a43f3858f6de7b3497d15320988a51544acadad7a2ab20a66ef1504d84875be8fe7ffc7a7ab5911a998c11265076699d13"}, 0x20) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x200, 0x0) (async) write$char_usb(r0, 0x0, 0x0) (async) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080)="b6d303d775b62df941ff6daac115847536b6fb13e60d741536ccd156ce196bd5b13ef5bbee9a39cc06e585a331323a84f89a5a551d46390bd5744502d797c3bf156dda2f2e757726815095a25efe01b2902a1ebb6c611ed5d68a29d9fee28b785d0ea2995513fd952f84aa5a31", &(0x7f0000000100)=@buf="ffd38d9e534dcb455a004ec8cbb72dff3e73d7d652bb245cffa171682560c5c87dbec8d647880b35e0325967eae8e6a9eee0261ae348ffcd706949c14c33b2888866ae850045447baf247d2afd63cb017ae67b3bd13bdd02f1922da1b943f6636b48a62def68d0e021724aa8f6c5d48b9a7cabd742666735b7037223880095b161b50cb08f8a6fa9dd2a1e93204cfdb27d29df0a0ab7bd659c1c9db45e1e2fa9346f6a456bcabf9af891dbff72037ed17e227e275da6f88c3f8e709455e6a43f3858f6de7b3497d15320988a51544acadad7a2ab20a66ef1504d84875be8fe7ffc7a7ab5911a998c11265076699d13"}, 0x20) (async) 20:46:25 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x7, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:25 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x44, 0x0, 0x89e889366c3714d0, 0x70bd28, 0x25dfdbfc, {}, [@GTPA_TID={0xc, 0x3, 0x3}, @GTPA_TID={0xc, 0x3, 0x1}, @GTPA_VERSION={0x8}, @GTPA_NET_NS_FD={0x8, 0x7, r0}, @GTPA_NET_NS_FD={0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000040}, 0x80) (async) getitimer(0x4, &(0x7f0000000040)) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) 20:46:25 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18}, './file0\x00'}) 20:46:25 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)=ANY=[@ANYBLOB="02c4000000006e6f7071027374c2f7833c165a6775767778797a"], 0x29, 0xfffffffffffffffe) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x4, [@enum={0x0, 0x3, 0x0, 0x6, 0x4, [{}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61]}}, &(0x7f0000000240)=""/5, 0x68, 0x5, 0x1}, 0x20) 20:46:25 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x8, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:25 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x3, 0xfffffffffffffff9) 20:46:25 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18}, './file0\x00'}) 20:46:25 executing program 3: add_key$fscrypt_provisioning(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)=ANY=[@ANYBLOB="02c4000000006e6f7071027374c2f7833c165a6775767778797a"], 0x29, 0xfffffffffffffffe) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:25 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x3, 0xfffffffffffffff9) 20:46:25 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x9, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:25 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:25 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x3, 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x3, 0xfffffffffffffff9) (async) 20:46:25 executing program 3: add_key$fscrypt_provisioning(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)=ANY=[@ANYBLOB="02c4000000006e6f7071027374c2f7833c165a6775767778797a"], 0x29, 0xfffffffffffffffe) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x4, [@enum={0x0, 0x3, 0x0, 0x6, 0x4, [{}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61]}}, &(0x7f0000000240)=""/5, 0x68, 0x5, 0x1}, 0x20) 20:46:25 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0xa, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x4, [@enum={0x0, 0x3, 0x0, 0x6, 0x4, [{}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61]}}, &(0x7f0000000240)=""/5, 0x68, 0x5, 0x1}, 0x20) 20:46:25 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) pipe2$watch_queue(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$char_usb(r0, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@ipv6_getnexthop={0x20, 0x6a, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NHA_OIF={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4004801) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), r0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000280)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, r2, 0x4, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0xe4010101}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8021}, 0x4000040) 20:46:25 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:25 executing program 3: add_key$fscrypt_provisioning(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)=ANY=[@ANYBLOB="02c4000000006e6f7071027374c2f7833c165a6775767778797a"], 0x29, 0xfffffffffffffffe) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:25 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0xb, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:25 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) pipe2$watch_queue(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$char_usb(r0, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@ipv6_getnexthop={0x20, 0x6a, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NHA_OIF={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4004801) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), r0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000280)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, r2, 0x4, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0xe4010101}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8021}, 0x4000040) openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) (async) pipe2$watch_queue(&(0x7f0000000240), 0x80) (async) write$char_usb(r0, 0x0, 0x0) (async) sendmsg$nl_route(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@ipv6_getnexthop={0x20, 0x6a, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NHA_OIF={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4004801) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), r0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000280)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, r2, 0x4, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0xe4010101}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8021}, 0x4000040) (async) 20:46:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x0, 0xa, 0x0, 0x6, 0x4, [{}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x0]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:25 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:25 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}], 0x10, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}], 0x10, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000006c0)=r0, 0xfe33) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) 20:46:25 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(0x0, &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)=ANY=[@ANYBLOB="02c4000000006e6f7071027374c2f7833c165a6775767778797a"], 0x29, 0xfffffffffffffffe) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:25 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}], 0x10, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}], 0x10, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}], 0x10, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000006c0)=r0, 0xfe33) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) 20:46:25 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0xc, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:25 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) pipe2$watch_queue(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$char_usb(r0, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@ipv6_getnexthop={0x20, 0x6a, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NHA_OIF={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4004801) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), r0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000280)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, r2, 0x4, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0xe4010101}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8021}, 0x4000040) openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) (async) pipe2$watch_queue(&(0x7f0000000240), 0x80) (async) write$char_usb(r0, 0x0, 0x0) (async) sendmsg$nl_route(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@ipv6_getnexthop={0x20, 0x6a, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NHA_OIF={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4004801) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), r0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000280)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, r2, 0x4, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0xe4010101}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8021}, 0x4000040) (async) 20:46:25 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(0x0, &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)=ANY=[@ANYBLOB="02c4000000006e6f7071027374c2f7833c165a6775767778797a"], 0x29, 0xfffffffffffffffe) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x4, [@enum={0x0, 0x3, 0x0, 0x6, 0x4, [{}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x0]}}, &(0x7f0000000240)=""/5, 0x68, 0x5, 0x1}, 0x20) 20:46:25 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}], 0x10, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}], 0x10, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000006c0)=r0, 0xfe33) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) 20:46:25 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0xd, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x4, [@enum={0x0, 0x3, 0x0, 0x6, 0x4, [{}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x0]}}, &(0x7f0000000240)=""/5, 0x68, 0x5, 0x1}, 0x20) 20:46:25 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb0100180000000000000010000000106e000005000000030000000000000e00000000000000000000002e00"], 0x0, 0x2d}, 0x20) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x1, 0x0, @a}, 0x48, 0xfffffffffffffffe) r0 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="4400001a", @ANYRES16=r0, @ANYBLOB="200027bd7000fcdbdf2503000000080002000200000008000200020000000800010000000000080002000200000008000100020000000800020002000000"], 0x44}, 0x1, 0x0, 0x0, 0x20000040}, 0x20044088) prctl$PR_SET_SECUREBITS(0x1c, 0x0) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r2 = getgid() mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0xa81040, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}, {@nodevmap}, {@cache_mmap}, {@debug={'debug', 0x3d, 0x7f}}, {@access_user}, {@cachetag={'cachetag', 0x3d, '\'\xb7!.^'}}, {@dfltuid}, {@fscache}, {@dfltgid={'dfltgid', 0x3d, r2}}], [{@euid_eq={'euid', 0x3d, 0xee00}}, {@fsname={'fsname', 0x3d, '\\^\',.'}}, {@permit_directio}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '/!$'}}]}}) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.impure\x00', &(0x7f00000001c0)='&+%!{*\x00', 0x7, 0x1) prctl$PR_SET_SECUREBITS(0x1c, 0x26) 20:46:25 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)=ANY=[@ANYBLOB="02c4000000006e6f7071027374c2f7833c165a6775767778797a"], 0x29, 0xfffffffffffffffe) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:25 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(0x0, &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)=ANY=[@ANYBLOB="02c4000000006e6f7071027374c2f7833c165a6775767778797a"], 0x29, 0xfffffffffffffffe) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:25 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb0100180000000000000010000000106e000005000000030000000000000e00000000000000000000002e00"], 0x0, 0x2d}, 0x20) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x1, 0x0, @a}, 0x48, 0xfffffffffffffffe) (async) r0 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="4400001a", @ANYRES16=r0, @ANYBLOB="200027bd7000fcdbdf2503000000080002000200000008000200020000000800010000000000080002000200000008000100020000000800020002000000"], 0x44}, 0x1, 0x0, 0x0, 0x20000040}, 0x20044088) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) (async, rerun: 64) r2 = getgid() (rerun: 64) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0xa81040, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}, {@nodevmap}, {@cache_mmap}, {@debug={'debug', 0x3d, 0x7f}}, {@access_user}, {@cachetag={'cachetag', 0x3d, '\'\xb7!.^'}}, {@dfltuid}, {@fscache}, {@dfltgid={'dfltgid', 0x3d, r2}}], [{@euid_eq={'euid', 0x3d, 0xee00}}, {@fsname={'fsname', 0x3d, '\\^\',.'}}, {@permit_directio}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '/!$'}}]}}) (async) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.impure\x00', &(0x7f00000001c0)='&+%!{*\x00', 0x7, 0x1) (async, rerun: 64) prctl$PR_SET_SECUREBITS(0x1c, 0x26) (rerun: 64) 20:46:25 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0xe, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:25 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x4, 0x4, 0xdfa4, 0x10, 0x1, 0xff, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x4, 0xc}, 0x48) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x1, 0x0, @auto=[0x10, 0x12, 0x2b, 0x2c, 0x32, 0x21]}, 0xe, 0xfffffffffffffffc) 20:46:25 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)=ANY=[@ANYBLOB="02c4000000006e6f7071027374c2f7833c165a6775767778797a"], 0x29, 0xfffffffffffffffe) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:25 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x4, 0x4, 0xdfa4, 0x10, 0x1, 0xff, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x4, 0xc}, 0x48) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x1, 0x0, @auto=[0x10, 0x12, 0x2b, 0x2c, 0x32, 0x21]}, 0xe, 0xfffffffffffffffc) 20:46:25 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="02c4000000006e6f7071027374c2f7833c165a6775767778797a"], 0x29, 0xfffffffffffffffe) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x4, [@enum={0x0, 0x3, 0x0, 0x6, 0x4, [{}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x0]}}, &(0x7f0000000240)=""/5, 0x68, 0x5, 0x1}, 0x20) 20:46:25 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb0100180000000000000010000000106e000005000000030000000000000e00000000000000000000002e00"], 0x0, 0x2d}, 0x20) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x1, 0x0, @a}, 0x48, 0xfffffffffffffffe) r0 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="4400001a", @ANYRES16=r0, @ANYBLOB="200027bd7000fcdbdf2503000000080002000200000008000200020000000800010000000000080002000200000008000100020000000800020002000000"], 0x44}, 0x1, 0x0, 0x0, 0x20000040}, 0x20044088) prctl$PR_SET_SECUREBITS(0x1c, 0x0) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r2 = getgid() mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0xa81040, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}, {@nodevmap}, {@cache_mmap}, {@debug={'debug', 0x3d, 0x7f}}, {@access_user}, {@cachetag={'cachetag', 0x3d, '\'\xb7!.^'}}, {@dfltuid}, {@fscache}, {@dfltgid={'dfltgid', 0x3d, r2}}], [{@euid_eq={'euid', 0x3d, 0xee00}}, {@fsname={'fsname', 0x3d, '\\^\',.'}}, {@permit_directio}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '/!$'}}]}}) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.impure\x00', &(0x7f00000001c0)='&+%!{*\x00', 0x7, 0x1) prctl$PR_SET_SECUREBITS(0x1c, 0x26) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb0100180000000000000010000000106e000005000000030000000000000e00000000000000000000002e00"], 0x0, 0x2d}, 0x20) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x1, 0x0, @a}, 0x48, 0xfffffffffffffffe) (async) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000400), 0xffffffffffffffff) (async) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="4400001a", @ANYRES16=r0, @ANYBLOB="200027bd7000fcdbdf2503000000080002000200000008000200020000000800010000000000080002000200000008000100020000000800020002000000"], 0x44}, 0x1, 0x0, 0x0, 0x20000040}, 0x20044088) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) (async) getgid() (async) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0xa81040, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}, {@nodevmap}, {@cache_mmap}, {@debug={'debug', 0x3d, 0x7f}}, {@access_user}, {@cachetag={'cachetag', 0x3d, '\'\xb7!.^'}}, {@dfltuid}, {@fscache}, {@dfltgid={'dfltgid', 0x3d, r2}}], [{@euid_eq={'euid', 0x3d, 0xee00}}, {@fsname={'fsname', 0x3d, '\\^\',.'}}, {@permit_directio}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '/!$'}}]}}) (async) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.impure\x00', &(0x7f00000001c0)='&+%!{*\x00', 0x7, 0x1) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x26) (async) 20:46:25 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x10, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:25 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x4, 0x4, 0xdfa4, 0x10, 0x1, 0xff, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x4, 0xc}, 0x48) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x1, 0x0, @auto=[0x10, 0x12, 0x2b, 0x2c, 0x32, 0x21]}, 0xe, 0xfffffffffffffffc) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x4, 0x4, 0xdfa4, 0x10, 0x1, 0xff, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x4, 0xc}, 0x48) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x1, 0x0, @auto=[0x10, 0x12, 0x2b, 0x2c, 0x32, 0x21]}, 0xe, 0xfffffffffffffffc) (async) 20:46:25 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)=ANY=[@ANYBLOB="02c4000000006e6f7071027374c2f7833c165a6775767778797a"], 0x29, 0xfffffffffffffffe) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:25 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x29, 0xfffffffffffffffe) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x0, 0xa, 0x0, 0x6, 0x4, [{}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x0, 0x0]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:25 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:25 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x29, 0xfffffffffffffffe) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:25 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x11, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:25 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xffffffffffffff97, 0xffffffffffffffff) 20:46:25 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000140)) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)={0x0, 0x0, @a}, 0x48, 0xfffffffffffffffc) 20:46:25 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x4, [@enum={0x0, 0x3, 0x0, 0x6, 0x4, [{}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000240)=""/5, 0x68, 0x5, 0x1}, 0x20) 20:46:25 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x29, 0xfffffffffffffffe) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:25 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xffffffffffffff97, 0xffffffffffffffff) 20:46:25 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:25 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, &(0x7f00000000c0)=ANY=[], 0x29, 0xfffffffffffffffe) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:25 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x12, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x4, [@enum={0x0, 0x3, 0x0, 0x6, 0x4, [{}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000240)=""/5, 0x68, 0x5, 0x1}, 0x20) 20:46:25 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000140)) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)={0x0, 0x0, @a}, 0x48, 0xfffffffffffffffc) 20:46:25 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xffffffffffffff97, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xffffffffffffff97, 0xffffffffffffffff) (async) 20:46:25 executing program 1: add_key$fscrypt_provisioning(0x0, &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)=ANY=[@ANYBLOB="02c4000000006e6f7071027374c2f7833c165a6775767778797a"], 0x29, 0xfffffffffffffffe) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:25 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x500, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:25 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb0100180000000000000010000000106e000005000000030000000000000e00000000000000000000002e00"], 0x0, 0x2d}, 0x20) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x1, 0x0, @a}, 0x48, 0xfffffffffffffffe) r0 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="4400001a", @ANYRES16=r0, @ANYBLOB="200027bd7000fcdbdf2503000000080002000200000008000200020000000800010000000000080002000200000008000100020000000800020002000000"], 0x44}, 0x1, 0x0, 0x0, 0x20000040}, 0x20044088) prctl$PR_SET_SECUREBITS(0x1c, 0x0) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r2 = getgid() mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0xa81040, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}, {@nodevmap}, {@cache_mmap}, {@debug={'debug', 0x3d, 0x7f}}, {@access_user}, {@cachetag={'cachetag', 0x3d, '\'\xb7!.^'}}, {@dfltuid}, {@fscache}, {@dfltgid={'dfltgid', 0x3d, r2}}], [{@euid_eq={'euid', 0x3d, 0xee00}}, {@fsname={'fsname', 0x3d, '\\^\',.'}}, {@permit_directio}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '/!$'}}]}}) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.impure\x00', &(0x7f00000001c0)='&+%!{*\x00', 0x7, 0x1) prctl$PR_SET_SECUREBITS(0x1c, 0x26) 20:46:25 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000140)) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)={0x0, 0x0, @a}, 0x48, 0xfffffffffffffffc) 20:46:25 executing program 1: add_key$fscrypt_provisioning(0x0, &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)=ANY=[@ANYBLOB="02c4000000006e6f7071027374c2f7833c165a6775767778797a"], 0x29, 0xfffffffffffffffe) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x4, [@enum={0x0, 0x3, 0x0, 0x6, 0x4, [{}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000240)=""/5, 0x68, 0x5, 0x1}, 0x20) 20:46:25 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x5, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:25 executing program 1: add_key$fscrypt_provisioning(0x0, &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)=ANY=[@ANYBLOB="02c4000000006e6f7071027374c2f7833c165a6775767778797a"], 0x29, 0xfffffffffffffffe) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:25 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x900, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:25 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb0100180000000000000010000000106e000005000000030000000000000e00000000000000000000002e00"], 0x0, 0x2d}, 0x20) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x1, 0x0, @a}, 0x48, 0xfffffffffffffffe) r0 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="4400001a", @ANYRES16=r0, @ANYBLOB="200027bd7000fcdbdf2503000000080002000200000008000200020000000800010000000000080002000200000008000100020000000800020002000000"], 0x44}, 0x1, 0x0, 0x0, 0x20000040}, 0x20044088) prctl$PR_SET_SECUREBITS(0x1c, 0x0) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r2 = getgid() mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0xa81040, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}, {@nodevmap}, {@cache_mmap}, {@debug={'debug', 0x3d, 0x7f}}, {@access_user}, {@cachetag={'cachetag', 0x3d, '\'\xb7!.^'}}, {@dfltuid}, {@fscache}, {@dfltgid={'dfltgid', 0x3d, r2}}], [{@euid_eq={'euid', 0x3d, 0xee00}}, {@fsname={'fsname', 0x3d, '\\^\',.'}}, {@permit_directio}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '/!$'}}]}}) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.impure\x00', &(0x7f00000001c0)='&+%!{*\x00', 0x7, 0x1) prctl$PR_SET_SECUREBITS(0x1c, 0x26) 20:46:25 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x5, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:25 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) prctl$PR_SET_SECUREBITS(0x1c, 0xe) 20:46:25 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="02c4000000006e6f7071027374c2f7833c165a6775767778797a"], 0x29, 0xfffffffffffffffe) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x0, 0xa, 0x0, 0x6, 0x4, [{}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:25 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x5, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x0, 0x3, 0x0, 0x6, 0x4, [{}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x69, 0x0, 0x1}, 0x20) 20:46:26 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0xa00, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:26 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb0100180000000000000010000000106e000005000000030000000000000e00000000000000000000002e00"], 0x0, 0x2d}, 0x20) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x1, 0x0, @a}, 0x48, 0xfffffffffffffffe) r0 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="4400001a", @ANYRES16=r0, @ANYBLOB="200027bd7000fcdbdf2503000000080002000200000008000200020000000800010000000000080002000200000008000100020000000800020002000000"], 0x44}, 0x1, 0x0, 0x0, 0x20000040}, 0x20044088) prctl$PR_SET_SECUREBITS(0x1c, 0x0) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r2 = getgid() mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0xa81040, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}, {@nodevmap}, {@cache_mmap}, {@debug={'debug', 0x3d, 0x7f}}, {@access_user}, {@cachetag={'cachetag', 0x3d, '\'\xb7!.^'}}, {@dfltuid}, {@fscache}, {@dfltgid={'dfltgid', 0x3d, r2}}], [{@euid_eq={'euid', 0x3d, 0xee00}}, {@fsname={'fsname', 0x3d, '\\^\',.'}}, {@permit_directio}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '/!$'}}]}}) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.impure\x00', &(0x7f00000001c0)='&+%!{*\x00', 0x7, 0x1) prctl$PR_SET_SECUREBITS(0x1c, 0x26) 20:46:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x0, 0x3, 0x0, 0x6, 0x4, [{}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x69, 0x0, 0x1}, 0x20) 20:46:26 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) (async) prctl$PR_SET_SECUREBITS(0x1c, 0xe) 20:46:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 20:46:26 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x29, 0xfffffffffffffffe) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 20:46:26 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb0100180000000000000010000000106e000005000000030000000000000e00000000000000000000002e00"], 0x0, 0x2d}, 0x20) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x1, 0x0, @a}, 0x48, 0xfffffffffffffffe) r0 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="4400001a", @ANYRES16=r0, @ANYBLOB="200027bd7000fcdbdf2503000000080002000200000008000200020000000800010000000000080002000200000008000100020000000800020002000000"], 0x44}, 0x1, 0x0, 0x0, 0x20000040}, 0x20044088) prctl$PR_SET_SECUREBITS(0x1c, 0x0) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r2 = getgid() mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0xa81040, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}, {@nodevmap}, {@cache_mmap}, {@debug={'debug', 0x3d, 0x7f}}, {@access_user}, {@cachetag={'cachetag', 0x3d, '\'\xb7!.^'}}, {@dfltuid}, {@fscache}, {@dfltgid={'dfltgid', 0x3d, r2}}], [{@euid_eq={'euid', 0x3d, 0xee00}}, {@fsname={'fsname', 0x3d, '\\^\',.'}}, {@permit_directio}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '/!$'}}]}}) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.impure\x00', &(0x7f00000001c0)='&+%!{*\x00', 0x7, 0x1) 20:46:26 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0xb00, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:26 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x29, 0xfffffffffffffffe) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:26 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0xc00, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x0, 0x3, 0x0, 0x6, 0x4, [{}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x69, 0x0, 0x1}, 0x20) 20:46:26 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb0100180000000000000010000000106e000005000000030000000000000e00000000000000000000002e00"], 0x0, 0x2d}, 0x20) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x1, 0x0, @a}, 0x48, 0xfffffffffffffffe) r0 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="4400001a", @ANYRES16=r0, @ANYBLOB="200027bd7000fcdbdf2503000000080002000200000008000200020000000800010000000000080002000200000008000100020000000800020002000000"], 0x44}, 0x1, 0x0, 0x0, 0x20000040}, 0x20044088) prctl$PR_SET_SECUREBITS(0x1c, 0x0) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r2 = getgid() mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0xa81040, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}, {@nodevmap}, {@cache_mmap}, {@debug={'debug', 0x3d, 0x7f}}, {@access_user}, {@cachetag={'cachetag', 0x3d, '\'\xb7!.^'}}, {@dfltuid}, {@fscache}, {@dfltgid={'dfltgid', 0x3d, r2}}], [{@euid_eq={'euid', 0x3d, 0xee00}}, {@fsname={'fsname', 0x3d, '\\^\',.'}}, {@permit_directio}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '/!$'}}]}}) 20:46:26 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) prctl$PR_SET_SECUREBITS(0x1c, 0xe) 20:46:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 20:46:26 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x29, 0xfffffffffffffffe) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:26 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0xd00, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:26 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb0100180000000000000010000000106e000005000000030000000000000e00000000000000000000002e00"], 0x0, 0x2d}, 0x20) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x1, 0x0, @a}, 0x48, 0xfffffffffffffffe) r0 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="4400001a", @ANYRES16=r0, @ANYBLOB="200027bd7000fcdbdf2503000000080002000200000008000200020000000800010000000000080002000200000008000100020000000800020002000000"], 0x44}, 0x1, 0x0, 0x0, 0x20000040}, 0x20044088) prctl$PR_SET_SECUREBITS(0x1c, 0x0) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getgid() 20:46:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x0, 0xa, 0x0, 0x6, 0x4, [{}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/5, 0x69, 0x5}, 0x20) 20:46:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000240)=""/5, 0x0, 0x5, 0x1}, 0x20) 20:46:26 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, &(0x7f00000000c0)=ANY=[], 0x29, 0xfffffffffffffffe) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:26 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0xe00, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x0, 0xa, 0x0, 0x6, 0x4, [{}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/5, 0x69, 0x5}, 0x20) 20:46:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000240)=""/5, 0x0, 0x5, 0x1}, 0x20) 20:46:26 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb0100180000000000000010000000106e000005000000030000000000000e00000000000000000000002e00"], 0x0, 0x2d}, 0x20) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x1, 0x0, @a}, 0x48, 0xfffffffffffffffe) r0 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="4400001a", @ANYRES16=r0, @ANYBLOB="200027bd7000fcdbdf2503000000080002000200000008000200020000000800010000000000080002000200000008000100020000000800020002000000"], 0x44}, 0x1, 0x0, 0x0, 0x20000040}, 0x20044088) prctl$PR_SET_SECUREBITS(0x1c, 0x0) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) 20:46:26 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb0100180000000000000010000000106e000005000000030000000000000e00000000000000000000002e00"], 0x0, 0x2d}, 0x20) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x1, 0x0, @a}, 0x48, 0xfffffffffffffffe) r0 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="4400001a", @ANYRES16=r0, @ANYBLOB="200027bd7000fcdbdf2503000000080002000200000008000200020000000800010000000000080002000200000008000100020000000800020002000000"], 0x44}, 0x1, 0x0, 0x0, 0x20000040}, 0x20044088) prctl$PR_SET_SECUREBITS(0x1c, 0x0) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r2 = getgid() mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0xa81040, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}, {@nodevmap}, {@cache_mmap}, {@debug={'debug', 0x3d, 0x7f}}, {@access_user}, {@cachetag={'cachetag', 0x3d, '\'\xb7!.^'}}, {@dfltuid}, {@fscache}, {@dfltgid={'dfltgid', 0x3d, r2}}], [{@euid_eq={'euid', 0x3d, 0xee00}}, {@fsname={'fsname', 0x3d, '\\^\',.'}}, {@permit_directio}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '/!$'}}]}}) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.impure\x00', &(0x7f00000001c0)='&+%!{*\x00', 0x7, 0x1) 20:46:26 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x1400, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x0, 0xa, 0x0, 0x6, 0x4, [{}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/5, 0x69, 0x5}, 0x20) 20:46:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000240)=""/5, 0x0, 0x5, 0x1}, 0x20) 20:46:26 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb0100180000000000000010000000106e000005000000030000000000000e00000000000000000000002e00"], 0x0, 0x2d}, 0x20) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x1, 0x0, @a}, 0x48, 0xfffffffffffffffe) r0 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="4400001a", @ANYRES16=r0, @ANYBLOB="200027bd7000fcdbdf2503000000080002000200000008000200020000000800010000000000080002000200000008000100020000000800020002000000"], 0x44}, 0x1, 0x0, 0x0, 0x20000040}, 0x20044088) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:26 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x7, 0x400, 0x0, 0x42}, 0x14) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='highspeed\x00', 0xa) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0x80000001) socket$nl_audit(0x10, 0x3, 0x9) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000080)="8e2a281906832fd1b8d043e0655f7b71a69bccd1ea29057383792d17e51e763184ac0d64cc3a2831244dcd29e29318c01106f00c4f43f7d2429468a7ac06d354237bd9af189b45efb51d083e7a988f5c757ba49f21a5b15fdff01fba785aacb7cb571b87135ffc7a9362f25db064bc1a60b246f74633f4120df2ec8651ceb407ecf6ef2796ee1f4c7a4c5dddbe5b1dc894a7f17ea8de36a42c3c7037db1ec5a665b604c55b5fa23007873790cb43c84447ce4922d6e1ba1acca98fedb9193331d6a6f671dc29a3e8d14dd998af6eca1a0c29d9284f8fd6ecf989d56214fae50a82", 0xe1, r0}, 0x68) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r3, 0x0, 0x0) ioctl$NS_GET_PARENT(r3, 0xb702, 0x0) 20:46:26 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x2}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:26 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb0100180000000000000010000000106e000005000000030000000000000e00000000000000000000002e00"], 0x0, 0x2d}, 0x20) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x1, 0x0, @a}, 0x48, 0xfffffffffffffffe) r0 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="4400001a", @ANYRES16=r0, @ANYBLOB="200027bd7000fcdbdf2503000000080002000200000008000200020000000800010000000000080002000200000008000100020000000800020002000000"], 0x44}, 0x1, 0x0, 0x0, 0x20000040}, 0x20044088) 20:46:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x5, [@enum={0x1, 0x3, 0x0, 0x5, 0x4, [{0x1}, {}, {}]}, @volatile, @int]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x5d, 0x5, 0x1}, 0x20) 20:46:26 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000140)={0x0, 0x0, @a}, 0x48, 0xfffffffffffffffc) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000100)="75924999d8b992c7f1ab11f75ecf7851", 0x10) 20:46:26 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb0100180000000000000010000000106e000005000000030000000000000e00000000000000000000002e00"], 0x0, 0x2d}, 0x20) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x1, 0x0, @a}, 0x48, 0xfffffffffffffffe) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000400), 0xffffffffffffffff) 20:46:26 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x7, 0x400, 0x0, 0x42}, 0x14) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='highspeed\x00', 0xa) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0x80000001) socket$nl_audit(0x10, 0x3, 0x9) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000080)="8e2a281906832fd1b8d043e0655f7b71a69bccd1ea29057383792d17e51e763184ac0d64cc3a2831244dcd29e29318c01106f00c4f43f7d2429468a7ac06d354237bd9af189b45efb51d083e7a988f5c757ba49f21a5b15fdff01fba785aacb7cb571b87135ffc7a9362f25db064bc1a60b246f74633f4120df2ec8651ceb407ecf6ef2796ee1f4c7a4c5dddbe5b1dc894a7f17ea8de36a42c3c7037db1ec5a665b604c55b5fa23007873790cb43c84447ce4922d6e1ba1acca98fedb9193331d6a6f671dc29a3e8d14dd998af6eca1a0c29d9284f8fd6ecf989d56214fae50a82", 0xe1, r0}, 0x68) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r3, 0x0, 0x0) ioctl$NS_GET_PARENT(r3, 0xb702, 0x0) 20:46:26 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x3}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:26 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) prctl$PR_SET_SECUREBITS(0x1c, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x2) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) syz_genetlink_get_family_id$gtp(&(0x7f0000000000), r0) prctl$PR_SET_SECUREBITS(0x1c, 0x18) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) mmap$usbfs(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0xa, 0x10, r1, 0x0) 20:46:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x5, [@enum={0x1, 0x3, 0x0, 0x5, 0x4, [{0x1}, {}, {}]}, @volatile]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x4d, 0x5, 0x1}, 0x20) 20:46:26 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb0100180000000000000010000000106e000005000000030000000000000e00000000000000000000002e00"], 0x0, 0x2d}, 0x20) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x1, 0x0, @a}, 0x48, 0xfffffffffffffffe) 20:46:26 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) prctl$PR_SET_SECUREBITS(0x1c, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x2) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) syz_genetlink_get_family_id$gtp(&(0x7f0000000000), r0) prctl$PR_SET_SECUREBITS(0x1c, 0x18) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) mmap$usbfs(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0xa, 0x10, r1, 0x0) 20:46:26 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x7, 0x400, 0x0, 0x42}, 0x14) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='highspeed\x00', 0xa) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0x80000001) socket$nl_audit(0x10, 0x3, 0x9) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000080)="8e2a281906832fd1b8d043e0655f7b71a69bccd1ea29057383792d17e51e763184ac0d64cc3a2831244dcd29e29318c01106f00c4f43f7d2429468a7ac06d354237bd9af189b45efb51d083e7a988f5c757ba49f21a5b15fdff01fba785aacb7cb571b87135ffc7a9362f25db064bc1a60b246f74633f4120df2ec8651ceb407ecf6ef2796ee1f4c7a4c5dddbe5b1dc894a7f17ea8de36a42c3c7037db1ec5a665b604c55b5fa23007873790cb43c84447ce4922d6e1ba1acca98fedb9193331d6a6f671dc29a3e8d14dd998af6eca1a0c29d9284f8fd6ecf989d56214fae50a82", 0xe1, r0}, 0x68) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r3, 0x0, 0x0) ioctl$NS_GET_PARENT(r3, 0xb702, 0x0) 20:46:26 