, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) r5 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x3c, r4, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r5}]}, 0x3c}}, 0x0) 15:02:59 executing program 0: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(0xffffffffffffffff, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:02:59 executing program 2: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000800)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QBUF(r0, 0x400448c9, &(0x7f00000001c0)={0x0, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "590de82d"}, 0x0, 0x0, @planes=0x0}) 15:02:59 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r0 = gettid() rt_sigqueueinfo(r0, 0x3c, &(0x7f0000000040)) 15:02:59 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x5100, 0x0) 15:02:59 executing program 2: io_setup(0xfff, &(0x7f0000000200)=0x0) io_submit(r0, 0x0, 0x0) 15:02:59 executing program 0: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(0xffffffffffffffff, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:00 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r0 = gettid() rt_sigqueueinfo(r0, 0x3c, &(0x7f0000000040)) 15:03:00 executing program 3: syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x0, 0x2) 15:03:01 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05e4dde63e5d7499d9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a611aa99f54a05ac20a06f35517e1b6469a7808e16513f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e55cd1114b247369c9eeeefabec61884ed3aefba9ad514e4ec09db2f30d91a5dfac70964a4ade291f00ec7856efaccdce6aac34207008938bae72d296ab8d600a07cf43121507fa68af245c5047ca4e41cf1da2f9f7cbac1c59c74c01144935dd4c3f", 0xcf}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:03:01 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0x4e140, 0x0) 15:03:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:01 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) r5 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x3c, r4, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r5}]}, 0x3c}}, 0x0) 15:03:01 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r0 = gettid() rt_sigqueueinfo(r0, 0x3c, &(0x7f0000000040)) 15:03:01 executing program 3: openat$vcs(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vcs\x00', 0x64a81, 0x0) 15:03:01 executing program 2: clone3(&(0x7f0000001440)={0x4000100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000001400)=[0x0], 0x1}, 0x58) 15:03:01 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:01 executing program 3: clone3(&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000440)=""/35, 0x23, 0x0, &(0x7f00000000c0)=[0xffffffffffffffff], 0x1}, 0x58) 15:03:02 executing program 2: clone3(&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000440)=""/35, 0x23, 0x0, 0x0}, 0x58) 15:03:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:02 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:03 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05e4dde63e5d7499d9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a611aa99f54a05ac20a06f35517e1b6469a7808e16513f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e55cd1114b247369c9eeeefabec61884ed3aefba9ad514e4ec09db2f30d91a5dfac70964a4ade291f00ec7856efaccdce6aac34207008938bae72d296ab8d600a07cf43121507fa68af245c5047ca4e41cf1da2f9f7cbac1c59c74c01144935dd4c3f72a0dd067abac060ce665165360162a9aa552a84308266d5603c122e0a39f339559db3", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:03:03 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) r5 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x3c, r4, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r5}]}, 0x3c}}, 0x0) 15:03:03 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:03 executing program 2: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000800)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000d40)={0x0, 0xa, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "f5bd5688"}, 0x0, 0x0, @fd}) 15:03:03 executing program 3: clone3(&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 15:03:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040)='mptcp_pm\x00', 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x20, r1, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6}]}]}, 0x20}}, 0x0) 15:03:04 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:04 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xb, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x403, 0xf0ffff, 0xa21a0200, {0xc}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x1, 'wireguard\x00'}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x40}}, 0x0) 15:03:04 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 556.603437][T16063] ptrace attach of "/root/syz-executor.5"[16062] was attempted by "/root/syz-executor.5"[16063] 15:03:04 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x40085112, &(0x7f0000000400)=@e={0xff, 0x0, 0x0, 0x0, @SEQ_NOTEON}) read$sequencer(r0, &(0x7f0000000440)=""/4096, 0x1000) [ 557.103012][T16077] ptrace attach of "/root/syz-executor.5"[16076] was attempted by "/root/syz-executor.5"[16077] 15:03:05 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 557.390543][T16082] ptrace attach of "/root/syz-executor.5"[16081] was attempted by "/root/syz-executor.5"[16082] 15:03:05 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05e4dde63e5d7499d9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a611aa99f54a05ac20a06f35517e1b6469a7808e16513f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e55cd1114b247369c9eeeefabec61884ed3aefba9ad514e4ec09db2f30d91a5dfac70964a4ade291f00ec7856efaccdce6aac34207008938bae72d296ab8d600a07cf43121507fa68af245c5047ca4e41cf1da2f9f7cbac1c59c74c01144935dd4c3f72a0dd067abac060ce665165360162a9aa552a84308266d5603c122e0a39f339559db3", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:03:05 executing program 3: io_setup(0x2, &(0x7f0000000000)=0x0) io_pgetevents(r0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={0x0, 0x989680}, &(0x7f0000000640)={&(0x7f0000000600), 0x8}) 15:03:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:05 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f0000000080)='logon\x00', &(0x7f00000000c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000100)={0x0, "e15c1e499c81c9d69018a0f1620893779a1c8234650a9b095af74739f7f78579b7e20c2d82d0f89b5378e1281d693ffc41b19d40e587d19f342d3e9d3083cdc3"}, 0x48, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000340)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x2}, 0xfffffffffffffff9) 15:03:05 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) r6 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x3c, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r6}]}, 0x3c}}, 0x0) 15:03:05 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:06 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x5404, 0x0) ioctl$SNDCTL_TMR_TEMPO(r0, 0x5402, 0x0) 15:03:06 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:06 executing program 3: select(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x77359400}) 15:03:07 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x5404, 0x0) ioctl$SNDCTL_TMR_TEMPO(r0, 0x5402, 0x0) 15:03:07 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:08 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05e4dde63e5d7499d9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a611aa99f54a05ac20a06f35517e1b6469a7808e16513f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e55cd1114b247369c9eeeefabec61884ed3aefba9ad514e4ec09db2f30d91a5dfac70964a4ade291f00ec7856efaccdce6aac34207008938bae72d296ab8d600a07cf43121507fa68af245c5047ca4e41cf1da2f9f7cbac1c59c74c01144935dd4c3f72a0dd067abac060ce665165360162a9aa552a84308266d5603c122e0a39f339559db3", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:03:08 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) r6 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x3c, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r6}]}, 0x3c}}, 0x0) 15:03:08 executing program 2: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000080)) 15:03:08 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:08 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x40085112, &(0x7f0000000080)=@l={0x92, 0x0, 0xb0, 0x6}) 15:03:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:08 executing program 3: socketpair(0x10, 0x3, 0xfffffffe, &(0x7f0000000000)) 15:03:09 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x8004510b, 0x0) 15:03:09 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:09 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:09 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x40085112, &(0x7f0000000080)=@raw={0xfe, 0x0, "1d326d3973f7"}) 15:03:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:10 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05e4dde63e5d7499d9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a611aa99f54a05ac20a06f35517e1b6469a7808e16513f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e55cd1114b247369c9eeeefabec61884ed3aefba9ad514e4ec09db2f30d91a5dfac70964a4ade291f00ec7856efaccdce6aac34207008938bae72d296ab8d600a07cf43121507fa68af245c5047ca4e41cf1da2f9f7cbac1c59c74c01144935dd4c3f72a0dd067abac060ce665165360162a9aa552a84308266d5603c122e0a39f339559db31adeceea5ca95196826d8fe58969442517", 0x103}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:03:10 executing program 2: socketpair(0x2, 0x3, 0x4f, &(0x7f00000000c0)) 15:03:10 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) r6 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x3c, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r6}]}, 0x3c}}, 0x0) 15:03:10 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:10 executing program 3: pipe2$9p(&(0x7f0000000080), 0x0) 15:03:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:11 executing program 3: r0 = inotify_init1(0x0) inotify_add_watch(r0, 0x0, 0x80) 15:03:11 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x204000, 0x0) 15:03:11 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:11 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-camellia-asm\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r2, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) recvfrom(r2, &(0x7f0000003240)=""/4096, 0x100000205, 0x0, 0x0, 0x415) sendmsg$kcm(r2, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000180)='q', 0x1}], 0x1}, 0x0) 15:03:11 executing program 2: clock_gettime(0x0, &(0x7f0000001680)={0x0, 0x0}) ioctl$vim2m_VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000001700)={0x8001, 0x7, 0x4, 0x70000, 0x0, {r0, r1/1000+10000}, {0x1, 0x2, 0x1, 0x1, 0x4, 0xfe, "a92a5b3c"}, 0x6, 0x4, @planes=&(0x7f00000016c0)={0x1361, 0xa4, @mem_offset=0x30, 0x1}, 0xe3}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vcs\x00', 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000000640)='net_prio.ifpriomap\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000019c0)='freezer.parent_freezing\x00', 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001a80)='cgroup.stat\x00', 0x0, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vcs\x00', 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000000640)='net_prio.ifpriomap\x00', 0x2, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vcs\x00', 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000000640)='net_prio.ifpriomap\x00', 0x2, 0x0) clone3(&(0x7f0000001f00)={0xe0080100, &(0x7f0000001cc0), &(0x7f0000001d00), &(0x7f0000001d40), {0x17}, &(0x7f0000001d80)=""/148, 0x94, &(0x7f0000001e40)=""/126, &(0x7f0000001ec0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vcs\x00', 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r5, &(0x7f0000000640)='net_prio.ifpriomap\x00', 0x2, 0x0) 15:03:11 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 564.027190][T16207] IPVS: ftp: loaded support on port[0] = 21 [ 564.389872][T16207] IPVS: ftp: loaded support on port[0] = 21 15:03:13 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x103}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:03:13 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) r6 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x3c, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r6}]}, 0x3c}}, 0x0) 15:03:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:13 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:13 executing program 3: keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffff9) 15:03:13 executing program 2: io_setup(0x81, &(0x7f0000000680)) 15:03:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_DEL(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0xfffffffffffffffe}}, 0x0) 15:03:13 executing program 2: socketpair(0x29, 0x5, 0x0, &(0x7f0000000180)) 15:03:13 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:14 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x38, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x1f}]}, 0x38}}, 0x0) 15:03:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000), 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:14 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="a5", 0x1}], 0x1, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x34}}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, r3, 0x0, 0x2ffff, 0x0) 15:03:16 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x103}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:03:16 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) r6 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x3c, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r6}]}, 0x3c}}, 0x0) 15:03:16 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x38, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x1f}]}, 0x38}}, 0x0) 15:03:16 executing program 2: io_setup(0x8, &(0x7f0000000400)) io_setup(0x2, &(0x7f0000000000)=0x0) io_destroy(r0) io_pgetevents(r0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={0x0, 0x989680}, &(0x7f0000000640)={&(0x7f0000000600)={[0x4171fd4]}, 0x8}) 15:03:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000), 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x38, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x1f}]}, 0x38}}, 0x0) 15:03:16 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:16 executing program 2: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000800)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc0285628, &(0x7f00000001c0)={0x0, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "590de82d"}, 0x0, 0x0, @planes=0x0}) 15:03:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000), 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x38, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x1f}]}, 0x38}}, 0x0) 15:03:17 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:18 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05e4dde63e5d7499d9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a611aa99f54a05ac20a06f35517e1b6469a7808e16513f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e55cd1114b247369c9eeeefabec61884ed3aefba9ad514e4ec09db2f30d91a5dfac70964a4ade291f00ec7856efaccdce6aac34207008938bae72d296ab8d600a07cf43121507fa68af245c5047ca4e41cf1da2f9f7cbac1c59c74c01144935dd4c3f72a0dd067abac060ce665165360162a9aa552a84308266d5603c122e0a39f339559db31adeceea5ca95196826d8fe5896944251797224a9cf05599da9a", 0x10c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:03:18 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) r6 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x3c, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r6}]}, 0x3c}}, 0x0) 15:03:18 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x40000, 0x0) 15:03:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x38, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x1f}]}, 0x38}}, 0x0) 15:03:18 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x38, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x1f}]}, 