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x5}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@enum={0x1, 0x3, 0x0, 0x5, 0x4, [{0x1}, {}, {}]}]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x41, 0x5, 0x1}, 0x20) 20:46:26 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0xa}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@enum={0x1, 0x3, 0x0, 0x5, 0x4, [{0x1}, {}, {}]}]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x41, 0x5, 0x1}, 0x20) 20:46:26 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x1, 0x0, @a}, 0x48, 0xfffffffffffffffe) 20:46:26 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x7, 0x400, 0x0, 0x42}, 0x14) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='highspeed\x00', 0xa) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0x80000001) socket$nl_audit(0x10, 0x3, 0x9) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000080)="8e2a281906832fd1b8d043e0655f7b71a69bccd1ea29057383792d17e51e763184ac0d64cc3a2831244dcd29e29318c01106f00c4f43f7d2429468a7ac06d354237bd9af189b45efb51d083e7a988f5c757ba49f21a5b15fdff01fba785aacb7cb571b87135ffc7a9362f25db064bc1a60b246f74633f4120df2ec8651ceb407ecf6ef2796ee1f4c7a4c5dddbe5b1dc894a7f17ea8de36a42c3c7037db1ec5a665b604c55b5fa23007873790cb43c84447ce4922d6e1ba1acca98fedb9193331d6a6f671dc29a3e8d14dd998af6eca1a0c29d9284f8fd6ecf989d56214fae50a82", 0xe1, r0}, 0x68) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r3, 0x0, 0x0) 20:46:26 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x10}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:26 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) prctl$PR_SET_SECUREBITS(0x1c, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x2) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) syz_genetlink_get_family_id$gtp(&(0x7f0000000000), r0) prctl$PR_SET_SECUREBITS(0x1c, 0x18) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) mmap$usbfs(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0xa, 0x10, r1, 0x0) 20:46:26 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x1, 0x0, @a}, 0x48, 0xfffffffffffffffe) 20:46:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@enum={0x1, 0x3, 0x0, 0x5, 0x4, [{0x1}, {}, {}]}]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x41, 0x5, 0x1}, 0x20) 20:46:26 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x64}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:26 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) prctl$PR_SET_SECUREBITS(0x1c, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x2) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) syz_genetlink_get_family_id$gtp(&(0x7f0000000000), r0) prctl$PR_SET_SECUREBITS(0x1c, 0x18) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) 20:46:26 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x65) epoll_create(0xc0) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)={0x1, 0x0, @d}, 0x18, 0xfffffffffffffffb) prctl$PR_SET_SECUREBITS(0x1c, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100), 0x400000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f00000005c0)={0x5c, r2, 0x1, 0x0, 0x0, {}, [{{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}]}, 0x5c}}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000180)={@empty, @rand_addr, 0x0}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f0000000280)=[0x0, 0x0], &(0x7f00000002c0)=[0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000540)={'vxcan0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000680)={'syztnl1\x00', &(0x7f0000000580)={'erspan0\x00', 0x0, 0x10, 0x1, 0x8, 0x7, {{0x2c, 0x4, 0x3, 0x31, 0xb0, 0x67, 0x0, 0x2, 0x2f, 0x0, @private=0xa010100, @remote, {[@rr={0x7, 0xf, 0xd3, [@broadcast, @private=0xa010100, @rand_addr=0x64010102]}, @cipso={0x86, 0x4c, 0x290cb4725e160cdd, [{0x5, 0xf, "f6ddd6337532ce19edf673a4c1"}, {0x2, 0xe, "07936cbdcb193fa28b4c898b"}, {0x1, 0xe, "e95d3f95ac5b1ba01c107fb6"}, {0x0, 0x12, "b22f69a967d1a2cb47b257d9c793a979"}, {0x6, 0x9, "ec9986cd60f20c"}]}, @end, @ra={0x94, 0x4, 0x1}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0xf, 0xb4, [@multicast2, @private=0xa010101, @empty]}, @noop, @rr={0x7, 0x13, 0x3b, [@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, @dev={0xac, 0x14, 0x14, 0x27}, @dev={0xac, 0x14, 0x14, 0x18}]}, @generic={0x7, 0xe, "6f5b28f83d0afea9ce9c8da0"}, @lsrr={0x83, 0x7, 0x54, [@empty]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000740)={'tunl0\x00', &(0x7f00000006c0)={'gretap0\x00', 0x0, 0x10, 0x7800, 0x100, 0xfffffffa, {{0x10, 0x4, 0x2, 0x9, 0x40, 0x65, 0x0, 0x1, 0x0, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x31}, {[@noop, @lsrr={0x83, 0xf, 0x11, [@dev={0xac, 0x14, 0x14, 0x35}, @broadcast, @broadcast]}, @end, @generic={0x87, 0x11, "8420ab4ab25dd2072e5a129c989f96"}, @lsrr={0x83, 0x7, 0xae, [@empty]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000780)={'team0\x00', 0x0}) gettid() ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000001180)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000001140)={&(0x7f0000000800)={0x90c, r2, 0x10, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0x1c0, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0xffffff7f}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1d8, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x6, 0x1f, 0x7, 0x5}, {0x200, 0x0, 0xda, 0x80000001}, {0x7, 0x1, 0x3f, 0xfa}, {0x1, 0x8, 0x0, 0x62e}, {0x4, 0x1, 0xaf}]}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x91}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8000}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8}, {0x264, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x1, 0x5b, 0x0, 0x8001}, {0x80, 0x1, 0x4, 0x2}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x81}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1000}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1ff}}}]}}, {{0x8}, {0x16c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x9f}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r7}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x8001}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3f}}, {0x8, 0x6, r9}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r10}, {0x168, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xd199}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x0, 0x4, 0x80, 0x200}]}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xc}}, {0x8}}}]}}]}, 0x90c}, 0x1, 0x0, 0x0, 0x40091}, 0x4) 20:46:26 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x7, 0x400, 0x0, 0x42}, 0x14) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='highspeed\x00', 0xa) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0x80000001) socket$nl_audit(0x10, 0x3, 0x9) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000080)="8e2a281906832fd1b8d043e0655f7b71a69bccd1ea29057383792d17e51e763184ac0d64cc3a2831244dcd29e29318c01106f00c4f43f7d2429468a7ac06d354237bd9af189b45efb51d083e7a988f5c757ba49f21a5b15fdff01fba785aacb7cb571b87135ffc7a9362f25db064bc1a60b246f74633f4120df2ec8651ceb407ecf6ef2796ee1f4c7a4c5dddbe5b1dc894a7f17ea8de36a42c3c7037db1ec5a665b604c55b5fa23007873790cb43c84447ce4922d6e1ba1acca98fedb9193331d6a6f671dc29a3e8d14dd998af6eca1a0c29d9284f8fd6ecf989d56214fae50a82", 0xe1, r0}, 0x68) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) 20:46:26 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x1, 0x0, @a}, 0x48, 0xfffffffffffffffe) 20:46:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@volatile]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x29, 0x5, 0x1}, 0x20) 20:46:26 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) prctl$PR_SET_SECUREBITS(0x1c, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x2) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) syz_genetlink_get_family_id$gtp(&(0x7f0000000000), r0) prctl$PR_SET_SECUREBITS(0x1c, 0x18) openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) 20:46:26 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x65) (async) epoll_create(0xc0) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)={0x1, 0x0, @d}, 0x18, 0xfffffffffffffffb) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100), 0x400000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f00000005c0)={0x5c, r2, 0x1, 0x0, 0x0, {}, [{{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}]}, 0x5c}}, 0x0) (async) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000180)={@empty, @rand_addr, 0x0}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f0000000280)=[0x0, 0x0], &(0x7f00000002c0)=[0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000540)={'vxcan0\x00', 0x0}) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000680)={'syztnl1\x00', &(0x7f0000000580)={'erspan0\x00', 0x0, 0x10, 0x1, 0x8, 0x7, {{0x2c, 0x4, 0x3, 0x31, 0xb0, 0x67, 0x0, 0x2, 0x2f, 0x0, @private=0xa010100, @remote, {[@rr={0x7, 0xf, 0xd3, [@broadcast, @private=0xa010100, @rand_addr=0x64010102]}, @cipso={0x86, 0x4c, 0x290cb4725e160cdd, [{0x5, 0xf, "f6ddd6337532ce19edf673a4c1"}, {0x2, 0xe, "07936cbdcb193fa28b4c898b"}, {0x1, 0xe, "e95d3f95ac5b1ba01c107fb6"}, {0x0, 0x12, "b22f69a967d1a2cb47b257d9c793a979"}, {0x6, 0x9, "ec9986cd60f20c"}]}, @end, @ra={0x94, 0x4, 0x1}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0xf, 0xb4, [@multicast2, @private=0xa010101, @empty]}, @noop, @rr={0x7, 0x13, 0x3b, [@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, @dev={0xac, 0x14, 0x14, 0x27}, @dev={0xac, 0x14, 0x14, 0x18}]}, @generic={0x7, 0xe, "6f5b28f83d0afea9ce9c8da0"}, @lsrr={0x83, 0x7, 0x54, [@empty]}]}}}}}) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000740)={'tunl0\x00', &(0x7f00000006c0)={'gretap0\x00', 0x0, 0x10, 0x7800, 0x100, 0xfffffffa, {{0x10, 0x4, 0x2, 0x9, 0x40, 0x65, 0x0, 0x1, 0x0, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x31}, {[@noop, @lsrr={0x83, 0xf, 0x11, [@dev={0xac, 0x14, 0x14, 0x35}, @broadcast, @broadcast]}, @end, @generic={0x87, 0x11, "8420ab4ab25dd2072e5a129c989f96"}, @lsrr={0x83, 0x7, 0xae, [@empty]}]}}}}}) (async) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000780)={'team0\x00', 0x0}) gettid() ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000001180)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000001140)={&(0x7f0000000800)={0x90c, r2, 0x10, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0x1c0, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0xffffff7f}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1d8, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x6, 0x1f, 0x7, 0x5}, {0x200, 0x0, 0xda, 0x80000001}, {0x7, 0x1, 0x3f, 0xfa}, {0x1, 0x8, 0x0, 0x62e}, {0x4, 0x1, 0xaf}]}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x91}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8000}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8}, {0x264, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x1, 0x5b, 0x0, 0x8001}, {0x80, 0x1, 0x4, 0x2}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x81}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1000}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1ff}}}]}}, {{0x8}, {0x16c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x9f}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r7}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x8001}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3f}}, {0x8, 0x6, r9}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r10}, {0x168, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xd199}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x0, 0x4, 0x80, 0x200}]}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xc}}, {0x8}}}]}}]}, 0x90c}, 0x1, 0x0, 0x0, 0x40091}, 0x4) 20:46:26 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x3ed}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@volatile]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x29, 0x5, 0x1}, 0x20) 20:46:26 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x7, 0x400, 0x0, 0x42}, 0x14) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='highspeed\x00', 0xa) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0x80000001) socket$nl_audit(0x10, 0x3, 0x9) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000080)="8e2a281906832fd1b8d043e0655f7b71a69bccd1ea29057383792d17e51e763184ac0d64cc3a2831244dcd29e29318c01106f00c4f43f7d2429468a7ac06d354237bd9af189b45efb51d083e7a988f5c757ba49f21a5b15fdff01fba785aacb7cb571b87135ffc7a9362f25db064bc1a60b246f74633f4120df2ec8651ceb407ecf6ef2796ee1f4c7a4c5dddbe5b1dc894a7f17ea8de36a42c3c7037db1ec5a665b604c55b5fa23007873790cb43c84447ce4922d6e1ba1acca98fedb9193331d6a6f671dc29a3e8d14dd998af6eca1a0c29d9284f8fd6ecf989d56214fae50a82", 0xe1, r0}, 0x68) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2, 0xffffffffffffffff) 20:46:26 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x1, 0x0, @a}, 0x48, 0xfffffffffffffffe) 20:46:26 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) prctl$PR_SET_SECUREBITS(0x1c, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x2) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) syz_genetlink_get_family_id$gtp(&(0x7f0000000000), r0) prctl$PR_SET_SECUREBITS(0x1c, 0x18) 20:46:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@volatile]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x29, 0x5, 0x1}, 0x20) 20:46:26 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x65) epoll_create(0xc0) (async, rerun: 32) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)={0x1, 0x0, @d}, 0x18, 0xfffffffffffffffb) (async, rerun: 32) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100), 0x400000, 0x0) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f00000005c0)={0x5c, r2, 0x1, 0x0, 0x0, {}, [{{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}]}, 0x5c}}, 0x0) (async, rerun: 64) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000180)={@empty, @rand_addr, 0x0}, &(0x7f00000001c0)=0xc) (async, rerun: 64) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) (async, rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f0000000280)=[0x0, 0x0], &(0x7f00000002c0)=[0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) (async, rerun: 64) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000540)={'vxcan0\x00', 0x0}) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000680)={'syztnl1\x00', &(0x7f0000000580)={'erspan0\x00', 0x0, 0x10, 0x1, 0x8, 0x7, {{0x2c, 0x4, 0x3, 0x31, 0xb0, 0x67, 0x0, 0x2, 0x2f, 0x0, @private=0xa010100, @remote, {[@rr={0x7, 0xf, 0xd3, [@broadcast, @private=0xa010100, @rand_addr=0x64010102]}, @cipso={0x86, 0x4c, 0x290cb4725e160cdd, [{0x5, 0xf, "f6ddd6337532ce19edf673a4c1"}, {0x2, 0xe, "07936cbdcb193fa28b4c898b"}, {0x1, 0xe, "e95d3f95ac5b1ba01c107fb6"}, {0x0, 0x12, "b22f69a967d1a2cb47b257d9c793a979"}, {0x6, 0x9, "ec9986cd60f20c"}]}, @end, @ra={0x94, 0x4, 0x1}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0xf, 0xb4, [@multicast2, @private=0xa010101, @empty]}, @noop, @rr={0x7, 0x13, 0x3b, [@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, @dev={0xac, 0x14, 0x14, 0x27}, @dev={0xac, 0x14, 0x14, 0x18}]}, @generic={0x7, 0xe, "6f5b28f83d0afea9ce9c8da0"}, @lsrr={0x83, 0x7, 0x54, [@empty]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000740)={'tunl0\x00', &(0x7f00000006c0)={'gretap0\x00', 0x0, 0x10, 0x7800, 0x100, 0xfffffffa, {{0x10, 0x4, 0x2, 0x9, 0x40, 0x65, 0x0, 0x1, 0x0, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x31}, {[@noop, @lsrr={0x83, 0xf, 0x11, [@dev={0xac, 0x14, 0x14, 0x35}, @broadcast, @broadcast]}, @end, @generic={0x87, 0x11, "8420ab4ab25dd2072e5a129c989f96"}, @lsrr={0x83, 0x7, 0xae, [@empty]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000780)={'team0\x00', 0x0}) (async, rerun: 64) gettid() (rerun: 64) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000001180)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000001140)={&(0x7f0000000800)={0x90c, r2, 0x10, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0x1c0, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0xffffff7f}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1d8, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x6, 0x1f, 0x7, 0x5}, {0x200, 0x0, 0xda, 0x80000001}, {0x7, 0x1, 0x3f, 0xfa}, {0x1, 0x8, 0x0, 0x62e}, {0x4, 0x1, 0xaf}]}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x91}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8000}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8}, {0x264, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x1, 0x5b, 0x0, 0x8001}, {0x80, 0x1, 0x4, 0x2}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x81}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1000}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1ff}}}]}}, {{0x8}, {0x16c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x9f}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r7}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x8001}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3f}}, {0x8, 0x6, r9}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r10}, {0x168, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xd199}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x0, 0x4, 0x80, 0x200}]}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xc}}, {0x8}}}]}}]}, 0x90c}, 0x1, 0x0, 0x0, 0x40091}, 0x4) 20:46:26 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x7, 0x400, 0x0, 0x42}, 0x14) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='highspeed\x00', 0xa) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0x80000001) socket$nl_audit(0x10, 0x3, 0x9) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000080)="8e2a281906832fd1b8d043e0655f7b71a69bccd1ea29057383792d17e51e763184ac0d64cc3a2831244dcd29e29318c01106f00c4f43f7d2429468a7ac06d354237bd9af189b45efb51d083e7a988f5c757ba49f21a5b15fdff01fba785aacb7cb571b87135ffc7a9362f25db064bc1a60b246f74633f4120df2ec8651ceb407ecf6ef2796ee1f4c7a4c5dddbe5b1dc894a7f17ea8de36a42c3c7037db1ec5a665b604c55b5fa23007873790cb43c84447ce4922d6e1ba1acca98fedb9193331d6a6f671dc29a3e8d14dd998af6eca1a0c29d9284f8fd6ecf989d56214fae50a82", 0xe1, r0}, 0x68) 20:46:26 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x3f3}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:26 executing program 2: add_key$fscrypt_provisioning(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x1, 0x0, @a}, 0x48, 0xfffffffffffffffe) 20:46:26 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) prctl$PR_SET_SECUREBITS(0x1c, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x2) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) syz_genetlink_get_family_id$gtp(&(0x7f0000000000), r0) 20:46:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x5, [@enum={0x0, 0x3, 0x0, 0x5, 0x4, [{0x1}, {}, {}]}, @volatile]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x4d, 0x5, 0x1}, 0x20) 20:46:26 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x3f4}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:26 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0xffffffffffffffe1) ptrace$ARCH_SHSTK_UNLOCK(0x1e, 0x0, 0x2, 0x5004) write$char_usb(r1, 0x0, 0x0) write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:26 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) prctl$PR_SET_SECUREBITS(0x1c, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x2) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18}, './file0\x00'}) 20:46:26 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x7, 0x400, 0x0, 0x42}, 0x14) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='highspeed\x00', 0xa) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0x80000001) socket$nl_audit(0x10, 0x3, 0x9) 20:46:26 executing program 2: add_key$fscrypt_provisioning(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x1, 0x0, @a}, 0x48, 0xfffffffffffffffe) 20:46:26 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) (async) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0xffffffffffffffe1) ptrace$ARCH_SHSTK_UNLOCK(0x1e, 0x0, 0x2, 0x5004) (async, rerun: 32) write$char_usb(r1, 0x0, 0x0) (rerun: 32) write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x5, [@enum={0x0, 0x3, 0x0, 0x5, 0x4, [{0x1}, {}, {}]}, @volatile]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x4d, 0x5, 0x1}, 0x20) 20:46:26 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x3f5}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:26 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) prctl$PR_SET_SECUREBITS(0x1c, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x2) 20:46:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x5, [@enum={0x0, 0x3, 0x0, 0x5, 0x4, [{0x1}, {}, {}]}, @volatile]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x4d, 0x5, 0x1}, 0x20) 20:46:26 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x7, 0x400, 0x0, 0x42}, 0x14) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='highspeed\x00', 0xa) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0x80000001) 20:46:26 executing program 2: add_key$fscrypt_provisioning(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x1, 0x0, @a}, 0x48, 0xfffffffffffffffe) 20:46:26 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) (async, rerun: 32) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0xffffffffffffffe1) (async, rerun: 32) ptrace$ARCH_SHSTK_UNLOCK(0x1e, 0x0, 0x2, 0x5004) write$char_usb(r1, 0x0, 0x0) (async) write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:26 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:26 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x7, 0x400, 0x0, 0x42}, 0x14) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='highspeed\x00', 0xa) 20:46:26 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x3f6}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@enum={0x1, 0x2, 0x0, 0x5, 0x4, [{0x1}, {}]}, @volatile]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x45, 0x5, 0x1}, 0x20) 20:46:26 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(0x0, &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x1, 0x0, @a}, 0x48, 0xfffffffffffffffe) 20:46:26 executing program 5: prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:26 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x3f8}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x5, [@enum={0x1, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x3d, 0x5, 0x1}, 0x20) 20:46:26 executing program 0: r0 = open_tree(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x80001) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, r1, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x1ff}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f00000001c0)={{0x1, 0x1, 0x18}, './file0\x00'}) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:26 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x7, 0x400, 0x0, 0x42}, 0x14) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000200)='highspeed\x00', 0xa) 20:46:26 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(0x0, &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x1, 0x0, @a}, 0x48, 0xfffffffffffffffe) 20:46:26 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1000000}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:26 executing program 5: prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:26 executing program 0: r0 = open_tree(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x80001) (async) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, r1, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x1ff}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x1) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f00000001c0)={{0x1, 0x1, 0x18}, './file0\x00'}) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:26 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x7, 0x400, 0x0, 0x42}, 0x14) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000200)='highspeed\x00', 0xa) 20:46:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@enum={0x1, 0x0, 0x0, 0x5}, @volatile]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x35, 0x5, 0x1}, 0x20) 20:46:26 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(0x0, &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x1, 0x0, @a}, 0x48, 0xfffffffffffffffe) 20:46:26 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:26 executing program 5: prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:26 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x7, 0x400, 0x0, 0x42}, 0x14) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000200)='highspeed\x00', 0xa) 20:46:26 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, &(0x7f00000000c0)={0x1, 0x0, @a}, 0x48, 0xfffffffffffffffe) 20:46:26 executing program 5: add_key$fscrypt_provisioning(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:26 executing program 0: r0 = open_tree(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x80001) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, r1, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x1ff}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x1) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f00000001c0)={{0x1, 0x1, 0x18}, './file0\x00'}) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@enum={0x1, 0x0, 0x0, 0x5}, @volatile]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x35, 0x5, 0x1}, 0x20) 20:46:26 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x7, 0x400, 0x0, 0x42}, 0x14) openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='highspeed\x00', 0xa) 20:46:26 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x2}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:26 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffe) 20:46:26 executing program 5: add_key$fscrypt_provisioning(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:26 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x889d) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x10, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x2400c084) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:26 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x3}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@enum={0x1, 0x0, 0x0, 0x5}, @volatile]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x35, 0x5, 0x1}, 0x20) 20:46:26 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x7, 0x400, 0x0, 0x42}, 0x14) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='highspeed\x00', 0xa) 20:46:26 executing program 5: add_key$fscrypt_provisioning(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:26 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x4}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x5, [@enum={0x1, 0x1, 0x0, 0x5, 0x4, [{}]}, @volatile]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x3d, 0x5, 0x1}, 0x20) 20:46:26 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1000000}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:26 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x889d) (async) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x10, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x2400c084) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:26 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) prctl$PR_SET_SECUREBITS(0x1c, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x2) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) syz_genetlink_get_family_id$gtp(&(0x7f0000000000), r0) prctl$PR_SET_SECUREBITS(0x1c, 0x18) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) mmap$usbfs(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0xa, 0x10, r1, 0x0) 20:46:26 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='highspeed\x00', 0xa) 20:46:26 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x5}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:26 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1000000}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x5, [@enum={0x1, 0x1, 0x0, 0x5, 0x4, [{}]}, @volatile]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x3d, 0x5, 0x1}, 0x20) 20:46:26 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x889d) (async) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x10, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x2400c084) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:26 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x6}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:26 executing program 1: openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='highspeed\x00', 0xa) 20:46:26 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) ptrace$poke(0x4, 0x0, &(0x7f0000000080), 0xfffffffffffffffc) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1000000}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x5, [@enum={0x1, 0x1, 0x0, 0x5, 0x4, [{}]}, @volatile]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x3d, 0x5, 0x1}, 0x20) 20:46:27 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0xfd08, 0xfffffffffffffffa) prctl$PR_SET_SECUREBITS(0x1c, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) 20:46:27 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='highspeed\x00', 0xa) 20:46:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x7}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 20:46:27 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)={0x3, 0x0, @auto=[0x3a, 0x1b, 0x1d, 0x1a, 0x40, 0x2c, 0x26, 0x1f, 0x30, 0x11]}, 0x12, 0xfffffffffffffffc) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x4, [@enum={0x1, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x61, 0x61]}}, &(0x7f0000000240)=""/5, 0x3c, 0x5, 0x1}, 0x20) 20:46:27 executing program 1: socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000200)='highspeed\x00', 0xa) 20:46:27 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000000)={'wpan1\x00'}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 20:46:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x8}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x4, [@enum={0x1, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x61, 0x61]}}, &(0x7f0000000240)=""/5, 0x3c, 0x5, 0x1}, 0x20) 20:46:27 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0xfd08, 0xfffffffffffffffa) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) 20:46:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 20:46:27 executing program 1: socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000200)='highspeed\x00', 0xa) 20:46:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x4, [@enum={0x1, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x61, 0x61]}}, &(0x7f0000000240)=""/5, 0x3c, 0x5, 0x1}, 0x20) 20:46:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000240)=""/5, 0x0, 0x5, 0x1}, 0x20) 20:46:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x5, [@enum={0x1, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x61, 0x61, 0x0]}}, &(0x7f0000000240)=""/5, 0x3d, 0x5, 0x1}, 0x20) 20:46:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x9}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:27 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0xfd08, 0xfffffffffffffffa) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0xfd08, 0xfffffffffffffffa) prctl$PR_SET_SECUREBITS(0x1c, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) (async) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) 20:46:27 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000000)={'wpan1\x00'}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:27 executing program 1: socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000200)='highspeed\x00', 0xa) 20:46:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000240)=""/5, 0x0, 0x5, 0x1}, 0x20) 20:46:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x5, [@enum={0x1, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x61, 0x61, 0x0]}}, &(0x7f0000000240)=""/5, 0x3d, 0x5, 0x1}, 0x20) [ 1282.977643][ T6346] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 20:46:27 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) 20:46:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0xa}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x5, [@enum={0x1, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x61, 0x61, 0x0]}}, &(0x7f0000000240)=""/5, 0x3d, 0x5, 0x1}, 0x20) 20:46:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0xb}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000240)=""/5, 0x0, 0x5, 0x1}, 0x20) 20:46:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x4, [@enum={0x1, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x3c, 0x5, 0x1}, 0x20) 20:46:27 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000000)={'wpan1\x00'}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) [ 1283.046803][ T6372] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 20:46:27 executing program 0: r0 = open_tree(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x8100) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000100)=0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x1004, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[], [{@dont_measure}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@fowner_eq={'fowner', 0x3d, r1}}]}}) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffe) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1000000}, {}, {}]}, @volatile, @int]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x5d, 0x5, 0x1}, 0x20) 20:46:27 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) 20:46:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0xc}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:27 executing program 0: r0 = open_tree(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x8100) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000100)=0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x1004, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[], [{@dont_measure}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@fowner_eq={'fowner', 0x3d, r1}}]}}) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffe) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffe) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:27 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) 20:46:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x4, [@enum={0x1, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x3c, 0x5, 0x1}, 0x20) 20:46:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0xd}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1000000}, {}, {}]}, @volatile]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x4d, 0x5, 0x1}, 0x20) [ 1283.118413][ T6392] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 20:46:27 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000000)={'wpan1\x00'}) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:27 executing program 0: r0 = open_tree(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x8100) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000100)=0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x1004, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[], [{@dont_measure}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@fowner_eq={'fowner', 0x3d, r1}}]}}) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffe) prctl$PR_SET_SECUREBITS(0x1c, 0x0) open_tree(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x8100) (async) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000100)) (async) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x1004, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[], [{@dont_measure}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@fowner_eq={'fowner', 0x3d, r1}}]}}) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffe) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) 20:46:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x4, [@enum={0x1, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x3c, 0x5, 0x1}, 0x20) 20:46:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x4, [@enum={0x1, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x3c, 0x5, 0x1}, 0x20) 20:46:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0xe}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1000000}, {}, {}]}]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x41, 0x5, 0x1}, 0x20) 20:46:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0xf}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:27 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x1, 0x0, @b}, 0x48, 0xfffffffffffffffd) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='trusted.syz\x00', &(0x7f0000000200)='fscrypt-provisioning\x00', 0x15, 0x3) prctl$PR_SET_SECUREBITS(0x1c, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000140), 0xa7, 0x101000) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280), 0x80000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) mmap$usbfs(&(0x7f0000fea000/0x14000)=nil, 0x14000, 0x200000b, 0x13, r0, 0xffffffffffff0000) 20:46:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x5, [@enum={0x1, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x61, 0x0, 0x5f]}}, &(0x7f0000000240)=""/5, 0x3d, 0x5, 0x1}, 0x20) 20:46:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x4, [@enum={0x1, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x3c, 0x5, 0x1}, 0x20) 20:46:27 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) [ 1283.217041][ T6423] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 20:46:27 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x1, 0x0, @b}, 0x48, 0xfffffffffffffffd) (async) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='trusted.syz\x00', &(0x7f0000000200)='fscrypt-provisioning\x00', 0x15, 0x3) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) r0 = syz_open_dev$usbfs(&(0x7f0000000140), 0xa7, 0x101000) (async) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280), 0x80000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) mmap$usbfs(&(0x7f0000fea000/0x14000)=nil, 0x14000, 0x200000b, 0x13, r0, 0xffffffffffff0000) 20:46:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x5, [@enum={0x1, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x61, 0x0, 0x5f]}}, &(0x7f0000000240)=""/5, 0x3d, 0x5, 0x1}, 0x20) 20:46:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x10}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x1d, 0x5, 0x1}, 0x20) 20:46:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x5, [@enum={0x1, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x61, 0x0, 0x5f]}}, &(0x7f0000000240)=""/5, 0x3d, 0x5, 0x1}, 0x20) 20:46:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x11}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x4, [@enum={0x1, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x3c, 0x5, 0x1}, 0x20) 20:46:27 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x1, 0x0, @b}, 0x48, 0xfffffffffffffffd) (async) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='trusted.syz\x00', &(0x7f0000000200)='fscrypt-provisioning\x00', 0x15, 0x3) (async, rerun: 32) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (rerun: 32) r0 = syz_open_dev$usbfs(&(0x7f0000000140), 0xa7, 0x101000) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280), 0x80000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) mmap$usbfs(&(0x7f0000fea000/0x14000)=nil, 0x14000, 0x200000b, 0x13, r0, 0xffffffffffff0000) 20:46:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x1d, 0x5, 0x1}, 0x20) 20:46:27 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x1d, 0x5, 0x1}, 0x20) 20:46:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x12}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x4, [@enum={0x1, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x3c, 0x5, 0x1}, 0x20) [ 1283.326288][ T6443] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 20:46:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 20:46:27 executing program 0: r0 = syz_io_uring_setup(0x385c, &(0x7f0000000140)={0x0, 0x408e, 0x80, 0x0, 0x1f8}, &(0x7f00000001c0), &(0x7f0000000200)=0x0) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000002, 0x4000010, r0, 0x8000000) syz_io_uring_submit(r2, r1, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x44, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000040)=@llc={0x1a, 0x2, 0x81, 0x7f, 0x7f, 0x1, @multicast}, 0x0, 0x0, 0x2}) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 20:46:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@enum={0x0, 0x3, 0x0, 0x6, 0x4, [{0x1000000}, {}, {}]}]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x41, 0x5, 0x1}, 0x20) 20:46:27 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x25}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 20:46:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x4, [@enum={0x1, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x3c, 0x5, 0x1}, 0x20) 20:46:27 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:27 executing program 0: syz_io_uring_setup(0x385c, &(0x7f0000000140)={0x0, 0x408e, 0x80, 0x0, 0x1f8}, &(0x7f00000001c0), &(0x7f0000000200)) (async) r0 = syz_io_uring_setup(0x385c, &(0x7f0000000140)={0x0, 0x408e, 0x80, 0x0, 0x1f8}, &(0x7f00000001c0), &(0x7f0000000200)=0x0) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000002, 0x4000010, r0, 0x8000000) syz_io_uring_submit(r2, r1, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x44, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000040)=@llc={0x1a, 0x2, 0x81, 0x7f, 0x7f, 0x1, @multicast}, 0x0, 0x0, 0x2}) (async) syz_io_uring_submit(r2, r1, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x44, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000040)=@llc={0x1a, 0x2, 0x81, 0x7f, 0x7f, 0x1, @multicast}, 0x0, 0x0, 0x2}) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 20:46:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@enum={0x0, 0x3, 0x0, 0x6, 0x4, [{0x1000000}, {}, {}]}]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x41, 0x5, 0x1}, 0x20) 20:46:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x48}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 20:46:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x4, [@enum={0x1, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x3c, 0x5, 0x1}, 0x20) 20:46:27 executing program 0: r0 = syz_io_uring_setup(0x385c, &(0x7f0000000140)={0x0, 0x408e, 0x80, 0x0, 0x1f8}, &(0x7f00000001c0), &(0x7f0000000200)=0x0) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000002, 0x4000010, r0, 0x8000000) syz_io_uring_submit(r2, r1, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x44, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000040)=@llc={0x1a, 0x2, 0x81, 0x7f, 0x7f, 0x1, @multicast}, 0x0, 0x0, 0x2}) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 20:46:27 executing program 5: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r0, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x4c}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x5, [@enum={0x1, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x0, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x3d, 0x5, 0x1}, 0x20) 20:46:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000240)=""/5, 0x0, 0x5, 0x1}, 0x20) 20:46:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x51}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:27 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) add_key$fscrypt_provisioning(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffa) write$cgroup_freezer_state(r0, &(0x7f0000000080)='FROZEN\x00', 0x7) prctl$PR_SET_SECUREBITS(0x1c, 0x0) setsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f00000000c0)=0x1, 0x4) add_key$fscrypt_provisioning(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffb) 20:46:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000240)=""/5, 0x0, 0x5, 0x1}, 0x20) 20:46:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@enum={0x0, 0x3, 0x0, 0x6, 0x4, [{0x1000000}, {}, {}]}]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x41, 0x5, 0x1}, 0x20) 20:46:27 executing program 5: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r0, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x5, [@enum={0x1, 0x2, 0x0, 0x6, 0x4, [{0x1000000}, {}]}]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x39, 0x5, 0x1}, 0x20) 20:46:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x5, [@enum={0x1, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x0, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x3d, 0x5, 0x1}, 0x20) 20:46:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x68}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:27 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) add_key$fscrypt_provisioning(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffa) write$cgroup_freezer_state(r0, &(0x7f0000000080)='FROZEN\x00', 0x7) prctl$PR_SET_SECUREBITS(0x1c, 0x0) setsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f00000000c0)=0x1, 0x4) add_key$fscrypt_provisioning(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) pipe2$watch_queue(&(0x7f0000000040), 0x80) (async) add_key$fscrypt_provisioning(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffa) (async) write$cgroup_freezer_state(r0, &(0x7f0000000080)='FROZEN\x00', 0x7) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) setsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f00000000c0)=0x1, 0x4) (async) add_key$fscrypt_provisioning(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffb) (async) 20:46:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x1, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x31, 0x5, 0x1}, 0x20) 20:46:27 executing program 5: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r0, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000240)=""/5, 0x0, 0x5, 0x1}, 0x20) 20:46:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x6c}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x5, [@enum={0x1, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x0, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x3d, 0x5, 0x1}, 0x20) 20:46:27 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) add_key$fscrypt_provisioning(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffa) write$cgroup_freezer_state(r0, &(0x7f0000000080)='FROZEN\x00', 0x7) prctl$PR_SET_SECUREBITS(0x1c, 0x0) setsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f00000000c0)=0x1, 0x4) add_key$fscrypt_provisioning(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) pipe2$watch_queue(&(0x7f0000000040), 0x80) (async) add_key$fscrypt_provisioning(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffa) (async) write$cgroup_freezer_state(r0, &(0x7f0000000080)='FROZEN\x00', 0x7) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) setsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f00000000c0)=0x1, 0x4) (async) add_key$fscrypt_provisioning(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffb) (async) 20:46:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x1}]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x29, 0x5, 0x1}, 0x20) 20:46:27 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x1, 0x1, 0x0, 0x5, 0x4, [{0x1}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x30, 0x5, 0x1}, 0x20) 20:46:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x74}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x1}]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x29, 0x5, 0x1}, 0x20) 20:46:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x5, [@enum={0x1, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x61, 0x61, 0x5f]}}, 0x0, 0x3d, 0x0, 0x1}, 0x20) 20:46:27 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x1, 0x1, 0x0, 0x5, 0x4, [{0x1}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x30, 0x5, 0x1}, 0x20) 20:46:27 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x889d) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x6c, 0x0, 0x4, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @mcast2}, @L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x3}, @L2TP_ATTR_RECV_TIMEOUT={0xc}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @local}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x81}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000000}, 0x404c080) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x7a}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x5, [@enum={0x1, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x61, 0x61, 0x5f]}}, 0x0, 0x3d}, 0x20) 20:46:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x1}]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x29, 0x5, 0x1}, 0x20) 20:46:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x300}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:27 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x1, 0x1, 0x0, 0x5, 0x4, [{0x1}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x30, 0x5, 0x1}, 0x20) 20:46:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@enum={0x0, 0x3, 0x0, 0x6, 0x4, [{0x1000000}, {}, {}]}]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x41, 0x5, 0x1}, 0x20) 20:46:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x1, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x31, 0x5, 0x1}, 0x20) 20:46:27 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x889d) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x6c, 0x0, 0x4, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @mcast2}, @L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x3}, @L2TP_ATTR_RECV_TIMEOUT={0xc}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @local}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x81}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000000}, 0x404c080) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x1, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x31, 0x5, 0x1}, 0x20) 20:46:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x500}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@enum={0x0, 0x3, 0x0, 0x6, 0x4, [{0x1000000}, {}, {}]}]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x41, 0x5, 0x1}, 0x20) 20:46:27 executing program 5: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r0, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:27 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x889d) (async) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x6c, 0x0, 0x4, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @mcast2}, @L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x3}, @L2TP_ATTR_RECV_TIMEOUT={0xc}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @local}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x81}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000000}, 0x404c080) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@volatile]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x28, 0x5, 0x1}, 0x20) 20:46:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x600}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:27 executing program 5: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r0, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@enum={0x0, 0x3, 0x0, 0x6, 0x4, [{0x1000000}, {}, {}]}]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x41, 0x5, 0x1}, 0x20) 20:46:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x1, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x31, 0x5, 0x1}, 0x20) 20:46:27 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x0) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x300000c, 0x12, r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)) write$char_usb(r1, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000009, 0x4010, r1, 0x10000000) 20:46:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x700}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@volatile]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x28, 0x5, 0x1}, 0x20) 20:46:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 20:46:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x1, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}, {0x0, [0x61, 0x61]}}, &(0x7f0000000240)=""/5, 0x30, 0x5, 0x1}, 0x20) 20:46:28 executing program 5: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r0, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:28 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async, rerun: 32) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (rerun: 32) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x300000c, 0x12, r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)) (async, rerun: 32) write$char_usb(r1, 0x0, 0x0) (async, rerun: 32) mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000009, 0x4010, r1, 0x10000000) 20:46:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x900}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@volatile]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x28, 0x5, 0x1}, 0x20) 20:46:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x1, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}, {0x0, [0x61]}}, &(0x7f0000000240)=""/5, 0x2f, 0x5, 0x1}, 0x20) 20:46:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 20:46:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0xa00}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:28 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x300000c, 0x12, r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)) (async) write$char_usb(r1, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000009, 0x4010, r1, 0x10000000) 20:46:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 20:46:28 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, 0x0, 0x0) 20:46:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x1, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}, {0x0, [0x61]}}, &(0x7f0000000240)=""/5, 0x2f, 0x5, 0x1}, 0x20) 20:46:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x4, [@enum={0x0, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x3c, 0x5, 0x1}, 0x20) 20:46:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0xb00}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000240)=""/5, 0x0, 0x5, 0x1}, 0x20) 20:46:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x1, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}, {0x0, [0x61]}}, &(0x7f0000000240)=""/5, 0x2f, 0x5, 0x1}, 0x20) 20:46:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@enum={0x0, 0x0, 0x0, 0x5}, @volatile]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x34, 0x5, 0x1}, 0x20) 20:46:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0xc00}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:28 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, 0x0, 0x0) 20:46:28 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) prctl$PR_SET_SECUREBITS(0x1c, 0x0) socket$nl_rdma(0x10, 0x3, 0x14) 20:46:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000240)=""/5, 0x0, 0x5, 0x1}, 0x20) 20:46:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x1, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}, {0x0, [0x61, 0x0]}}, &(0x7f0000000240)=""/5, 0x30, 0x5, 0x1}, 0x20) 20:46:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0xd00}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:28 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) socket$nl_rdma(0x10, 0x3, 0x14) 20:46:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000240)=""/5, 0x0, 0x5, 0x1}, 0x20) 20:46:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@enum={0x0, 0x0, 0x0, 0x5}, @volatile]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x34, 0x5, 0x1}, 0x20) 20:46:28 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, 0x0, 0x0) 20:46:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x1d, 0x5, 0x1}, 0x20) 20:46:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0xe00}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:28 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) prctl$PR_SET_SECUREBITS(0x1c, 0x0) socket$nl_rdma(0x10, 0x3, 0x14) (async) socket$nl_rdma(0x10, 0x3, 0x14) 20:46:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@enum={0x0, 0x0, 0x0, 0x5}, @volatile]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x34, 0x5, 0x1}, 0x20) 20:46:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x1, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}, {0x0, [0x61, 0x0]}}, &(0x7f0000000240)=""/5, 0x30, 0x5, 0x1}, 0x20) 20:46:28 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 20:46:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0xf00}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x1, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}, {0x0, [0x61, 0x0]}}, &(0x7f0000000240)=""/5, 0x30, 0x5, 0x1}, 0x20) 20:46:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x1d, 0x5, 0x1}, 0x20) 20:46:28 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x13) read$char_usb(0xffffffffffffffff, &(0x7f0000000040)=""/167, 0xa7) 20:46:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x4, [@enum={0x0, 0x1, 0x0, 0x5, 0x4, [{}]}, @volatile]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x3c, 0x5, 0x1}, 0x20) 20:46:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x1100}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x1d, 0x5, 0x1}, 0x20) 20:46:28 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x13) read$char_usb(0xffffffffffffffff, &(0x7f0000000040)=""/167, 0xa7) add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x13) (async) read$char_usb(0xffffffffffffffff, &(0x7f0000000040)=""/167, 0xa7) (async) 20:46:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x1, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}, {0x0, [0x61]}}, &(0x7f0000000240)=""/5, 0x2f, 0x5, 0x1}, 0x20) 20:46:28 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 20:46:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x1200}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x4, [@enum={0x0, 0x1, 0x0, 0x5, 0x4, [{}]}, @volatile]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x3c, 0x5, 0x1}, 0x20) 20:46:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x5, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x1000000}, {}]}]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x39, 0x5, 0x1}, 0x20) 20:46:28 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async, rerun: 64) prctl$PR_SET_SECUREBITS(0x1c, 0x13) (async, rerun: 64) read$char_usb(0xffffffffffffffff, &(0x7f0000000040)=""/167, 0xa7) 20:46:28 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 20:46:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x1, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}, {0x0, [0x61]}}, &(0x7f0000000240)=""/5, 0x2f, 0x5, 0x1}, 0x20) 20:46:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x2500}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x31, 0x5, 0x1}, 0x20) 20:46:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x4, [@enum={0x0, 0x1, 0x0, 0x5, 0x4, [{}]}, @volatile]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x3c, 0x5, 0x1}, 0x20) 20:46:28 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000000)={'wpan1\x00'}) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:28 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1c}}, 0x0) 20:46:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x1, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}, {0x0, [0x61]}}, &(0x7f0000000240)=""/5, 0x2f, 0x5, 0x1}, 0x20) 20:46:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x3, [@enum={0x0, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x61]}}, &(0x7f0000000240)=""/5, 0x3b, 0x5, 0x1}, 0x20) 20:46:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x29, 0x5, 0x1}, 0x20) 20:46:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x4800}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:28 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1c}}, 0x0) 20:46:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x1, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}, {0x0, [0x0, 0x61]}}, &(0x7f0000000240)=""/5, 0x30, 0x5, 0x1}, 0x20) 20:46:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x29, 0x5, 0x1}, 0x20) 20:46:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x4c00}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:28 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000000)={'wpan1\x00'}) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x3, [@enum={0x0, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x61]}}, &(0x7f0000000240)=""/5, 0x3b, 0x5, 0x1}, 0x20) [ 1284.258723][ T6737] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 20:46:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x29, 0x5, 0x1}, 0x20) 20:46:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x5100}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:28 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1c}}, 0x0) 20:46:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x1, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}, {0x0, [0x0, 0x61]}}, &(0x7f0000000240)=""/5, 0x30, 0x5, 0x1}, 0x20) 20:46:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x3, [@enum={0x0, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x61]}}, &(0x7f0000000240)=""/5, 0x3b, 0x5, 0x1}, 0x20) 20:46:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x31, 0x5, 0x1}, 0x20) 20:46:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x1, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}, {0x0, [0x0, 0x61]}}, &(0x7f0000000240)=""/5, 0x30, 0x5, 0x1}, 0x20) 20:46:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x6800}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:28 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1], 0x1c}}, 0x0) 20:46:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x4, [@enum={0x0, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x61, 0x0]}}, &(0x7f0000000240)=""/5, 0x3c, 0x5, 0x1}, 0x20) [ 1284.340660][ T6757] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 20:46:28 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x1, 0x0, @a}, 0x48, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)={0x3, 0x0, @c}, 0x29, 0xfffffffffffffffd) r0 = gettid() syz_open_procfs$userns(r0, &(0x7f0000000040)) 20:46:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x1, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}, {0x0, [0x61, 0x61]}}, 0x0, 0x30, 0x0, 0x1}, 0x20) 20:46:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x6c00}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x31, 0x5, 0x1}, 0x20) 20:46:28 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x1, 0x0, @a}, 0x48, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)={0x3, 0x0, @c}, 0x29, 0xfffffffffffffffd) r0 = gettid() syz_open_procfs$userns(r0, &(0x7f0000000040)) 20:46:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x4, [@enum={0x0, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x61, 0x0]}}, &(0x7f0000000240)=""/5, 0x3c, 0x5, 0x1}, 0x20) 20:46:28 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1], 0x1c}}, 0x0) 20:46:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x1, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}, {0x0, [0x61, 0x61]}}, 0x0, 0x30, 0x0, 0x1}, 0x20) 20:46:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x31, 0x5, 0x1}, 0x20) 20:46:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x7400}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x4, [@enum={0x0, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x61, 0x0]}}, &(0x7f0000000240)=""/5, 0x3c, 0x5, 0x1}, 0x20) 20:46:28 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x1, 0x0, @a}, 0x48, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)={0x3, 0x0, @c}, 0x29, 0xfffffffffffffffd) r0 = gettid() syz_open_procfs$userns(r0, &(0x7f0000000040)) 20:46:28 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1], 0x1c}}, 0x0) 20:46:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x1, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}, {0x0, [0x61, 0x61]}}, 0x0, 0x30, 0x0, 0x1}, 0x20) 20:46:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x7a00}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x3, [@enum={0x0, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x5f]}}, &(0x7f0000000240)=""/5, 0x3b, 0x5, 0x1}, 0x20) 20:46:28 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x1, 0x0, @a}, 0x48, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)={0x3, 0x0, @c}, 0x29, 0xfffffffffffffffd) gettid() 20:46:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}, {0x0, [0x61, 0x61]}}, &(0x7f0000000240)=""/5, 0x30, 0x5, 0x1}, 0x20) 20:46:28 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB], 0x1c}}, 0x0) 20:46:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x1, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}, {0x0, [0x61, 0x61]}}, &(0x7f0000000240)=""/5, 0x30, 0x5}, 0x20) 20:46:28 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB], 0x1c}}, 0x0) 20:46:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x1000000}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:28 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x1, 0x0, @a}, 0x48, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)={0x3, 0x0, @c}, 0x29, 0xfffffffffffffffd) 20:46:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}, {0x0, [0x61]}}, &(0x7f0000000240)=""/5, 0x2f, 0x5, 0x1}, 0x20) 20:46:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x1, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}, {0x0, [0x61, 0x61]}}, &(0x7f0000000240)=""/5, 0x30, 0x5}, 0x20) 20:46:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x3, [@enum={0x0, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x5f]}}, &(0x7f0000000240)=""/5, 0x3b, 0x5, 0x1}, 0x20) 20:46:28 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)={0x3, 0x0, @c}, 0x29, 0xfffffffffffffffd) 20:46:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x1, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}, {0x0, [0x61, 0x61]}}, &(0x7f0000000240)=""/5, 0x30, 0x5}, 0x20) 20:46:28 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB], 0x1c}}, 0x0) 20:46:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x2000000}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, &(0x7f0000000240)=""/5, 0x2e, 0x5, 0x1}, 0x20) 20:46:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x3, [@enum={0x0, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x5f]}}, &(0x7f0000000240)=""/5, 0x3b, 0x5, 0x1}, 0x20) 20:46:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x3000000}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:28 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)={0x3, 0x0, @c}, 0x29, 0xfffffffffffffffd) 20:46:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:28 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="010300000000"], 0x1c}}, 0x0) 20:46:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x4, [@enum={0x0, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x0, 0x5f]}}, &(0x7f0000000240)=""/5, 0x3c, 0x5, 0x1}, 0x20) 20:46:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x3, [@enum={0x0, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x5f]}}, &(0x7f0000000240)=""/5, 0x3b, 0x5, 0x1}, 0x20) 20:46:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x4000000}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:28 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)={0x3, 0x0, @c}, 0x29, 0xfffffffffffffffd) 20:46:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x3, [@enum={0x0, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x5f]}}, &(0x7f0000000240)=""/5, 0x3b, 0x5, 0x1}, 0x20) 20:46:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x4, [@enum={0x0, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x0, 0x5f]}}, &(0x7f0000000240)=""/5, 0x3c, 0x5, 0x1}, 0x20) 20:46:28 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="010300000000"], 0x1c}}, 0x0) 20:46:28 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)={0x3, 0x0, @c}, 0x29, 0xfffffffffffffffd) 20:46:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x5000000}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x3, [@enum={0x0, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x5f]}}, &(0x7f0000000240)=""/5, 0x3b, 0x5, 0x1}, 0x20) 20:46:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, &(0x7f0000000240)=""/5, 0x2e, 0x5}, 0x20) 20:46:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x6000000}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x4, [@enum={0x0, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x0, 0x5f]}}, &(0x7f0000000240)=""/5, 0x3c, 0x5, 0x1}, 0x20) 20:46:28 executing program 0: add_key$fscrypt_provisioning(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)={0x3, 0x0, @c}, 0x29, 0xfffffffffffffffd) 20:46:28 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="010300000000"], 0x1c}}, 0x0) 20:46:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, &(0x7f0000000240)=""/5, 0x2e, 0x5}, 0x20) 20:46:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 20:46:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x7000000}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:28 executing program 0: add_key$fscrypt_provisioning(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)={0x3, 0x0, @c}, 0x29, 0xfffffffffffffffd) 20:46:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x4, [@enum={0x0, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x61, 0x5f]}}, 0x0, 0x3c, 0x0, 0x1}, 0x20) 20:46:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x8000000}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 20:46:28 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="010300000000000000"], 0x1c}}, 0x0) 20:46:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, &(0x7f0000000240)=""/5, 0x2e, 0x5}, 0x20) 20:46:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x9000000}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x4, [@enum={0x0, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x61, 0x5f]}}, 0x0, 0x3c}, 0x20) 20:46:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 20:46:29 executing program 3: add_key$fscrypt_provisioning(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)={0x3, 0x0, @c}, 0x29, 0xfffffffffffffffd) 20:46:29 executing program 0: add_key$fscrypt_provisioning(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)={0x3, 0x0, @c}, 0x29, 0xfffffffffffffffd) 20:46:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x1, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}, {0x0, [0x61, 0x61]}}, 0x0, 0x30, 0x0, 0x1}, 0x20) 20:46:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000240)=""/5, 0x0, 0x5, 0x1}, 0x20) 20:46:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0xa000000}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:29 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="010300000000000000"], 0x1c}}, 0x0) 20:46:29 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), 0xfffffffffffffffe, &(0x7f0000000080)=ANY=[@ANYBLOB="02000000000000006162056465666768696a6b6c6d6e6f707172737475767778797a30313233343536"], 0x29, 0x0) 20:46:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x1, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}, {0x0, [0x61, 0x61]}}, 0x0, 0x30, 0x0, 0x1}, 0x20) 20:46:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0xb000000}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:29 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(0x0, &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)={0x3, 0x0, @c}, 0x29, 0xfffffffffffffffd) 20:46:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000240)=""/5, 0x0, 0x5, 0x1}, 0x20) 20:46:29 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="010300000000000000"], 0x1c}}, 0x0) 20:46:29 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), 0xfffffffffffffffe, &(0x7f0000000080)=ANY=[@ANYBLOB="02000000000000006162056465666768696a6b6c6d6e6f707172737475767778797a30313233343536"], 0x29, 0x0) 20:46:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0xc000000}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x1, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}, {0x0, [0x61, 0x61]}}, 0x0, 0x30, 0x0, 0x1}, 0x20) 20:46:29 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="01030000000000000000"], 0x1c}}, 0x0) 20:46:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0xd000000}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:29 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(0x0, &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)={0x3, 0x0, @c}, 0x29, 0xfffffffffffffffd) 20:46:29 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfffff, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), 0xfffffffffffffffe, &(0x7f0000000080)=ANY=[@ANYBLOB="02000000000000006162056465666768696a6b6c6d6e6f707172737475767778797a30313233343536"], 0x29, 0x0) 20:46:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 20:46:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000240)=""/5, 0x0, 0x5, 0x1}, 0x20) 20:46:29 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="01030000000000000000"], 0x1c}}, 0x0) 20:46:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0xe000000}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 20:46:29 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000040), 0xfffffffffffffffe, &(0x7f0000000080)=ANY=[@ANYBLOB="02000000000000006162056465666768696a6b6c6d6e6f707172737475767778797a30313233343536"], 0x29, 0x0) 20:46:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x5, 0x4, [{0x1}]}]}, {0x0, [0x5f]}}, &(0x7f0000000240)=""/5, 0x2f, 0x5, 0x1}, 0x20) 20:46:29 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="01030000000000000000"], 0x1c}}, 0x0) 20:46:29 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(0x0, &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)={0x3, 0x0, @c}, 0x29, 0xfffffffffffffffd) 20:46:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0xf000000}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:29 executing program 3: add_key$fscrypt_provisioning(0x0, 0xfffffffffffffffe, &(0x7f0000000080)=ANY=[@ANYBLOB="02000000000000006162056465666768696a6b6c6d6e6f707172737475767778797a30313233343536"], 0x29, 0x0) 20:46:29 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 20:46:29 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, &(0x7f0000000200)={0x3, 0x0, @c}, 0x29, 0xfffffffffffffffd) 20:46:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x10000000}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x5, 0x4, [{0x1}]}]}, {0x0, [0x5f]}}, &(0x7f0000000240)=""/5, 0x2f, 0x5, 0x1}, 0x20) 20:46:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 20:46:29 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:29 executing program 3: add_key$fscrypt_provisioning(0x0, 0xfffffffffffffffe, &(0x7f0000000080)=ANY=[@ANYBLOB="02000000000000006162056465666768696a6b6c6d6e6f707172737475767778797a30313233343536"], 0x29, 0x0) 20:46:29 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffd) 20:46:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 20:46:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x11000000}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:29 executing program 3: add_key$fscrypt_provisioning(0x0, 0xfffffffffffffffe, &(0x7f0000000080)=ANY=[@ANYBLOB="02000000000000006162056465666768696a6b6c6d6e6f707172737475767778797a30313233343536"], 0x29, 0x0) 20:46:29 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x5, 0x4, [{0x1}]}]}, {0x0, [0x5f]}}, &(0x7f0000000240)=""/5, 0x2f, 0x5, 0x1}, 0x20) 20:46:29 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000040), 0xfffffffffffffffe, 0x0, 0x29, 0x0) 20:46:29 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x200000000000000) 20:46:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 20:46:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x12000000}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:29 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@volatile]}, {0x0, [0x5f]}}, &(0x7f0000000240)=""/5, 0x27, 0x5, 0x1}, 0x20) 20:46:29 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x2f, 0x0) 20:46:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x61, 0x61]}}, 0x0, 0x1c, 0x0, 0x1}, 0x20) 20:46:29 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1b, 0x0) 20:46:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@volatile]}, {0x0, [0x5f]}}, &(0x7f0000000240)=""/5, 0x27, 0x5, 0x1}, 0x20) 20:46:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x25000000}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:29 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1b, 0x0) 20:46:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x61, 0x61]}}, 0x0, 0x1c, 0x0, 0x1}, 0x20) 20:46:29 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:29 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x2f, 0x0) 20:46:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x61, 0x61]}}, 0x0, 0x1c, 0x0, 0x1}, 0x20) 20:46:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x48000000}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@volatile]}, {0x0, [0x5f]}}, &(0x7f0000000240)=""/5, 0x27, 0x5, 0x1}, 0x20) 20:46:29 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1b, 0x0) 20:46:29 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:29 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x2f, 0x0) 20:46:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}, {0x0, [0x61, 0x61]}}, 0x0, 0x30, 0x0, 0x1}, 0x20) 20:46:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x4c000000}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:29 executing program 0: prctl$PR_SET_SECUREBITS(0x1b, 0x0) 20:46:29 executing program 3: prctl$PR_SET_SECUREBITS(0x2f, 0x0) 20:46:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@enum={0x0, 0x0, 0x0, 0x5}, @volatile]}, {0x0, [0x5f]}}, &(0x7f0000000240)=""/5, 0x33, 0x5, 0x1}, 0x20) 20:46:29 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x51000000}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum]}, {0x0, [0x61, 0x61]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 20:46:29 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x18, 0x0) 