0x38}}, 0x0) 15:03:19 executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x3, &(0x7f0000000000)=0x20, 0x4) 15:03:19 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 571.305735][ T3130] ieee802154 phy0 wpan0: encryption failed: -22 [ 571.312545][ T3130] ieee802154 phy1 wpan1: encryption failed: -22 15:03:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:19 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x5404, 0x0) ioctl$SNDCTL_TMR_TEMPO(r0, 0x5100, 0x0) 15:03:20 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) r6 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x3c, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r6}]}, 0x3c}}, 0x0) 15:03:20 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x10c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:03:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x38, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x1f}]}, 0x38}}, 0x0) 15:03:20 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:20 executing program 2: io_setup(0x2, &(0x7f0000000000)=0x0) io_pgetevents(r0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000600), 0x8}) [ 573.102448][T16399] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:03:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x1f}]}, 0x38}}, 0x0) 15:03:21 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0xfffffec6) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 15:03:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:21 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x1f}]}, 0x38}}, 0x0) 15:03:22 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) r6 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x3c, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r6}]}, 0x3c}}, 0x0) [ 574.357773][T16423] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 574.964005][T16408] picdev_write: 4088 callbacks suppressed [ 574.964073][T16408] kvm: pic: non byte write [ 574.997495][T16408] kvm: pic: non byte write [ 575.002466][T16408] kvm: pic: non byte write [ 575.007124][T16408] kvm: pic: non byte write [ 575.011785][T16408] kvm: pic: non byte write [ 575.016749][T16408] kvm: pic: non byte write [ 575.021571][T16408] kvm: pic: non byte write [ 575.026318][T16408] kvm: pic: non byte write [ 575.037413][T16408] kvm: pic: non byte write [ 575.042261][T16408] kvm: pic: non byte write 15:03:23 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x10c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:03:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x1f}]}, 0x38}}, 0x0) 15:03:23 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:23 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) r6 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x3c, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r6}]}, 0x3c}}, 0x0) [ 575.941115][T16447] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:03:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:25 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-camellia-asm\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r3, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) recvfrom(r3, &(0x7f0000003240)=""/4096, 0x100000205, 0x0, 0x0, 0x415) sendmsg$kcm(r3, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000180)='q', 0x1}], 0x1}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00', 0xffffffffffffffff) 15:03:25 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:25 executing program 3: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x38, r0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x1f}]}, 0x38}}, 0x0) 15:03:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:25 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) r6 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x3c, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r6}]}, 0x3c}}, 0x0) [ 577.539942][T16465] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:03:26 executing program 3: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x38, r0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x1f}]}, 0x38}}, 0x0) 15:03:26 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05e4dde63e5d7499d9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a611aa99f54a05ac20a06f35517e1b6469a7808e16513f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e55cd1114b247369c9eeeefabec61884ed3aefba9ad514e4ec09db2f30d91a5dfac70964a4ade291f00ec7856efaccdce6aac34207008938bae72d296ab8d600a07cf43121507fa68af245c5047ca4e41cf1da2f9f7cbac1c59c74c01144935dd4c3f72a0dd067abac060ce665165360162a9aa552a84308266d5603c122e0a39f339559db31adeceea5ca95196826d8fe5896944251797224a9cf05599da9ac5563524", 0x110}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:03:26 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:26 executing program 3: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x38, r0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x1f}]}, 0x38}}, 0x0) 15:03:26 executing program 2: socketpair(0x1, 0x5, 0x0, &(0x7f00000000c0)) 15:03:26 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) r6 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x3c, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r6}]}, 0x3c}}, 0x0) 15:03:26 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$UHID_CREATE(r0, &(0x7f00000001c0)={0x0, {'syz0\x00', 'syz1\x00', 'syz0\x00', 0x0}}, 0x120) [ 579.054738][T16498] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:03:27 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x38, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x1f}]}, 0x38}}, 0x0) 15:03:27 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:28 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x110}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:03:28 executing program 2: socketpair(0x18, 0x0, 0x1, &(0x7f0000000100)) 15:03:28 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:28 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x38, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x1f}]}, 0x38}}, 0x0) 15:03:28 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) r6 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x3c, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r6}]}, 0x3c}}, 0x0) 15:03:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:29 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 580.913854][T16528] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:03:29 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000100)={0x28, 0x0, 0x2710}, 0x10) 15:03:29 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x38, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x1f}]}, 0x38}}, 0x0) 15:03:29 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:29 executing program 2: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000800)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QBUF(r0, 0x10, 0x0) 15:03:30 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) r6 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x3c, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r6}]}, 0x3c}}, 0x0) [ 582.327929][T16550] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:03:31 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x110}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:03:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x38, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x1f}]}, 0x38}}, 0x0) 15:03:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:31 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:31 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000640)={&(0x7f0000000180), 0x2, &(0x7f00000001c0)={&(0x7f00000005c0)={0x14}, 0xfffffe02}}, 0x0) 15:03:31 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:31 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) r6 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x3c, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r6}]}, 0x3c}}, 0x0) 15:03:31 executing program 2: io_getevents(0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0) 15:03:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x38, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x1f}]}, 0x38}}, 0x0) 15:03:31 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 583.739090][T16575] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:03:32 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x38, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x1f}]}, 0x38}}, 0x0) 15:03:32 executing program 2: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000800)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc0585611, &(0x7f00000001c0)={0x0, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "590de82d"}, 0x0, 0x0, @planes=0x0}) 15:03:33 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x112}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:03:33 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x38, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x1f}]}, 0x38}}, 0x0) 15:03:33 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) r6 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x3c, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r6}]}, 0x3c}}, 0x0) 15:03:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040)='mptcp_pm\x00', 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x14, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6}, @MPTCP_PM_ADDR_ATTR_PORT={0x6}]}]}, 0x28}}, 0x0) [ 585.632770][T16608] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:03:33 executing program 2: r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x100) ioctl$CHAR_RAW_BSZSET(r0, 0x40041271, &(0x7f0000000040)=0x1e) ioctl$CHAR_RAW_FLSBUF(r0, 0x1261, &(0x7f0000000080)=0x80000000) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0x2) openat$dir(0xffffff9c, &(0x7f0000002dc0)='./file0\x00', 0x40, 0x9) openat$dir(0xffffff9c, &(0x7f0000002e40)='./file0\x00', 0x101000, 0x0) syz_open_dev$vcsn(&(0x7f0000003200)='/dev/vcs#\x00', 0x401, 0x4000) 15:03:33 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x38, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x1f}]}, 0x38}}, 0x0) 15:03:34 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:34 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000002580)='ethtool\x00', 0xffffffffffffffff) 15:03:34 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x38, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x1f}]}, 0x38}}, 0x0) 15:03:35 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x112}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:03:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:35 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) r5 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x3c, r4, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r5}]}, 0x3c}}, 0x0) 15:03:35 executing program 2: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) 15:03:35 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:35 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x38, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x1f}]}, 0x38}}, 0x0) [ 587.905167][T16647] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:03:36 executing program 2: sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) openat$audio1(0xffffff9c, &(0x7f0000000000)='/dev/audio1\x00', 0xe100, 0x0) 15:03:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:36 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x38, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x1f}]}, 0x38}}, 0x0) 15:03:36 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:36 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x41}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:37 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x112}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:03:37 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x38, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x1f}]}, 0x38}}, 0x0) 15:03:37 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) r5 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x3c, r4, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r5}]}, 0x3c}}, 0x0) 15:03:37 executing program 2: pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x0) 15:03:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:37 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x41}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 590.105628][T16684] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:03:38 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2c1, 0x0) 15:03:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:38 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x41}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:38 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000740)={'wlan1\x00'}) sendmsg$NL80211_CMD_JOIN_MESH(r0, 0x0, 0x0) 15:03:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:39 executing program 2: sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, 0x0, 0x0) 15:03:40 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05e4dde63e5d7499d9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a611aa99f54a05ac20a06f35517e1b6469a7808e16513f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e55cd1114b247369c9eeeefabec61884ed3aefba9ad514e4ec09db2f30d91a5dfac70964a4ade291f00ec7856efaccdce6aac34207008938bae72d296ab8d600a07cf43121507fa68af245c5047ca4e41cf1da2f9f7cbac1c59c74c01144935dd4c3f72a0dd067abac060ce665165360162a9aa552a84308266d5603c122e0a39f339559db31adeceea5ca95196826d8fe5896944251797224a9cf05599da9ac556352424cf23", 0x113}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:03:40 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000740)={'wlan1\x00'}) sendmsg$NL80211_CMD_JOIN_MESH(r0, 0x0, 0x0) 15:03:40 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x58, 0x58, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x75}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:40 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) r5 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x3c, r4, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r5}]}, 0x3c}}, 0x0) 15:03:40 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000fc0)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001180)='ethtool\x00', r0) 15:03:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) [ 592.211188][T16719] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:03:40 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000740)={'wlan1\x00'}) sendmsg$NL80211_CMD_JOIN_MESH(r0, 0x0, 0x0) 15:03:40 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x58, 0x58, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x75}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:40 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000003ac0)={0x0, 0x0, &(0x7f0000003a40)=[{&(0x7f0000001680)={0x10, 0x2e, 0x1}, 0x10}], 0x1}, 0x0) 15:03:41 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000740)={'wlan1\x00'}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x0) 15:03:41 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x58, 0x58, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x75}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:42 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x113}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:03:42 executing program 2: r0 = socket$inet(0x2, 0x3, 0x2) recvfrom$inet(r0, 0x0, 0x0, 0x2100, 0x0, 0x0) 15:03:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:42 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, 0x0, 0x0) 15:03:42 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000740)={'wlan1\x00'}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x0) 15:03:42 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x58, 0x58, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x75}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 594.417834][T16758] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:03:42 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000740)={'wlan1\x00'}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x0) 15:03:42 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x58, 0x58, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x75}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(0xffffffffffffffff, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:42 executing program 2: socketpair(0xa, 0x0, 0x3ff, 0x0) 15:03:43 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f0000000500)={&(0x7f0000000400), 0xc, &(0x7f00000004c0)={0x0, 0x4c}}, 0x0) 15:03:43 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x58, 0x58, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x75}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:44 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05e4dde63e5d7499d9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a611aa99f54a05ac20a06f35517e1b6469a7808e16513f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e55cd1114b247369c9eeeefabec61884ed3aefba9ad514e4ec09db2f30d91a5dfac70964a4ade291f00ec7856efaccdce6aac34207008938bae72d296ab8d600a07cf43121507fa68af245c5047ca4e41cf1da2f9f7cbac1c59c74c01144935dd4c3f72a0dd067abac060ce665165360162a9aa552a84308266d5603c122e0a39f339559db31adeceea5ca95196826d8fe5896944251797224a9cf05599da9ac556352424cf23", 0x113}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:03:44 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000740)={'wlan1\x00'}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={0x0}}, 0x0) 15:03:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(0xffffffffffffffff, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:44 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, 0x0, 0x0) 15:03:44 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f00000068c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x30}, 0x0) 15:03:44 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x58, 0x58, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x75}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 596.622638][T16796] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:03:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(0xffffffffffffffff, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:44 executing program 2: getpid() socket$inet6(0xa, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) 15:03:44 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000740)={'wlan1\x00'}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={0x0}}, 0x0) 15:03:44 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x58, 0x58, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x75}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 597.119767][T16805] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 15:03:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:45 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x58, 0x58, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x75}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:46 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:03:46 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000740)={'wlan1\x00'}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={0x0}}, 0x0) 15:03:46 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, 0x0, 0x0) 15:03:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:46 executing program 2: perf_event_open(&(0x7f0000000000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:03:46 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x58, 0x58, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x75}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 598.767895][T16837] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:03:47 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x1f}]}, 0x38}}, 0x0) 15:03:47 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x58, 0x58, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x75}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00', r0) connect$netlink(r0, &(0x7f0000000080), 0xc) 15:03:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:47 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x1f}]}, 0x38}}, 0x0) 15:03:47 executing program 2: sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x1b}, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) 15:03:48 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:03:48 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x58, 0x58, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x75}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:48 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 15:03:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:48 executing program 2: sendmsg$ETHTOOL_MSG_RINGS_GET(0xffffffffffffffff, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(&(0x7f0000000b00)='nl80211\x00', 0xffffffffffffffff) 15:03:48 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x1f}]}, 0x38}}, 0x0) [ 600.867555][T16875] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:03:49 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x38, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x1f}]}, 0x38}}, 0x0) 15:03:49 executing program 2: add_key$fscrypt_v1(&(0x7f0000000200)='logon\x00', &(0x7f00000000c0)={'fscrypt:', @desc4='85baa174f0cb1142'}, &(0x7f0000000280)={0x0, "f3d70f0000625e7c4be5405ba5abc42592f854c44ec6c1ae9869003fa5f4734089d5b1218bdc4e0ae4a3d22596f5c0215e50ffd2dd3bff3c12b4a500"}, 0xfcdd, 0xffffffffffffffff) 15:03:49 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x58, 0x58, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x75}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:49 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x38, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x1f}]}, 0x38}}, 0x0) 15:03:49 executing program 2: ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000b00)='nl80211\x00', 0xffffffffffffffff) 15:03:50 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:03:50 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x58, 0x58, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x75}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:50 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 15:03:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:50 executing program 2: add_key(&(0x7f00000002c0)='id_legacy\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) 15:03:50 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x38, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x1f}]}, 0x38}}, 0x0) [ 602.976503][T16911] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:03:51 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x58, 0x58, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x75}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:51 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000740)={'wlan1\x00'}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x38, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x1f}]}, 0x38}}, 0x0) 15:03:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc) getsockopt$netlink(r0, 0x10e, 0x9, 0x0, &(0x7f0000000100)) 15:03:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:51 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x58, 0x58, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x75}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:51 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000740)={'wlan1\x00'}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x38, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x1f}]}, 0x38}}, 0x0) 15:03:52 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:03:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = getpgid(0x0) sendmsg$netlink(r0, &(0x7f00000068c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000067c0)=[@cred={{0x1c, 0x1, 0x2, {r1}}}, @rights={{0x10}}], 0x30}, 0x0) 15:03:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:52 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 15:03:52 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x58, 0x58, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x75}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000740)={'wlan1\x00'}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x38, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x1f}]}, 0x38}}, 0x0) [ 604.946794][T16947] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:03:53 executing program 2: r0 = add_key$keyring(&(0x7f00000014c0)='keyring\x00', &(0x7f0000001500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r0, 0x0) 15:03:53 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_BEACON_INTERVAL={0x8}]}, 0x30}}, 0x0) 15:03:53 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x58, 0x58, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x75}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:53 executing program 2: openat$bsg(0xffffffffffffff9c, &(0x7f0000001280)='/dev/bsg\x00', 0x244c00, 0x0) 15:03:53 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x5, [@func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x59}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:54 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:03:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_BEACON_INTERVAL={0x8}]}, 0x30}}, 0x0) 15:03:54 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) 15:03:54 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x5, [@func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x59}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r0, 0x0, 0x24, 0x0, 0x0) [ 607.037337][T16984] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:03:55 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_BEACON_INTERVAL={0x8}]}, 0x30}}, 0x0) 15:03:55 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x5, [@func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x59}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:55 executing program 2: ioprio_set$pid(0x0, 0x0, 0x4004) 15:03:55 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x71}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:55 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x38, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8}]}, 0x38}}, 0x0) 15:03:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:56 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:03:56 executing program 2: mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}}) munmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000) 15:03:56 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) 15:03:56 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x71}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:56 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x38, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8}]}, 0x38}}, 0x0) 15:03:57 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x38, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8}]}, 0x38}}, 0x0) [ 609.076053][T17021] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:03:57 executing program 2: r0 = socket$inet(0x2, 0x3, 0x2) connect$inet(r0, &(0x7f0000000440)={0x2, 0x0, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) 15:03:57 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x71}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:57 executing program 2: r0 = socket$inet(0x2, 0x3, 0x2) recvfrom$inet(r0, 0x0, 0x0, 0x5cfe5b38865979f7, 0x0, 0x0) 15:03:57 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x1f}]}, 0x30}}, 0x0) 15:03:58 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x71}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:59 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05e4dde63e5d7499d9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a611aa99f54a05ac20a06f35517e1b6469a7808e16513f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e55cd1114b247369c9eeeefabec61884ed3aefba9ad514e4ec09db2f30d91a5dfac70964a4ade291f00ec7856efaccdce6aac34207008938bae72d296ab8d600a07cf43121507fa68af245c5047ca4e41cf1da2f9f7cbac1c59c74c01144935dd4c3f72a0dd067abac060ce665165360162a9aa552a84308266d5603c122e0a39f339559db31adeceea5ca95196826d8fe5896944251797224a9cf05599da9ac556352424cf239c", 0x114}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:03:59 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) 15:03:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x1f}]}, 0x30}}, 0x0) 15:03:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)={0x14, 0x17, 0x1, 0x0, 0x0, "", [@generic='y']}, 0x14}], 0x1}, 0x0) 15:03:59 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x71}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 611.237730][T17059] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:03:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:03:59 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x40000100, 0x0, 0x0) 15:03:59 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x71}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:03:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x1f}]}, 0x30}}, 0x0) 15:04:00 executing program 2: r0 = socket$inet(0x2, 0x3, 0x2) getsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, &(0x7f0000000180)) 15:04:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:04:01 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05e4dde63e5d7499d9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a611aa99f54a05ac20a06f35517e1b6469a7808e16513f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e55cd1114b247369c9eeeefabec61884ed3aefba9ad514e4ec09db2f30d91a5dfac70964a4ade291f00ec7856efaccdce6aac34207008938bae72d296ab8d600a07cf43121507fa68af245c5047ca4e41cf1da2f9f7cbac1c59c74c01144935dd4c3f72a0dd067abac060ce665165360162a9aa552a84308266d5603c122e0a39f339559db31adeceea5ca95196826d8fe5896944251797224a9cf05599da9ac556352424cf239c", 0x114}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:04:01 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x4, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x7c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:04:01 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) r5 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x3c, 0x0, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r5}]}, 0x3c}}, 0x0) 15:04:01 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x1f}]}, 0x2c}}, 0x0) 15:04:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = getpgid(0x0) r2 = getpgid(0x0) getpgid(0x0) sendmsg$netlink(r0, &(0x7f00000068c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@cred={{0x1c, 0x1, 0x2, {r1}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00}}}], 0x40}, 0x0) 15:04:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) [ 613.298644][T17096] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:04:01 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x4, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x7c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:04:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0x9, 0x0, &(0x7f0000000100)) 15:04:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)='>', 0x1, 0x0, 0x0, 0x0) 15:04:01 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x1f}]}, 0x2c}}, 0x0) 15:04:02 executing program 2: r0 = getegid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000000)={0x51, 0x7d, 0x1, {{0x0, 0x3c, 0x0, 0xfffff800, {0x8, 0x1, 0x1}, 0x2000000, 0x3, 0x8000, 0x195036e5, 0x1, '\'', 0x2, '&%', 0x3, '$!