20:46:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@enum={0x0, 0x0, 0x0, 0x5}, @volatile]}, {0x0, [0x5f]}}, &(0x7f0000000240)=""/5, 0x33, 0x5, 0x1}, 0x20) 20:46:29 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x17, 0x0) 20:46:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum]}, {0x0, [0x61, 0x61]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 20:46:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x68000000}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:29 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x18, 0x0) 20:46:29 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x6c000000}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:29 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x17, 0x0) 20:46:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@enum={0x0, 0x0, 0x0, 0x5}, @volatile]}, {0x0, [0x5f]}}, &(0x7f0000000240)=""/5, 0x33, 0x5, 0x1}, 0x20) 20:46:29 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x18, 0x0) 20:46:29 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum]}, {0x0, [0x61, 0x61]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 20:46:29 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x17, 0x0) 20:46:29 executing program 0: prctl$PR_SET_SECUREBITS(0x18, 0x0) 20:46:29 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x74000000}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x3, [@enum={0x0, 0x1, 0x0, 0x5, 0x4, [{}]}, @volatile]}, {0x0, [0x5f]}}, &(0x7f0000000240)=""/5, 0x3b, 0x5, 0x1}, 0x20) 20:46:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x61, 0x61]}}, 0x0, 0x30, 0x0, 0x1}, 0x20) 20:46:29 executing program 3: prctl$PR_SET_SECUREBITS(0x17, 0x0) 20:46:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x3, [@enum={0x0, 0x1, 0x0, 0x5, 0x4, [{}]}, @volatile]}, {0x0, [0x5f]}}, &(0x7f0000000240)=""/5, 0x3b, 0x5, 0x1}, 0x20) 20:46:29 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x8, 0x0) 20:46:29 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x7a000000}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x61, 0x61]}}, 0x0, 0x30, 0x0, 0x1}, 0x20) 20:46:29 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x8, 0x0) 20:46:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x3, [@enum={0x0, 0x1, 0x0, 0x5, 0x4, [{}]}, @volatile]}, {0x0, [0x5f]}}, &(0x7f0000000240)=""/5, 0x3b, 0x5, 0x1}, 0x20) 20:46:29 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x7, 0x0) 20:46:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x61, 0x61]}}, 0x0, 0x30, 0x0, 0x1}, 0x20) 20:46:29 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x8, 0x0) 20:46:29 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x2, [@enum={0x0, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}}, &(0x7f0000000240)=""/5, 0x3a, 0x5, 0x1}, 0x20) 20:46:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x2}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}, {0x0, [0x61]}}, 0x0, 0x2f, 0x0, 0x1}, 0x20) 20:46:29 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x7, 0x0) 20:46:29 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c00", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:29 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x0) 20:46:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x3}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x2, [@enum={0x0, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}}, &(0x7f0000000240)=""/5, 0x3a, 0x5, 0x1}, 0x20) 20:46:29 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x7, 0x0) 20:46:29 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x0) (fail_nth: 1) 20:46:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x2, [@enum={0x0, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}}, &(0x7f0000000240)=""/5, 0x3a, 0x5, 0x1}, 0x20) 20:46:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:29 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c00", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x4}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:29 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c00", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x3, [@enum={0x0, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/5, 0x3b, 0x5, 0x1}, 0x20) 20:46:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x5}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) [ 1285.702765][ T7138] FAULT_INJECTION: forcing a failure. [ 1285.702765][ T7138] name failslab, interval 1, probability 0, space 0, times 0 [ 1285.715477][ T7138] CPU: 1 PID: 7138 Comm: syz-executor.0 Not tainted 6.5.0-rc5-syzkaller-00243-g9106536c1aa3 #0 [ 1285.726348][ T7138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1285.737551][ T7138] Call Trace: [ 1285.740840][ T7138] [ 1285.744038][ T7138] dump_stack_lvl+0xda/0x130 [ 1285.748658][ T7138] dump_stack+0x15/0x20 20:46:29 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c0000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x3, [@enum={0x0, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/5, 0x3b, 0x5, 0x1}, 0x20) 20:46:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x6}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) [ 1285.753026][ T7138] should_fail_ex+0x21f/0x230 [ 1285.757817][ T7138] __should_failslab+0x92/0xa0 [ 1285.763037][ T7138] should_failslab+0x9/0x20 [ 1285.767644][ T7138] slab_pre_alloc_hook+0x38/0x180 [ 1285.772770][ T7138] kmem_cache_alloc+0x52/0x220 [ 1285.777633][ T7138] ? prepare_creds+0x36/0x420 [ 1285.782325][ T7138] prepare_creds+0x36/0x420 [ 1285.786840][ T7138] cap_task_prctl+0x2bf/0x5b0 [ 1285.791588][ T7138] security_task_prctl+0x64/0xe0 [ 1285.796544][ T7138] __se_sys_prctl+0x79/0x1de0 20:46:29 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x0) [ 1285.801306][ T7138] ? _parse_integer_limit+0x163/0x180 [ 1285.806871][ T7138] ? _parse_integer+0x27/0x30 [ 1285.811822][ T7138] ? kstrtoull+0x110/0x140 [ 1285.816248][ T7138] ? kstrtouint_from_user+0xb0/0xe0 [ 1285.821457][ T7138] ? 0xffffffff81000000 [ 1285.825607][ T7138] ? __rcu_read_unlock+0x4d/0x70 [ 1285.830657][ T7138] ? get_pid_task+0x8e/0xc0 [ 1285.835173][ T7138] ? proc_fail_nth_write+0x129/0x150 [ 1285.840573][ T7138] ? proc_fail_nth_read+0x140/0x140 [ 1285.845799][ T7138] ? vfs_write+0x676/0x7d0 [ 1285.850397][ T7138] ? __fget_files+0x1c4/0x200 [ 1285.855163][ T7138] ? mutex_lock+0xd/0x30 [ 1285.859408][ T7138] ? fput+0x112/0x140 [ 1285.863499][ T7138] ? fpregs_assert_state_consistent+0x80/0x90 [ 1285.869632][ T7138] __x64_sys_prctl+0x67/0x80 [ 1285.874205][ T7138] do_syscall_64+0x41/0xc0 [ 1285.878722][ T7138] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1285.884653][ T7138] RIP: 0033:0x7f2b1b0caae9 [ 1285.889051][ T7138] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1285.908703][ T7138] RSP: 002b:00007f2b1a44d0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000009d [ 1285.917097][ T7138] RAX: ffffffffffffffda RBX: 00007f2b1b1e9f80 RCX: 00007f2b1b0caae9 [ 1285.925240][ T7138] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 1285.933354][ T7138] RBP: 00007f2b1a44d120 R08: 0000000000000000 R09: 0000000000000000 [ 1285.941315][ T7138] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 20:46:30 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x0) (fail_nth: 2) 20:46:30 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c0000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:30 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x3, [@enum={0x0, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/5, 0x3b, 0x5, 0x1}, 0x20) 20:46:30 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x7}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:30 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e}, 0x20) 20:46:30 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x0) (fail_nth: 1) 20:46:30 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c0000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:30 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e}, 0x20) 20:46:30 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x8}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:30 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x3, [@enum={0x0, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x5f]}}, 0x0, 0x3b, 0x0, 0x1}, 0x20) [ 1285.949272][ T7138] R13: 000000000000000b R14: 00007f2b1b1e9f80 R15: 00007ffd57314b78 [ 1285.957263][ T7138] 20:46:30 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x9}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:30 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x3, [@enum={0x0, 0x1, 0x0, 0x5, 0x4, [{0x1}]}, @volatile]}, {0x0, [0x5f]}}, 0x0, 0x3b}, 0x20) [ 1286.008451][ T7174] FAULT_INJECTION: forcing a failure. [ 1286.008451][ T7174] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1286.021555][ T7174] CPU: 1 PID: 7174 Comm: syz-executor.3 Not tainted 6.5.0-rc5-syzkaller-00243-g9106536c1aa3 #0 [ 1286.031898][ T7174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1286.041998][ T7174] Call Trace: [ 1286.045394][ T7174] [ 1286.048334][ T7174] dump_stack_lvl+0xda/0x130 [ 1286.052942][ T7174] dump_stack+0x15/0x20 [ 1286.057111][ T7174] should_fail_ex+0x21f/0x230 [ 1286.061869][ T7174] should_fail+0xb/0x10 [ 1286.066118][ T7174] should_fail_usercopy+0x1a/0x20 [ 1286.071165][ T7174] _copy_to_user+0x1e/0x90 [ 1286.071343][ T7184] FAULT_INJECTION: forcing a failure. [ 1286.071343][ T7184] name failslab, interval 1, probability 0, space 0, times 0 [ 1286.075708][ T7174] simple_read_from_buffer+0xa0/0x110 [ 1286.075742][ T7174] proc_fail_nth_read+0xfc/0x140 [ 1286.075766][ T7174] ? proc_fault_inject_write+0x210/0x210 [ 1286.075865][ T7174] vfs_read+0x19f/0x5c0 [ 1286.108510][ T7174] ? __fget_files+0x1c4/0x200 [ 1286.113186][ T7174] ? mutex_lock+0xd/0x30 [ 1286.117451][ T7174] ksys_read+0xeb/0x1a0 [ 1286.121695][ T7174] __x64_sys_read+0x42/0x50 [ 1286.126207][ T7174] do_syscall_64+0x41/0xc0 [ 1286.130633][ T7174] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1286.136537][ T7174] RIP: 0033:0x7fa35cc8b78c [ 1286.140944][ T7174] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 59 81 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 af 81 02 00 48 [ 1286.160644][ T7174] RSP: 002b:00007fa35c00f0c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1286.169173][ T7174] RAX: ffffffffffffffda RBX: 00007fa35cdabf80 RCX: 00007fa35cc8b78c [ 1286.177253][ T7174] RDX: 000000000000000f RSI: 00007fa35c00f130 RDI: 0000000000000003 [ 1286.185218][ T7174] RBP: 00007fa35c00f120 R08: 0000000000000000 R09: 0000000000000000 [ 1286.193189][ T7174] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1286.201233][ T7174] R13: 000000000000000b R14: 00007fa35cdabf80 R15: 00007ffcffe6e3e8 [ 1286.209240][ T7174] [ 1286.212349][ T7184] CPU: 0 PID: 7184 Comm: syz-executor.0 Not tainted 6.5.0-rc5-syzkaller-00243-g9106536c1aa3 #0 [ 1286.222872][ T7184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1286.233002][ T7184] Call Trace: [ 1286.236317][ T7184] [ 1286.239245][ T7184] dump_stack_lvl+0xda/0x130 [ 1286.243844][ T7184] dump_stack+0x15/0x20 [ 1286.248045][ T7184] should_fail_ex+0x21f/0x230 [ 1286.252761][ T7184] ? security_prepare_creds+0x4c/0xf0 [ 1286.258118][ T7184] __should_failslab+0x92/0xa0 [ 1286.262863][ T7184] should_failslab+0x9/0x20 [ 1286.267447][ T7184] slab_pre_alloc_hook+0x38/0x180 [ 1286.272474][ T7184] ? security_prepare_creds+0x4c/0xf0 [ 1286.277831][ T7184] ? security_prepare_creds+0x4c/0xf0 [ 1286.283299][ T7184] __kmem_cache_alloc_node+0x48/0x1d0 [ 1286.288719][ T7184] ? security_prepare_creds+0x4c/0xf0 [ 1286.294096][ T7184] __kmalloc+0x95/0x1a0 [ 1286.298338][ T7184] ? kmem_cache_alloc+0x10f/0x220 [ 1286.303403][ T7184] security_prepare_creds+0x4c/0xf0 [ 1286.308644][ T7184] prepare_creds+0x309/0x420 [ 1286.313225][ T7184] cap_task_prctl+0x2bf/0x5b0 [ 1286.317893][ T7184] security_task_prctl+0x64/0xe0 [ 1286.322816][ T7184] __se_sys_prctl+0x79/0x1de0 [ 1286.327479][ T7184] ? _parse_integer_limit+0x163/0x180 [ 1286.332832][ T7184] ? _parse_integer+0x27/0x30 [ 1286.337571][ T7184] ? kstrtoull+0x110/0x140 [ 1286.341991][ T7184] ? kstrtouint_from_user+0xb0/0xe0 [ 1286.347251][ T7184] ? 0xffffffff81000000 [ 1286.351388][ T7184] ? __rcu_read_unlock+0x4d/0x70 [ 1286.356332][ T7184] ? get_pid_task+0x8e/0xc0 [ 1286.360818][ T7184] ? proc_fail_nth_write+0x129/0x150 [ 1286.366183][ T7184] ? proc_fail_nth_read+0x140/0x140 [ 1286.371367][ T7184] ? vfs_write+0x676/0x7d0 [ 1286.375850][ T7184] ? __fget_files+0x1c4/0x200 [ 1286.380528][ T7184] ? mutex_lock+0xd/0x30 [ 1286.384755][ T7184] ? fput+0x112/0x140 [ 1286.388717][ T7184] ? fpregs_assert_state_consistent+0x80/0x90 [ 1286.394851][ T7184] __x64_sys_prctl+0x67/0x80 [ 1286.399447][ T7184] do_syscall_64+0x41/0xc0 [ 1286.403941][ T7184] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1286.409817][ T7184] RIP: 0033:0x7f2b1b0caae9 [ 1286.414209][ T7184] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1286.433882][ T7184] RSP: 002b:00007f2b1a44d0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000009d [ 1286.442279][ T7184] RAX: ffffffffffffffda RBX: 00007f2b1b1e9f80 RCX: 00007f2b1b0caae9 [ 1286.450288][ T7184] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 20:46:30 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x0) (fail_nth: 3) 20:46:30 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0xa}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:30 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e}, 0x20) 20:46:30 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e}, 0x20) 20:46:30 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x0) 20:46:30 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) (fail_nth: 1) 20:46:30 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e}, 0x20) 20:46:30 executing program 3: prctl$PR_SET_SECUREBITS(0x8, 0x0) [ 1286.458269][ T7184] RBP: 00007f2b1a44d120 R08: 0000000000000000 R09: 0000000000000000 [ 1286.466226][ T7184] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1286.474275][ T7184] R13: 000000000000000b R14: 00007f2b1b1e9f80 R15: 00007ffd57314b78 [ 1286.482260][ T7184] [ 1286.519508][ T7195] FAULT_INJECTION: forcing a failure. [ 1286.519508][ T7195] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1286.532600][ T7195] CPU: 0 PID: 7195 Comm: syz-executor.5 Not tainted 6.5.0-rc5-syzkaller-00243-g9106536c1aa3 #0 [ 1286.543049][ T7195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1286.550695][ T7199] FAULT_INJECTION: forcing a failure. [ 1286.550695][ T7199] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1286.553089][ T7195] Call Trace: [ 1286.553096][ T7195] [ 1286.553109][ T7195] dump_stack_lvl+0xda/0x130 [ 1286.576923][ T7195] dump_stack+0x15/0x20 [ 1286.581075][ T7195] should_fail_ex+0x21f/0x230 [ 1286.585740][ T7195] should_fail+0xb/0x10 [ 1286.589881][ T7195] should_fail_usercopy+0x1a/0x20 [ 1286.594974][ T7195] _copy_from_user+0x1e/0xd0 [ 1286.599596][ T7195] copy_msghdr_from_user+0x54/0x2a0 [ 1286.604864][ T7195] __sys_sendmsg+0x17d/0x270 [ 1286.609452][ T7195] __x64_sys_sendmsg+0x46/0x50 [ 1286.614366][ T7195] do_syscall_64+0x41/0xc0 [ 1286.618828][ T7195] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1286.624911][ T7195] RIP: 0033:0x7f506b37dae9 [ 1286.629357][ T7195] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1286.649030][ T7195] RSP: 002b:00007f506a7000c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1286.657475][ T7195] RAX: ffffffffffffffda RBX: 00007f506b49cf80 RCX: 00007f506b37dae9 20:46:30 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) (fail_nth: 1) 20:46:30 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0xb}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) [ 1286.665436][ T7195] RDX: 0000000000000000 RSI: 0000000020000300 RDI: 0000000000000004 [ 1286.673391][ T7195] RBP: 00007f506a700120 R08: 0000000000000000 R09: 0000000000000000 [ 1286.681350][ T7195] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1286.689368][ T7195] R13: 000000000000000b R14: 00007f506b49cf80 R15: 00007ffe82ed59a8 [ 1286.697359][ T7195] [ 1286.700374][ T7199] CPU: 1 PID: 7199 Comm: syz-executor.0 Not tainted 6.5.0-rc5-syzkaller-00243-g9106536c1aa3 #0 20:46:30 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e}, 0x20) 20:46:30 executing program 3: prctl$PR_SET_SECUREBITS(0x17, 0x0) [ 1286.710729][ T7199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1286.720908][ T7199] Call Trace: [ 1286.724220][ T7199] [ 1286.727208][ T7199] dump_stack_lvl+0xda/0x130 [ 1286.731938][ T7199] dump_stack+0x15/0x20 [ 1286.736104][ T7199] should_fail_ex+0x21f/0x230 [ 1286.740788][ T7199] should_fail+0xb/0x10 [ 1286.744994][ T7199] should_fail_usercopy+0x1a/0x20 [ 1286.750020][ T7199] _copy_to_user+0x1e/0x90 [ 1286.753033][ T7205] FAULT_INJECTION: forcing a failure. [ 1286.753033][ T7205] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1286.754431][ T7199] simple_read_from_buffer+0xa0/0x110 [ 1286.772978][ T7199] proc_fail_nth_read+0xfc/0x140 [ 1286.777914][ T7199] ? proc_fault_inject_write+0x210/0x210 [ 1286.783642][ T7199] vfs_read+0x19f/0x5c0 [ 1286.787790][ T7199] ? __fget_files+0x1c4/0x200 [ 1286.792463][ T7199] ? mutex_lock+0xd/0x30 [ 1286.796694][ T7199] ksys_read+0xeb/0x1a0 [ 1286.800955][ T7199] __x64_sys_read+0x42/0x50 [ 1286.805450][ T7199] do_syscall_64+0x41/0xc0 [ 1286.809932][ T7199] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1286.815940][ T7199] RIP: 0033:0x7f2b1b0c978c [ 1286.820384][ T7199] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 59 81 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 af 81 02 00 48 [ 1286.840081][ T7199] RSP: 002b:00007f2b1a44d0c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1286.848477][ T7199] RAX: ffffffffffffffda RBX: 00007f2b1b1e9f80 RCX: 00007f2b1b0c978c [ 1286.856465][ T7199] RDX: 000000000000000f RSI: 00007f2b1a44d130 RDI: 0000000000000003 [ 1286.864440][ T7199] RBP: 00007f2b1a44d120 R08: 0000000000000000 R09: 0000000000000000 [ 1286.872396][ T7199] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1286.880353][ T7199] R13: 000000000000000b R14: 00007f2b1b1e9f80 R15: 00007ffd57314b78 [ 1286.888311][ T7199] [ 1286.891315][ T7205] CPU: 0 PID: 7205 Comm: syz-executor.1 Not tainted 6.5.0-rc5-syzkaller-00243-g9106536c1aa3 #0 [ 1286.901653][ T7205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1286.911747][ T7205] Call Trace: [ 1286.915088][ T7205] 20:46:31 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x0) 20:46:31 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) (fail_nth: 2) 20:46:31 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0xc}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:31 executing program 3: prctl$PR_SET_SECUREBITS(0x18, 0x0) 20:46:31 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 20:46:31 executing program 0: prctl$PR_SET_SECUREBITS(0x7, 0x0) 20:46:31 executing program 0: prctl$PR_SET_SECUREBITS(0x17, 0x0) [ 1286.918025][ T7205] dump_stack_lvl+0xda/0x130 [ 1286.922715][ T7205] dump_stack+0x15/0x20 [ 1286.926876][ T7205] should_fail_ex+0x21f/0x230 [ 1286.931561][ T7205] should_fail+0xb/0x10 [ 1286.935728][ T7205] should_fail_usercopy+0x1a/0x20 [ 1286.940755][ T7205] _copy_from_user+0x1e/0xd0 [ 1286.945372][ T7205] __sys_bpf+0x14e/0x780 [ 1286.949625][ T7205] __x64_sys_bpf+0x43/0x50 [ 1286.954047][ T7205] do_syscall_64+0x41/0xc0 [ 1286.958518][ T7205] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1286.964417][ T7205] RIP: 0033:0x7ff67c466ae9 20:46:31 executing program 0: prctl$PR_SET_SECUREBITS(0x18, 0x0) [ 1286.968920][ T7205] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1286.988602][ T7205] RSP: 002b:00007ff67b7e90c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1286.997035][ T7205] RAX: ffffffffffffffda RBX: 00007ff67c585f80 RCX: 00007ff67c466ae9 [ 1287.005029][ T7205] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000012 [ 1287.013007][ T7205] RBP: 00007ff67b7e9120 R08: 0000000000000000 R09: 0000000000000000 [ 1287.021138][ T7205] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1287.024435][ T7222] FAULT_INJECTION: forcing a failure. [ 1287.024435][ T7222] name failslab, interval 1, probability 0, space 0, times 0 [ 1287.029102][ T7205] R13: 000000000000000b R14: 00007ff67c585f80 R15: 00007fff657eb078 [ 1287.029122][ T7205] [ 1287.052705][ T7222] CPU: 1 PID: 7222 Comm: syz-executor.5 Not tainted 6.5.0-rc5-syzkaller-00243-g9106536c1aa3 #0 20:46:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) (fail_nth: 2) 20:46:31 executing program 0: prctl$PR_SET_SECUREBITS(0x1b, 0x0) 20:46:31 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 20:46:31 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0xd}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:31 executing program 3: prctl$PR_SET_SECUREBITS(0x1b, 0x0) [ 1287.063076][ T7222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1287.073215][ T7222] Call Trace: [ 1287.076494][ T7222] [ 1287.079442][ T7222] dump_stack_lvl+0xda/0x130 [ 1287.084177][ T7222] dump_stack+0x15/0x20 [ 1287.088519][ T7222] should_fail_ex+0x21f/0x230 [ 1287.093259][ T7222] __should_failslab+0x92/0xa0 [ 1287.098109][ T7222] should_failslab+0x9/0x20 [ 1287.102686][ T7222] slab_pre_alloc_hook+0x38/0x180 [ 1287.107816][ T7222] kmem_cache_alloc_node+0x54/0x240 [ 1287.113041][ T7222] ? __alloc_skb+0x109/0x2e0 [ 1287.117641][ T7222] __alloc_skb+0x109/0x2e0 [ 1287.122130][ T7222] netlink_sendmsg+0x483/0x770 [ 1287.126977][ T7222] ? netlink_getsockopt+0x3e0/0x3e0 [ 1287.132244][ T7222] ____sys_sendmsg+0x37c/0x4d0 [ 1287.137046][ T7222] __sys_sendmsg+0x1e9/0x270 [ 1287.141655][ T7222] __x64_sys_sendmsg+0x46/0x50 [ 1287.146524][ T7222] do_syscall_64+0x41/0xc0 [ 1287.150988][ T7222] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1287.156897][ T7222] RIP: 0033:0x7f506b37dae9 [ 1287.161318][ T7222] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1287.180946][ T7222] RSP: 002b:00007f506a7000c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1287.189346][ T7222] RAX: ffffffffffffffda RBX: 00007f506b49cf80 RCX: 00007f506b37dae9 [ 1287.197302][ T7222] RDX: 0000000000000000 RSI: 0000000020000300 RDI: 0000000000000004 [ 1287.205350][ T7222] RBP: 00007f506a700120 R08: 0000000000000000 R09: 0000000000000000 [ 1287.213382][ T7222] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 20:46:31 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) (fail_nth: 3) 20:46:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) (fail_nth: 3) 20:46:31 executing program 3: prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:31 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 20:46:31 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0xe}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:31 executing program 0: prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) (fail_nth: 4) 20:46:31 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0xf}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:31 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, 0x0}, 0x20) 20:46:31 executing program 3: prctl$PR_SET_SECUREBITS(0x2f, 0x0) [ 1287.221337][ T7222] R13: 000000000000000b R14: 00007f506b49cf80 R15: 00007ffe82ed59a8 [ 1287.229309][ T7222] 20:46:31 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) (fail_nth: 4) 20:46:31 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x10}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:31 executing program 0: prctl$PR_SET_SECUREBITS(0x2f, 0x0) 20:46:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) (fail_nth: 5) 20:46:31 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, 0x0}, 0x20) 20:46:31 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x2) 20:46:31 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x11}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:31 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, 0x0}, 0x20) 20:46:31 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0xdaffffff) [ 1287.337017][ T7269] FAULT_INJECTION: forcing a failure. [ 1287.337017][ T7269] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1287.348394][ T7268] FAULT_INJECTION: forcing a failure. [ 1287.348394][ T7268] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1287.350172][ T7269] CPU: 1 PID: 7269 Comm: syz-executor.1 Not tainted 6.5.0-rc5-syzkaller-00243-g9106536c1aa3 #0 [ 1287.373420][ T7269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1287.383464][ T7269] Call Trace: [ 1287.386728][ T7269] [ 1287.389647][ T7269] dump_stack_lvl+0xda/0x130 [ 1287.394309][ T7269] dump_stack+0x15/0x20 [ 1287.398581][ T7269] should_fail_ex+0x21f/0x230 [ 1287.403302][ T7269] should_fail+0xb/0x10 [ 1287.407445][ T7269] should_fail_usercopy+0x1a/0x20 [ 1287.412587][ T7269] _copy_from_user+0x1e/0xd0 [ 1287.417336][ T7269] btf_new_fd+0x1f0/0x6b0 [ 1287.421655][ T7269] bpf_btf_load+0x71/0x90 [ 1287.425976][ T7269] __sys_bpf+0x649/0x780 [ 1287.430213][ T7269] __x64_sys_bpf+0x43/0x50 [ 1287.434618][ T7269] do_syscall_64+0x41/0xc0 [ 1287.439032][ T7269] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1287.444915][ T7269] RIP: 0033:0x7ff67c466ae9 [ 1287.449365][ T7269] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1287.469014][ T7269] RSP: 002b:00007ff67b7e90c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1287.477432][ T7269] RAX: ffffffffffffffda RBX: 00007ff67c585f80 RCX: 00007ff67c466ae9 [ 1287.485428][ T7269] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000012 [ 1287.493384][ T7269] RBP: 00007ff67b7e9120 R08: 0000000000000000 R09: 0000000000000000 [ 1287.501357][ T7269] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1287.509389][ T7269] R13: 000000000000000b R14: 00007ff67c585f80 R15: 00007fff657eb078 [ 1287.517360][ T7269] [ 1287.520366][ T7268] CPU: 0 PID: 7268 Comm: syz-executor.5 Not tainted 6.5.0-rc5-syzkaller-00243-g9106536c1aa3 #0 20:46:31 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x1000000) 20:46:31 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x12}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:31 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x2000000) [ 1287.530850][ T7268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1287.540944][ T7268] Call Trace: [ 1287.544271][ T7268] [ 1287.547204][ T7268] dump_stack_lvl+0xda/0x130 [ 1287.551864][ T7268] dump_stack+0x15/0x20 [ 1287.556100][ T7268] should_fail_ex+0x21f/0x230 [ 1287.560944][ T7268] should_fail+0xb/0x10 [ 1287.565108][ T7268] should_fail_usercopy+0x1a/0x20 [ 1287.570178][ T7268] _copy_from_iter+0xd8/0xa40 [ 1287.574999][ T7268] ? kmalloc_reserve+0xfb/0x190 [ 1287.579858][ T7268] ? __build_skb_around+0x196/0x1f0 [ 1287.585069][ T7268] ? __virt_addr_valid+0x16a/0x1b0 [ 1287.590199][ T7268] ? __check_object_size+0x363/0x520 [ 1287.595501][ T7268] netlink_sendmsg+0x53c/0x770 [ 1287.600363][ T7268] ? netlink_getsockopt+0x3e0/0x3e0 [ 1287.605569][ T7268] ____sys_sendmsg+0x37c/0x4d0 [ 1287.610403][ T7268] __sys_sendmsg+0x1e9/0x270 [ 1287.615133][ T7268] __x64_sys_sendmsg+0x46/0x50 [ 1287.619925][ T7268] do_syscall_64+0x41/0xc0 [ 1287.624372][ T7268] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1287.630276][ T7268] RIP: 0033:0x7f506b37dae9 [ 1287.634704][ T7268] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1287.654329][ T7268] RSP: 002b:00007f506a7000c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1287.662871][ T7268] RAX: ffffffffffffffda RBX: 00007f506b49cf80 RCX: 00007f506b37dae9 [ 1287.670855][ T7268] RDX: 0000000000000000 RSI: 0000000020000300 RDI: 0000000000000004 [ 1287.678805][ T7268] RBP: 00007f506a700120 R08: 0000000000000000 R09: 0000000000000000 20:46:31 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) (fail_nth: 5) 20:46:31 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x25}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:31 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0xdaffffff) 20:46:31 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 20:46:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) (fail_nth: 6) 20:46:31 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0xffffffda) 20:46:31 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0xffffffda) 20:46:31 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x48}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) [ 1287.686886][ T7268] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1287.694907][ T7268] R13: 000000000000000b R14: 00007f506b49cf80 R15: 00007ffe82ed59a8 [ 1287.702863][ T7268] [ 1287.725021][ T7287] FAULT_INJECTION: forcing a failure. [ 1287.725021][ T7287] name fail_usercopy, interval 1, probability 0, space 0, times 0 20:46:31 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x4c}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:31 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x100000000000000) [ 1287.738307][ T7287] CPU: 0 PID: 7287 Comm: syz-executor.1 Not tainted 6.5.0-rc5-syzkaller-00243-g9106536c1aa3 #0 [ 1287.748647][ T7287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1287.758717][ T7287] Call Trace: [ 1287.762000][ T7287] [ 1287.764989][ T7287] dump_stack_lvl+0xda/0x130 [ 1287.769659][ T7287] dump_stack+0x15/0x20 [ 1287.773927][ T7287] should_fail_ex+0x21f/0x230 [ 1287.778618][ T7287] should_fail+0xb/0x10 [ 1287.782780][ T7287] should_fail_usercopy+0x1a/0x20 20:46:31 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 20:46:31 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x51}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) [ 1287.787812][ T7287] _copy_to_user+0x1e/0x90 [ 1287.792324][ T7287] btf_new_fd+0x2e5/0x6b0 [ 1287.796666][ T7287] bpf_btf_load+0x71/0x90 [ 1287.800999][ T7287] __sys_bpf+0x649/0x780 [ 1287.805253][ T7287] __x64_sys_bpf+0x43/0x50 [ 1287.809671][ T7287] do_syscall_64+0x41/0xc0 [ 1287.814189][ T7287] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1287.820104][ T7287] RIP: 0033:0x7ff67c466ae9 [ 1287.824523][ T7287] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1287.844149][ T7287] RSP: 002b:00007ff67b7e90c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1287.852646][ T7287] RAX: ffffffffffffffda RBX: 00007ff67c585f80 RCX: 00007ff67c466ae9 [ 1287.860625][ T7287] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000012 [ 1287.866407][ T7303] FAULT_INJECTION: forcing a failure. [ 1287.866407][ T7303] name failslab, interval 1, probability 0, space 0, times 0 [ 1287.868589][ T7287] RBP: 00007ff67b7e9120 R08: 0000000000000000 R09: 0000000000000000 [ 1287.889259][ T7287] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1287.897245][ T7287] R13: 000000000000000b R14: 00007ff67c585f80 R15: 00007fff657eb078 [ 1287.905223][ T7287] [ 1287.908325][ T7303] CPU: 1 PID: 7303 Comm: syz-executor.5 Not tainted 6.5.0-rc5-syzkaller-00243-g9106536c1aa3 #0 [ 1287.918723][ T7303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1287.928809][ T7303] Call Trace: [ 1287.932159][ T7303] [ 1287.935080][ T7303] dump_stack_lvl+0xda/0x130 [ 1287.939723][ T7303] dump_stack+0x15/0x20 [ 1287.943868][ T7303] should_fail_ex+0x21f/0x230 [ 1287.948526][ T7303] ? genl_family_rcv_msg_attrs_parse+0x75/0x1a0 [ 1287.954760][ T7303] __should_failslab+0x92/0xa0 [ 1287.959565][ T7303] should_failslab+0x9/0x20 [ 1287.964082][ T7303] slab_pre_alloc_hook+0x38/0x180 [ 1287.969188][ T7303] ? genl_family_rcv_msg_attrs_parse+0x75/0x1a0 [ 1287.975478][ T7303] ? genl_family_rcv_msg_attrs_parse+0x75/0x1a0 [ 1287.981753][ T7303] __kmem_cache_alloc_node+0x48/0x1d0 [ 1287.987162][ T7303] ? genl_family_rcv_msg_attrs_parse+0x75/0x1a0 [ 1287.993388][ T7303] __kmalloc+0x95/0x1a0 [ 1287.997526][ T7303] genl_family_rcv_msg_attrs_parse+0x75/0x1a0 [ 1288.003997][ T7303] ? __rcu_read_unlock+0x33/0x70 [ 1288.008959][ T7303] genl_start+0xea/0x2b0 [ 1288.013231][ T7303] __netlink_dump_start+0x30f/0x510 [ 1288.018445][ T7303] genl_rcv_msg+0x479/0x720 [ 1288.023078][ T7303] ? nl802154_get_wpan_phy+0xf0/0xf0 [ 1288.028348][ T7303] ? nl802154_dump_wpan_phy+0x4c0/0x4c0 [ 1288.033881][ T7303] ? genl_rcv_msg+0x720/0x720 [ 1288.038613][ T7303] ? genl_start+0x2b0/0x2b0 [ 1288.043183][ T7303] ? genl_lock_dumpit+0x60/0x60 [ 1288.048027][ T7303] netlink_rcv_skb+0x126/0x220 [ 1288.052845][ T7303] ? genl_bind+0x1b0/0x1b0 [ 1288.057297][ T7303] genl_rcv+0x28/0x40 [ 1288.061320][ T7303] netlink_unicast+0x56f/0x640 [ 1288.066071][ T7303] netlink_sendmsg+0x665/0x770 [ 1288.070864][ T7303] ? netlink_getsockopt+0x3e0/0x3e0 [ 1288.076068][ T7303] ____sys_sendmsg+0x37c/0x4d0 [ 1288.080896][ T7303] __sys_sendmsg+0x1e9/0x270 [ 1288.085570][ T7303] __x64_sys_sendmsg+0x46/0x50 [ 1288.090465][ T7303] do_syscall_64+0x41/0xc0 [ 1288.094944][ T7303] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1288.100836][ T7303] RIP: 0033:0x7f506b37dae9 [ 1288.105245][ T7303] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1288.124921][ T7303] RSP: 002b:00007f506a7000c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 20:46:32 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) (fail_nth: 6) 20:46:32 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x200000000000000) 20:46:32 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 20:46:32 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x68}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:32 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0xdaffffff00000000) 20:46:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) (fail_nth: 7) [ 1288.133375][ T7303] RAX: ffffffffffffffda RBX: 00007f506b49cf80 RCX: 00007f506b37dae9 [ 1288.141414][ T7303] RDX: 0000000000000000 RSI: 0000000020000300 RDI: 0000000000000004 [ 1288.149369][ T7303] RBP: 00007f506a700120 R08: 0000000000000000 R09: 0000000000000000 [ 1288.157319][ T7303] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1288.165272][ T7303] R13: 000000000000000b R14: 00007f506b49cf80 R15: 00007ffe82ed59a8 [ 1288.173291][ T7303] [ 1288.201974][ T7313] FAULT_INJECTION: forcing a failure. [ 1288.201974][ T7313] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1288.215106][ T7313] CPU: 1 PID: 7313 Comm: syz-executor.1 Not tainted 6.5.0-rc5-syzkaller-00243-g9106536c1aa3 #0 [ 1288.225653][ T7313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1288.235718][ T7313] Call Trace: [ 1288.239147][ T7313] [ 1288.242078][ T7313] dump_stack_lvl+0xda/0x130 [ 1288.246777][ T7313] dump_stack+0x15/0x20 20:46:32 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x5c, 0x0, 0x20, 0x70bd27, 0x25dfdbff, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x4}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @broadcast}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x7}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x3f}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40000) 20:46:32 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26}, 0x20) 20:46:32 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0xdaffffff00000000) 20:46:32 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x6c}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:32 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x5c, 0x0, 0x20, 0x70bd27, 0x25dfdbff, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x4}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @broadcast}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x7}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x3f}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40000) 20:46:32 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x74}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) [ 1288.250957][ T7313] should_fail_ex+0x21f/0x230 [ 1288.255645][ T7313] should_fail+0xb/0x10 [ 1288.259885][ T7313] should_fail_usercopy+0x1a/0x20 [ 1288.264928][ T7313] _copy_to_user+0x1e/0x90 [ 1288.269346][ T7313] simple_read_from_buffer+0xa0/0x110 [ 1288.274828][ T7313] proc_fail_nth_read+0xfc/0x140 [ 1288.279837][ T7313] ? proc_fault_inject_write+0x210/0x210 [ 1288.285645][ T7313] vfs_read+0x19f/0x5c0 [ 1288.289584][ T7325] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1288.289809][ T7313] ? __fget_files+0x1c4/0x200 [ 1288.299099][ T7325] FAULT_INJECTION: forcing a failure. [ 1288.299099][ T7325] name failslab, interval 1, probability 0, space 0, times 0 [ 1288.303731][ T7313] ? mutex_lock+0xd/0x30 [ 1288.320919][ T7313] ksys_read+0xeb/0x1a0 [ 1288.325139][ T7313] __x64_sys_read+0x42/0x50 [ 1288.329788][ T7313] do_syscall_64+0x41/0xc0 [ 1288.334300][ T7313] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1288.340240][ T7313] RIP: 0033:0x7ff67c46578c [ 1288.344645][ T7313] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 59 81 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 af 81 02 00 48 [ 1288.364368][ T7313] RSP: 002b:00007ff67b7e90c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1288.372785][ T7313] RAX: ffffffffffffffda RBX: 00007ff67c585f80 RCX: 00007ff67c46578c [ 1288.380805][ T7313] RDX: 000000000000000f RSI: 00007ff67b7e9130 RDI: 0000000000000003 [ 1288.388773][ T7313] RBP: 00007ff67b7e9120 R08: 0000000000000000 R09: 0000000000000000 [ 1288.396805][ T7313] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1288.404760][ T7313] R13: 000000000000000b R14: 00007ff67c585f80 R15: 00007fff657eb078 [ 1288.412751][ T7313] [ 1288.415754][ T7325] CPU: 0 PID: 7325 Comm: syz-executor.5 Not tainted 6.5.0-rc5-syzkaller-00243-g9106536c1aa3 #0 [ 1288.426155][ T7325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1288.436218][ T7325] Call Trace: [ 1288.439572][ T7325] [ 1288.442592][ T7325] dump_stack_lvl+0xda/0x130 [ 1288.447237][ T7325] dump_stack+0x15/0x20 [ 1288.451413][ T7325] should_fail_ex+0x21f/0x230 [ 1288.456095][ T7325] ? genl_start+0x121/0x2b0 [ 1288.460623][ T7325] __should_failslab+0x92/0xa0 [ 1288.465414][ T7325] should_failslab+0x9/0x20 [ 1288.469934][ T7325] slab_pre_alloc_hook+0x38/0x180 [ 1288.474987][ T7325] ? genl_start+0x121/0x2b0 [ 1288.479606][ T7325] __kmem_cache_alloc_node+0x48/0x1d0 [ 1288.485051][ T7325] ? genl_start+0x121/0x2b0 [ 1288.489571][ T7325] kmalloc_trace+0x2a/0xa0 [ 1288.493972][ T7325] genl_start+0x121/0x2b0 [ 1288.498289][ T7325] __netlink_dump_start+0x30f/0x510 [ 1288.503471][ T7325] genl_rcv_msg+0x479/0x720 [ 1288.508064][ T7325] ? nl802154_get_wpan_phy+0xf0/0xf0 [ 1288.513338][ T7325] ? nl802154_dump_wpan_phy+0x4c0/0x4c0 [ 1288.518862][ T7325] ? genl_rcv_msg+0x720/0x720 [ 1288.523529][ T7325] ? genl_start+0x2b0/0x2b0 [ 1288.528019][ T7325] ? genl_lock_dumpit+0x60/0x60 [ 1288.532933][ T7325] netlink_rcv_skb+0x126/0x220 [ 1288.537843][ T7325] ? genl_bind+0x1b0/0x1b0 [ 1288.542285][ T7325] genl_rcv+0x28/0x40 [ 1288.546337][ T7325] netlink_unicast+0x56f/0x640 [ 1288.551126][ T7325] netlink_sendmsg+0x665/0x770 [ 1288.555941][ T7325] ? netlink_getsockopt+0x3e0/0x3e0 [ 1288.561127][ T7325] ____sys_sendmsg+0x37c/0x4d0 [ 1288.565880][ T7325] __sys_sendmsg+0x1e9/0x270 [ 1288.570475][ T7325] __x64_sys_sendmsg+0x46/0x50 [ 1288.575228][ T7325] do_syscall_64+0x41/0xc0 [ 1288.579668][ T7325] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1288.585580][ T7325] RIP: 0033:0x7f506b37dae9 [ 1288.590000][ T7325] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1288.609621][ T7325] RSP: 002b:00007f506a7000c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1288.618024][ T7325] RAX: ffffffffffffffda RBX: 00007f506b49cf80 RCX: 00007f506b37dae9 [ 1288.626107][ T7325] RDX: 0000000000000000 RSI: 0000000020000300 RDI: 0000000000000004 [ 1288.634072][ T7325] RBP: 00007f506a700120 R08: 0000000000000000 R09: 0000000000000000 [ 1288.642065][ T7325] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 20:46:32 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) (fail_nth: 7) 20:46:32 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x0) (async) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x5c, 0x0, 0x20, 0x70bd27, 0x25dfdbff, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x4}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @broadcast}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x7}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x3f}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x40000) 20:46:32 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x7a}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:32 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26}, 0x20) 20:46:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:32 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x8) 20:46:32 executing program 1: bpf$BPF_BTF_LOAD(0x2, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:32 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="7259bd536309000000000000002e2b66696c653000c06009099b0204a5be2b3d1bcce3bfeef5215bcef502d04f54878dec440ebd795731942727186d6f81e4cc2aee4ffd9f8644f8e56b8f69ec51ee2906a2cc8d52457a83a44e4ade01b93965f90405c4d09427a3239da6af09bc"]) write$cgroup_type(r0, &(0x7f0000000040), 0x9) prctl$PR_SET_SECUREBITS(0x1c, 0x14) 20:46:32 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26}, 0x20) 20:46:32 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x300}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) [ 1288.650040][ T7325] R13: 000000000000000b R14: 00007f506b49cf80 R15: 00007ffe82ed59a8 [ 1288.658181][ T7325] [ 1288.687762][ T7341] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 20:46:32 executing program 1: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:32 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, 0x0, 0x2e}, 0x20) [ 1288.714465][ T7341] FAULT_INJECTION: forcing a failure. [ 1288.714465][ T7341] name failslab, interval 1, probability 0, space 0, times 0 [ 1288.727146][ T7341] CPU: 0 PID: 7341 Comm: syz-executor.5 Not tainted 6.5.0-rc5-syzkaller-00243-g9106536c1aa3 #0 [ 1288.737481][ T7341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1288.747545][ T7341] Call Trace: [ 1288.750825][ T7341] [ 1288.753766][ T7341] dump_stack_lvl+0xda/0x130 [ 1288.758367][ T7341] dump_stack+0x15/0x20 [ 1288.762541][ T7341] should_fail_ex+0x21f/0x230 [ 1288.767295][ T7341] __should_failslab+0x92/0xa0 [ 1288.772108][ T7341] should_failslab+0x9/0x20 [ 1288.776704][ T7341] slab_pre_alloc_hook+0x38/0x180 [ 1288.781738][ T7341] kmem_cache_alloc_node+0x54/0x240 [ 1288.786955][ T7341] ? __alloc_skb+0x109/0x2e0 [ 1288.791606][ T7341] __alloc_skb+0x109/0x2e0 [ 1288.796052][ T7341] netlink_dump+0x160/0x710 [ 1288.800558][ T7341] ? __kmem_cache_alloc_node+0x121/0x1d0 [ 1288.806243][ T7341] __netlink_dump_start+0x426/0x510 [ 1288.811440][ T7341] genl_rcv_msg+0x479/0x720 [ 1288.815935][ T7341] ? nl802154_get_wpan_phy+0xf0/0xf0 [ 1288.821211][ T7341] ? nl802154_dump_wpan_phy+0x4c0/0x4c0 [ 1288.826787][ T7341] ? genl_rcv_msg+0x720/0x720 [ 1288.831647][ T7341] ? genl_start+0x2b0/0x2b0 [ 1288.836145][ T7341] ? genl_lock_dumpit+0x60/0x60 [ 1288.840984][ T7341] netlink_rcv_skb+0x126/0x220 [ 1288.845953][ T7341] ? genl_bind+0x1b0/0x1b0 [ 1288.850361][ T7341] genl_rcv+0x28/0x40 [ 1288.854343][ T7341] netlink_unicast+0x56f/0x640 [ 1288.859165][ T7341] netlink_sendmsg+0x665/0x770 [ 1288.863940][ T7341] ? netlink_getsockopt+0x3e0/0x3e0 [ 1288.869168][ T7341] ____sys_sendmsg+0x37c/0x4d0 [ 1288.873917][ T7341] __sys_sendmsg+0x1e9/0x270 [ 1288.878498][ T7341] __x64_sys_sendmsg+0x46/0x50 [ 1288.883268][ T7341] do_syscall_64+0x41/0xc0 [ 1288.887701][ T7341] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1288.893584][ T7341] RIP: 0033:0x7f506b37dae9 [ 1288.898087][ T7341] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1288.917676][ T7341] RSP: 002b:00007f506a7000c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1288.926137][ T7341] RAX: ffffffffffffffda RBX: 00007f506b49cf80 RCX: 00007f506b37dae9 [ 1288.934110][ T7341] RDX: 0000000000000000 RSI: 0000000020000300 RDI: 0000000000000004 [ 1288.942127][ T7341] RBP: 00007f506a700120 R08: 0000000000000000 R09: 0000000000000000 [ 1288.950077][ T7341] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 20:46:33 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) (fail_nth: 8) 20:46:33 executing program 1: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, 0x0, 0x2e}, 0x20) 20:46:33 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x8) 20:46:33 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x500}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:33 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="7259bd536309000000000000002e2b66696c653000c06009099b0204a5be2b3d1bcce3bfeef5215bcef502d04f54878dec440ebd795731942727186d6f81e4cc2aee4ffd9f8644f8e56b8f69ec51ee2906a2cc8d52457a83a44e4ade01b93965f90405c4d09427a3239da6af09bc"]) write$cgroup_type(r0, &(0x7f0000000040), 0x9) prctl$PR_SET_SECUREBITS(0x1c, 0x14) prctl$PR_SET_SECUREBITS(0x7, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="7259bd536309000000000000002e2b66696c653000c06009099b0204a5be2b3d1bcce3bfeef5215bcef502d04f54878dec440ebd795731942727186d6f81e4cc2aee4ffd9f8644f8e56b8f69ec51ee2906a2cc8d52457a83a44e4ade01b93965f90405c4d09427a3239da6af09bc"]) (async) write$cgroup_type(r0, &(0x7f0000000040), 0x9) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x14) (async) 20:46:33 executing program 1: bpf$BPF_BTF_LOAD(0x5, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:33 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x600}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) [ 1288.958040][ T7341] R13: 000000000000000b R14: 00007f506b49cf80 R15: 00007ffe82ed59a8 [ 1288.966035][ T7341] 20:46:33 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x8) prctl$PR_SET_SECUREBITS(0x8, 0x0) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x8) (async) 20:46:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, 0x0, 0x2e}, 0x20) 20:46:33 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="7259bd536309000000000000002e2b66696c653000c06009099b0204a5be2b3d1bcce3bfeef5215bcef502d04f54878dec440ebd795731942727186d6f81e4cc2aee4ffd9f8644f8e56b8f69ec51ee2906a2cc8d52457a83a44e4ade01b93965f90405c4d09427a3239da6af09bc"]) (async) write$cgroup_type(r0, &(0x7f0000000040), 0x9) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x14) 20:46:33 executing program 1: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:33 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) (fail_nth: 9) 20:46:33 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x700}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26}, 0x20) 20:46:33 executing program 3: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) prctl$PR_SET_SECUREBITS(0x7, 0x23) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f0000000080)) 20:46:33 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0x2) [ 1289.021901][ T7366] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 20:46:33 executing program 1: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:33 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x900}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:33 executing program 3: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) (async) prctl$PR_SET_SECUREBITS(0x7, 0x23) (async, rerun: 64) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) (rerun: 64) write$char_usb(r0, 0x0, 0x0) (async) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f0000000080)) 20:46:33 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:33 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0x2) 20:46:33 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0xa00}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:33 executing program 3: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) (async) prctl$PR_SET_SECUREBITS(0x7, 0x23) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) (async) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f0000000080)) [ 1289.095828][ T7393] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1289.145498][ T7393] FAULT_INJECTION: forcing a failure. [ 1289.145498][ T7393] name failslab, interval 1, probability 0, space 0, times 0 [ 1289.158178][ T7393] CPU: 1 PID: 7393 Comm: syz-executor.5 Not tainted 6.5.0-rc5-syzkaller-00243-g9106536c1aa3 #0 [ 1289.168583][ T7393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1289.178740][ T7393] Call Trace: [ 1289.182096][ T7393] [ 1289.185032][ T7393] dump_stack_lvl+0xda/0x130 [ 1289.189668][ T7393] dump_stack+0x15/0x20 [ 1289.193836][ T7393] should_fail_ex+0x21f/0x230 [ 1289.198599][ T7393] ? nl802154_dump_wpan_phy+0x7f/0x4c0 [ 1289.204167][ T7393] __should_failslab+0x92/0xa0 [ 1289.208982][ T7393] should_failslab+0x9/0x20 [ 1289.213582][ T7393] slab_pre_alloc_hook+0x38/0x180 [ 1289.218777][ T7393] ? nl802154_dump_wpan_phy+0x7f/0x4c0 [ 1289.224334][ T7393] __kmem_cache_alloc_node+0x48/0x1d0 [ 1289.229710][ T7393] ? nl802154_dump_wpan_phy+0x7f/0x4c0 [ 1289.235151][ T7393] kmalloc_trace+0x2a/0xa0 [ 1289.239563][ T7393] nl802154_dump_wpan_phy+0x7f/0x4c0 [ 1289.244884][ T7393] ? __build_skb_around+0x196/0x1f0 [ 1289.250090][ T7393] genl_lock_dumpit+0x40/0x60 [ 1289.254777][ T7393] netlink_dump+0x381/0x710 [ 1289.259281][ T7393] __netlink_dump_start+0x426/0x510 [ 1289.264490][ T7393] genl_rcv_msg+0x479/0x720 [ 1289.269003][ T7393] ? nl802154_get_wpan_phy+0xf0/0xf0 [ 1289.274350][ T7393] ? nl802154_dump_wpan_phy+0x4c0/0x4c0 [ 1289.280027][ T7393] ? genl_rcv_msg+0x720/0x720 [ 1289.284825][ T7393] ? genl_start+0x2b0/0x2b0 [ 1289.289389][ T7393] ? genl_lock_dumpit+0x60/0x60 [ 1289.294281][ T7393] netlink_rcv_skb+0x126/0x220 [ 1289.299038][ T7393] ? genl_bind+0x1b0/0x1b0 [ 1289.303488][ T7393] genl_rcv+0x28/0x40 [ 1289.307644][ T7393] netlink_unicast+0x56f/0x640 [ 1289.312403][ T7393] netlink_sendmsg+0x665/0x770 [ 1289.317257][ T7393] ? netlink_getsockopt+0x3e0/0x3e0 [ 1289.322600][ T7393] ____sys_sendmsg+0x37c/0x4d0 [ 1289.327425][ T7393] __sys_sendmsg+0x1e9/0x270 [ 1289.332006][ T7393] __x64_sys_sendmsg+0x46/0x50 [ 1289.336791][ T7393] do_syscall_64+0x41/0xc0 [ 1289.341374][ T7393] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1289.347348][ T7393] RIP: 0033:0x7f506b37dae9 [ 1289.351764][ T7393] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1289.371357][ T7393] RSP: 002b:00007f506a7000c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1289.379751][ T7393] RAX: ffffffffffffffda RBX: 00007f506b49cf80 RCX: 00007f506b37dae9 [ 1289.387708][ T7393] RDX: 0000000000000000 RSI: 0000000020000300 RDI: 0000000000000004 20:46:33 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) (fail_nth: 10) 20:46:33 executing program 1: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:33 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0x2) 20:46:33 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x0) clock_getres(0x0, &(0x7f0000000000)) 20:46:33 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000140)={'gre0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x80, 0x8, 0x1, 0x17e, {{0x13, 0x4, 0x2, 0x0, 0x4c, 0x64, 0x0, 0x3f, 0x4, 0x0, @multicast1, @rand_addr=0x64010101, {[@lsrr={0x83, 0x7, 0xf9, [@empty]}, @generic={0x44, 0xb, "909faf3de6272de3d7"}, @ssrr={0x89, 0x13, 0xd3, [@loopback, @remote, @loopback, @dev={0xac, 0x14, 0x14, 0x1e}]}, @end, @lsrr={0x83, 0x7, 0x89, [@loopback]}, @cipso={0x86, 0x9, 0xffffffffffffffff, [{0x0, 0x3, "e0"}]}, @end]}}}}}) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @dev, 0x0}, &(0x7f00000001c0)=0xc) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000200)={@dev, @remote, 0x0}, &(0x7f0000000240)=0xc) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000280)={@private, @remote, 0x0}, &(0x7f00000002c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000340)={&(0x7f0000000840)={0x788, 0x0, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [{{0x8}, {0x84, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r1}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xfffffffe}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x264, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7fff}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x8dad}}, {0x8, 0x6, r2}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7fff}}, {0x8}}}]}}, {{0x8}, {0x1e8, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r5}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r7}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}]}}, {{0x8}, {0x1b8, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3890}}, {0x8}}}]}}]}, 0x788}, 0x1, 0x0, 0x0, 0x8080}, 0x8000) socket$can_raw(0x1d, 0x3, 0x1) mmap$xdp(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2800008, 0x8010, r0, 0x180000000) prctl$PR_SET_SECUREBITS(0x8, 0x0) shmget$private(0x0, 0x4000, 0x1000, &(0x7f0000ffb000/0x4000)=nil) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r8, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r8, &(0x7f00000003c0)="f95bec473581e5a72e1e54029a224e9bf5309f1349212d398ec04fa4e6b9dd04a667473905c2e96d6df255c4f3973f23b5a2e7fe04b788996fe3a38d4db29a769c04c47fca50f285e4031ab32eb97ede0879227d9ab314b7a6a550e37f3f704a2a68c9b7743fb2cb1dbdd863a2", &(0x7f0000001000)=@buf="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", 0x1}, 0x20) 20:46:33 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0xb00}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) [ 1289.395669][ T7393] RBP: 00007f506a700120 R08: 0000000000000000 R09: 0000000000000000 [ 1289.403659][ T7393] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1289.411627][ T7393] R13: 000000000000000b R14: 00007f506b49cf80 R15: 00007ffe82ed59a8 [ 1289.419641][ T7393] 20:46:33 executing program 1: bpf$BPF_BTF_LOAD(0xa, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:33 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x0) clock_getres(0x0, &(0x7f0000000000)) 20:46:33 executing program 1: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) [ 1289.439902][ T7417] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1289.455606][ T7417] FAULT_INJECTION: forcing a failure. [ 1289.455606][ T7417] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1289.468734][ T7417] CPU: 0 PID: 7417 Comm: syz-executor.5 Not tainted 6.5.0-rc5-syzkaller-00243-g9106536c1aa3 #0 [ 1289.479101][ T7417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1289.489251][ T7417] Call Trace: [ 1289.492573][ T7417] 20:46:33 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x0) (async) clock_getres(0x0, &(0x7f0000000000)) [ 1289.495513][ T7417] dump_stack_lvl+0xda/0x130 [ 1289.500119][ T7417] dump_stack+0x15/0x20 [ 1289.504287][ T7417] should_fail_ex+0x21f/0x230 [ 1289.509056][ T7417] should_fail+0xb/0x10 [ 1289.513220][ T7417] should_fail_usercopy+0x1a/0x20 [ 1289.518256][ T7417] _copy_to_user+0x1e/0x90 [ 1289.522681][ T7417] simple_read_from_buffer+0xa0/0x110 [ 1289.528097][ T7417] proc_fail_nth_read+0xfc/0x140 [ 1289.533139][ T7417] ? proc_fault_inject_write+0x210/0x210 [ 1289.538784][ T7417] vfs_read+0x19f/0x5c0 20:46:33 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0x0) 20:46:33 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0xc00}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) [ 1289.543049][ T7417] ? __fget_files+0x1c4/0x200 [ 1289.547748][ T7417] ? mutex_lock+0xd/0x30 [ 1289.552093][ T7417] ksys_read+0xeb/0x1a0 [ 1289.556449][ T7417] __x64_sys_read+0x42/0x50 [ 1289.561000][ T7417] do_syscall_64+0x41/0xc0 [ 1289.567523][ T7417] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1289.573446][ T7417] RIP: 0033:0x7f506b37c78c [ 1289.577875][ T7417] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 59 81 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 af 81 02 00 48 [ 1289.597563][ T7417] RSP: 002b:00007f506a7000c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1289.606031][ T7417] RAX: ffffffffffffffda RBX: 00007f506b49cf80 RCX: 00007f506b37c78c [ 1289.614078][ T7417] RDX: 000000000000000f RSI: 00007f506a700130 RDI: 0000000000000003 [ 1289.622052][ T7417] RBP: 00007f506a700120 R08: 0000000000000000 R09: 0000000000000000 [ 1289.630005][ T7417] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1289.638048][ T7417] R13: 000000000000000b R14: 00007f506b49cf80 R15: 00007ffe82ed59a8 20:46:33 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:33 executing program 3: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) open_tree(r0, &(0x7f0000000080)='./file0\x00', 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x3) 20:46:33 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0x0) 20:46:33 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0xd00}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:33 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) (async) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000140)={'gre0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x80, 0x8, 0x1, 0x17e, {{0x13, 0x4, 0x2, 0x0, 0x4c, 0x64, 0x0, 0x3f, 0x4, 0x0, @multicast1, @rand_addr=0x64010101, {[@lsrr={0x83, 0x7, 0xf9, [@empty]}, @generic={0x44, 0xb, "909faf3de6272de3d7"}, @ssrr={0x89, 0x13, 0xd3, [@loopback, @remote, @loopback, @dev={0xac, 0x14, 0x14, 0x1e}]}, @end, @lsrr={0x83, 0x7, 0x89, [@loopback]}, @cipso={0x86, 0x9, 0xffffffffffffffff, [{0x0, 0x3, "e0"}]}, @end]}}}}}) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @dev, 0x0}, &(0x7f00000001c0)=0xc) (async) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000200)={@dev, @remote, 0x0}, &(0x7f0000000240)=0xc) (async) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000280)={@private, @remote, 0x0}, &(0x7f00000002c0)=0xc) (async) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000340)={&(0x7f0000000840)={0x788, 0x0, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [{{0x8}, {0x84, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r1}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xfffffffe}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x264, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7fff}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x8dad}}, {0x8, 0x6, r2}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7fff}}, {0x8}}}]}}, {{0x8}, {0x1e8, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r5}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r7}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}]}}, {{0x8}, {0x1b8, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3890}}, {0x8}}}]}}]}, 0x788}, 0x1, 0x0, 0x0, 0x8080}, 0x8000) socket$can_raw(0x1d, 0x3, 0x1) mmap$xdp(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2800008, 0x8010, r0, 0x180000000) prctl$PR_SET_SECUREBITS(0x8, 0x0) (async) shmget$private(0x0, 0x4000, 0x1000, &(0x7f0000ffb000/0x4000)=nil) (async) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r8, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r8, &(0x7f00000003c0)="f95bec473581e5a72e1e54029a224e9bf5309f1349212d398ec04fa4e6b9dd04a667473905c2e96d6df255c4f3973f23b5a2e7fe04b788996fe3a38d4db29a769c04c47fca50f285e4031ab32eb97ede0879227d9ab314b7a6a550e37f3f704a2a68c9b7743fb2cb1dbdd863a2", &(0x7f0000001000)=@buf="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", 0x1}, 0x20) 20:46:33 executing program 1: bpf$BPF_BTF_LOAD(0xc, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:33 executing program 3: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) open_tree(r0, &(0x7f0000000080)='./file0\x00', 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x3) pipe2$watch_queue(&(0x7f0000000000), 0x80) (async) open_tree(r0, &(0x7f0000000080)='./file0\x00', 0x0) (async) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x3) (async) [ 1289.646086][ T7417] 20:46:33 executing program 1: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:33 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) (async) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000140)={'gre0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x80, 0x8, 0x1, 0x17e, {{0x13, 0x4, 0x2, 0x0, 0x4c, 0x64, 0x0, 0x3f, 0x4, 0x0, @multicast1, @rand_addr=0x64010101, {[@lsrr={0x83, 0x7, 0xf9, [@empty]}, @generic={0x44, 0xb, "909faf3de6272de3d7"}, @ssrr={0x89, 0x13, 0xd3, [@loopback, @remote, @loopback, @dev={0xac, 0x14, 0x14, 0x1e}]}, @end, @lsrr={0x83, 0x7, 0x89, [@loopback]}, @cipso={0x86, 0x9, 0xffffffffffffffff, [{0x0, 0x3, "e0"}]}, @end]}}}}}) (async) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @dev, 0x0}, &(0x7f00000001c0)=0xc) (async) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000200)={@dev, @remote, 0x0}, &(0x7f0000000240)=0xc) (async) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000280)={@private, @remote, 0x0}, &(0x7f00000002c0)=0xc) (async) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000340)={&(0x7f0000000840)={0x788, 0x0, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [{{0x8}, {0x84, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r1}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xfffffffe}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x264, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7fff}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x8dad}}, {0x8, 0x6, r2}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7fff}}, {0x8}}}]}}, {{0x8}, {0x1e8, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r5}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r7}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}]}}, {{0x8}, {0x1b8, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3890}}, {0x8}}}]}}]}, 0x788}, 0x1, 0x0, 0x0, 0x8080}, 0x8000) (async) socket$can_raw(0x1d, 0x3, 0x1) (async) mmap$xdp(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2800008, 0x8010, r0, 0x180000000) (async) prctl$PR_SET_SECUREBITS(0x8, 0x0) (async) shmget$private(0x0, 0x4000, 0x1000, &(0x7f0000ffb000/0x4000)=nil) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r8, 0x0, 0x0) (async) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r8, &(0x7f00000003c0)="f95bec473581e5a72e1e54029a224e9bf5309f1349212d398ec04fa4e6b9dd04a667473905c2e96d6df255c4f3973f23b5a2e7fe04b788996fe3a38d4db29a769c04c47fca50f285e4031ab32eb97ede0879227d9ab314b7a6a550e37f3f704a2a68c9b7743fb2cb1dbdd863a2", &(0x7f0000001000)=@buf="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", 0x1}, 0x20) 20:46:33 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0x0) 20:46:33 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:33 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0xe00}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:33 executing program 1: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) [ 1289.680351][ T7454] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 20:46:33 executing program 1: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:33 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0xf00}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:33 executing program 3: pipe2$watch_queue(&(0x7f0000000000), 0x80) (async) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) open_tree(r0, &(0x7f0000000080)='./file0\x00', 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x3) 20:46:33 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0x2) (fail_nth: 1) 20:46:33 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x1100}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) [ 1289.731018][ T7462] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1289.765433][ T7483] FAULT_INJECTION: forcing a failure. [ 1289.765433][ T7483] name fail_usercopy, interval 1, probability 0, space 0, times 0 20:46:33 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x18) 20:46:33 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x1200}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:33 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x18) 20:46:33 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x2500}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) [ 1289.778625][ T7483] CPU: 1 PID: 7483 Comm: syz-executor.2 Not tainted 6.5.0-rc5-syzkaller-00243-g9106536c1aa3 #0 [ 1289.789042][ T7483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1289.799213][ T7483] Call Trace: [ 1289.802496][ T7483] [ 1289.805510][ T7483] dump_stack_lvl+0xda/0x130 [ 1289.810138][ T7483] dump_stack+0x15/0x20 [ 1289.814325][ T7483] should_fail_ex+0x21f/0x230 [ 1289.819101][ T7483] should_fail+0xb/0x10 [ 1289.823269][ T7483] should_fail_usercopy+0x1a/0x20 20:46:34 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x2, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:34 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x18) 20:46:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x4800}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:34 executing program 1: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:34 executing program 3: syz_open_dev$usbmon(&(0x7f0000000000), 0x3, 0x200) prctl$PR_SET_SECUREBITS(0x7, 0x0) [ 1289.828376][ T7483] _copy_to_user+0x1e/0x90 [ 1289.832794][ T7483] simple_read_from_buffer+0xa0/0x110 [ 1289.838222][ T7483] proc_fail_nth_read+0xfc/0x140 [ 1289.843173][ T7483] ? proc_fault_inject_write+0x210/0x210 [ 1289.848860][ T7483] vfs_read+0x19f/0x5c0 [ 1289.853028][ T7483] ? __fget_files+0x1c4/0x200 [ 1289.857866][ T7483] ? mutex_lock+0xd/0x30 [ 1289.862111][ T7483] ksys_read+0xeb/0x1a0 [ 1289.866287][ T7483] __x64_sys_read+0x42/0x50 [ 1289.870881][ T7483] do_syscall_64+0x41/0xc0 [ 1289.875310][ T7483] entry_SYSCALL_64_after_hwframe+0x63/0xcd 20:46:34 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x3, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) [ 1289.881238][ T7483] RIP: 0033:0x7fd2ce28878c [ 1289.883537][ T7502] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1289.885649][ T7483] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 59 81 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 af 81 02 00 48 [ 1289.885669][ T7483] RSP: 002b:00007fd2cd60c0c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1289.885687][ T7483] RAX: ffffffffffffffda RBX: 00007fd2ce3a8f80 RCX: 00007fd2ce28878c 20:46:34 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0x2) 20:46:34 executing program 1: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:34 executing program 3: syz_open_dev$usbmon(&(0x7f0000000000), 0x3, 0x200) prctl$PR_SET_SECUREBITS(0x7, 0x0) (async) prctl$PR_SET_SECUREBITS(0x7, 0x0) 20:46:34 executing program 0: syz_open_dev$char_usb(0xc, 0xb4, 0x2) prctl$PR_SET_SECUREBITS(0x8, 0x0) r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$NS_GET_NSTYPE(0xffffffffffffffff, 0xb703, 0x0) r1 = socket$l2tp6(0xa, 0x2, 0x73) r2 = syz_open_dev$char_usb(0xc, 0xb4, 0x100000001) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_SPLICE={0x1e, 0x20, 0x0, @fd=r0, 0x0, {0x0, r1}, 0x1ff, 0x0, 0x0, {0x0, 0x0, r2}}) 20:46:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x4c00}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:34 executing program 3: syz_open_dev$usbmon(&(0x7f0000000000), 0x3, 0x200) prctl$PR_SET_SECUREBITS(0x7, 0x0) (async) prctl$PR_SET_SECUREBITS(0x7, 0x0) 20:46:34 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x4, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:34 executing program 2: prctl$PR_SET_SECUREBITS(0x7, 0x2) [ 1289.885699][ T7483] RDX: 000000000000000f RSI: 00007fd2cd60c130 RDI: 0000000000000003 [ 1289.885712][ T7483] RBP: 00007fd2cd60c120 R08: 0000000000000000 R09: 0000000000000000 [ 1289.885722][ T7483] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1289.928849][ T7505] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1289.931012][ T7483] R13: 000000000000000b R14: 00007fd2ce3a8f80 R15: 00007ffca767b198 [ 1289.931032][ T7483] 20:46:34 executing program 1: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:34 executing program 0: syz_open_dev$char_usb(0xc, 0xb4, 0x2) prctl$PR_SET_SECUREBITS(0x8, 0x0) (async) prctl$PR_SET_SECUREBITS(0x8, 0x0) r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$NS_GET_NSTYPE(0xffffffffffffffff, 0xb703, 0x0) socket$l2tp6(0xa, 0x2, 0x73) (async) r1 = socket$l2tp6(0xa, 0x2, 0x73) r2 = syz_open_dev$char_usb(0xc, 0xb4, 0x100000001) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_SPLICE={0x1e, 0x20, 0x0, @fd=r0, 0x0, {0x0, r1}, 0x1ff, 0x0, 0x0, {0x0, 0x0, r2}}) 20:46:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x5100}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:34 executing program 2: prctl$PR_SET_SECUREBITS(0x17, 0x2) 20:46:34 executing program 1: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x6800}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:34 executing program 2: prctl$PR_SET_SECUREBITS(0x18, 0x2) 20:46:34 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) getsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) prctl$PR_SET_SECUREBITS(0x7, 0x339a921838d376f0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) r2 = open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x81000) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x20, 0x1407, 0x300, 0x70bd2c, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000810}, 0x4008080) 20:46:34 executing program 2: prctl$PR_SET_SECUREBITS(0x1b, 0x2) 20:46:34 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x5, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) [ 1290.036320][ T7525] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 20:46:34 executing program 1: bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:34 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) getsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) (async) prctl$PR_SET_SECUREBITS(0x7, 0x339a921838d376f0) (async) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) (async) r2 = open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x81000) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x20, 0x1407, 0x300, 0x70bd2c, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000810}, 0x4008080) 20:46:34 executing program 0: syz_open_dev$char_usb(0xc, 0xb4, 0x2) (async) syz_open_dev$char_usb(0xc, 0xb4, 0x2) prctl$PR_SET_SECUREBITS(0x8, 0x0) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) (async) r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$NS_GET_NSTYPE(0xffffffffffffffff, 0xb703, 0x0) r1 = socket$l2tp6(0xa, 0x2, 0x73) r2 = syz_open_dev$char_usb(0xc, 0xb4, 0x100000001) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_SPLICE={0x1e, 0x20, 0x0, @fd=r0, 0x0, {0x0, r1}, 0x1ff, 0x0, 0x0, {0x0, 0x0, r2}}) 20:46:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x6c00}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:34 executing program 2: prctl$PR_SET_SECUREBITS(0x1c, 0x2) 20:46:34 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x6, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x7400}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:34 executing program 1: bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:34 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10c, 0x10c, 0x4, [@union={0x1, 0x5, 0x0, 0x5, 0x1, 0x7f8d, [{0x1, 0x4, 0x9}, {0x1, 0x5, 0x5}, {0xf, 0x0, 0x100}, {0xe, 0x0, 0xc9}, {0x3, 0x0, 0x4}]}, @restrict={0x5, 0x0, 0x0, 0xb, 0x5}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x4a, 0x0, 0x8, 0x6}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xb, 0x5}]}, @var={0xd, 0x0, 0x0, 0xe, 0x3, 0x1}, @fwd={0xc}, @struct={0x4, 0x8, 0x0, 0x4, 0x0, 0x9, [{0xa, 0x4}, {0xd, 0x1, 0x2}, {0x7, 0x2, 0xe8}, {0xc, 0x4, 0x2}, {0x9, 0x4, 0x6}, {0x5, 0x1, 0xbe}, {0x9, 0x3, 0x3f}, {0x9, 0x0, 0x7}]}, @ptr={0xf, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x2e, 0x5f]}}, &(0x7f0000000140)=""/34, 0x128, 0x22, 0x1}, 0x20) prctl$PR_SET_SECUREBITS(0x8, 0x71) 20:46:34 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) getsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) prctl$PR_SET_SECUREBITS(0x7, 0x339a921838d376f0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) r2 = open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x81000) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x20, 0x1407, 0x300, 0x70bd2c, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000810}, 0x4008080) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) (async) getsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) (async) prctl$PR_SET_SECUREBITS(0x7, 0x339a921838d376f0) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) (async) write$char_usb(r1, 0x0, 0x0) (async) open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x81000) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x20, 0x1407, 0x300, 0x70bd2c, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000810}, 0x4008080) (async) 20:46:34 executing program 2: prctl$PR_SET_SECUREBITS(0x2f, 0x2) 20:46:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x7a00}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:34 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x7, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:34 executing program 1: bpf$BPF_BTF_LOAD(0x17, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:34 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10c, 0x10c, 0x4, [@union={0x1, 0x5, 0x0, 0x5, 0x1, 0x7f8d, [{0x1, 0x4, 0x9}, {0x1, 0x5, 0x5}, {0xf, 0x0, 0x100}, {0xe, 0x0, 0xc9}, {0x3, 0x0, 0x4}]}, @restrict={0x5, 0x0, 0x0, 0xb, 0x5}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x4a, 0x0, 0x8, 0x6}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xb, 0x5}]}, @var={0xd, 0x0, 0x0, 0xe, 0x3, 0x1}, @fwd={0xc}, @struct={0x4, 0x8, 0x0, 0x4, 0x0, 0x9, [{0xa, 0x4}, {0xd, 0x1, 0x2}, {0x7, 0x2, 0xe8}, {0xc, 0x4, 0x2}, {0x9, 0x4, 0x6}, {0x5, 0x1, 0xbe}, {0x9, 0x3, 0x3f}, {0x9, 0x0, 0x7}]}, @ptr={0xf, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x2e, 0x5f]}}, &(0x7f0000000140)=""/34, 0x128, 0x22, 0x1}, 0x20) prctl$PR_SET_SECUREBITS(0x8, 0x71) (async) prctl$PR_SET_SECUREBITS(0x8, 0x71) 20:46:34 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x4, 0x1010, r0, 0x5a737000) write$char_usb(r0, 0x0, 0x0) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000000), 0x4) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) sendmsg$RDMA_NLDEV_CMD_SET(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x1402, 0x100, 0x70bd2d, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz0\x00'}]}, 0x1c}}, 0x4) write$char_usb(r1, &(0x7f00000001c0)="85bb7a87faef033ca7931065dbeab35178f8b4333ad438fcdaa00791b344db2bb2492b290a81878d964aed04da2edd828b3ffc1df7d5526e941d0a65d1de0fa7094b06676257e00d087eff9a61447b2c720c39ae198602a9563fe520568982bed993727abd5c6397d10f6cda7326802b20aca42608e911f28e770d679919ee9f4b59d83341c5783c3782854a2db61996c06028a068516c02afdddb4a3070dd8c61a6cefc0a2f606526a0f985a13495de40854bea1fc694c1ba61b0879dfa", 0xbe) write$char_usb(r1, 0x0, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000080), 0x4) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00/file0\x00\x00\x00\x00\x00\x00\x00']) openat$nci(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) 20:46:34 executing program 3: getsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x6, &(0x7f0000000000), &(0x7f0000000040)=0x4) prctl$PR_SET_SECUREBITS(0x7, 0x39) 20:46:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x1000000}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:34 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x8, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:34 executing program 1: bpf$BPF_BTF_LOAD(0x18, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:34 executing program 3: getsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x6, &(0x7f0000000000), &(0x7f0000000040)=0x4) (async) prctl$PR_SET_SECUREBITS(0x7, 0x39) 20:46:34 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10c, 0x10c, 0x4, [@union={0x1, 0x5, 0x0, 0x5, 0x1, 0x7f8d, [{0x1, 0x4, 0x9}, {0x1, 0x5, 0x5}, {0xf, 0x0, 0x100}, {0xe, 0x0, 0xc9}, {0x3, 0x0, 0x4}]}, @restrict={0x5, 0x0, 0x0, 0xb, 0x5}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x4a, 0x0, 0x8, 0x6}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xb, 0x5}]}, @var={0xd, 0x0, 0x0, 0xe, 0x3, 0x1}, @fwd={0xc}, @struct={0x4, 0x8, 0x0, 0x4, 0x0, 0x9, [{0xa, 0x4}, {0xd, 0x1, 0x2}, {0x7, 0x2, 0xe8}, {0xc, 0x4, 0x2}, {0x9, 0x4, 0x6}, {0x5, 0x1, 0xbe}, {0x9, 0x3, 0x3f}, {0x9, 0x0, 0x7}]}, @ptr={0xf, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x2e, 0x5f]}}, &(0x7f0000000140)=""/34, 0x128, 0x22, 0x1}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10c, 0x10c, 0x4, [@union={0x1, 0x5, 0x0, 0x5, 0x1, 0x7f8d, [{0x1, 0x4, 0x9}, {0x1, 0x5, 0x5}, {0xf, 0x0, 0x100}, {0xe, 0x0, 0xc9}, {0x3, 0x0, 0x4}]}, @restrict={0x5, 0x0, 0x0, 0xb, 0x5}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x4a, 0x0, 0x8, 0x6}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xb, 0x5}]}, @var={0xd, 0x0, 0x0, 0xe, 0x3, 0x1}, @fwd={0xc}, @struct={0x4, 0x8, 0x0, 0x4, 0x0, 0x9, [{0xa, 0x4}, {0xd, 0x1, 0x2}, {0x7, 0x2, 0xe8}, {0xc, 0x4, 0x2}, {0x9, 0x4, 0x6}, {0x5, 0x1, 0xbe}, {0x9, 0x3, 0x3f}, {0x9, 0x0, 0x7}]}, @ptr={0xf, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x2e, 0x5f]}}, &(0x7f0000000140)=""/34, 0x128, 0x22, 0x1}, 0x20) prctl$PR_SET_SECUREBITS(0x8, 0x71) 20:46:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x2000000}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:34 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x4, 0x1010, r0, 0x5a737000) (async) write$char_usb(r0, 0x0, 0x0) (async) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000000), 0x4) (async) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) sendmsg$RDMA_NLDEV_CMD_SET(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x1402, 0x100, 0x70bd2d, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz0\x00'}]}, 0x1c}}, 0x4) (async) write$char_usb(r1, &(0x7f00000001c0)="85bb7a87faef033ca7931065dbeab35178f8b4333ad438fcdaa00791b344db2bb2492b290a81878d964aed04da2edd828b3ffc1df7d5526e941d0a65d1de0fa7094b06676257e00d087eff9a61447b2c720c39ae198602a9563fe520568982bed993727abd5c6397d10f6cda7326802b20aca42608e911f28e770d679919ee9f4b59d83341c5783c3782854a2db61996c06028a068516c02afdddb4a3070dd8c61a6cefc0a2f606526a0f985a13495de40854bea1fc694c1ba61b0879dfa", 0xbe) (async, rerun: 