\\', 0x3, '\x9b-#'}, 0x0, '', 0xee00, r0, 0xee01}}, 0x51) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x88, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x800}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}], [{@uid_gt={'uid>', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}}) munmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000) syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00', 0xffffffffffffffff) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getgroups(0x1, &(0x7f0000000400)=[0x0]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) clone(0x10228080, 0x0, 0x0, 0x0, 0x0) munmap(&(0x7f0000ff8000/0x4000)=nil, 0x4000) write$P9_RAUTH(0xffffffffffffffff, 0x0, 0x0) 15:04:02 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x4, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x7c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:04:03 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:04:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:04:03 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) r5 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x3c, 0x0, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r5}]}, 0x3c}}, 0x0) 15:04:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000000)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x1f}]}, 0x2c}}, 0x0) 15:04:03 executing program 2: r0 = add_key$keyring(&(0x7f00000014c0)='keyring\x00', &(0x7f0000001500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r0, 0x0) add_key$keyring(&(0x7f0000001580)='keyring\x00', 0x0, 0x0, 0x0, r0) 15:04:03 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x4, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x7c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 615.471067][T17135] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:04:03 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x4, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x7c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:04:03 executing program 2: r0 = socket$inet(0x2, 0x3, 0x2) connect$inet(r0, &(0x7f0000000440)={0x2, 0x0, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) 15:04:03 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000000)=""/2, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0, 0x0) 15:04:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:04:04 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x4, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x7c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:04:04 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[], 0x1a0) fallocate(r0, 0x100000003, 0x0, 0x80019c) 15:04:05 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:04:05 executing program 3: r0 = socket$inet(0x2, 0x3, 0x2) connect$inet(r0, &(0x7f0000000440)={0x2, 0x0, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) 15:04:05 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) r5 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x3c, 0x0, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r5}]}, 0x3c}}, 0x0) 15:04:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:04:05 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x4, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x7c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:04:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) creat(0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[], 0x1a0) fallocate(r0, 0x100000003, 0x0, 0x80019c) lseek(r0, 0x0, 0x3) 15:04:05 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000fc0)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) [ 617.669797][T17178] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:04:05 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x4, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x7c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:04:05 executing program 3: syz_genetlink_get_family_id$nl80211(&(0x7f0000000b00)='nl80211\x00', 0xffffffffffffffff) 15:04:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) 15:04:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 15:04:06 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x4, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x7c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:04:07 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:04:07 executing program 3: getresgid(&(0x7f0000000080), &(0x7f0000003040), &(0x7f0000003080)) 15:04:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) 15:04:07 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, {'syz0\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000400)=""/33, 0x21}}, 0x120) 15:04:07 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) r6 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x3c, r5, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r6}]}, 0x3c}}, 0x0) 15:04:07 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 619.418996][T17211] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:04:07 executing program 3: unshare(0x20000600) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo\x00') fchdir(r0) 15:04:07 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:04:07 executing program 2: sched_setattr(0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100), 0x10) 15:04:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "3f2b6758fe043f31", "c3bd96812891ecb8ff79eb0054280be8789a622f6f121b69259904061e75ae34", "d4b46c20", "9ebf60e5422549b1"}, 0x38) sendto$inet6(r0, &(0x7f0000000140)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) 15:04:08 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x10000000}, 0xc) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000000)=0xb, 0x4) 15:04:08 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:04:09 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:04:09 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) r6 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x3c, r5, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r6}]}, 0x3c}}, 0x0) 15:04:09 executing program 0: mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}}) getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) 15:04:09 executing program 2: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x3800, 0x0, 0x0, "c570b277e5d2ea9cd0036a4f389166e0fbcaab"}) 15:04:09 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000001380)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/35, 0x23}}], 0x1, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) setrlimit(0x0, 0x0) fgetxattr(0xffffffffffffffff, 0x0, &(0x7f0000000300)=""/14, 0xe) write(r3, &(0x7f0000000340), 0xfffffd82) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x1, 0x0, 0x8, 0x101}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x50, 0x0, 0x5, 0x0, 0x0, 0x0, 0x800000}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x12200, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x2) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x3000008, 0x11, r1, 0x514d2000) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x6100) ptrace$setopts(0xffffffffffffffff, 0x0, 0x60000000000004, 0x0) write$cgroup_type(r4, &(0x7f0000000200)='threaded\x00', 0x175d900f) 15:04:09 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 621.391264][T17258] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:04:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r0, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x10000000}, 0xc) 15:04:09 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:04:09 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f0000000500)={&(0x7f0000000400), 0x43, &(0x7f00000004c0)={0x0, 0x4c}}, 0x0) 15:04:09 executing program 3: add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) 15:04:10 executing program 0: mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 15:04:10 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:04:11 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:04:11 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000001240)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r0, 0x0, 0x420000a77, 0x0) write$binfmt_elf64(r3, &(0x7f0000000340)=ANY=[], 0xfffffd88) recvmmsg(r0, &(0x7f0000000ac0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) 15:04:11 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) r6 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x3c, r5, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r6}]}, 0x3c}}, 0x0) 15:04:11 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 15:04:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}], 0x20}, 0x0) 15:04:11 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 623.563455][T17298] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:04:11 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000001380), 0x0, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) setrlimit(0x0, &(0x7f00000000c0)={0x1, 0x3}) fgetxattr(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000300)=""/14, 0xe) write(r3, &(0x7f0000000340), 0xfffffd82) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x1, 0x0, 0x8, 0x101}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x8}, 0x12200, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x2) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x3000008, 0x11, r1, 0x514d2000) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f00000001c0)='./bus\x00', 0x42) fcntl$setstatus(r4, 0x4, 0x6100) ptrace$setopts(0xffffffffffffffff, 0x0, 0x60000000000004, 0x0) write$cgroup_type(r4, &(0x7f0000000200)='threaded\x00', 0x175d900f) 15:04:11 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:04:11 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @loopback}}) 15:04:12 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:04:12 executing program 0: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0xe, 0x3fe}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002a40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}, 0x10000}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}, 0xfffffffa}, {{&(0x7f0000000480)=@un=@abs, 0x80, 0x0, 0x0, &(0x7f0000002940)=""/213, 0xd5}, 0x60}], 0x5, 0x20, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000500)}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000440)={0x38, 0x2, 0x0, 0x92, 0x3, 0x0, 0xd45f}, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0x1b}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xcf9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sched_setaffinity(0x0, 0x8, &(0x7f0000000680)=0x36a) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f000099e000)={0x2, 0x4e20, @local}, 0x10) sendto$inet(r4, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000080)="9137181cec80c1a758ef7067c7f353f15d6a12943383517d2ae057a5a6dcef1b5d8233bedc088ebf7e409604215f73b7729e037ab48798040b1746c261a15aa2", 0x40}, {&(0x7f0000001100)="f7cec4e6e8f3ee81f5ced67831ff0f86366f682e73035852b8ebcd736c437e856cee31ef8c1ab9bf30c57d222e098235fed71dbbd42f0735749a", 0x3a}, {&(0x7f0000001180)="db135c86d0c2725e8b36726e2efe2e829c4ad7f7252d3f8fa07dfd0f2063a345b88313618ec53be5550f2bb6a0931f5899506c2d64002c8a46ec7623af0547ed915c559426bb42a93393440f641c60f5c6f5818f5d794f986c1d9a0c4769a72cb1e5ee2dcb28c477e21f501d910210f0ab", 0x71}, {&(0x7f0000001200)="c55474a861eaf5179054bbfeb99665b781b017042cc7c77c7426b7fc7228807cf108cce5171a97123367d48570549732fc79aaebec7e117aa2c0d410947bae8df66d90a063027106c59812cc", 0x4c}, {0x0}, {&(0x7f0000001280)="837a8709a2c88f4e65fe18e200d4652c8348a0e0d5c177073b489d7b539fde5dfa409401ee628c35817100"/53, 0x35}, {&(0x7f00000012c0)="297f596c16b6fb7859f182fc383d19b5814ef8214d28b6f2063703fe52a43bb14fa185cf3047064a794439957fee7471ee279ddf49f98958b6a87963d5d6706577c2ee5e68e2bb", 0x47}], 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x100}, 0x4000800) r5 = accept4$unix(r3, &(0x7f0000000240)=@abs, &(0x7f0000000180)=0x6e, 0x800) dup2(r4, r5) 15:04:12 executing program 3: add_key$keyring(&(0x7f00000013c0)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000001600)='keyring\x00', 0x0, &(0x7f0000001680)="c9", 0x1, 0xfffffffffffffffd) 15:04:13 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:04:13 executing program 2: r0 = add_key$keyring(&(0x7f0000001340)='keyring\x00', &(0x7f0000001380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f00000013c0)='keyring\x00', &(0x7f0000001400)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000001440)='keyring\x00', &(0x7f0000001480)={'syz', 0x2}, 0x0, 0x0, r0) 15:04:13 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x34, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}]}, 0x34}}, 0x0) 15:04:13 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:04:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @empty}, 0x10) 15:04:13 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000001240)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r1, 0x0, 0x420000a77, 0x0) write$binfmt_elf64(r4, &(0x7f0000000340)=ANY=[], 0xfffffd88) close(r2) [ 625.479206][T17342] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:04:13 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:04:13 executing program 2: getpid() socket$inet6(0xa, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x0, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100), 0x10) r1 = accept4$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x0, 0x0) dup2(0xffffffffffffffff, r1) 15:04:13 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo\x00') fchdir(r0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./bus\x00', 0x0) 15:04:14 executing program 2: r0 = socket$inet(0x2, 0x3, 0x2) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 15:04:14 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) 15:04:14 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:04:15 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:04:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) 15:04:15 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x34, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}]}, 0x34}}, 0x0) 15:04:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x10000000}, 0xc) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={0x0}}, 0x0) 15:04:15 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:04:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc) [ 627.391541][T17378] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:04:15 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:04:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc) 15:04:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) sendmsg$NL80211_CMD_SET_POWER_SAVE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 15:04:15 executing program 3: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0xe, 0x3fe}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002a40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}, 0x10000}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}, 0xfffffffa}, {{&(0x7f0000000480)=@un=@abs, 0x80, 0x0, 0x0, &(0x7f0000002940)=""/213, 0xd5}, 0x60}], 0x5, 0x20, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000500)}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000440)={0x38, 0x2, 0x0, 0x92, 0x3, 0x0, 0xd45f}, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000500), 0x1b}, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0xcf9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sched_setaffinity(0x0, 0x8, &(0x7f0000000680)=0x36a) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f000099e000)={0x2, 0x4e20, @local}, 0x10) sendto$inet(r4, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000080)="9137181cec80c1a758ef7067c7f353f15d6a12943383517d2ae057a5a6dcef1b5d8233bedc088ebf7e409604215f73b7729e037ab48798040b1746c261a15aa2", 0x40}, {&(0x7f0000001100)="f7cec4e6e8f3ee81f5ced67831ff0f86366f682e73035852b8ebcd736c437e856cee31ef8c1ab9bf30c57d222e098235fed71dbbd42f0735749ad2895b8ee9941e10572ad89ad7b86d5bc3605bcc0e4581d0e42db1ee13af021f944255459b4c964784dac0fa486b9ec50d75a259bc6409ad0d", 0x73}, {&(0x7f0000001180)="db135c86d0c2725e8b36726e2efe2e829c4ad7f7252d3f8fa07dfd0f2063a345b88313618ec53be5550f2bb6a0931f5899506c2d64002c8a46ec7623af0547ed915c559426bb42a93393440f641c60f5c6f5818f5d794f986c1d9a0c4769a72cb1e5ee2dcb28c477e21f501d910210f0ab", 0x71}, {&(0x7f0000001200)="c55474a861eaf5179054bbfeb99665b781b017042cc7c77c7426b7fc7228807cf108cce5171a97123367d48570549732fc79aaebec7e117aa2c0d410947bae8df66d90a063027106c59812cc", 0x4c}, {0x0}, {&(0x7f0000001280)="837a8709a2c88f4e65fe18e200d4652c8348a0e0d5c177073b489d7b539fde5dfa409401ee628c35817100"/53, 0x35}, {&(0x7f00000012c0)="297f596c16b6fb7859f182fc383d19b5814ef8214d28b6f2063703fe52a43bb14fa185cf3047064a794439957fee7471ee279ddf49f98958b6a87963d5d6706577c2ee5e68e2bb", 0x47}], 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x100}, 0x4000800) r5 = accept4$unix(r3, &(0x7f0000000240)=@abs, &(0x7f0000000180)=0x6e, 0x800) dup2(r4, r5) 15:04:16 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:04:16 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000001380)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=""/26, 0x1a}, 0x421}], 0x1, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) setrlimit(0x0, &(0x7f00000000c0)={0x1, 0x3}) fgetxattr(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="5473322e3aac21b195415429a9921a0671110af42d"], &(0x7f0000000300)=""/14, 0xe) write(r3, &(0x7f0000000340), 0xfffffd82) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x1, 0x0, 0x8, 0x101}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x800000}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x8}, 0x12200, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x2) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x3000008, 0x11, r1, 0x514d2000) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f00000001c0)='./bus\x00', 0x42) fcntl$setstatus(r4, 0x4, 0x6100) ptrace$setopts(0xffffffffffffffff, 0x0, 0x60000000000004, 0x0) write$cgroup_type(r4, &(0x7f0000000200)='threaded\x00', 0x175d900f) 15:04:17 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:04:17 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x12, &(0x7f0000000100)=0x1, 0x4) 15:04:17 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:04:17 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x34, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}]}, 0x34}}, 0x0) 15:04:17 executing program 2: r0 = getegid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000000)={0x51, 0x7d, 0x1, {{0x0, 0x3c, 0x0, 0xfffff800, {0x8, 0x1, 0x1}, 0x2000000, 0x3, 0x8000, 0x195036e5, 0x1, '\'', 0x2, '&%', 0x3, '$!\\', 0x3, '\x9b-#'}, 0x0, '', 0xee00, r0, 0xee01}}, 0x51) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x88, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x800}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}], [{@uid_gt={'uid>', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}}) munmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000) syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00', 0xffffffffffffffff) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getgroups(0x3, &(0x7f0000000400)=[0x0, r0, r0]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) clone(0x10228080, 0x0, 0x0, 0x0, 0x0) munmap(&(0x7f0000ff8000/0x4000)=nil, 0x4000) write$P9_RAUTH(0xffffffffffffffff, &(0x7f00000026c0)={0x14, 0x67, 0x0, {0x8, 0x3, 0x7}}, 0x14) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000002700)={0x78, 0x0, 0x0, {0x1ff, 0x2, 0x0, {0x3, 0xe0e, 0x8, 0x13, 0xff, 0x200, 0x4, 0x0, 0x7fffffff, 0x1000, 0x80000001, 0x0, 0x0, 0x0, 0x800}}}, 0x78) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000027c0)={'wlan1\x00'}) 15:04:17 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0xa, 0x0, 0x0) 15:04:17 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 629.489471][T17431] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:04:17 executing program 0: mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) stat(&(0x7f0000000280)='./file0\x00', 0x0) 15:04:17 executing program 2: r0 = add_key(&(0x7f00000002c0)='id_legacy\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='E', 0x1, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x1}, r1) 15:04:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x1) 15:04:17 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:04:18 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:04:19 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:04:19 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x11, &(0x7f0000000000), 0x4) 15:04:19 executing program 2: r0 = socket$inet(0x2, 0x3, 0x2) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 15:04:19 executing program 3: r0 = add_key$keyring(&(0x7f0000001340)='keyring\x00', &(0x7f0000001380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000001440)='keyring\x00', &(0x7f0000001480)={'syz', 0x2}, 0x0, 0x0, r0) 15:04:19 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x3c, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp}]}, 0x3c}}, 0x0) 15:04:19 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:04:19 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 631.369596][T17473] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:04:19 executing program 2: perf_event_open(&(0x7f0000000000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:04:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$netlink(r0, 0x10e, 0x3, 0x0, &(0x7f0000000000)=0x23) 15:04:19 executing program 0: add_key(&(0x7f00000002c0)='id_legacy\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='E', 0x1, 0xfffffffffffffffc) 15:04:19 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:04:20 executing program 2: mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}}) getresgid(&(0x7f0000000340), 0x0, 0x0) [ 632.746490][ T3130] ieee802154 phy0 wpan0: encryption failed: -22 [ 632.753099][ T3130] ieee802154 phy1 wpan1: encryption failed: -22 15:04:21 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:04:21 executing program 3: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x200, 0x0) 15:04:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="48000000fcd87d"], 0x48}}, 0x0) 15:04:21 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x3c, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp}]}, 0x3c}}, 0x0) 15:04:21 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:04:21 executing program 2: r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x8200) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) r2 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 633.494393][T17512] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:04:21 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000001f40)='/dev/net/tun\x00', 0x84100, 0x0) 15:04:21 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 15:04:21 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:04:21 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0, 0x26}], 0x1, 0x7, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 15:04:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300), 0x4}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='wlan0\x00', 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000070, 0x0) 15:04:22 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:04:23 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05e4dde63e5d7499d9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a611aa99f54a05ac20a06f35517e1b6469a7808e16513f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e55cd1114b247369c9eeeefabec61884ed3aefba9ad514e4ec09db2f30d91a5dfac70964a4ade291f00ec7856efaccdce6aac34207008938bae72d296ab8d600a07cf43121507fa68af245c5047ca4e41cf1da2f9f7cbac1c59c74c01144935dd4c3f72a0dd067abac060ce665165360162a9aa552a84308266d5603c122e0a39f339559db31adeceea5ca95196826d8fe5896944251797224a9cf05599da9ac556352424cf239c", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(0x0, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:04:23 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x8}, 0xc) 15:04:23 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x3c, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp}]}, 0x3c}}, 0x0) 15:04:23 executing program 0: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5453, 0x0) 15:04:23 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:04:23 executing program 3: syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x6, 0x44041) [ 635.885586][T17553] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:04:24 executing program 3: syz_open_dev$rtc(0xfffffffffffffffd, 0x0, 0x0) 15:04:24 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:04:24 executing program 0: semctl$SETVAL(0xffffffffffffffff, 0x0, 0x10, 0x0) 15:04:24 executing program 2: timerfd_create(0xe, 0x0) 15:04:24 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000100)={0xffffffff}) 15:04:24 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:04:25 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05e4dde63e5d7499d9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a611aa99f54a05ac20a06f35517e1b6469a7808e16513f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e55cd1114b247369c9eeeefabec61884ed3aefba9ad514e4ec09db2f30d91a5dfac70964a4ade291f00ec7856efaccdce6aac34207008938bae72d296ab8d600a07cf43121507fa68af245c5047ca4e41cf1da2f9f7cbac1c59c74c01144935dd4c3f72a0dd067abac060ce665165360162a9aa552a84308266d5603c122e0a39f339559db31adeceea5ca95196826d8fe5896944251797224a9cf05599da9ac556352424cf239c", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(0x0, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:04:25 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) connect$netlink(r0, &(0x7f0000000000)=@proc={0x10, 0x0, 0x25dfdbfd}, 0xc) 15:04:25 executing program 0: waitid(0x0, 0x0, &(0x7f0000000000), 0x4, 0x0) 15:04:25 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) r6 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x34, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r6}]}, 0x34}}, 0x0) 15:04:25 executing program 3: select(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x363}, 0x0, 0x0) 15:04:25 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 637.861675][T17586] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:04:26 executing program 0: clock_gettime(0x0, &(0x7f0000000180)={0x0}) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000100)={0x4}, 0x0, &(0x7f00000001c0)={r0}, 0x0) 15:04:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[], 0x120}}, 0x0) 15:04:26 executing program 2: openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000e80)='cgroup.type\x00', 0x2, 0x0) 15:04:26 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 15:04:26 executing program 3: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self\x00', 0x22ccc0, 0x0) 15:04:26 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @hyper}, 0x10) 15:04:27 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(0x0, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:04:27 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x2) 15:04:27 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) gettid() rt_sigqueueinfo(0x0, 0x3c, &(0x7f0000000040)) 15:04:27 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) r6 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x34, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r6}]}, 0x34}}, 0x0) 15:04:27 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f00000000c0), 0x8) 15:04:27 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x51) [ 640.049776][T17623] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:04:28 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000140)) 15:04:28 executing program 2: semctl$SETVAL(0x0, 0x4, 0x10, 0x0) 15:04:28 executing program 3: socket(0x28, 0x0, 0x10000) 15:04:28 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) 15:04:28 executing program 2: getresuid(&(0x7f0000000080), &(0x7f00000000c0), 0x0) 15:04:28 executing program 3: openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/seq\x00', 0x230000) 15:04:30 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05e4dde63e5d7499d9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a611aa99f54a05ac20a06f35517e1b6469a7808e16513f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e55cd1114b247369c9eeeefabec61884ed3aefba9ad514e4ec09db2f30d91a5dfac70964a4ade291f00ec7856efaccdce6aac34207008938bae72d296ab8d600a07cf43121507fa68af245c5047ca4e41cf1da2f9f7cbac1c59c74c01144935dd4c3f72a0dd067abac060ce665165360162a9aa552a84308266d5603c122e0a39f339559db31adeceea5ca95196826d8fe5896944251797224a9cf05599da9ac556352424cf239c", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:04:30 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) r6 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x34, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r6}]}, 0x34}}, 0x0) [ 642.288416][T17653] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:04:31 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) gettid() rt_sigqueueinfo(0x0, 0x3c, &(0x7f0000000040)) 15:04:31 executing program 0: futex(&(0x7f0000000280)=0x2, 0x8b, 0x0, 0x0, 0x0, 0x0) 15:04:31 executing program 2: futex(&(0x7f0000000280), 0x8b, 0x0, 0x0, &(0x7f0000000300), 0x0) 15:04:31 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) 15:04:31 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:04:31 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) r6 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x34, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r6}]}, 0x34}}, 0x0) 15:04:31 executing program 3: r0 = socket(0x11, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, 0x0, 0x0) 15:04:31 executing program 0: name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xa58d3790967fbe7b) 15:04:31 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) gettid() rt_sigqueueinfo(0x0, 0x3c, &(0x7f0000000040)) [ 643.737855][T17676] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:04:32 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, 0x0) 15:04:32 executing program 0: openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x40401, 0x0) 15:04:32 executing program 2: read$rfkill(0xffffffffffffffff, 0x0, 0x0) 15:04:32 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue0\x00'}) 15:04:32 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) r6 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x34, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r6}]}, 0x34}}, 0x0) 15:04:32 executing program 0: r0 = getpgrp(0x0) syz_open_procfs$namespace(0x0, 0x0) prlimit64(r0, 0x0, 0x0, &(0x7f0000000000)) 15:04:32 executing program 2: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000140)) [ 645.060673][T17699] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:04:33 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:04:33 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvmsg(r0, &(0x7f00000015c0)={0x0, 0x0, 0x0}, 0x0) 15:04:33 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvram\x00', 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000c00)='cgroup.type\x00', 0x2, 0x0) 15:04:33 executing program 2: prlimit64(0x0, 0x6, &(0x7f0000000000)={0x0, 0xfffffffffffffffc}, 0x0) 15:04:35 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000040)) 15:04:35 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) r6 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x34, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r6}]}, 0x34}}, 0x0) 15:04:35 executing program 0: select(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x363}, 0x0, &(0x7f0000000240)={0x77359400}) 15:04:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000400)=0x20000, 0x4) 15:04:35 executing program 3: openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x4001, 0x0) [ 647.190597][T17734] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:04:35 executing program 0: openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x5f3afd4e430fa1da, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000ec0)='/dev/null\x00', 0x0, 0x0) 15:04:35 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/ipc\x00') 15:04:35 executing program 2: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000040)={{}, {0x4}}) 