64) write$char_usb(r1, 0x0, 0x0) (rerun: 64) r2 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000080), 0x4) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00/file0\x00\x00\x00\x00\x00\x00\x00']) openat$nci(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) 20:46:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x3000000}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:34 executing program 3: getsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x6, &(0x7f0000000000), &(0x7f0000000040)=0x4) prctl$PR_SET_SECUREBITS(0x7, 0x39) (async) prctl$PR_SET_SECUREBITS(0x7, 0x39) 20:46:34 executing program 1: bpf$BPF_BTF_LOAD(0x19, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:34 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x9, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:34 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x0) 20:46:34 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0xa, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:34 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x4, 0x1010, r0, 0x5a737000) write$char_usb(r0, 0x0, 0x0) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000000), 0x4) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) sendmsg$RDMA_NLDEV_CMD_SET(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x1402, 0x100, 0x70bd2d, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz0\x00'}]}, 0x1c}}, 0x4) write$char_usb(r1, &(0x7f00000001c0)="85bb7a87faef033ca7931065dbeab35178f8b4333ad438fcdaa00791b344db2bb2492b290a81878d964aed04da2edd828b3ffc1df7d5526e941d0a65d1de0fa7094b06676257e00d087eff9a61447b2c720c39ae198602a9563fe520568982bed993727abd5c6397d10f6cda7326802b20aca42608e911f28e770d679919ee9f4b59d83341c5783c3782854a2db61996c06028a068516c02afdddb4a3070dd8c61a6cefc0a2f606526a0f985a13495de40854bea1fc694c1ba61b0879dfa", 0xbe) write$char_usb(r1, 0x0, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000080), 0x4) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00/file0\x00\x00\x00\x00\x00\x00\x00']) openat$nci(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) (async) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x4, 0x1010, r0, 0x5a737000) (async) write$char_usb(r0, 0x0, 0x0) (async) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000000), 0x4) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) (async) sendmsg$RDMA_NLDEV_CMD_SET(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x1402, 0x100, 0x70bd2d, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz0\x00'}]}, 0x1c}}, 0x4) (async) write$char_usb(r1, &(0x7f00000001c0)="85bb7a87faef033ca7931065dbeab35178f8b4333ad438fcdaa00791b344db2bb2492b290a81878d964aed04da2edd828b3ffc1df7d5526e941d0a65d1de0fa7094b06676257e00d087eff9a61447b2c720c39ae198602a9563fe520568982bed993727abd5c6397d10f6cda7326802b20aca42608e911f28e770d679919ee9f4b59d83341c5783c3782854a2db61996c06028a068516c02afdddb4a3070dd8c61a6cefc0a2f606526a0f985a13495de40854bea1fc694c1ba61b0879dfa", 0xbe) (async) write$char_usb(r1, 0x0, 0x0) (async) socket$can_raw(0x1d, 0x3, 0x1) (async) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000080), 0x4) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00/file0\x00\x00\x00\x00\x00\x00\x00']) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) (async) 20:46:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x4000000}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:34 executing program 1: bpf$BPF_BTF_LOAD(0x1a, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:34 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x0) socket$nl_audit(0x10, 0x3, 0x9) 20:46:34 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x0) prctl$PR_SET_SECUREBITS(0x8, 0x0) (async) 20:46:34 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0xb, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x5000000}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:34 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x0) prctl$PR_SET_SECUREBITS(0x8, 0x0) (async) 20:46:34 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x0) socket$nl_audit(0x10, 0x3, 0x9) (async) socket$nl_audit(0x10, 0x3, 0x9) 20:46:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x6000000}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:34 executing program 1: bpf$BPF_BTF_LOAD(0x1b, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:34 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:34 executing program 2: syz_open_procfs$userns(0x0, &(0x7f0000000000)) prctl$PR_SET_SECUREBITS(0x8, 0x2) 20:46:34 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x33) prctl$PR_SET_SECUREBITS(0x1c, 0x31) 20:46:34 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x0) socket$nl_audit(0x10, 0x3, 0x9) 20:46:34 executing program 1: bpf$BPF_BTF_LOAD(0x1c, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x7000000}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:34 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0xd, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:34 executing program 1: bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:34 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x33) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x31) 20:46:34 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x4) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4, 0x40010, 0xffffffffffffffff, 0x8000000) 20:46:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x8000000}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:34 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0xe, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:34 executing program 2: syz_open_procfs$userns(0x0, &(0x7f0000000000)) prctl$PR_SET_SECUREBITS(0x8, 0x2) 20:46:34 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x33) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x31) 20:46:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x9000000}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:34 executing program 2: syz_open_procfs$userns(0x0, &(0x7f0000000000)) prctl$PR_SET_SECUREBITS(0x8, 0x2) 20:46:34 executing program 1: bpf$BPF_BTF_LOAD(0x1e, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:34 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0xf, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:34 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x4) (async, rerun: 32) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4, 0x40010, 0xffffffffffffffff, 0x8000000) (rerun: 32) 20:46:34 executing program 1: bpf$BPF_BTF_LOAD(0x21, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:34 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) prctl$PR_SET_SECUREBITS(0x1c, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) socket(0x1, 0x2, 0x1) 20:46:34 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x15c, 0x15c, 0x7, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x9, 0x4}, {0xc}]}, @ptr={0x8, 0x0, 0x0, 0x2, 0x3}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x2, 0xb2}}, @func_proto={0x0, 0xa, 0x0, 0xd, 0x0, [{0xb, 0x1}, {0x9, 0x5}, {0xa, 0x4}, {0x10, 0x3}, {0x10, 0x5}, {0xb, 0x5}, {0x8, 0x5}, {0x0, 0x5}, {0x7}, {0x4, 0x3}]}, @struct={0x10, 0x8, 0x0, 0x4, 0x1, 0xfffffff7, [{0x5, 0x2, 0x10000}, {0x10, 0x4, 0x20}, {0xf, 0x2, 0x7}, {0xe, 0x1, 0x3}, {0xa, 0x3, 0xf2}, {0xc, 0x5, 0x858}, {0xd, 0x0, 0x3}, {0x9, 0x0, 0xfffffb30}]}, @union={0x9, 0x6, 0x0, 0x5, 0x0, 0x20, [{0xa, 0x2, 0x100}, {0x9, 0x0, 0xff}, {0x9, 0x4, 0x80000001}, {0xd, 0x2, 0x5}, {0x6, 0x4, 0xffff}, {0x10, 0x0, 0x8000}]}]}, {0x0, [0x61, 0x4f, 0x0, 0x30, 0x61]}}, &(0x7f0000000180)=""/4096, 0x17b, 0x1000}, 0x20) 20:46:34 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x4) (async) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4, 0x40010, 0xffffffffffffffff, 0x8000000) 20:46:34 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x10, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:34 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) prctl$PR_SET_SECUREBITS(0x1c, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) socket(0x1, 0x2, 0x1) prctl$PR_SET_SECUREBITS(0x8, 0x0) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) (async) write$char_usb(r0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) socket(0x1, 0x2, 0x1) (async) 20:46:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0xa000000}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:34 executing program 1: bpf$BPF_BTF_LOAD(0x22, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:34 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x3) 20:46:34 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0x2) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x15c, 0x15c, 0x7, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x9, 0x4}, {0xc}]}, @ptr={0x8, 0x0, 0x0, 0x2, 0x3}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x2, 0xb2}}, @func_proto={0x0, 0xa, 0x0, 0xd, 0x0, [{0xb, 0x1}, {0x9, 0x5}, {0xa, 0x4}, {0x10, 0x3}, {0x10, 0x5}, {0xb, 0x5}, {0x8, 0x5}, {0x0, 0x5}, {0x7}, {0x4, 0x3}]}, @struct={0x10, 0x8, 0x0, 0x4, 0x1, 0xfffffff7, [{0x5, 0x2, 0x10000}, {0x10, 0x4, 0x20}, {0xf, 0x2, 0x7}, {0xe, 0x1, 0x3}, {0xa, 0x3, 0xf2}, {0xc, 0x5, 0x858}, {0xd, 0x0, 0x3}, {0x9, 0x0, 0xfffffb30}]}, @union={0x9, 0x6, 0x0, 0x5, 0x0, 0x20, [{0xa, 0x2, 0x100}, {0x9, 0x0, 0xff}, {0x9, 0x4, 0x80000001}, {0xd, 0x2, 0x5}, {0x6, 0x4, 0xffff}, {0x10, 0x0, 0x8000}]}]}, {0x0, [0x61, 0x4f, 0x0, 0x30, 0x61]}}, &(0x7f0000000180)=""/4096, 0x17b, 0x1000}, 0x20) 20:46:34 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x11, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0xb000000}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:34 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x0) (async) prctl$PR_SET_SECUREBITS(0x8, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) (async) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) prctl$PR_SET_SECUREBITS(0x1c, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) socket(0x1, 0x2, 0x1) 20:46:34 executing program 1: bpf$BPF_BTF_LOAD(0x23, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:34 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0x2) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x15c, 0x15c, 0x7, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x9, 0x4}, {0xc}]}, @ptr={0x8, 0x0, 0x0, 0x2, 0x3}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x2, 0xb2}}, @func_proto={0x0, 0xa, 0x0, 0xd, 0x0, [{0xb, 0x1}, {0x9, 0x5}, {0xa, 0x4}, {0x10, 0x3}, {0x10, 0x5}, {0xb, 0x5}, {0x8, 0x5}, {0x0, 0x5}, {0x7}, {0x4, 0x3}]}, @struct={0x10, 0x8, 0x0, 0x4, 0x1, 0xfffffff7, [{0x5, 0x2, 0x10000}, {0x10, 0x4, 0x20}, {0xf, 0x2, 0x7}, {0xe, 0x1, 0x3}, {0xa, 0x3, 0xf2}, {0xc, 0x5, 0x858}, {0xd, 0x0, 0x3}, {0x9, 0x0, 0xfffffb30}]}, @union={0x9, 0x6, 0x0, 0x5, 0x0, 0x20, [{0xa, 0x2, 0x100}, {0x9, 0x0, 0xff}, {0x9, 0x4, 0x80000001}, {0xd, 0x2, 0x5}, {0x6, 0x4, 0xffff}, {0x10, 0x0, 0x8000}]}]}, {0x0, [0x61, 0x4f, 0x0, 0x30, 0x61]}}, &(0x7f0000000180)=""/4096, 0x17b, 0x1000}, 0x20) 20:46:34 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x0) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x3) 20:46:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0xc000000}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:34 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x4) 20:46:34 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x12, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0xd000000}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:34 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x0) (async) prctl$PR_SET_SECUREBITS(0x7, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x3) 20:46:34 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0x2) 20:46:34 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x4) 20:46:34 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x25, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x0, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:34 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0x2) 20:46:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0xe000000}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:34 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x4) 20:46:34 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)={0x2, 0x0, @a}, 0x48, 0xffffffffffffffff) syz_genetlink_get_family_id$gtp(&(0x7f0000000180), 0xffffffffffffffff) getsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x6, &(0x7f0000000100), &(0x7f0000000140)=0x4) 20:46:34 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0x2) 20:46:34 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x48, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:34 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x10) 20:46:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:34 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x0) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)={0x2, 0x0, @a}, 0x48, 0xffffffffffffffff) syz_genetlink_get_family_id$gtp(&(0x7f0000000180), 0xffffffffffffffff) (async) getsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x6, &(0x7f0000000100), &(0x7f0000000140)=0x4) 20:46:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0xf000000}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x10000000}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:34 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x10) 20:46:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x3, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:34 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x4c, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:34 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0x2) getgid() r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x370, 0xffffffff, 0x108, 0x1e0, 0x0, 0xffffffff, 0xffffffff, 0x2d8, 0x2d8, 0x2d8, 0xffffffff, 0x4, &(0x7f0000000040), {[{{@ip={@empty, @dev={0xac, 0x14, 0x14, 0x2e}, 0x0, 0xff, 'macvtap0\x00', 'caif0\x00', {}, {}, 0x16, 0x2, 0x6}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@socket0={{0x20}}, @common=@ah={{0x30}, {[0x81]}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'pimreg0\x00', {0x100}}}}, {{@ip={@broadcast, @local, 0xff, 0xff000000, 'batadv_slave_1\x00', 'batadv0\x00', {0xff}, {}, 0x2f, 0x1, 0x10}, 0x0, 0xb0, 0xd8, 0x0, {}, [@common=@set={{0x40}, {{0x4, [0x1, 0x2, 0x0, 0x6, 0x1, 0x2], 0x3}}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x6}}}, {{@ip={@broadcast, @broadcast, 0xffffffff, 0xffffffff, 'macvtap0\x00', 'veth1_vlan\x00', {0xff}, {0xff}, 0x5c, 0x3}, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@inet=@socket2={{0x28}, 0xd466ce597294d1e7}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x4, 0x5, 0x6, 0x0, 0x1, 0x4], 0x5, 0x2}, {0xffffffffffffffff, [0x0, 0x3, 0x1, 0x4, 0x6], 0x3, 0x2}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 20:46:34 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)={0x2, 0x0, @a}, 0x48, 0xffffffffffffffff) (async) syz_genetlink_get_family_id$gtp(&(0x7f0000000180), 0xffffffffffffffff) (async) getsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x6, &(0x7f0000000100), &(0x7f0000000140)=0x4) 20:46:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x11000000}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:34 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x60, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:34 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0x2) getgid() openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) (async) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x370, 0xffffffff, 0x108, 0x1e0, 0x0, 0xffffffff, 0xffffffff, 0x2d8, 0x2d8, 0x2d8, 0xffffffff, 0x4, &(0x7f0000000040), {[{{@ip={@empty, @dev={0xac, 0x14, 0x14, 0x2e}, 0x0, 0xff, 'macvtap0\x00', 'caif0\x00', {}, {}, 0x16, 0x2, 0x6}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@socket0={{0x20}}, @common=@ah={{0x30}, {[0x81]}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'pimreg0\x00', {0x100}}}}, {{@ip={@broadcast, @local, 0xff, 0xff000000, 'batadv_slave_1\x00', 'batadv0\x00', {0xff}, {}, 0x2f, 0x1, 0x10}, 0x0, 0xb0, 0xd8, 0x0, {}, [@common=@set={{0x40}, {{0x4, [0x1, 0x2, 0x0, 0x6, 0x1, 0x2], 0x3}}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x6}}}, {{@ip={@broadcast, @broadcast, 0xffffffff, 0xffffffff, 'macvtap0\x00', 'veth1_vlan\x00', {0xff}, {0xff}, 0x5c, 0x3}, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@inet=@socket2={{0x28}, 0xd466ce597294d1e7}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x4, 0x5, 0x6, 0x0, 0x1, 0x4], 0x5, 0x2}, {0xffffffffffffffff, [0x0, 0x3, 0x1, 0x4, 0x6], 0x3, 0x2}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 20:46:34 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x10) 20:46:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0xa, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:35 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x12000000}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:35 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x68, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:35 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000)=[{}], &(0x7f0000000040)=0x8) prctl$PR_SET_SECUREBITS(0x7, 0x0) 20:46:35 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0x2) (async) getgid() r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x370, 0xffffffff, 0x108, 0x1e0, 0x0, 0xffffffff, 0xffffffff, 0x2d8, 0x2d8, 0x2d8, 0xffffffff, 0x4, &(0x7f0000000040), {[{{@ip={@empty, @dev={0xac, 0x14, 0x14, 0x2e}, 0x0, 0xff, 'macvtap0\x00', 'caif0\x00', {}, {}, 0x16, 0x2, 0x6}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@socket0={{0x20}}, @common=@ah={{0x30}, {[0x81]}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'pimreg0\x00', {0x100}}}}, {{@ip={@broadcast, @local, 0xff, 0xff000000, 'batadv_slave_1\x00', 'batadv0\x00', {0xff}, {}, 0x2f, 0x1, 0x10}, 0x0, 0xb0, 0xd8, 0x0, {}, [@common=@set={{0x40}, {{0x4, [0x1, 0x2, 0x0, 0x6, 0x1, 0x2], 0x3}}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x6}}}, {{@ip={@broadcast, @broadcast, 0xffffffff, 0xffffffff, 'macvtap0\x00', 'veth1_vlan\x00', {0xff}, {0xff}, 0x5c, 0x3}, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@inet=@socket2={{0x28}, 0xd466ce597294d1e7}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x4, 0x5, 0x6, 0x0, 0x1, 0x4], 0x5, 0x2}, {0xffffffffffffffff, [0x0, 0x3, 0x1, 0x4, 0x6], 0x3, 0x2}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 20:46:35 executing program 0: r0 = io_uring_setup(0x17d0, &(0x7f0000000000)={0x0, 0xae9c, 0x400, 0x1, 0x2f1}) syz_io_uring_setup(0x7e93, &(0x7f0000000080)={0x0, 0xf1ad, 0x800, 0x0, 0x396}, &(0x7f0000000100), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x30, r0, 0x0) prctl$PR_SET_SECUREBITS(0x8, 0x0) 20:46:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x10, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:35 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x25000000}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:35 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x6c, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:35 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000)=[{}], &(0x7f0000000040)=0x8) (async, rerun: 64) prctl$PR_SET_SECUREBITS(0x7, 0x0) (rerun: 64) 20:46:35 executing program 0: r0 = io_uring_setup(0x17d0, &(0x7f0000000000)={0x0, 0xae9c, 0x400, 0x1, 0x2f1}) (async) syz_io_uring_setup(0x7e93, &(0x7f0000000080)={0x0, 0xf1ad, 0x800, 0x0, 0x396}, &(0x7f0000000100), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x30, r0, 0x0) (async) prctl$PR_SET_SECUREBITS(0x8, 0x0) 20:46:35 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x48000000}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:35 executing program 2: syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x8, 0x2) prctl$PR_SET_SECUREBITS(0x1c, 0x39) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) 20:46:35 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000)=[{}], &(0x7f0000000040)=0x8) prctl$PR_SET_SECUREBITS(0x7, 0x0) 20:46:35 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x74, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:35 executing program 2: syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) (async) prctl$PR_SET_SECUREBITS(0x8, 0x2) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x39) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) 20:46:35 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x4c000000}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:35 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x7a, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:35 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x3e8, 0xc0, 0x168, 0xffffffff, 0xc0, 0x280, 0x350, 0x350, 0xffffffff, 0x350, 0x350, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@inet=@socket3={{0x28}, 0x1}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x400}}}, {{@ip={@broadcast, @loopback, 0x0, 0xff000000, 'macvtap0\x00', 'syzkaller1\x00', {0xff}, {}, 0x89, 0x3, 0x11}, 0x0, 0x70, 0xa8}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x13, @dev={0xac, 0x14, 0x14, 0x17}, @multicast1, @gre_key=0xff, @gre_key=0x81}}}}, {{@ip={@broadcast, @multicast2, 0xffffff00, 0xff, 'veth1_to_bridge\x00', 'veth1_vlan\x00', {0xff}, {}, 0x33, 0x1, 0x20}, 0x0, 0xb8, 0x118, 0x0, {}, [@common=@ttl={{0x28}, {0x0, 0x5}}, @common=@socket0={{0x20}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@local, [0xff000000, 0xffffff00, 0xff000000, 0xffffff00], 0x4e20, 0x4e20, 0x4e21, 0x4e20, 0x8000, 0x727e, 0x2b5, 0x0, 0x400}}}, {{@ip={@loopback, @remote, 0xff, 0xffffff00, 'wg2\x00', 'wg1\x00', {0xff}, {}, 0x89, 0x2, 0x5}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@socket2={{0x28}, 0x2}]}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0xb, @broadcast, @rand_addr=0x64010100, @port=0x4e21, @port=0x4e20}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x448) 20:46:35 executing program 0: r0 = io_uring_setup(0x17d0, &(0x7f0000000000)={0x0, 0xae9c, 0x400, 0x1, 0x2f1}) syz_io_uring_setup(0x7e93, &(0x7f0000000080)={0x0, 0xf1ad, 0x800, 0x0, 0x396}, &(0x7f0000000100), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x30, r0, 0x0) prctl$PR_SET_SECUREBITS(0x8, 0x0) io_uring_setup(0x17d0, &(0x7f0000000000)={0x0, 0xae9c, 0x400, 0x1, 0x2f1}) (async) syz_io_uring_setup(0x7e93, &(0x7f0000000080)={0x0, 0xf1ad, 0x800, 0x0, 0x396}, &(0x7f0000000100), &(0x7f0000000140)) (async) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x30, r0, 0x0) (async) prctl$PR_SET_SECUREBITS(0x8, 0x0) (async) 20:46:35 executing program 2: syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x8, 0x2) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x39) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) 20:46:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x3, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:35 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x300, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:35 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x51000000}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:35 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x0) (async) prctl$PR_SET_SECUREBITS(0x7, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x3e8, 0xc0, 0x168, 0xffffffff, 0xc0, 0x280, 0x350, 0x350, 0xffffffff, 0x350, 0x350, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@inet=@socket3={{0x28}, 0x1}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x400}}}, {{@ip={@broadcast, @loopback, 0x0, 0xff000000, 'macvtap0\x00', 'syzkaller1\x00', {0xff}, {}, 0x89, 0x3, 0x11}, 0x0, 0x70, 0xa8}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x13, @dev={0xac, 0x14, 0x14, 0x17}, @multicast1, @gre_key=0xff, @gre_key=0x81}}}}, {{@ip={@broadcast, @multicast2, 0xffffff00, 0xff, 'veth1_to_bridge\x00', 'veth1_vlan\x00', {0xff}, {}, 0x33, 0x1, 0x20}, 0x0, 0xb8, 0x118, 0x0, {}, [@common=@ttl={{0x28}, {0x0, 0x5}}, @common=@socket0={{0x20}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@local, [0xff000000, 0xffffff00, 0xff000000, 0xffffff00], 0x4e20, 0x4e20, 0x4e21, 0x4e20, 0x8000, 0x727e, 0x2b5, 0x0, 0x400}}}, {{@ip={@loopback, @remote, 0xff, 0xffffff00, 'wg2\x00', 'wg1\x00', {0xff}, {}, 0x89, 0x2, 0x5}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@socket2={{0x28}, 0x2}]}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0xb, @broadcast, @rand_addr=0x64010100, @port=0x4e21, @port=0x4e20}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x448) 20:46:35 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x0) socket$nl_route(0x10, 0x3, 0x0) 20:46:35 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x500, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x4, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) [ 1291.025552][ T7853] x_tables: duplicate underflow at hook 1 20:46:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0x5450, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x889d) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000002580), r0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000002640)={&(0x7f0000002540)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000002600)={&(0x7f0000003a00)=ANY=[@ANYBLOB="04000000f1e74d01dc053f54c3a506f0c204a6e1695dee4ca397fc1d9086cd08ec1eb7bd537904650d582caf6057bfe9f6c024ae738c11530cbc36f540a5a95b9ae5dec37e6518fd0406bc3269a580a8e51417d552c76d7459bcac0b20a8d164c1b6019528ca3ec79886bdb1ca0f016665a0196aff283e1133d9f5fe5e6afe56be2cc6e7ff3ec52b6feceec093ad214f3de8ad397d729fa2b303c7", @ANYRES16=r2, @ANYBLOB="040028bd7000fddbdf250000000008001900ac1414bb"], 0x1c}, 0x1, 0x0, 0x0, 0x8040}, 0x850) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000002500)={&(0x7f0000001480)=@xdp, 0x80, &(0x7f0000003940)=[{&(0x7f0000000080)=""/193, 0xc1}, {&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000002680)=""/248, 0xf8}, {&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000000280)=""/203, 0x21}, {&(0x7f0000002780)=""/238, 0xee}, {&(0x7f0000002880)=""/4096, 0x1000}, {&(0x7f0000003880)=""/164, 0xa4}], 0x9, &(0x7f0000001500)=""/4096, 0x1000}, 0x120) prctl$PR_SET_SECUREBITS(0x8, 0x2) 20:46:35 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x68000000}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:35 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x600, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:35 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x0) socket$nl_route(0x10, 0x3, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) 20:46:35 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x3e8, 0xc0, 0x168, 0xffffffff, 0xc0, 0x280, 0x350, 0x350, 0xffffffff, 0x350, 0x350, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@inet=@socket3={{0x28}, 0x1}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x400}}}, {{@ip={@broadcast, @loopback, 0x0, 0xff000000, 'macvtap0\x00', 'syzkaller1\x00', {0xff}, {}, 0x89, 0x3, 0x11}, 0x0, 0x70, 0xa8}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x13, @dev={0xac, 0x14, 0x14, 0x17}, @multicast1, @gre_key=0xff, @gre_key=0x81}}}}, {{@ip={@broadcast, @multicast2, 0xffffff00, 0xff, 'veth1_to_bridge\x00', 'veth1_vlan\x00', {0xff}, {}, 0x33, 0x1, 0x20}, 0x0, 0xb8, 0x118, 0x0, {}, [@common=@ttl={{0x28}, {0x0, 0x5}}, @common=@socket0={{0x20}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@local, [0xff000000, 0xffffff00, 0xff000000, 0xffffff00], 0x4e20, 0x4e20, 0x4e21, 0x4e20, 0x8000, 0x727e, 0x2b5, 0x0, 0x400}}}, {{@ip={@loopback, @remote, 0xff, 0xffffff00, 'wg2\x00', 'wg1\x00', {0xff}, {}, 0x89, 0x2, 0x5}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@socket2={{0x28}, 0x2}]}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0xb, @broadcast, @rand_addr=0x64010100, @port=0x4e21, @port=0x4e20}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x448) 20:46:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x5, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:35 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x6c000000}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:35 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x700, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) [ 1291.073302][ T7874] x_tables: duplicate underflow at hook 1 20:46:35 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x0) socket$nl_route(0x10, 0x3, 0x0) 20:46:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0x5450, 0x0) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x889d) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000002580), r0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000002640)={&(0x7f0000002540)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000002600)={&(0x7f0000003a00)=ANY=[@ANYBLOB="04000000f1e74d01dc053f54c3a506f0c204a6e1695dee4ca397fc1d9086cd08ec1eb7bd537904650d582caf6057bfe9f6c024ae738c11530cbc36f540a5a95b9ae5dec37e6518fd0406bc3269a580a8e51417d552c76d7459bcac0b20a8d164c1b6019528ca3ec79886bdb1ca0f016665a0196aff283e1133d9f5fe5e6afe56be2cc6e7ff3ec52b6feceec093ad214f3de8ad397d729fa2b303c7", @ANYRES16=r2, @ANYBLOB="040028bd7000fddbdf250000000008001900ac1414bb"], 0x1c}, 0x1, 0x0, 0x0, 0x8040}, 0x850) (async) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000002500)={&(0x7f0000001480)=@xdp, 0x80, &(0x7f0000003940)=[{&(0x7f0000000080)=""/193, 0xc1}, {&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000002680)=""/248, 0xf8}, {&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000000280)=""/203, 0x21}, {&(0x7f0000002780)=""/238, 0xee}, {&(0x7f0000002880)=""/4096, 0x1000}, {&(0x7f0000003880)=""/164, 0xa4}], 0x9, &(0x7f0000001500)=""/4096, 0x1000}, 0x120) prctl$PR_SET_SECUREBITS(0x8, 0x2) 20:46:35 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x8d4, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x6, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:35 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0xc) 20:46:35 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x74000000}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:35 executing program 3: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x3d8, 0x248, 0x248, 0xffffffff, 0x0, 0x178, 0x340, 0x340, 0xffffffff, 0x340, 0x340, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@ttl={{0x28}, {0x1, 0x4}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x5, @dev={0xac, 0x14, 0x14, 0x17}, @private=0xa010100, @port=0x4e24, @port=0x4e22}}}}, {{@uncond, 0x0, 0x70, 0xa8}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x1, @rand_addr=0x64010101, @broadcast, @gre_key=0x78fd, @icmp_id=0x68}}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @local, 0x0, 0xa, [0x2c, 0x17, 0x25, 0x1c, 0x24, 0x30, 0x36, 0x14, 0x25, 0x11, 0x2f, 0x2f, 0xb, 0x21, 0x36, 0x38], 0x1, 0x0, 0x4}}}, {{@ip={@remote, @rand_addr=0x64010100, 0xffffffff, 0xffff00, 'pim6reg1\x00', 'ip6erspan0\x00', {0xff}, {0xa517a7de0b87e67a}, 0x84, 0x2}, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@icmp={{0x28}, {0xc, "dcf1"}}, @common=@ttl={{0x28}, {0x0, 0x7}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x1, @rand_addr=0x64010102, @multicast1, @gre_key=0xfff8, @port=0x4e23}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x438) prctl$PR_SET_SECUREBITS(0x7, 0x0) 20:46:35 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0xc) 20:46:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0x5450, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x889d) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000002580), r0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000002640)={&(0x7f0000002540)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000002600)={&(0x7f0000003a00)=ANY=[@ANYBLOB="04000000f1e74d01dc053f54c3a506f0c204a6e1695dee4ca397fc1d9086cd08ec1eb7bd537904650d582caf6057bfe9f6c024ae738c11530cbc36f540a5a95b9ae5dec37e6518fd0406bc3269a580a8e51417d552c76d7459bcac0b20a8d164c1b6019528ca3ec79886bdb1ca0f016665a0196aff283e1133d9f5fe5e6afe56be2cc6e7ff3ec52b6feceec093ad214f3de8ad397d729fa2b303c7", @ANYRES16=r2, @ANYBLOB="040028bd7000fddbdf250000000008001900ac1414bb"], 0x1c}, 0x1, 0x0, 0x0, 0x8040}, 0x850) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000002500)={&(0x7f0000001480)=@xdp, 0x80, &(0x7f0000003940)=[{&(0x7f0000000080)=""/193, 0xc1}, {&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000002680)=""/248, 0xf8}, {&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000000280)=""/203, 0x21}, {&(0x7f0000002780)=""/238, 0xee}, {&(0x7f0000002880)=""/4096, 0x1000}, {&(0x7f0000003880)=""/164, 0xa4}], 0x9, &(0x7f0000001500)=""/4096, 0x1000}, 0x120) (async) prctl$PR_SET_SECUREBITS(0x8, 0x2) [ 1291.136851][ T7891] x_tables: duplicate underflow at hook 1 20:46:35 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x900, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x7, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:35 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x7a000000}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:35 executing program 3: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x3d8, 0x248, 0x248, 0xffffffff, 0x0, 0x178, 0x340, 0x340, 0xffffffff, 0x340, 0x340, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@ttl={{0x28}, {0x1, 0x4}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x5, @dev={0xac, 0x14, 0x14, 0x17}, @private=0xa010100, @port=0x4e24, @port=0x4e22}}}}, {{@uncond, 0x0, 0x70, 0xa8}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x1, @rand_addr=0x64010101, @broadcast, @gre_key=0x78fd, @icmp_id=0x68}}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @local, 0x0, 0xa, [0x2c, 0x17, 0x25, 0x1c, 0x24, 0x30, 0x36, 0x14, 0x25, 0x11, 0x2f, 0x2f, 0xb, 0x21, 0x36, 0x38], 0x1, 0x0, 0x4}}}, {{@ip={@remote, @rand_addr=0x64010100, 0xffffffff, 0xffff00, 'pim6reg1\x00', 'ip6erspan0\x00', {0xff}, {0xa517a7de0b87e67a}, 0x84, 0x2}, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@icmp={{0x28}, {0xc, "dcf1"}}, @common=@ttl={{0x28}, {0x0, 0x7}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x1, @rand_addr=0x64010102, @multicast1, @gre_key=0xfff8, @port=0x4e23}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x438) (async) prctl$PR_SET_SECUREBITS(0x7, 0x0) 20:46:35 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0xc) 20:46:35 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0xa00, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:35 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0x6) prctl$PR_SET_SECUREBITS(0x1c, 0x28) 20:46:35 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0x6) prctl$PR_SET_SECUREBITS(0x1c, 0x28) 20:46:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x8, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:35 executing program 3: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x3d8, 0x248, 0x248, 0xffffffff, 0x0, 0x178, 0x340, 0x340, 0xffffffff, 0x340, 0x340, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@ttl={{0x28}, {0x1, 0x4}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x5, @dev={0xac, 0x14, 0x14, 0x17}, @private=0xa010100, @port=0x4e24, @port=0x4e22}}}}, {{@uncond, 0x0, 0x70, 0xa8}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x1, @rand_addr=0x64010101, @broadcast, @gre_key=0x78fd, @icmp_id=0x68}}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @local, 0x0, 0xa, [0x2c, 0x17, 0x25, 0x1c, 0x24, 0x30, 0x36, 0x14, 0x25, 0x11, 0x2f, 0x2f, 0xb, 0x21, 0x36, 0x38], 0x1, 0x0, 0x4}}}, {{@ip={@remote, @rand_addr=0x64010100, 0xffffffff, 0xffff00, 'pim6reg1\x00', 'ip6erspan0\x00', {0xff}, {0xa517a7de0b87e67a}, 0x84, 0x2}, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@icmp={{0x28}, {0xc, "dcf1"}}, @common=@ttl={{0x28}, {0x0, 0x7}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x1, @rand_addr=0x64010102, @multicast1, @gre_key=0xfff8, @port=0x4e23}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x438) (async, rerun: 64) prctl$PR_SET_SECUREBITS(0x7, 0x0) (rerun: 64) 20:46:35 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x0) epoll_create(0x2) 20:46:35 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:35 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0xb00, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x9, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:35 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0x2}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:35 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0x6) prctl$PR_SET_SECUREBITS(0x1c, 0x28) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x28) 20:46:35 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x0) epoll_create(0x2) 20:46:35 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x1) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) getsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f0000000040), &(0x7f0000000080)) openat$nci(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000000)) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x2, 0x6, 0x401, 0x7}, 0x14) 20:46:35 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0xc00, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:35 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x0) epoll_create(0x2) (async) epoll_create(0x2) 20:46:35 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0xa) getrlimit(0x8, &(0x7f0000000000)) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:35 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0x3}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0xa, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:35 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0xd00, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:35 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x4) 20:46:35 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x4) 20:46:35 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0xe00, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:35 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0x4}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0xb, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:35 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x1) (async) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) getsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f0000000040), &(0x7f0000000080)) (async, rerun: 64) openat$nci(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async, rerun: 64) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000000)) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x2, 0x6, 0x401, 0x7}, 0x14) 20:46:35 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0xa) (async) getrlimit(0x8, &(0x7f0000000000)) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:46:35 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0xec0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:35 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x0) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x4) 20:46:35 