15:04:35 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0xffffffffffffffff, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:04:35 executing program 0: socket(0x2, 0xa, 0x50) 15:04:35 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_INPUT(r0, &(0x7f0000000f00)={0x8, {"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", 0x1000}}, 0x1006) 15:04:36 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000ec0)='/dev/null\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) [ 648.095300][T17750] syz-executor.0 uses obsolete (PF_INET,SOCK_PACKET) 15:04:38 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000040)) 15:04:38 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) r6 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x3c, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r6}]}, 0x3c}}, 0x0) 15:04:38 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000080)={0x0, 0x9}) 15:04:38 executing program 2: openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 15:04:38 executing program 3: prlimit64(0x0, 0x0, &(0x7f0000000000), 0x0) 15:04:38 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0xffffffffffffffff, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 650.503988][T17774] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:04:38 executing program 3: futex(&(0x7f0000000280)=0x2, 0x8b, 0x0, &(0x7f00000002c0), 0x0, 0x0) 15:04:38 executing program 2: r0 = getpid() waitid(0x2, r0, 0x0, 0x2, 0x0) 15:04:38 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0x4, 0x0, &(0x7f0000000280)) 15:04:39 executing program 3: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) 15:04:39 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000440)={0x28, 0x0, 0x2710}, 0x10) 15:04:39 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f00000003c0), 0x4) 15:04:41 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000040)) 15:04:41 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) r6 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x3c, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r6}]}, 0x3c}}, 0x0) 15:04:41 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000200)={{0x3f}}) 15:04:41 executing program 3: openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x9}, &(0x7f00000000c0)={0x0, 0x989680}, 0x0) 15:04:41 executing program 2: select(0x5b, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0xea60}) 15:04:41 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0xffffffffffffffff, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 653.662479][T17812] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:04:41 executing program 3: pselect6(0x37, &(0x7f0000000000)={0x7fff}, 0x0, &(0x7f0000000080), &(0x7f00000000c0)={0x77359400}, 0x0) 15:04:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[], 0x120}}, 0x0) 15:04:42 executing program 2: syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x7, 0x800) 15:04:42 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockname$netlink(r0, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) 15:04:42 executing program 2: symlinkat(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00') 15:04:42 executing program 3: socket(0x18, 0x0, 0x101) 15:04:44 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, 0x0) 15:04:44 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) r6 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x3c, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r6}]}, 0x3c}}, 0x0) 15:04:44 executing program 0: pselect6(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000140)={&(0x7f0000000100), 0x8}) 15:04:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) connect$netlink(r0, &(0x7f0000000000)=@proc, 0xc) 15:04:44 executing program 3: openat$nvram(0xffffffffffffff9c, 0x0, 0x543e42, 0x0) 15:04:44 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 656.927192][T17848] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:04:45 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000180)={{}, {0x1}}) 15:04:45 executing program 2: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x157, @time}) 15:04:45 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x1) 15:04:45 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f00000009c0)={0x0, 0x0, 0x0}, 0x1) 15:04:45 executing program 0: accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x180800) 15:04:45 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) r6 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x34, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r6}]}, 0x34}}, 0x0) [ 658.146128][T17871] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:04:48 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, 0x0) 15:04:48 executing program 2: futex(&(0x7f0000000200), 0x3, 0x0, &(0x7f0000000140), &(0x7f0000000180), 0x0) 15:04:48 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f00000003c0)={0x6}, 0x4) 15:04:48 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:04:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x7) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 15:04:48 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) r6 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x34, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r6}]}, 0x34}}, 0x0) [ 660.204152][T17893] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:04:48 executing program 2: semget(0x2, 0x6, 0x0) 15:04:48 executing program 0: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self\x00', 0x31f182, 0x0) 15:04:48 executing program 3: pselect6(0x40, &(0x7f0000000100), 0x0, 0xffffffffffffffff, 0x0, 0x0) 15:04:48 executing program 0: utimensat(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x100) 15:04:49 executing program 2: pselect6(0x40, &(0x7f0000000000)={0x1}, 0x0, &(0x7f0000000080)={0x5}, &(0x7f00000000c0)={0x0, 0x3938700}, 0x0) 15:04:49 executing program 3: r0 = getpgid(0x0) sched_rr_get_interval(r0, &(0x7f0000000580)) 15:04:51 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x7d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, 0x0) 15:04:51 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) r6 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x34, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r6}]}, 0x34}}, 0x0) 15:04:51 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000013c0), 0x8) 15:04:51 executing program 2: inotify_init1(0xc0000) 15:04:51 executing program 3: waitid(0x1, 0xffffffffffffffff, 0x0, 0x2, 0x0) 15:04:51 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 663.570259][T17932] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:04:51 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000440), 0x10) 15:04:51 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000000)={{}, 'port1\x00'}) 15:04:51 executing program 2: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000340)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000380)={0x0, 0x0, 'client0\x00', 0x0, "a7823ce09a98593c", "d9cc1be1d7ae7e36639192c96432c0c405cdc3dcc0c544750fd4e69bde00a645"}) 15:04:52 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000000)={0x4}, 0x0) 15:04:52 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000140)={0x80, 0x0, 'client1\x00', 0x0, "5e01fa96924b5533", "eb0b44e5db5ed5939152f688040671f33c15d4fb39098dc75b70b937f13110b7"}) 15:04:52 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 15:04:54 executing program 3: symlinkat(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 15:04:54 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) r6 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x34, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r6}]}, 0x34}}, 0x0) 15:04:54 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000ec0)='/dev/null\x00', 0x0, 0x0) timerfd_gettime(r0, 0x0) 15:04:54 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:04:54 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvram\x00', 0x0, 0x0) read$rfkill(r0, 0x0, 0x0) 15:04:54 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x802, 0x0) write$UHID_INPUT2(r0, &(0x7f0000000280), 0x6) [ 666.808702][T17971] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:04:55 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, &(0x7f0000000080)) 15:04:55 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000ec0)='/dev/null\x00', 0x634982, 0x0) 15:04:55 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) accept4(r0, 0x0, 0x0, 0x0) 15:04:55 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r0, 0x0, &(0x7f00000016c0)) 15:04:55 executing program 2: msgget(0x0, 0x684) r0 = msgget(0x2, 0x4) msgctl$IPC_RMID(r0, 0x0) 15:04:55 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000080)={0x5}) 15:04:55 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000013c0), 0x8) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000000), 0x8) 15:04:55 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) r6 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x34, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r6}]}, 0x34}}, 0x0) 15:04:55 executing program 3: write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) [ 668.277187][T18000] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:04:57 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:04:57 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue0\x00'}) 15:04:57 executing program 2: pselect6(0xffffffa9, &(0x7f0000000000), 0x0, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x3938700}, 0x0) 15:04:57 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000180)={@hyper}) 15:04:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000580)=""/202, 0x2b, 0xca, 0x1}, 0x20) 15:04:57 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) r6 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x34, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r6}]}, 0x34}}, 0x0) 15:04:57 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={0x0}, 0x1, 0x0, 0x5000000}, 0x0) 15:04:57 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDDISABIO(r1, 0x4b37) ioctl$KDDISABIO(r0, 0x4b37) 15:04:57 executing program 2: r0 = socket$unix(0x1, 0x3, 0x0) getsockname$unix(r0, 0x0, &(0x7f0000000000)) 15:04:57 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x1c) [ 669.585221][T18020] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:04:58 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8905, &(0x7f0000000540)={'batadv0\x00'}) 15:04:58 executing program 3: sysfs$2(0x2, 0x0, &(0x7f0000000000)=""/23) 15:04:59 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05e4dde63e5d7499d9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a611aa99f54a05ac20a06f35517e1b6469a7808e16513f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e55cd1114b247369c9eeeefabec61884ed3aefba9ad514e4ec09db2f30d91a5dfac70964a4ade291f00ec7856efaccdce6aac34207008938bae72d296ab8d600a07cf43121507fa68af245c5047ca4e41cf1da2f9f7cbac1c59c74c01144935dd4c3f72a0dd067abac060ce665165360162a9aa552a84308266d5603c122e0a39f339559db31adeceea5ca95196826d8fe5896944251797224a9cf05599da9ac556352424cf239c", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:04:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="70000000030601080000000054c5719514ef25fe0900020073797a310000000005000100070000000900020073797a31000000000900020073797a32000000000900020073797a31000000000900"], 0x70}}, 0x0) read$char_usb(0xffffffffffffffff, &(0x7f0000000180)=""/152, 0x98) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) 15:04:59 executing program 0: r0 = openat$rtc(0xffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8004700b, &(0x7f0000000000)) 15:04:59 executing program 3: prctl$PR_SET_PDEATHSIG(0x34, 0x0) 15:04:59 executing program 5: fchownat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 15:04:59 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) r6 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x3c, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r6}]}, 0x3c}}, 0x0) [ 671.255807][T18049] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 671.319257][T18049] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 671.329069][T18055] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:04:59 executing program 0: r0 = io_uring_setup(0x4f3b, &(0x7f00000004c0)) mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x10000000) 15:04:59 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000080)='logon\x00', &(0x7f00000000c0)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000100)={0x0, "289fb55f17d69a6fa071be8965c27605cf4d9590e0ffdb59cf6209475304211c6667b28c4e0e59379962b94ab654c536eb4d0bc474813b991215362cfde8d2b3"}, 0x48, 0xffffffffffffffff) keyctl$get_security(0x11, r0, &(0x7f0000000180)=""/232, 0xe8) 15:04:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_VERDICT_BATCH(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)=ANY=[], 0x3c}}, 0x0) 15:04:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="70000000030601080000000054c5719514ef25fe0900020073797a310000000005000100070000000900020073797a31000000000900020073797a3200000000090002007379"], 0x70}, 0x1, 0x0, 0x0, 0x4000}, 0x200000c0) [ 671.907357][T18067] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 15:05:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000)=0x1, 0x4) 15:05:00 executing program 3: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00', 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000180)={'batadv_slave_0\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x34, r0, 0x1, 0x0, 0x0, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x34}}, 0x0) 15:05:01 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:05:01 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000000340)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) 15:05:01 executing program 2: splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xc5, 0x17) 15:05:01 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) r6 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x3c, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r6}]}, 0x3c}}, 0x0) 15:05:01 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x11, 0x65, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x374, 0xffffffff, 0x23c, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x3f8, 0x3f8, 0x3f8, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@mcast2, @local, [], [], 'ip_vti0\x00', 'gre0\x00'}, 0x0, 0xa4, 0xe4}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "9bd7fbab8a0a3409446d2ae700beca54273d7c53f604f61a99f4bab00842"}}, {{@ipv6={@loopback, @private0, [], [], 'vcan0\x00', 'veth1_to_batadv\x00'}, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00'}}, {{@ipv6={@local, @empty, [], [], 'veth0_to_team\x00', 'vlan0\x00'}, 0x0, 0xa4, 0x100}, @common=@inet=@HMARK={0x5c, 'HMARK\x00', 0x0, {@ipv4=@remote}}}], {{[], 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x3d0) 15:05:01 executing program 3: add_key$fscrypt_v1(&(0x7f0000000380)='logon\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 673.291369][T18089] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:05:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000340)="11", 0x1, 0x200000d0, 0x0, 0x0) 15:05:01 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) 15:05:01 executing program 0: r0 = socket$unix(0x1, 0x3, 0x0) getsockname$unix(r0, &(0x7f0000000140), &(0x7f0000000000)=0x6e) openat$zero(0xffffff9c, &(0x7f0000000d40)='/dev/zero\x00', 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000240)=@raw=[@btf_id], &(0x7f00000001c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 15:05:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f00000005c0)={0x20, 0x0, 0x2, 0x101, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_TUPLE={0x4}]}, 0x20}}, 0x0) 15:05:02 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x10, 0x0, 0x0) 15:05:02 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDDISABIO(r0, 