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0xa) getrlimit(0x8, &(0x7f0000000000)) prctl$PR_SET_SECUREBITS(0x1c, 0x0) prctl$PR_SET_SECUREBITS(0x8, 0xa) (async) getrlimit(0x8, &(0x7f0000000000)) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x0) (async) 20:46:35 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0x5}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:35 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0xf00, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0xc, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:35 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0xc) 20:46:35 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x58, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_NETNS_FD={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_NETNS_FD={0x8}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040}, 0x4004040) syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), r0) prctl$PR_SET_SECUREBITS(0x8, 0x0) 20:46:35 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x1100, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:35 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0x6}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) [ 1291.600425][ T3629] ================================================================== [ 1291.608517][ T3629] BUG: KCSAN: data-race in kernfs_iop_permission / kernfs_link_sibling [ 1291.616741][ T3629] [ 1291.619063][ T3629] read-write to 0xffff888102831640 of 8 bytes by task 7997 on cpu 1: [ 1291.627141][ T3629] kernfs_link_sibling+0x1e7/0x230 [ 1291.632252][ T3629] kernfs_add_one+0x260/0x390 [ 1291.636930][ T3629] kernfs_create_dir_ns+0x100/0x150 [ 1291.642121][ T3629] sysfs_create_dir_ns+0xd7/0x1d0 [ 1291.647237][ T3629] kobject_add_internal+0x47b/0x780 [ 1291.652421][ T3629] kobject_add+0xdc/0x150 [ 1291.656735][ T3629] device_add+0x2ff/0xab0 [ 1291.661042][ T3629] nfc_register_device+0x44/0x190 [ 1291.666057][ T3629] nci_register_device+0x4e6/0x570 [ 1291.671147][ T3629] virtual_ncidev_open+0xdc/0x140 [ 1291.676241][ T3629] misc_open+0x203/0x240 [ 1291.680483][ T3629] chrdev_open+0x34f/0x3c0 [ 1291.684891][ T3629] do_dentry_open+0x5cd/0xaf0 [ 1291.689564][ T3629] vfs_open+0x4a/0x50 [ 1291.693533][ T3629] path_openat+0x17f2/0x1d10 [ 1291.698132][ T3629] do_filp_open+0xf6/0x200 [ 1291.702526][ T3629] do_sys_openat2+0xab/0x110 [ 1291.707118][ T3629] __x64_sys_openat+0xf3/0x120 [ 1291.711900][ T3629] do_syscall_64+0x41/0xc0 [ 1291.716298][ T3629] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1291.722182][ T3629] [ 1291.724484][ T3629] read to 0xffff888102831640 of 8 bytes by task 3629 on cpu 0: [ 1291.732088][ T3629] kernfs_iop_permission+0x165/0x1b0 [ 1291.737360][ T3629] inode_permission+0x184/0x300 [ 1291.742276][ T3629] link_path_walk+0x19e/0x7e0 [ 1291.746938][ T3629] path_openat+0x1a1/0x1d10 [ 1291.751479][ T3629] do_filp_open+0xf6/0x200 [ 1291.755871][ T3629] do_sys_openat2+0xab/0x110 [ 1291.760444][ T3629] __x64_sys_openat+0xf3/0x120 [ 1291.765206][ T3629] do_syscall_64+0x41/0xc0 [ 1291.769610][ T3629] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1291.775492][ T3629] [ 1291.777801][ T3629] value changed: 0x0000000000000039 -> 0x000000000000003a [ 1291.784883][ T3629] [ 1291.787185][ T3629] Reported by Kernel Concurrency Sanitizer on: [ 1291.793398][ T3629] CPU: 0 PID: 3629 Comm: udevd Not tainted 6.5.0-rc5-syzkaller-00243-g9106536c1aa3 #0 [ 1291.802916][ T3629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1291.812968][ T3629] ================================================================== 20:46:36 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x1) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) getsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f0000000040), &(0x7f0000000080)) openat$nci(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000000)) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x2, 0x6, 0x401, 0x7}, 0x14) prctl$PR_SET_SECUREBITS(0x7, 0x1) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) (async) write$char_usb(r0, 0x0, 0x0) (async) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) getsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f0000000040), &(0x7f0000000080)) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000000)) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) (async) write$char_usb(r1, 0x0, 0x0) (async) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x2, 0x6, 0x401, 0x7}, 0x14) (async) 20:46:36 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0xc) 20:46:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0xd, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:36 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x58, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_NETNS_FD={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_NETNS_FD={0x8}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040}, 0x4004040) (async) syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), r0) (async) prctl$PR_SET_SECUREBITS(0x8, 0x0) 20:46:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x1200, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0x7}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0xe, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:36 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0xc) 20:46:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x2500, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0xf, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0x8}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:36 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x58, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_NETNS_FD={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_NETNS_FD={0x8}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040}, 0x4004040) (async) syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), r0) (async) prctl$PR_SET_SECUREBITS(0x8, 0x0) 20:46:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x3941, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:36 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x0) r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000100)) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff8000/0x6000)=nil, &(0x7f0000ff8000/0x2000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ff8000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff5000/0x4000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fee000/0x12000)=nil, &(0x7f0000000040)="c153f466efbb149e5c6f1bb178a150a286374efd", 0x14, r0}, 0x68) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) sendto$unix(r2, &(0x7f0000000a00)="4a3b6199b498", 0x6, 0x8092, &(0x7f0000000a40)=@abs={0x1, 0x0, 0x4e21}, 0x6e) recvmsg$can_bcm(r1, &(0x7f00000007c0)={&(0x7f0000000180)=@vsock, 0x80, &(0x7f0000000680)=[{&(0x7f0000000200)=""/36, 0x24}, {&(0x7f0000000240)=""/87, 0x57}, {&(0x7f00000002c0)=""/94, 0x5e}, {&(0x7f0000000340)=""/188, 0xbc}, {&(0x7f0000000400)=""/147, 0x93}, {&(0x7f00000004c0)=""/233, 0xe9}, {&(0x7f00000005c0)=""/170, 0xaa}], 0x7, &(0x7f0000000700)=""/166, 0xa6}, 0x40002062) setsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f00000009c0)=[{{0x0, 0x0, 0x0, 0x1}, {0x4, 0x0, 0x1, 0x1}}, {{0x0, 0x0, 0x0, 0x1}, {0x0, 0x0, 0x1}}], 0x10) pselect6(0x40, &(0x7f0000000840)={0x1226, 0x5, 0x4, 0x8, 0x0, 0xffff, 0x200, 0xff}, &(0x7f0000000880)={0x4, 0x8000000000000000, 0xfe, 0x6, 0xf829, 0x7f, 0x3, 0x5}, &(0x7f00000008c0)={0x9, 0x4, 0x800, 0x6, 0x100, 0x7, 0x9, 0x2}, &(0x7f0000000900)={0x77359400}, &(0x7f0000000980)={&(0x7f0000000ac0)={[0x7]}, 0x8}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 20:46:36 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x8) 20:46:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x10, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0x9}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:36 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x8) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x8) 20:46:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x4139, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0xa}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x11, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0xb}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:36 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x0) r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000100)) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff8000/0x6000)=nil, &(0x7f0000ff8000/0x2000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ff8000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff5000/0x4000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fee000/0x12000)=nil, &(0x7f0000000040)="c153f466efbb149e5c6f1bb178a150a286374efd", 0x14, r0}, 0x68) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) sendto$unix(r2, &(0x7f0000000a00)="4a3b6199b498", 0x6, 0x8092, &(0x7f0000000a40)=@abs={0x1, 0x0, 0x4e21}, 0x6e) recvmsg$can_bcm(r1, &(0x7f00000007c0)={&(0x7f0000000180)=@vsock, 0x80, &(0x7f0000000680)=[{&(0x7f0000000200)=""/36, 0x24}, {&(0x7f0000000240)=""/87, 0x57}, {&(0x7f00000002c0)=""/94, 0x5e}, {&(0x7f0000000340)=""/188, 0xbc}, {&(0x7f0000000400)=""/147, 0x93}, {&(0x7f00000004c0)=""/233, 0xe9}, {&(0x7f00000005c0)=""/170, 0xaa}], 0x7, &(0x7f0000000700)=""/166, 0xa6}, 0x40002062) setsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f00000009c0)=[{{0x0, 0x0, 0x0, 0x1}, {0x4, 0x0, 0x1, 0x1}}, {{0x0, 0x0, 0x0, 0x1}, {0x0, 0x0, 0x1}}], 0x10) pselect6(0x40, &(0x7f0000000840)={0x1226, 0x5, 0x4, 0x8, 0x0, 0xffff, 0x200, 0xff}, &(0x7f0000000880)={0x4, 0x8000000000000000, 0xfe, 0x6, 0xf829, 0x7f, 0x3, 0x5}, &(0x7f00000008c0)={0x9, 0x4, 0x800, 0x6, 0x100, 0x7, 0x9, 0x2}, &(0x7f0000000900)={0x77359400}, &(0x7f0000000980)={&(0x7f0000000ac0)={[0x7]}, 0x8}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SET_SECUREBITS(0x7, 0x0) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000100)) (async) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff8000/0x6000)=nil, &(0x7f0000ff8000/0x2000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ff8000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff5000/0x4000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fee000/0x12000)=nil, &(0x7f0000000040)="c153f466efbb149e5c6f1bb178a150a286374efd", 0x14, r0}, 0x68) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) (async) write$char_usb(r1, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) (async) sendto$unix(r2, &(0x7f0000000a00)="4a3b6199b498", 0x6, 0x8092, &(0x7f0000000a40)=@abs={0x1, 0x0, 0x4e21}, 0x6e) (async) recvmsg$can_bcm(r1, &(0x7f00000007c0)={&(0x7f0000000180)=@vsock, 0x80, &(0x7f0000000680)=[{&(0x7f0000000200)=""/36, 0x24}, {&(0x7f0000000240)=""/87, 0x57}, {&(0x7f00000002c0)=""/94, 0x5e}, {&(0x7f0000000340)=""/188, 0xbc}, {&(0x7f0000000400)=""/147, 0x93}, {&(0x7f00000004c0)=""/233, 0xe9}, {&(0x7f00000005c0)=""/170, 0xaa}], 0x7, &(0x7f0000000700)=""/166, 0xa6}, 0x40002062) (async) setsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f00000009c0)=[{{0x0, 0x0, 0x0, 0x1}, {0x4, 0x0, 0x1, 0x1}}, {{0x0, 0x0, 0x0, 0x1}, {0x0, 0x0, 0x1}}], 0x10) (async) pselect6(0x40, &(0x7f0000000840)={0x1226, 0x5, 0x4, 0x8, 0x0, 0xffff, 0x200, 0xff}, &(0x7f0000000880)={0x4, 0x8000000000000000, 0xfe, 0x6, 0xf829, 0x7f, 0x3, 0x5}, &(0x7f00000008c0)={0x9, 0x4, 0x800, 0x6, 0x100, 0x7, 0x9, 0x2}, &(0x7f0000000900)={0x77359400}, &(0x7f0000000980)={&(0x7f0000000ac0)={[0x7]}, 0x8}) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) 20:46:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x12, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0xc}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x4800, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:36 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x0) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x8) 20:46:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0xd}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) [ 1291.997019][ T8249] workqueue: Failed to create a rescuer kthread for wq "nfc4_nci_cmd_wq": -EINTR 20:46:36 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x0) (async) r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000100)) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff8000/0x6000)=nil, &(0x7f0000ff8000/0x2000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ff8000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff5000/0x4000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fee000/0x12000)=nil, &(0x7f0000000040)="c153f466efbb149e5c6f1bb178a150a286374efd", 0x14, r0}, 0x68) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) sendto$unix(r2, &(0x7f0000000a00)="4a3b6199b498", 0x6, 0x8092, &(0x7f0000000a40)=@abs={0x1, 0x0, 0x4e21}, 0x6e) (async) recvmsg$can_bcm(r1, &(0x7f00000007c0)={&(0x7f0000000180)=@vsock, 0x80, &(0x7f0000000680)=[{&(0x7f0000000200)=""/36, 0x24}, {&(0x7f0000000240)=""/87, 0x57}, {&(0x7f00000002c0)=""/94, 0x5e}, {&(0x7f0000000340)=""/188, 0xbc}, {&(0x7f0000000400)=""/147, 0x93}, {&(0x7f00000004c0)=""/233, 0xe9}, {&(0x7f00000005c0)=""/170, 0xaa}], 0x7, &(0x7f0000000700)=""/166, 0xa6}, 0x40002062) (async) setsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f00000009c0)=[{{0x0, 0x0, 0x0, 0x1}, {0x4, 0x0, 0x1, 0x1}}, {{0x0, 0x0, 0x0, 0x1}, {0x0, 0x0, 0x1}}], 0x10) pselect6(0x40, &(0x7f0000000840)={0x1226, 0x5, 0x4, 0x8, 0x0, 0xffff, 0x200, 0xff}, &(0x7f0000000880)={0x4, 0x8000000000000000, 0xfe, 0x6, 0xf829, 0x7f, 0x3, 0x5}, &(0x7f00000008c0)={0x9, 0x4, 0x800, 0x6, 0x100, 0x7, 0x9, 0x2}, &(0x7f0000000900)={0x77359400}, &(0x7f0000000980)={&(0x7f0000000ac0)={[0x7]}, 0x8}) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 20:46:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x4c00, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:36 executing program 0: rt_sigaction(0x34, &(0x7f0000000280)={&(0x7f0000000200)="f3643665dbce6642de802d000000c402c99284295bffffffc422510c98f87f000064dcdc470f9518660ff42a400fb67d1e420fb9507e660f6727", 0x0, 0x0}, 0x0, 0x8, &(0x7f00000004c0)) prctl$PR_SET_SECUREBITS(0x8, 0x0) 20:46:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0xe}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x13, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x6000, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0xf}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:36 executing program 0: rt_sigaction(0x34, &(0x7f0000000280)={&(0x7f0000000200)="f3643665dbce6642de802d000000c402c99284295bffffffc422510c98f87f000064dcdc470f9518660ff42a400fb67d1e420fb9507e660f6727", 0x0, 0x0}, 0x0, 0x8, &(0x7f00000004c0)) (async) prctl$PR_SET_SECUREBITS(0x8, 0x0) 20:46:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x16, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x6800, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:36 executing program 0: rt_sigaction(0x34, &(0x7f0000000280)={&(0x7f0000000200)="f3643665dbce6642de802d000000c402c99284295bffffffc422510c98f87f000064dcdc470f9518660ff42a400fb67d1e420fb9507e660f6727", 0x0, 0x0}, 0x0, 0x8, &(0x7f00000004c0)) prctl$PR_SET_SECUREBITS(0x8, 0x0) rt_sigaction(0x34, &(0x7f0000000280)={&(0x7f0000000200)="f3643665dbce6642de802d000000c402c99284295bffffffc422510c98f87f000064dcdc470f9518660ff42a400fb67d1e420fb9507e660f6727", 0x0, 0x0}, 0x0, 0x8, &(0x7f00000004c0)) (async) prctl$PR_SET_SECUREBITS(0x8, 0x0) (async) 20:46:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x889d) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000100)={@local, @loopback, 0x0}, &(0x7f0000000140)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000180)={@remote, @multicast2, 0x0}, &(0x7f00000001c0)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000200)={@multicast1, @loopback, 0x0}, &(0x7f0000000240)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000280)={@empty, @broadcast, 0x0}, &(0x7f00000002c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000340)={@rand_addr, @multicast1, 0x0}, &(0x7f0000000380)=0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000003c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}], 0x8, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000006c0)={@local, @remote, 0x0}, &(0x7f0000000700)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000780)={'team0\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], 0x0, 0x8, &(0x7f00000008c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000b00)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000bc0)={'tunl0\x00', &(0x7f0000000b40)={'ip_vti0\x00', 0x0, 0x1, 0x8000, 0x9, 0x9, {{0x11, 0x4, 0x0, 0x35, 0x44, 0x65, 0x0, 0x9, 0x29, 0x0, @local, @private=0xa010100, {[@generic={0x0, 0x10, "8d22c5e63328ffe89853b0c94b88"}, @generic={0x94, 0x3, 'h'}, @generic={0x88, 0xf, "08b7759c496f35145adb4ac59f"}, @lsrr={0x83, 0xb, 0xaf, [@broadcast, @remote]}]}}}}}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000001900)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000018c0)={&(0x7f0000000c00)={0xcb8, 0x0, 0x400, 0x70bd27, 0x25dfdbfc, {}, [{{0x8}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x104, 0x2, 0x0, 0x1, [{0x54, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x24, 0x4, [{0xfff7, 0xad, 0x0, 0x5}, {0x7f, 0x40, 0x0, 0x1000}, {0x2, 0x1, 0xe3, 0x1353}, {0x2, 0x1, 0x7, 0x5}]}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x1a8, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r1}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x1ac, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3f}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffffff8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}, {0x8}}}]}}, {{0x8, 0x1, r5}, {0x1a8, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r6}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x248, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r9}}, {0x8}}}]}}, {{0x8, 0x1, r10}, {0x170, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xec51}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1ff}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r12}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}]}}, {{0x8}, {0x16c, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x598}}}, {0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x8, 0x3f, 0xf, 0x8}, {0x6, 0x7, 0x6, 0x4}, {0x3ff, 0x0, 0x0, 0x1}, {0x1ff, 0xfc, 0x7f, 0x35}, {0x5bee, 0x3f, 0xd3, 0x7}, {0x2, 0x5, 0x4, 0x400}, {0x101, 0x5, 0x6, 0xfff}]}}}]}}, {{0x8, 0x1, r13}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}]}}]}, 0xcb8}, 0x1, 0x0, 0x0, 0x800}, 0x801) mkdirat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs2\x00', 0x1ff) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r15 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r15, 0x0, 0x0) r16 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r15, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r16}, './file0\x00'}) setns(r14, 0x20000) msync(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x7) 20:46:36 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x8) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r0, 0x65, 0x5, &(0x7f0000000000)=0x1, 0x4) 20:46:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0x10}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x889d) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000100)={@local, @loopback, 0x0}, &(0x7f0000000140)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000180)={@remote, @multicast2, 0x0}, &(0x7f00000001c0)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000200)={@multicast1, @loopback}, &(0x7f0000000240)=0xc) (async) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000200)={@multicast1, @loopback, 0x0}, &(0x7f0000000240)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000280)={@empty, @broadcast, 0x0}, &(0x7f00000002c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000340)={@rand_addr, @multicast1}, &(0x7f0000000380)=0xc) (async) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000340)={@rand_addr, @multicast1, 0x0}, &(0x7f0000000380)=0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000003c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}], 0x8, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000006c0)={@local, @remote}, &(0x7f0000000700)=0xc) (async) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000006c0)={@local, @remote, 0x0}, &(0x7f0000000700)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000780)={'team0\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], 0x0, 0x8, &(0x7f00000008c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], 0x0, 0x8, &(0x7f00000008c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000b00)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000bc0)={'tunl0\x00', &(0x7f0000000b40)={'ip_vti0\x00', 0x0, 0x1, 0x8000, 0x9, 0x9, {{0x11, 0x4, 0x0, 0x35, 0x44, 0x65, 0x0, 0x9, 0x29, 0x0, @local, @private=0xa010100, {[@generic={0x0, 0x10, "8d22c5e63328ffe89853b0c94b88"}, @generic={0x94, 0x3, 'h'}, @generic={0x88, 0xf, "08b7759c496f35145adb4ac59f"}, @lsrr={0x83, 0xb, 0xaf, [@broadcast, @remote]}]}}}}}) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000bc0)={'tunl0\x00', &(0x7f0000000b40)={'ip_vti0\x00', 0x0, 0x1, 0x8000, 0x9, 0x9, {{0x11, 0x4, 0x0, 0x35, 0x44, 0x65, 0x0, 0x9, 0x29, 0x0, @local, @private=0xa010100, {[@generic={0x0, 0x10, "8d22c5e63328ffe89853b0c94b88"}, @generic={0x94, 0x3, 'h'}, @generic={0x88, 0xf, "08b7759c496f35145adb4ac59f"}, @lsrr={0x83, 0xb, 0xaf, [@broadcast, @remote]}]}}}}}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000001900)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000018c0)={&(0x7f0000000c00)={0xcb8, 0x0, 0x400, 0x70bd27, 0x25dfdbfc, {}, [{{0x8}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x104, 0x2, 0x0, 0x1, [{0x54, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x24, 0x4, [{0xfff7, 0xad, 0x0, 0x5}, {0x7f, 0x40, 0x0, 0x1000}, {0x2, 0x1, 0xe3, 0x1353}, {0x2, 0x1, 0x7, 0x5}]}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x1a8, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r1}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x1ac, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3f}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffffff8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}, {0x8}}}]}}, {{0x8, 0x1, r5}, {0x1a8, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r6}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x248, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r9}}, {0x8}}}]}}, {{0x8, 0x1, r10}, {0x170, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xec51}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1ff}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r12}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}]}}, {{0x8}, {0x16c, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x598}}}, {0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x8, 0x3f, 0xf, 0x8}, {0x6, 0x7, 0x6, 0x4}, {0x3ff, 0x0, 0x0, 0x1}, {0x1ff, 0xfc, 0x7f, 0x35}, {0x5bee, 0x3f, 0xd3, 0x7}, {0x2, 0x5, 0x4, 0x400}, {0x101, 0x5, 0x6, 0xfff}]}}}]}}, {{0x8, 0x1, r13}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}]}}]}, 0xcb8}, 0x1, 0x0, 0x0, 0x800}, 0x801) mkdirat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs2\x00', 0x1ff) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r15 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r15, 0x0, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) (async) r16 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r15, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r16}, './file0\x00'}) setns(r14, 0x20000) (async) setns(r14, 0x20000) msync(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x7) 20:46:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x1d, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x6c00, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0x11}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x7400, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:36 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x8) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) (async) write$char_usb(r0, 0x0, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r0, 0x65, 0x5, &(0x7f0000000000)=0x1, 0x4) 20:46:36 executing program 0: prctl$PR_SET_SECUREBITS(0x1c, 0x2) socket$nl_rdma(0x10, 0x3, 0x14) 20:46:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x25, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0x12}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x889d) (async) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000100)={@local, @loopback, 0x0}, &(0x7f0000000140)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000180)={@remote, @multicast2, 0x0}, &(0x7f00000001c0)=0xc) (async) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000200)={@multicast1, @loopback, 0x0}, &(0x7f0000000240)=0xc) (async) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000280)={@empty, @broadcast, 0x0}, &(0x7f00000002c0)=0xc) (async) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) (async) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000340)={@rand_addr, @multicast1, 0x0}, &(0x7f0000000380)=0xc) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000003c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}], 0x8, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) (async) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000006c0)={@local, @remote, 0x0}, &(0x7f0000000700)=0xc) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'vcan0\x00', 0x0}) (async) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000780)={'team0\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], 0x0, 0x8, &(0x7f00000008c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) (async) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000b00)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000bc0)={'tunl0\x00', &(0x7f0000000b40)={'ip_vti0\x00', 0x0, 0x1, 0x8000, 0x9, 0x9, {{0x11, 0x4, 0x0, 0x35, 0x44, 0x65, 0x0, 0x9, 0x29, 0x0, @local, @private=0xa010100, {[@generic={0x0, 0x10, "8d22c5e63328ffe89853b0c94b88"}, @generic={0x94, 0x3, 'h'}, @generic={0x88, 0xf, "08b7759c496f35145adb4ac59f"}, @lsrr={0x83, 0xb, 0xaf, [@broadcast, @remote]}]}}}}}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000001900)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000018c0)={&(0x7f0000000c00)={0xcb8, 0x0, 0x400, 0x70bd27, 0x25dfdbfc, {}, [{{0x8}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x104, 0x2, 0x0, 0x1, [{0x54, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x24, 0x4, [{0xfff7, 0xad, 0x0, 0x5}, {0x7f, 0x40, 0x0, 0x1000}, {0x2, 0x1, 0xe3, 0x1353}, {0x2, 0x1, 0x7, 0x5}]}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x1a8, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r1}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x1ac, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3f}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffffff8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}, {0x8}}}]}}, {{0x8, 0x1, r5}, {0x1a8, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r6}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x248, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r9}}, {0x8}}}]}}, {{0x8, 0x1, r10}, {0x170, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xec51}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1ff}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r12}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}]}}, {{0x8}, {0x16c, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x598}}}, {0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x8, 0x3f, 0xf, 0x8}, {0x6, 0x7, 0x6, 0x4}, {0x3ff, 0x0, 0x0, 0x1}, {0x1ff, 0xfc, 0x7f, 0x35}, {0x5bee, 0x3f, 0xd3, 0x7}, {0x2, 0x5, 0x4, 0x400}, {0x101, 0x5, 0x6, 0xfff}]}}}]}}, {{0x8, 0x1, r13}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}]}}]}, 0xcb8}, 0x1, 0x0, 0x0, 0x800}, 0x801) (async) mkdirat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs2\x00', 0x1ff) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) (async) r15 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r15, 0x0, 0x0) (async) r16 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r15, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r16}, './file0\x00'}) (async) setns(r14, 0x20000) (async) msync(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x7) 20:46:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x7a00, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:36 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x8) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r0, 0x65, 0x5, &(0x7f0000000000)=0x1, 0x4) prctl$PR_SET_SECUREBITS(0x7, 0x8) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) (async) write$char_usb(r0, 0x0, 0x0) (async) setsockopt$CAN_RAW_FD_FRAMES(r0, 0x65, 0x5, &(0x7f0000000000)=0x1, 0x4) (async) 20:46:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0x25}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x48, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:36 executing program 0: prctl$PR_SET_SECUREBITS(0x1c, 0x2) (async) socket$nl_rdma(0x10, 0x3, 0x14) 20:46:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0xc00e, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:36 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x6) prctl$PR_SET_SECUREBITS(0x1c, 0x24) 20:46:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x4c, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0x48}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:36 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0xa) 20:46:36 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x6) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x24) 20:46:36 executing program 0: prctl$PR_SET_SECUREBITS(0x1c, 0x2) (async, rerun: 32) socket$nl_rdma(0x10, 0x3, 0x14) (rerun: 32) 20:46:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x68, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0xd408, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0x4c}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:36 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0xa) 20:46:36 executing program 0: lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x400}, {0x1, 0x4000000}]}, 0x14, 0x3) open_tree(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800) prctl$PR_SET_SECUREBITS(0x8, 0x0) open_tree(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x1) 20:46:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x34000, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x6c, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:36 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x6) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x24) 20:46:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0x51}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x74, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:36 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0xa) 20:46:36 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x16) 20:46:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x400300, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:36 executing program 0: lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x400}, {0x1, 0x4000000}]}, 0x14, 0x3) (async) open_tree(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800) (async) prctl$PR_SET_SECUREBITS(0x8, 0x0) (async) open_tree(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x1) 20:46:36 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000780)={'wlan0\x00'}) mmap(&(0x7f0000fe9000/0x14000)=nil, 0x14000, 0x8, 0x11, r0, 0x5c852000) prctl$PR_SET_SECUREBITS(0x8, 0x2) socket$nl_generic(0x10, 0x3, 0x10) 20:46:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0x68}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:36 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x16) 20:46:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x1000000, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x7a, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:36 executing program 0: lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x400}, {0x1, 0x4000000}]}, 0x14, 0x3) (async) open_tree(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800) (async) prctl$PR_SET_SECUREBITS(0x8, 0x0) (async) open_tree(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x1) 20:46:36 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x2) 20:46:36 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x16) 20:46:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0xa, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x2000000, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0x6c}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x3000000, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:36 executing program 2: socket$nl_audit(0x10, 0x3, 0x9) (async) r0 = socket$nl_audit(0x10, 0x3, 0x9) syz_open_dev$char_usb(0xc, 0xb4, 0x0) (async) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000780)={'wlan0\x00'}) mmap(&(0x7f0000fe9000/0x14000)=nil, 0x14000, 0x8, 0x11, r0, 0x5c852000) prctl$PR_SET_SECUREBITS(0x8, 0x2) socket$nl_generic(0x10, 0x3, 0x10) 20:46:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0x74}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:36 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x2) 20:46:36 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f00000000c0)=ANY=[@ANYBLOB="dcd3f6bbf1050818ddd38f2168ba02e7bb938c50d480af744512e10657a4c526d132b850", @ANYRES32=0xffffffffffffffff, @ANYBLOB="06000000000000002e2f66696c653000"]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp-reno\x00', 0xb) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x103800, 0x0) 20:46:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x29, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x4000000, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:36 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x0) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x2) 20:46:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0x7a}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:36 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f00000000c0)=ANY=[@ANYBLOB="dcd3f6bbf1050818ddd38f2168ba02e7bb938c50d480af744512e10657a4c526d132b850", @ANYRES32, @ANYBLOB="06000000000000002e2f66696c653000"]) (async) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f00000000c0)=ANY=[@ANYBLOB="dcd3f6bbf1050818ddd38f2168ba02e7bb938c50d480af744512e10657a4c526d132b850", @ANYRES32=0xffffffffffffffff, @ANYBLOB="06000000000000002e2f66696c653000"]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp-reno\x00', 0xb) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x103800, 0x0) 20:46:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x2e, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:36 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x3d) socket$unix(0x1, 0x2, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x15) prctl$PR_SET_SECUREBITS(0x1c, 0x2d) prctl$PR_SET_SECUREBITS(0x1c, 0x11) 20:46:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x5000000, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:36 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) syz_open_dev$char_usb(0xc, 0xb4, 0x0) (async) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000780)={'wlan0\x00'}) mmap(&(0x7f0000fe9000/0x14000)=nil, 0x14000, 0x8, 0x11, r0, 0x5c852000) (async) prctl$PR_SET_SECUREBITS(0x8, 0x2) (async) socket$nl_generic(0x10, 0x3, 0x10) 20:46:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0x300}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:36 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f00000000c0)=ANY=[@ANYBLOB="dcd3f6bbf1050818ddd38f2168ba02e7bb938c50d480af744512e10657a4c526d132b850", @ANYRES32=0xffffffffffffffff, @ANYBLOB="06000000000000002e2f66696c653000"]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp-reno\x00', 0xb) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x103800, 0x0) prctl$PR_SET_SECUREBITS(0x7, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f00000000c0)=ANY=[@ANYBLOB="dcd3f6bbf1050818ddd38f2168ba02e7bb938c50d480af744512e10657a4c526d132b850", @ANYRES32, @ANYBLOB="06000000000000002e2f66696c653000"]) (async) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp-reno\x00', 0xb) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x103800, 0x0) (async) 20:46:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x64, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x6000000, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:36 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x3d) (async) socket$unix(0x1, 0x2, 0x0) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x15) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x2d) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x11) 20:46:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0x500}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x7000000, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x8000000, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x5f5e0ff, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:37 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x9000000, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0x600}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:37 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0x18) 20:46:37 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x3d) (async) prctl$PR_SET_SECUREBITS(0x8, 0x3d) socket$unix(0x1, 0x2, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x15) prctl$PR_SET_SECUREBITS(0x1c, 0x2d) prctl$PR_SET_SECUREBITS(0x1c, 0x11) 20:46:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:37 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0x18) 20:46:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0x700}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:37 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x1) socket$inet(0x2, 0xa, 0x9) prctl$PR_SET_SECUREBITS(0x1c, 0x2) 20:46:37 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0xa000000, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:37 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0x18) 20:46:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0x900}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:37 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0xb000000, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x3, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:37 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0x2d) prctl$PR_SET_SECUREBITS(0x1c, 0x8) 20:46:37 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x1) (async) socket$inet(0x2, 0xa, 0x9) prctl$PR_SET_SECUREBITS(0x1c, 0x2) 20:46:37 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0xc000000, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0xa00}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:37 