0x5437) 15:05:03 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:05:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) openat$zero(0xffffff9c, &(0x7f0000000d40)='/dev/zero\x00', 0x0, 0x0) gettid() openat$zero(0xffffff9c, &(0x7f0000000d40)='/dev/zero\x00', 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f00000002c0)="9394203eb3e0c3c2e6eb9d021fa1e4c31a886ec23b8a8dd6ce01e5811b274efead7952d434", 0x25}, {&(0x7f0000000340)="f8232d46c5730cbc0c6e796ccbdfe8682c5cef1afc20e16e3635246dd14ec871e4cc4a8678cae846c8b6539d28b05b9071", 0x31}, {&(0x7f0000000380)="0fff3eca32e2", 0x6}, {&(0x7f00000003c0)="fe502e5c33f9a096c8866d99601b745b587658a642f890f9d3b96f5d10992a2ec1b0fdc39c04be7581957a78e41b63c715a0938b972b1c", 0x37}, {&(0x7f0000000400)="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", 0xe2e}], 0x5}, 0x0) 15:05:03 executing program 2: timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, @thr={&(0x7f0000000000), 0x0}}, 0x0) 15:05:03 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_ALL_TARGETS={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000093000000000000000000", @ANYRES32=0x0, @ANYBLOB="00920000616e00"/21], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x181440) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) r6 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x3c, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r6}]}, 0x3c}}, 0x0) 15:05:03 executing program 5: getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) 15:05:03 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x5451, 0x0) [ 675.346583][T18128] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 15:05:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 15:05:03 executing program 2: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00', 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000200)={'batadv0\x00'}) sendmsg$ETHTOOL_MSG_TSINFO_GET(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)={0x2c, r0, 0x20f, 0x0, 0x0, {0x13}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}]}, 0x2c}}, 0x0) 15:05:03 executing program 5: add_key$fscrypt_v1(&(0x7f0000000040)='logon\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) 15:05:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fremovexattr(r0, &(0x7f0000000000)=@random={'security.', '\x00'}) 15:05:04 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x1e, &(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 15:05:04 executing program 3: openat$zero(0xffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x230043, 0x0) 15:05:05 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:05:05 executing program 0: io_setup(0x6, &(0x7f0000000000)=0x0) r1 = openat$zero(0xffffff9c, &(0x7f0000000d40)='/dev/zero\x00', 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000001780)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 15:05:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000005c0)='e', 0x1, 0x0, 0x0, 0x0) 15:05:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00', 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000001080)={0x14, r1, 0x1}, 0x14}}, 0x0) 15:05:05 executing program 3: r0 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x3000006, 0x4004031, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r0, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x3000006, 0x4004031, 0xffffffffffffffff, 0x0) 15:05:05 executing program 5: add_key$fscrypt_v1(&(0x7f0000000040)='logon\x00', &(0x7f0000000080)={'fscrypt:', @desc4='85baa174f0cb1142'}, &(0x7f00000000c0)={0x0, "35d81696b7599f47a2b4643f2493737b1ac82852cb940f51df62309087573e3e5fa3d34ceee1c55f75dd50ea3f6ab2ce1caf8c170f7cf84fa7766e73fc43ae87"}, 0x48, 0xfffffffffffffffe) 15:05:05 executing program 2: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00', 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000200)={'batadv0\x00'}) sendmsg$ETHTOOL_MSG_TSINFO_GET(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)={0x2c, r0, 0x20f, 0x0, 0x0, {0x7}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}]}, 0x2c}}, 0x0) 15:05:05 executing program 3: openat$dir(0xffffff9c, &(0x7f0000000100)='./file0\x00', 0x42440, 0x0) 15:05:05 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000380)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0x7, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 15:05:05 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)) 15:05:05 executing program 5: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) 15:05:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_DEL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x3, 0x7, 0x801}, 0x14}}, 0x0) 15:05:07 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:05:07 executing program 3: r0 = socket$unix(0x1, 0x3, 0x0) getsockname$unix(r0, &(0x7f0000000140), &(0x7f0000000000)=0x6e) 15:05:07 executing program 0: prctl$PR_SET_PDEATHSIG(0x1c, 0x1032) 15:05:07 executing program 4: fchownat(0xffffffffffffffff, 0x0, 0x0, 0xee01, 0x1500) 15:05:07 executing program 5: getresgid(0x0, 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) 15:05:07 executing program 2: io_cancel(0x0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 15:05:07 executing program 0: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00', 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)={0x2c, r0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x3, 'veth1_to_bond\x00'}]}]}, 0x2c}}, 0x0) 15:05:07 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x200000ee) 15:05:07 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00', r0) 15:05:07 executing program 5: socketpair(0x10, 0x0, 0x0, &(0x7f0000000340)) 15:05:07 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x3, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x374, 0xffffffff, 0x23c, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x3f8, 0x3f8, 0x3f8, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@mcast2, @local, [], [], 'ip_vti0\x00', 'gre0\x00'}, 0x0, 0xa4, 0xe4}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "9bd7fbab8a0a3409446d2ae700beca54273d7c53f604f61a99f4bab00842"}}, {{@ipv6={@loopback, @private0, [], [], 'vcan0\x00', 'veth1_to_batadv\x00'}, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00'}}, {{@ipv6={@local, @empty, [], [], 'veth0_to_team\x00', 'vlan0\x00'}, 0x0, 0xa4, 0x100}, @common=@inet=@HMARK={0x5c, 'HMARK\x00', 0x0, {@ipv4=@remote}}}], {{[], 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x3d0) [ 679.587520][T18201] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 679.654770][T18206] netlink: 'syz-executor.0': attribute type 3 has an invalid length. 15:05:07 executing program 2: r0 = socket(0x2, 0xa, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f00000027c0)={&(0x7f00000001c0), 0xc, &(0x7f0000002780)={0x0}}, 0x0) 15:05:08 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:05:08 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_mreq(r0, 0x29, 0x13, 0x0, &(0x7f00000004c0)) 15:05:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000340)={0x1c, 0x1, 0x1, 0x801, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x4}, @CTA_LABELS_MASK={0x4}]}, 0x1c}}, 0x0) 15:05:08 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="70000000030601080000000054c5719514ef25fe0900020073797a31000000000500010007"], 0x70}}, 0x0) 15:05:08 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="70000000030601080000000054c5"], 0x70}, 0x1, 0x0, 0x0, 0x4000}, 0x200000c0) 15:05:08 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000280)='*', 0x1}, {&(0x7f0000000340)='?', 0x1}], 0x3, &(0x7f0000000540)=[@cred={{0x19, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}], 0x18}, 0x0) [ 680.871321][T18230] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.4'. [ 680.881491][T18229] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.5'. 15:05:09 executing program 0: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00', 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)={0x2c, r0, 0x1, 0x0, 0x0, {0x3}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}]}]}, 0x2c}}, 0x0) 15:05:09 executing program 5: request_key(&(0x7f0000000040)='keyring\x00', 0x0, 0x0, 0xfffffffffffffffc) 15:05:09 executing program 2: socketpair(0x2, 0x8000f, 0x0, &(0x7f0000000000)) 15:05:09 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000280)='*', 0x1}, {&(0x7f0000000340)='?', 0x1}], 0x3, &(0x7f0000000540)=[@cred={{0x18, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}], 0x20000518}, 0x0) 15:05:09 executing program 3: timer_create(0x700, 0x0, 0x0) 15:05:09 executing program 0: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f00000006c0)='big_key\x00', 0x0) 15:05:10 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:05:10 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f00000004c0)='logon\x00', &(0x7f0000000500)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000540)={0x0, "fdc5d4604af88ef2cf89eacdeb88ff27f22cde738244a267aae3d93b0239b2497bc3d6b8e134bfc8323489b3c6dfe17d250d15209f8319ed4f478ed6b029b640"}, 0x48, 0xffffffffffffffff) keyctl$link(0x10, r0, 0x0) 15:05:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x8, [@enum={0x6, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000580)=""/202, 0x34, 0xca, 0x1}, 0x20) 15:05:10 executing program 3: r0 = openat$rtc(0xffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) ioctl$RTC_PIE_OFF(r0, 0x7006) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) 15:05:10 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = gettid() sendmsg$unix(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{0x0}, {0x0}, {&(0x7f0000000340)='?', 0x1}], 0x3, &(0x7f0000000540)=[@cred={{0x18, 0x1, 0x2, {r1, 0xee01, 0xee01}}}], 0x18}, 0x0) 15:05:10 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}]}]}, 0x2c}}, 0x0) 15:05:10 executing program 0: request_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)='!):\x00', 0xfffffffffffffffc) 15:05:11 executing program 5: r0 = socket(0x2, 0xa, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002780)={0x0}}, 0x0) 15:05:11 executing program 4: openat$kvm(0xffffff9c, &(0x7f0000000500)='/dev/kvm\x00', 0x24000, 0x0) 15:05:11 executing program 2: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00', 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x2c, r0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}]}]}, 0x2c}}, 0x0) 15:05:11 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/user\x00') setns(r0, 0x20000000) 15:05:11 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x374, 0xffffffff, 0x23c, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x3f8, 0x3f8, 0x3f8, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@mcast2, @local, [], [], 'ip_vti0\x00', 'gre0\x00'}, 0x0, 0xa4, 0xe4}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "9bd7fbab8a0a3409446d2ae700beca54273d7c53f604f61a99f4bab00842"}}, {{@ipv6={@loopback, @private0, [], [], 'vcan0\x00', 'veth1_to_batadv\x00'}, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00'}}, {{@ipv6={@local, @empty, [], [], 'veth0_to_team\x00', 'vlan0\x00'}, 0x0, 0xa4, 0x100}, @common=@inet=@HMARK={0x5c, 'HMARK\x00', 0x0, {@ipv4=@remote}}}], {{[], 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x3d0) 15:05:12 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:05:12 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000340)={0x18, 0x1, 0x1, 0x801, 0x0, 0x0, {}, [@CTA_TUPLE_REPLY={0x4}]}, 0x18}}, 0x0) 15:05:12 executing program 2: openat$zero(0xffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0xac880, 0x0) 15:05:12 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getpeername(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f00000000c0)=0x80) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, 0x0) 15:05:12 executing program 3: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00', 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_TSINFO_GET(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)={0x14, r0, 0x20f, 0x0, 0x0, {0xc}}, 0x14}}, 0x0) 15:05:12 executing program 0: prctl$PR_SET_PDEATHSIG(0x27, 0x1032) 15:05:13 executing program 0: perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40800, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1184, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:05:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[@cred={{0x18, 0x1, 0x2, {0xffffffffffffffff, 0xee00}}}], 0x18}], 0x1, 0x0) 15:05:13 executing program 5: socketpair(0x11, 0x2, 0x1, &(0x7f0000000200)) 15:05:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x5411, &(0x7f00000000c0)={'batadv0\x00'}) 15:05:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) 15:05:13 executing program 0: openat$zero(0xffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x20000, 0x0) 15:05:14 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:05:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x14}, 0x200002d4}}, 0x0) 15:05:14 executing program 5: r0 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 15:05:14 executing program 4: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000000)='\x00'}, 0x10) 15:05:14 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_int(r0, 0x29, 0x18, 0x0, &(0x7f0000000040)) 15:05:14 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = gettid() sendmsg$unix(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000280)='*', 0x1}, {&(0x7f0000000340)='?', 0x1}], 0x3, &(0x7f0000000540)=[@cred={{0x18, 0x1, 0x2, {r1, 0xee01, 0xee01}}}], 0x18}, 0x0) 15:05:14 executing program 5: add_key(&(0x7f0000000000)='blacklist\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f00000001c0)='logon\x00', &(0x7f0000000240)={'fscrypt:', @desc4='85baa174f0cb1142'}, &(0x7f0000000280)={0x0, "b422b5f33aa9017a6319288ea3807a9249a26b19ecce62c3f706090b0cb4bd956cd3b56d66149705595f9b45f6caf7bba31d221efd5159f83e93e7d527fd6ec5"}, 0x48, r0) 15:05:14 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x8927, &(0x7f0000000040)={'veth1_to_bridge\x00', @ifru_addrs=@in={0x2, 0x0, @initdev}}) 15:05:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003380)=[@cred={{0x18, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}], 0x18}, 0x0) 15:05:15 executing program 0: io_setup(0x6, &(0x7f0000000000)=0x0) io_submit(r0, 0x1, &(0x7f0000001780)=[0x0]) 15:05:15 executing program 3: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc1881, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x430}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:05:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000000280)=[{0x0, 0x0, 0x0}], 0x1, 0x0) 15:05:16 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:05:16 executing program 4: openat$thread_pidfd(0xffffff9c, &(0x7f0000000100)='/proc/thread-self\x00', 0xff795933e82b8bec, 0x0) 15:05:16 executing program 3: prctl$PR_SET_PDEATHSIG(0x16, 0x0) 15:05:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f00000005c0)={0x14, 0x4, 0x2, 0x101}, 0x14}}, 0x0) 15:05:16 executing program 2: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$KDDISABIO(r0, 0x5437) 15:05:16 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 15:05:16 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1d, 0xa, &(0x7f0000000240)=@raw=[@jmp={0x5, 0x1, 0xc, 0x0, 0x0, 0x100, 0x1}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @map={0x18, 0x6}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xfe}], &(0x7f00000001c0)='syzkaller\x00', 0x1, 0xc, &(0x7f00000002c0)=""/12, 0x41100, 0x10, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x1}, 0x10}, 0x74) 15:05:16 executing program 3: io_uring_setup(0x7bf0, &(0x7f0000001540)={0x0, 0x0, 0x8}) 15:05:16 executing program 2: openat$tun(0xffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) 15:05:16 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001300)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 15:05:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 