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0x2d) prctl$PR_SET_SECUREBITS(0x1c, 0x8) prctl$PR_SET_SECUREBITS(0x8, 0x2d) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x8) (async) 20:46:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:37 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000000c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000200), &(0x7f0000000240), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000280)}}, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000400)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r1, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, &(0x7f00000004c0)=[0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000540)=[{}], 0x8, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000840)={'ip_vti0\x00', &(0x7f0000000780)={'sit0\x00', 0x0, 0x8000, 0x8000, 0x7, 0xb5, {{0x10, 0x4, 0x0, 0x8, 0x40, 0x66, 0x0, 0x1, 0x29, 0x0, @local, @multicast1, {[@rr={0x7, 0x27, 0xcc, [@private=0xa010101, @local, @multicast1, @local, @empty, @rand_addr=0x64010100, @rand_addr=0x64010101, @remote, @multicast2]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'syztnl1\x00', &(0x7f0000000880)={'ip_vti0\x00', 0x0, 0x7800, 0x40, 0x2, 0x1, {{0x1e, 0x4, 0x2, 0x9, 0x78, 0x64, 0x0, 0x2, 0x4, 0x0, @remote, @local, {[@lsrr={0x83, 0x7, 0xf6, [@empty]}, @ssrr={0x89, 0x2b, 0x2a, [@remote, @empty, @local, @dev={0xac, 0x14, 0x14, 0x13}, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, @broadcast]}, @timestamp_addr={0x44, 0x14, 0xd2, 0x1, 0x2, [{@loopback, 0x2}, {@private=0xa010101, 0x100}]}, @generic={0x86, 0x2}, @timestamp_addr={0x44, 0xc, 0x15, 0x1, 0xe, [{@loopback, 0x81}]}, @lsrr={0x83, 0xf, 0x8b, [@remote, @multicast1, @loopback]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000980)={'team0\x00', 0x0}) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f00000009c0)={@local, @empty, 0x0}, &(0x7f0000000a00)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'vxcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000a80)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000ac0)={'vxcan0\x00', 0x0}) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000001440)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001400)={&(0x7f0000000b00)={0x8cc, 0x0, 0xe07, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8}, {0x1dc, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x54, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x24, 0x4, [{0x100, 0x7, 0xb5, 0x7f}, {0x200, 0xa7, 0x21, 0x1ff}, {0x400, 0x3, 0xc0, 0xff}, {0x5, 0x43, 0x44, 0x2}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r3}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x10000}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r5}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x80000000}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r6}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x6, 0xb5, 0x20, 0x1000}, {0x40, 0x2, 0x9, 0x6}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x101}}}, {0x34, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x4}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r7}}}]}}, {{0x8, 0x1, r8}, {0xf8, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x8001}}, {0x8, 0x6, r9}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0x174, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}]}}, {{0x8}, {0x19c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7f}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffffc}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0xc0, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r12}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x8cc}}, 0x4048001) write$char_usb(r1, 0x0, 0x0) write$cgroup_type(r1, &(0x7f0000000000), 0x9) prctl$PR_SET_SECUREBITS(0x1c, 0x2) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) prctl$PR_SET_SECUREBITS(0x1c, 0x20) 20:46:37 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x1) (async) socket$inet(0x2, 0xa, 0x9) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x2) 20:46:37 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0xd000000, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0xb00}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:37 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000000c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000200), &(0x7f0000000240), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000280)}}, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000400)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r1, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, &(0x7f00000004c0)=[0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000540)=[{}], 0x8, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000840)={'ip_vti0\x00', &(0x7f0000000780)={'sit0\x00', 0x0, 0x8000, 0x8000, 0x7, 0xb5, {{0x10, 0x4, 0x0, 0x8, 0x40, 0x66, 0x0, 0x1, 0x29, 0x0, @local, @multicast1, {[@rr={0x7, 0x27, 0xcc, [@private=0xa010101, @local, @multicast1, @local, @empty, @rand_addr=0x64010100, @rand_addr=0x64010101, @remote, @multicast2]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'syztnl1\x00', &(0x7f0000000880)={'ip_vti0\x00', 0x0, 0x7800, 0x40, 0x2, 0x1, {{0x1e, 0x4, 0x2, 0x9, 0x78, 0x64, 0x0, 0x2, 0x4, 0x0, @remote, @local, {[@lsrr={0x83, 0x7, 0xf6, [@empty]}, @ssrr={0x89, 0x2b, 0x2a, [@remote, @empty, @local, @dev={0xac, 0x14, 0x14, 0x13}, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, @broadcast]}, @timestamp_addr={0x44, 0x14, 0xd2, 0x1, 0x2, [{@loopback, 0x2}, {@private=0xa010101, 0x100}]}, @generic={0x86, 0x2}, @timestamp_addr={0x44, 0xc, 0x15, 0x1, 0xe, [{@loopback, 0x81}]}, @lsrr={0x83, 0xf, 0x8b, [@remote, @multicast1, @loopback]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000980)={'team0\x00', 0x0}) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f00000009c0)={@local, @empty, 0x0}, &(0x7f0000000a00)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'vxcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000a80)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000ac0)={'vxcan0\x00', 0x0}) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000001440)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001400)={&(0x7f0000000b00)={0x8cc, 0x0, 0xe07, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8}, {0x1dc, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x54, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x24, 0x4, [{0x100, 0x7, 0xb5, 0x7f}, {0x200, 0xa7, 0x21, 0x1ff}, {0x400, 0x3, 0xc0, 0xff}, {0x5, 0x43, 0x44, 0x2}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r3}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x10000}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r5}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x80000000}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r6}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x6, 0xb5, 0x20, 0x1000}, {0x40, 0x2, 0x9, 0x6}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x101}}}, {0x34, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x4}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r7}}}]}}, {{0x8, 0x1, r8}, {0xf8, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x8001}}, {0x8, 0x6, r9}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0x174, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}]}}, {{0x8}, {0x19c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7f}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffffc}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0xc0, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r12}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x8cc}}, 0x4048001) write$char_usb(r1, 0x0, 0x0) write$cgroup_type(r1, &(0x7f0000000000), 0x9) prctl$PR_SET_SECUREBITS(0x1c, 0x2) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) prctl$PR_SET_SECUREBITS(0x1c, 0x20) prctl$PR_SET_SECUREBITS(0x7, 0x0) (async) socket$can_bcm(0x1d, 0x2, 0x2) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000000c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000200), &(0x7f0000000240), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000280)}}, 0x10) (async) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000400)) (async) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r1, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, &(0x7f00000004c0)=[0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000540)=[{}], 0x8, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000840)={'ip_vti0\x00', &(0x7f0000000780)={'sit0\x00', 0x0, 0x8000, 0x8000, 0x7, 0xb5, {{0x10, 0x4, 0x0, 0x8, 0x40, 0x66, 0x0, 0x1, 0x29, 0x0, @local, @multicast1, {[@rr={0x7, 0x27, 0xcc, [@private=0xa010101, @local, @multicast1, @local, @empty, @rand_addr=0x64010100, @rand_addr=0x64010101, @remote, @multicast2]}, @ra={0x94, 0x4, 0x1}]}}}}}) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'syztnl1\x00', &(0x7f0000000880)={'ip_vti0\x00', 0x0, 0x7800, 0x40, 0x2, 0x1, {{0x1e, 0x4, 0x2, 0x9, 0x78, 0x64, 0x0, 0x2, 0x4, 0x0, @remote, @local, {[@lsrr={0x83, 0x7, 0xf6, [@empty]}, @ssrr={0x89, 0x2b, 0x2a, [@remote, @empty, @local, @dev={0xac, 0x14, 0x14, 0x13}, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, @broadcast]}, @timestamp_addr={0x44, 0x14, 0xd2, 0x1, 0x2, [{@loopback, 0x2}, {@private=0xa010101, 0x100}]}, @generic={0x86, 0x2}, @timestamp_addr={0x44, 0xc, 0x15, 0x1, 0xe, [{@loopback, 0x81}]}, @lsrr={0x83, 0xf, 0x8b, [@remote, @multicast1, @loopback]}]}}}}}) (async) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000980)) (async) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f00000009c0)={@local, @empty}, &(0x7f0000000a00)=0xc) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'vxcan0\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000a80)) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000ac0)={'vxcan0\x00'}) (async) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000001440)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001400)={&(0x7f0000000b00)={0x8cc, 0x0, 0xe07, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8}, {0x1dc, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x54, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x24, 0x4, [{0x100, 0x7, 0xb5, 0x7f}, {0x200, 0xa7, 0x21, 0x1ff}, {0x400, 0x3, 0xc0, 0xff}, {0x5, 0x43, 0x44, 0x2}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r3}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x10000}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r5}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x80000000}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r6}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x6, 0xb5, 0x20, 0x1000}, {0x40, 0x2, 0x9, 0x6}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x101}}}, {0x34, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x4}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r7}}}]}}, {{0x8, 0x1, r8}, {0xf8, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x8001}}, {0x8, 0x6, r9}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0x174, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}]}}, {{0x8}, {0x19c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7f}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffffc}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0xc0, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r12}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x8cc}}, 0x4048001) (async) write$char_usb(r1, 0x0, 0x0) (async) write$cgroup_type(r1, &(0x7f0000000000), 0x9) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x2) (async) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x20) (async) 20:46:37 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0x2d) prctl$PR_SET_SECUREBITS(0x1c, 0x8) prctl$PR_SET_SECUREBITS(0x8, 0x2d) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x8) (async) 20:46:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x5, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:37 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0xe000000, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0xc00}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:37 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x889d) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x10, 0x70bd27, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) 20:46:37 executing program 0: setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000040)="00de8ba4e8b28500", 0x10) prctl$PR_SET_SECUREBITS(0x8, 0x0) 20:46:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x6, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:37 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0xf000000, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:37 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x0) (async) r0 = socket$can_bcm(0x1d, 0x2, 0x2) (async) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000000c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000200), &(0x7f0000000240), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000280)}}, 0x10) (async) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000400)={'team0\x00', 0x0}) (async) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r1, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, &(0x7f00000004c0)=[0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000540)=[{}], 0x8, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000840)={'ip_vti0\x00', &(0x7f0000000780)={'sit0\x00', 0x0, 0x8000, 0x8000, 0x7, 0xb5, {{0x10, 0x4, 0x0, 0x8, 0x40, 0x66, 0x0, 0x1, 0x29, 0x0, @local, @multicast1, {[@rr={0x7, 0x27, 0xcc, [@private=0xa010101, @local, @multicast1, @local, @empty, @rand_addr=0x64010100, @rand_addr=0x64010101, @remote, @multicast2]}, @ra={0x94, 0x4, 0x1}]}}}}}) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'syztnl1\x00', &(0x7f0000000880)={'ip_vti0\x00', 0x0, 0x7800, 0x40, 0x2, 0x1, {{0x1e, 0x4, 0x2, 0x9, 0x78, 0x64, 0x0, 0x2, 0x4, 0x0, @remote, @local, {[@lsrr={0x83, 0x7, 0xf6, [@empty]}, @ssrr={0x89, 0x2b, 0x2a, [@remote, @empty, @local, @dev={0xac, 0x14, 0x14, 0x13}, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, @broadcast]}, @timestamp_addr={0x44, 0x14, 0xd2, 0x1, 0x2, [{@loopback, 0x2}, {@private=0xa010101, 0x100}]}, @generic={0x86, 0x2}, @timestamp_addr={0x44, 0xc, 0x15, 0x1, 0xe, [{@loopback, 0x81}]}, @lsrr={0x83, 0xf, 0x8b, [@remote, @multicast1, @loopback]}]}}}}}) (async) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000980)={'team0\x00', 0x0}) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f00000009c0)={@local, @empty, 0x0}, &(0x7f0000000a00)=0xc) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'vxcan0\x00', 0x0}) (async) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000a80)={'team0\x00', 0x0}) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000ac0)={'vxcan0\x00', 0x0}) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000001440)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001400)={&(0x7f0000000b00)={0x8cc, 0x0, 0xe07, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8}, {0x1dc, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x54, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x24, 0x4, [{0x100, 0x7, 0xb5, 0x7f}, {0x200, 0xa7, 0x21, 0x1ff}, {0x400, 0x3, 0xc0, 0xff}, {0x5, 0x43, 0x44, 0x2}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r3}}, {0x8}}}]}}, {{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x10000}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r5}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x80000000}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r6}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x6, 0xb5, 0x20, 0x1000}, {0x40, 0x2, 0x9, 0x6}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x101}}}, {0x34, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x4}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r7}}}]}}, {{0x8, 0x1, r8}, {0xf8, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x8001}}, {0x8, 0x6, r9}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0x174, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}]}}, {{0x8}, {0x19c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7f}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffffc}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0xc0, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r12}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x8cc}}, 0x4048001) write$char_usb(r1, 0x0, 0x0) (async) write$cgroup_type(r1, &(0x7f0000000000), 0x9) prctl$PR_SET_SECUREBITS(0x1c, 0x2) (async) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) prctl$PR_SET_SECUREBITS(0x1c, 0x20) 20:46:37 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x10000000, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0xd00}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:37 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0x2) (async) prctl$PR_SET_SECUREBITS(0x8, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x889d) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x10, 0x70bd27, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) 20:46:37 executing program 0: setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000040)="00de8ba4e8b28500", 0x10) (async) prctl$PR_SET_SECUREBITS(0x8, 0x0) 20:46:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x7, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0xe00}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x8, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:37 executing program 3: ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)={0xffffffffffffffff}, 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000500)={{0x1, 0x1, 0x18, r1, {0x101}}, './file0\x00'}) prctl$PR_SET_SECUREBITS(0x7, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r2, 0x0, 0x0) mmap$xdp(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000000, 0x4010, r2, 0x100000000) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000200)={'syztnl1\x00', &(0x7f0000000180)={'ip_vti0\x00', 0x0, 0x8, 0x7800, 0x1f, 0x3f, {{0xb, 0x4, 0x3, 0x3, 0x2c, 0x66, 0x0, 0xbf, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, {[@lsrr={0x83, 0xb, 0x1f, [@remote, @local]}, @ra={0x94, 0x4}, @timestamp={0x44, 0x8, 0x57, 0x0, 0x8, [0x20]}]}}}}}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={r2, 0x20, &(0x7f0000000340)={&(0x7f00000002c0)=""/8, 0x8, 0x0, &(0x7f0000000300)=""/1, 0x1}}, 0x10) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x8, 0x1df, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8327301}, [@call={0x85, 0x0, 0x0, 0xc7}, @call={0x85, 0x0, 0x0, 0xd}, @map_fd={0x18, 0x3, 0x1, 0x0, r3}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x80000001}]}, &(0x7f00000000c0)='GPL\x00', 0x1, 0x54, &(0x7f0000000100)=""/84, 0x41100, 0x12, '\x00', r4, 0x19, r0, 0x8, &(0x7f0000000480)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000280)={0x3, 0x1}, 0x10, 0x0, r5, 0x0, &(0x7f00000003c0)=[0xffffffffffffffff]}, 0x80) 20:46:37 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x11000000, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:37 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x889d) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x10, 0x70bd27, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) 20:46:37 executing program 0: setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000040)="00de8ba4e8b28500", 0x10) (async) prctl$PR_SET_SECUREBITS(0x8, 0x0) 20:46:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0xf00}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x9, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0x1100}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:37 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x12000000, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:37 executing program 3: ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) (async) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)={0xffffffffffffffff}, 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000500)={{0x1, 0x1, 0x18, r1, {0x101}}, './file0\x00'}) (async) prctl$PR_SET_SECUREBITS(0x7, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r2, 0x0, 0x0) mmap$xdp(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000000, 0x4010, r2, 0x100000000) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000200)={'syztnl1\x00', &(0x7f0000000180)={'ip_vti0\x00', 0x0, 0x8, 0x7800, 0x1f, 0x3f, {{0xb, 0x4, 0x3, 0x3, 0x2c, 0x66, 0x0, 0xbf, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, {[@lsrr={0x83, 0xb, 0x1f, [@remote, @local]}, @ra={0x94, 0x4}, @timestamp={0x44, 0x8, 0x57, 0x0, 0x8, [0x20]}]}}}}}) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={r2, 0x20, &(0x7f0000000340)={&(0x7f00000002c0)=""/8, 0x8, 0x0, &(0x7f0000000300)=""/1, 0x1}}, 0x10) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x8, 0x1df, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8327301}, [@call={0x85, 0x0, 0x0, 0xc7}, @call={0x85, 0x0, 0x0, 0xd}, @map_fd={0x18, 0x3, 0x1, 0x0, r3}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x80000001}]}, &(0x7f00000000c0)='GPL\x00', 0x1, 0x54, &(0x7f0000000100)=""/84, 0x41100, 0x12, '\x00', r4, 0x19, r0, 0x8, &(0x7f0000000480)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000280)={0x3, 0x1}, 0x10, 0x0, r5, 0x0, &(0x7f00000003c0)=[0xffffffffffffffff]}, 0x80) 20:46:37 executing program 0: r0 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x200000c, 0x110, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(r0, 0x0, &(0x7f0000000000)=@IORING_OP_ASYNC_CANCEL={0xe, 0x2f58bd4772b8a144, 0x0, 0x0, 0x0, 0x23456}) prctl$PR_SET_SECUREBITS(0x8, 0x0) 20:46:37 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0x17) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x4) 20:46:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xa, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:37 executing program 0: r0 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x200000c, 0x110, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(r0, 0x0, &(0x7f0000000000)=@IORING_OP_ASYNC_CANCEL={0xe, 0x2f58bd4772b8a144, 0x0, 0x0, 0x0, 0x23456}) (async, rerun: 32) prctl$PR_SET_SECUREBITS(0x8, 0x0) (rerun: 32) 20:46:37 executing program 3: ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) (async) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)={0xffffffffffffffff}, 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000500)={{0x1, 0x1, 0x18, r1, {0x101}}, './file0\x00'}) (async) prctl$PR_SET_SECUREBITS(0x7, 0x0) (async) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r2, 0x0, 0x0) (async) mmap$xdp(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000000, 0x4010, r2, 0x100000000) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000200)={'syztnl1\x00', &(0x7f0000000180)={'ip_vti0\x00', 0x0, 0x8, 0x7800, 0x1f, 0x3f, {{0xb, 0x4, 0x3, 0x3, 0x2c, 0x66, 0x0, 0xbf, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, {[@lsrr={0x83, 0xb, 0x1f, [@remote, @local]}, @ra={0x94, 0x4}, @timestamp={0x44, 0x8, 0x57, 0x0, 0x8, [0x20]}]}}}}}) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={r2, 0x20, &(0x7f0000000340)={&(0x7f00000002c0)=""/8, 0x8, 0x0, &(0x7f0000000300)=""/1, 0x1}}, 0x10) (async) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x8, 0x1df, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8327301}, [@call={0x85, 0x0, 0x0, 0xc7}, @call={0x85, 0x0, 0x0, 0xd}, @map_fd={0x18, 0x3, 0x1, 0x0, r3}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x80000001}]}, &(0x7f00000000c0)='GPL\x00', 0x1, 0x54, &(0x7f0000000100)=""/84, 0x41100, 0x12, '\x00', r4, 0x19, r0, 0x8, &(0x7f0000000480)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000280)={0x3, 0x1}, 0x10, 0x0, r5, 0x0, &(0x7f00000003c0)=[0xffffffffffffffff]}, 0x80) 20:46:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0x1200}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:37 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0x17) (async) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x4) 20:46:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xb, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) [ 1292.110101][ T8283] workqueue: Failed to create a rescuer kthread for wq "nfc3_nci_cmd_wq": -EINTR [ 1293.288171][ T8645] __nla_validate_parse: 68 callbacks suppressed [ 1293.288192][ T8645] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 20:46:37 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x25000000, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0x2500}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:37 executing program 0: r0 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x200000c, 0x110, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(r0, 0x0, &(0x7f0000000000)=@IORING_OP_ASYNC_CANCEL={0xe, 0x2f58bd4772b8a144, 0x0, 0x0, 0x0, 0x23456}) (async) prctl$PR_SET_SECUREBITS(0x8, 0x0) 20:46:37 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x1) prctl$PR_SET_SECUREBITS(0x1c, 0x2) 20:46:37 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0x17) (async) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x4) 20:46:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xc, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0x4800}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:37 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x0) setsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f0000000000), 0x0) getsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00\x00\x00file0\x00']) getsockopt$CAN_RAW_FD_FRAMES(r0, 0x65, 0x5, &(0x7f0000000080), &(0x7f00000000c0)=0x4) recvmsg$can_bcm(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000180)=""/112, 0x70}, {&(0x7f0000000200)=""/254, 0xfe}, {&(0x7f0000000300)=""/239, 0xef}, {&(0x7f0000000400)=""/4096, 0x1000}], 0x4, &(0x7f0000001440)=""/35, 0x23}, 0x10100) setsockopt$inet_dccp_int(r0, 0x21, 0x10, &(0x7f00000014c0)=0x2, 0x5c) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) setsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, &(0x7f0000001500)=[{{0x2, 0x1}, {0x3, 0x1}}, {{0x1}, {0x4}}, {{0x1, 0x0, 0x1, 0x1}, {0x4, 0x0, 0x0, 0x1}}, {{0x0, 0x1, 0x1, 0x1}, {0x3, 0x0, 0x1, 0x1}}, {{0x0, 0x0, 0x1, 0x1}, {0x3, 0x0, 0x1}}, {{0x4, 0x1}, {0x2}}, {{0x3, 0x1, 0x1, 0x1}, {0x4, 0x0, 0x1}}, {{0x2, 0x0, 0x1}, {0x0, 0x0, 0x1, 0x1}}, {{0x0, 0x0, 0x0, 0x1}, {0x1, 0x0, 0x1, 0x1}}, {{0x3, 0x1, 0x1}, {0x3}}], 0x50) 20:46:37 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x1) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x2) 20:46:37 executing program 2: madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x10) prctl$PR_SET_SECUREBITS(0x8, 0x2) mmap$xdp(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000008, 0x2010, 0xffffffffffffffff, 0x0) 20:46:37 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x39410000, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:37 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x0) setsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f0000000000), 0x0) getsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00\x00\x00file0\x00']) getsockopt$CAN_RAW_FD_FRAMES(r0, 0x65, 0x5, &(0x7f0000000080), &(0x7f00000000c0)=0x4) (async) recvmsg$can_bcm(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000180)=""/112, 0x70}, {&(0x7f0000000200)=""/254, 0xfe}, {&(0x7f0000000300)=""/239, 0xef}, {&(0x7f0000000400)=""/4096, 0x1000}], 0x4, &(0x7f0000001440)=""/35, 0x23}, 0x10100) setsockopt$inet_dccp_int(r0, 0x21, 0x10, &(0x7f00000014c0)=0x2, 0x5c) (async) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) setsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, &(0x7f0000001500)=[{{0x2, 0x1}, {0x3, 0x1}}, {{0x1}, {0x4}}, {{0x1, 0x0, 0x1, 0x1}, {0x4, 0x0, 0x0, 0x1}}, {{0x0, 0x1, 0x1, 0x1}, {0x3, 0x0, 0x1, 0x1}}, {{0x0, 0x0, 0x1, 0x1}, {0x3, 0x0, 0x1}}, {{0x4, 0x1}, {0x2}}, {{0x3, 0x1, 0x1, 0x1}, {0x4, 0x0, 0x1}}, {{0x2, 0x0, 0x1}, {0x0, 0x0, 0x1, 0x1}}, {{0x0, 0x0, 0x0, 0x1}, {0x1, 0x0, 0x1, 0x1}}, {{0x3, 0x1, 0x1}, {0x3}}], 0x50) 20:46:37 executing program 2: madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x10) (async) prctl$PR_SET_SECUREBITS(0x8, 0x2) mmap$xdp(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000008, 0x2010, 0xffffffffffffffff, 0x0) 20:46:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0x4c00}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) [ 1293.396848][ T8675] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 20:46:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xe, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:37 executing program 3: prctl$PR_SET_SECUREBITS(0x7, 0x1) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x2) 20:46:37 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x0) setsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f0000000000), 0x0) (async) getsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00\x00\x00file0\x00']) (async) getsockopt$CAN_RAW_FD_FRAMES(r0, 0x65, 0x5, &(0x7f0000000080), &(0x7f00000000c0)=0x4) (async) recvmsg$can_bcm(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000180)=""/112, 0x70}, {&(0x7f0000000200)=""/254, 0xfe}, {&(0x7f0000000300)=""/239, 0xef}, {&(0x7f0000000400)=""/4096, 0x1000}], 0x4, &(0x7f0000001440)=""/35, 0x23}, 0x10100) setsockopt$inet_dccp_int(r0, 0x21, 0x10, &(0x7f00000014c0)=0x2, 0x5c) (async) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r1, 0x0, 0x0) (async) setsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, &(0x7f0000001500)=[{{0x2, 0x1}, {0x3, 0x1}}, {{0x1}, {0x4}}, {{0x1, 0x0, 0x1, 0x1}, {0x4, 0x0, 0x0, 0x1}}, {{0x0, 0x1, 0x1, 0x1}, {0x3, 0x0, 0x1, 0x1}}, {{0x0, 0x0, 0x1, 0x1}, {0x3, 0x0, 0x1}}, {{0x4, 0x1}, {0x2}}, {{0x3, 0x1, 0x1, 0x1}, {0x4, 0x0, 0x1}}, {{0x2, 0x0, 0x1}, {0x0, 0x0, 0x1, 0x1}}, {{0x0, 0x0, 0x0, 0x1}, {0x1, 0x0, 0x1, 0x1}}, {{0x3, 0x1, 0x1}, {0x3}}], 0x50) 20:46:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xf, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:37 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x48000000, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0x5100}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x10, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:37 executing program 2: madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x10) (async) prctl$PR_SET_SECUREBITS(0x8, 0x2) (async, rerun: 64) mmap$xdp(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000008, 0x2010, 0xffffffffffffffff, 0x0) (rerun: 64) 20:46:37 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x8) getrlimit(0xc, &(0x7f0000000000)) prctl$PR_SET_SECUREBITS(0x1c, 0x20) prctl$PR_SET_SECUREBITS(0x1c, 0x9) [ 1293.475594][ T8702] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 20:46:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x11, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:37 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0x2) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) prctl$PR_SET_SECUREBITS(0x1c, 0x5) 20:46:37 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x8) getrlimit(0xc, &(0x7f0000000000)) prctl$PR_SET_SECUREBITS(0x1c, 0x20) prctl$PR_SET_SECUREBITS(0x1c, 0x9) prctl$PR_SET_SECUREBITS(0x8, 0x8) (async) getrlimit(0xc, &(0x7f0000000000)) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x20) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x9) (async) 20:46:37 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x4c000000, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0x6800}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) [ 1293.543441][ T8722] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 20:46:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x12, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:37 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0x2) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) prctl$PR_SET_SECUREBITS(0x1c, 0x5) prctl$PR_SET_SECUREBITS(0x8, 0x2) (async) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x5) (async) 20:46:37 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x8) (async) getrlimit(0xc, &(0x7f0000000000)) prctl$PR_SET_SECUREBITS(0x1c, 0x20) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x9) 20:46:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0x6c00}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x13, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0x7400}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) [ 1293.622615][ T8745] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 20:46:37 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0x2) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) (async, rerun: 32) prctl$PR_SET_SECUREBITS(0x1c, 0x5) (rerun: 32) 20:46:37 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x60000000, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:37 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x7b) 20:46:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x16, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:37 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x7b) 20:46:37 executing program 2: setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000000)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x5, 0x0, "ffc4ad04dfe5e29d8e9963587245bc082e4c347f41beef30ae5d996c5bca4c9790757b5b61e229508d60e8f2c2ed4f5eb8f791a89a9cd18baea3c8f12d95eec1cd3b39abb3a36b78a89c38652726730d"}, 0xd8) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001140)={&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000100)=""/4096, 0x1000, 0x0, &(0x7f0000001100)=""/55, 0x37}, &(0x7f0000001180)=0x40) prctl$PR_SET_SECUREBITS(0x8, 0x2) 20:46:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0x7a00}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x1d, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0x1000000}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:37 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x7b) prctl$PR_SET_SECUREBITS(0x8, 0x7b) (async) 20:46:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x25, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:37 executing program 2: setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000000)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x5, 0x0, "ffc4ad04dfe5e29d8e9963587245bc082e4c347f41beef30ae5d996c5bca4c9790757b5b61e229508d60e8f2c2ed4f5eb8f791a89a9cd18baea3c8f12d95eec1cd3b39abb3a36b78a89c38652726730d"}, 0xd8) (async) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) (async) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001140)={&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000100)=""/4096, 0x1000, 0x0, &(0x7f0000001100)=""/55, 0x37}, &(0x7f0000001180)=0x40) (async) prctl$PR_SET_SECUREBITS(0x8, 0x2) 20:46:37 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x68000000, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:37 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) [ 1293.744194][ T8768] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 20:46:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0x2000000}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:37 executing program 2: setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000000)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x5, 0x0, "ffc4ad04dfe5e29d8e9963587245bc082e4c347f41beef30ae5d996c5bca4c9790757b5b61e229508d60e8f2c2ed4f5eb8f791a89a9cd18baea3c8f12d95eec1cd3b39abb3a36b78a89c38652726730d"}, 0xd8) (async) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x109881, 0x0) write$char_usb(r0, 0x0, 0x0) (async) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001140)={&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000100)=""/4096, 0x1000, 0x0, &(0x7f0000001100)=""/55, 0x37}, &(0x7f0000001180)=0x40) (async, rerun: 32) prctl$PR_SET_SECUREBITS(0x8, 0x2) (rerun: 32) 20:46:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x48, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:37 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x0) (async) socket$inet_dccp(0x2, 0x6, 0x0) 20:46:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 20:46:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0x3000000}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:38 executing program 0: prctl$PR_SET_SECUREBITS(0x8, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 20:46:38 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0x0) 20:46:38 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000300)={0x0, 0x6c000000, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x1c}}, 0x0) 20:46:38 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x1}, {0x0, 0x4000000}, {}]}, @volatile, @int, @func]}, {0x0, [0x61, 0x61, 0x5f]}}, &(0x7f0000000240)=""/5, 0x69, 0x5, 0x1}, 0x20) 20:46:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x68, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) [ 1293.845187][ T8792] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 20:46:38 executing program 2: prctl$PR_SET_SECUREBITS(0x8, 0x0) prctl$PR_SET_SECUREBITS(0x8, 0x0) (async) 20:46:38 executing program 0: r0 = getuid() sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000000740)=@ipv6_newroute={0x24, 0x18, 0x200, 0x70bd25, 0x25dfdbfb, {0xa, 0x20, 0x80, 0xaa, 0xfd, 0x3, 0x0, 0x0, 0x200}, [@RTA_UID={0x8, 0x19, r0}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000080}, 0xc00) r1 = socket$inet(0x2, 0x4, 0x4) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x1020000, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cachetag={'cachetag', 0x3d, '^'}}, {@debug={'debug', 0x3d, 0x2}}, {@aname={'aname', 0x3d, 'syztnl1\x00'}}], [{@seclabel}, {@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'syztnl1\x00'}}, {@flag='nolazytime'}]}}) prctl$PR_SET_SECUREBITS(0x8, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x4) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x7, 0x40, 0x9, 0x9, {{0xb, 0x4, 0x3, 0x7, 0x2c, 0x64, 0x0, 0x7f, 0x4, 0x0, @rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0xe}, {[@noop, @timestamp={0x44, 0x14, 0xe5, 0x0, 0x9, [0x100, 0x398, 0x401, 0x6c]}]}}}}}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x4, 0x2f0, 0xffffffff, 0xd0, 0x1c0, 0x0, 0xffffffff, 0xffffffff, 0x258, 0x258, 0x258, 0xffffffff, 0x4, &(0x7f0000000380), {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x1, 0xe, 0x0, 0x2, 0x5, 0x3], 0x1, 0x7}, {0x4, [0x0, 0x0, 0x2, 0x6, 0x0, 0x5], 0x6, 0x1}}}}, {{@uncond, 0x0, 0xc8, 0xf0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "2bf1", 0x1}}, @common=@addrtype={{0x30}, {0x14, 0x96b, 0x1, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ip={@local, @dev={0xac, 0x14, 0x14, 0x1f}, 0xff000000, 0xff, 'erspan0\x00', 'macsec0\x00', {0xff}, {}, 0xc, 0x3, 0x14}, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x3}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x350) 20:46:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18,