15:05:17 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000000)={0x8, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @loopback}}}, 0x104) 15:05:18 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:05:18 executing program 3: socketpair(0x30, 0x0, 0x0, &(0x7f0000000100)) 15:05:18 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) io_setup(0x6, &(0x7f0000000000)) 15:05:18 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) 15:05:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000028c0)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 15:05:18 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002640)=@bpf_ext={0x1c, 0x3, &(0x7f0000002500)=@framed, &(0x7f0000002540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 15:05:18 executing program 3: r0 = eventfd(0x0) fremovexattr(r0, &(0x7f0000000140)=@random={'osx.', '/dev/bsg\x00'}) 15:05:18 executing program 5: getresuid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) 15:05:18 executing program 2: openat$zero(0xffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000580)) 15:05:18 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000240)=@raw=[@jmp={0x5, 0x1, 0xc, 0x0, 0x0, 0x100, 0x1}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x5}], &(0x7f00000001c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 15:05:18 executing program 4: r0 = openat$zero(0xffffff9c, &(0x7f0000000d40)='/dev/zero\x00', 0x0, 0x0) read$char_usb(r0, 0x0, 0x0) 15:05:19 executing program 3: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00', 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)={0x2c, r0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0xf, 0x2, 'veth1_to_bond\x00'}]}]}, 0x2c}}, 0x0) 15:05:20 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05e4dde63e5d7499d9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a611aa99f54a05ac20a06f35517e1b6469a7808e16513f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e55cd1114b247369c9eeeefabec61884ed3aefba9ad514e4ec09db2f30d91a5dfac70964a4ade291f00ec7856efaccdce6aac34207008938bae72d296ab8d600a07cf43121507fa68af245c5047ca4e41cf1da2f9f7cbac1c59c74c01144935dd4c3f72a0dd067abac060ce665165360162a9aa552a84308266d5603c122e0a39f339559db31adeceea5ca95196826d8fe5896944251797224a9cf05599da9ac556352424cf239c", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:05:20 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$GIO_CMAP(r0, 0x4bfb, &(0x7f00000004c0)) 15:05:20 executing program 5: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='@!\x00', 0xfffffffffffffffe) 15:05:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) openat$zero(0xffffff9c, &(0x7f0000000d40)='/dev/zero\x00', 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000140)='y', 0x1}, {&(0x7f0000000240)="16", 0x1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000000800)=[@rights={{0x14, 0x1, 0x1, [r0, r0]}}, @rights={{0x10, 0x1, 0x1, [r1]}}], 0x24}, 0x0) 15:05:20 executing program 2: prctl$PR_SET_PDEATHSIG(0x1e, 0x0) 15:05:20 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/cgroup\x00') 15:05:20 executing program 2: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00', 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000200)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_TSINFO_GET(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)={0x28, r0, 0x20f, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}]}, 0x28}}, 0x0) 15:05:20 executing program 0: clone(0x44032900, 0x0, 0x0, 0x0, 0x0) 15:05:20 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x11, 0x40, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x374, 0xffffffff, 0x23c, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x3f8, 0x3f8, 0x3f8, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@mcast2, @local, [], [], 'ip_vti0\x00', 'gre0\x00'}, 0x0, 0xa4, 0xe4}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "9bd7fbab8a0a3409446d2ae700beca54273d7c53f604f61a99f4bab00842"}}, {{@ipv6={@loopback, @private0, [], [], 'vcan0\x00', 'veth1_to_batadv\x00'}, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00'}}, {{@ipv6={@local, @empty, [], [], 'veth0_to_team\x00', 'vlan0\x00'}, 0x0, 0xa4, 0x100}, @common=@inet=@HMARK={0x5c, 'HMARK\x00', 0x0, {@ipv4=@remote}}}], {{[], 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x3d0) 15:05:20 executing program 4: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00', 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000200)={'batadv0\x00'}) sendmsg$ETHTOOL_MSG_TSINFO_GET(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)={0x2c, r0, 0x20f, 0x0, 0x0, {0xb}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}]}, 0x2c}}, 0x0) 15:05:20 executing program 3: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x0) [ 692.674536][T18447] IPVS: ftp: loaded support on port[0] = 21 [ 692.922877][T18472] IPVS: ftp: loaded support on port[0] = 21 15:05:21 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_POOL_SET(r0, &(0x7f0000000480)={&(0x7f0000000340), 0x4, &(0x7f0000000440)={&(0x7f0000000380)={0x3f, 0x0, 0x0, 0x0, 0x0, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}, {0x6}, {0x8}, {0x5}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}, {0x6}, {0x8}, {0x5}}]}, 0x8c}}, 0x0) [ 694.185577][ T3130] ieee802154 phy0 wpan0: encryption failed: -22 [ 694.192460][ T3130] ieee802154 phy1 wpan1: encryption failed: -22 15:05:22 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:05:22 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001300)={0x8, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 15:05:22 executing program 2: request_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0) 15:05:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) 15:05:22 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000380)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 15:05:22 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[@rights={{0x14, 0x1, 0x1, [r1, r0]}}], 0x14}, 0x0) 15:05:22 executing program 4: openat$zero(0xffffff9c, &(0x7f0000000840)='/dev/zero\x00', 0x98408aba9a3070c7, 0x0) 15:05:22 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 15:05:22 executing program 3: clone(0xc08a500, 0x0, 0x0, 0x0, 0x0) 15:05:22 executing program 2: io_pgetevents(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x0}) getresuid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) 15:05:22 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x2c}}, 0x0) 15:05:23 executing program 3: r0 = openat$rtc(0xffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) openat$bsg(0xffffff9c, 0x0, 0x0, 0x0) ioctl$FITRIM(r0, 0xc0185879, 0x0) 15:05:24 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05e4dde63e5d7499d9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a611aa99f54a05ac20a06f35517e1b6469a7808e16513f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e55cd1114b247369c9eeeefabec61884ed3aefba9ad514e4ec09db2f30d91a5dfac70964a4ade291f00ec7856efaccdce6aac34207008938bae72d296ab8d600a07cf43121507fa68af245c5047ca4e41cf1da2f9f7cbac1c59c74c01144935dd4c3f72a0dd067abac060ce665165360162a9aa552a84308266d5603c122e0a39f339559db31adeceea5ca95196826d8fe5896944251797224a9cf05599da9ac556352424cf239c", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)='M', 0x1}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:05:24 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) gettid() sendmsg$unix(r0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[@cred={{0x18, 0x1, 0x3, {0x0, 0xee01, 0xee01}}}], 0x18}, 0x0) 15:05:24 executing program 5: io_uring_setup(0x7877, &(0x7f0000000000)={0x0, 0x0, 0x2}) 15:05:24 executing program 4: r0 = openat$zero(0xffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setns(r0, 0x0) 15:05:24 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001300)={0x0, 0xf4240, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 15:05:24 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000440)={0x14, r1, 0x1}, 0x14}}, 0x0) 15:05:24 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) gettid() sendmsg$unix(r0, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x1ee) 15:05:24 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0xe, &(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 15:05:24 executing program 5: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00', 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)={0x14, r0, 0x1, 0x0, 0x0, {0x5c}}, 0x14}}, 0x0) 15:05:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_VERDICT_BATCH(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c0000000303050000000000800000000000000408"], 0x3c}}, 0x0) 15:05:25 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000240)=@raw=[@btf_id], &(0x7f00000001c0)='syzkaller\x00', 0x1, 0xc, &(0x7f00000002c0)=""/12, 0x41100, 0x10, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x1}, 0x10}, 0x74) [ 697.346833][T18568] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.2'. 15:05:25 executing program 3: r0 = openat$zero(0xffffff9c, &(0x7f0000000d40)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000d00)='IPVS\x00', r0) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, 0x0}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_VERDICT_BATCH(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c00000003030500000000008000000000000004080003400c0002000000000000"], 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x20004094) [ 697.898486][T18571] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 697.952956][T18572] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. 15:05:27 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)='M', 0x1}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:05:27 executing program 4: socketpair(0x2c, 0x3, 0x4, &(0x7f0000000000)) 15:05:27 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8926, 0x0) 15:05:27 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000380)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 15:05:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) openat$zero(0xffffff9c, &(0x7f0000000d40)='/dev/zero\x00', 0x0, 0x0) gettid() openat$zero(0xffffff9c, &(0x7f0000000d40)='/dev/zero\x00', 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f00000002c0)="9394203eb3e0c3c2e6eb9d021fa1e4c31a886ec23b8a8dd6ce01e5811b274efead7952d43492c2", 0x27}, {&(0x7f0000000340)="f8232d46c5730cbc0c6e796ccbdfe8682c5cef1afc20e16e3635246dd14ec871e4cc4a8678cae846c8b6539d28b05b9071", 0x31}, {&(0x7f0000000380)="0fff3eca32e2", 0x6}, {&(0x7f00000003c0)="fe502e5c33f9a096c8866d99601b745b587658a642f890f9d3b96f5d10992a2ec1b0fdc39c04be7581957a78e41b63c715", 0x31}, {&(0x7f0000000400)="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", 0xe32}], 0x5, &(0x7f0000001600)=[@rights={{0x10, 0x1, 0x1, [r0]}}], 0x10}, 0x0) 15:05:27 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000001100)={&(0x7f0000000b00), 0xc, &(0x7f00000010c0)={&(0x7f0000000c80)={0x54, 0x12, 0x1, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x4}, @INET_DIAG_REQ_BYTECODE={0x4}]}, 0x54}}, 0x0) 15:05:27 executing program 5: openat$zero(0xffffff9c, &(0x7f0000000d40)='/dev/zero\x00', 0xa00c0, 0x0) 15:05:27 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8918, &(0x7f0000000540)={'batadv0\x00'}) 15:05:27 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1d, 0x9, &(0x7f0000000240)=@raw=[@btf_id, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, @func, @map={0x18, 0x6}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xfe}], &(0x7f00000001c0)='syzkaller\x00', 0x1, 0xc, &(0x7f00000002c0)=""/12, 0x41100, 0x10, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x1}, 0x10}, 0x74) 15:05:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8934, &(0x7f0000000180)={'caif0\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=0x0}}) 15:05:27 executing program 0: r0 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x40, 0x4, @tid=r0}, &(0x7f0000000040)) 15:05:28 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TRIM(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000a40)={&(0x7f0000000a00)={0x10}, 0x10}}, 0x0) 15:05:29 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)='M', 0x1}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:05:29 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f0000002700)='ns/uts\x00') 15:05:29 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000080)=0xae03, 0x8) 15:05:29 executing program 3: prctl$PR_SET_PDEATHSIG(0x1d, 0x1032) 15:05:29 executing program 2: perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:05:29 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x4020940d, 0x0) 15:05:29 executing program 3: sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) 15:05:29 executing program 2: r0 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x3000006, 0x4004031, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r0, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x4004031, 0xffffffffffffffff, 0x0) 15:05:29 executing program 5: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00', 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r1, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000ec0)=""/30, 0x1e}, 0x102) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)={0x14, r0, 0x1}, 0x14}}, 0x0) 15:05:29 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffffffffffff, 0xfffffff9}, 0x40) 15:05:29 executing program 4: gettid() timer_create(0xfffffffe, 0x0, &(0x7f0000000040)) 15:05:29 executing program 3: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) 15:05:30 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x6, 0x11, 0x0, 0x0) 15:05:30 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x21, &(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 15:05:30 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) 15:05:30 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xffffffffffffffff, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:05:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) getpeername(r0, 0x0, &(0x7f0000000080)) 15:05:30 executing program 3: openat$zero(0xffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x191142, 0x0) 15:05:31 executing program 0: prctl$PR_SET_PDEATHSIG(0x34, 0x1032) 15:05:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000a00)={'sit0\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=0x0}}) 15:05:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001300)={0x17, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 15:05:31 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040)='logon\x00', &(0x7f0000000080)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f00000000c0)={0x0, "ad7d2ba38162353fa8d29218aa09be2a7193cf15adf1b0012d6a13b96855be9af7d554bdb63fea8843331ece3e7d552497d77f1bc1b46443722810d4a1ef664b"}, 0x48, 0xfffffffffffffffc) 15:05:31 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f00000005c0)={0x20, 0x0, 0x2, 0x101, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x3}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_TUPLE={0x4}]}, 0x20}}, 0x0) 15:05:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000000280)=[{&(0x7f0000000000)=@abs, 0x6e, 0x0}], 0x1, 0x0) [ 703.816947][T18667] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 15:05:31 executing program 2: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000280)='pkcs7_test\x00', &(0x7f00000002c0)=@keyring={'key_or_keyring:'}) 15:05:31 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8924, &(0x7f0000000540)={'batadv0\x00'}) 15:05:32 executing program 3: mq_open(&(0x7f00000001c0)='\xd88i\x06\x93\xffX\xc1\x97Qi\x9d\xa9D5\x8a\xff\xa6\xfb\xda\x9a\x9a\a`\xfd\xc5\x91!m\xec\xea\xcf\x925F\xc0\\3\xfct\x86X-\r*5j\x96C#\x9e\xe4o\x0f\x97\xe93Qh\x8f\xad+\xb0E\xec\x92\x17\xcc\f\xcd\x19\xe5\xe2G\x00\xe6&H\xd0\x87d\xde\xd9=\xaf\x18Uj\xaf\x9b\xf9\x16U-w\xab>\xac\xaf \xf5\x8b\xf7\x13\x94\x84\x03\x9c7\x06\x9d\xbb\xf6KQ%\xd8]\xa6\xf6\x1d\x87J\xa4\x01\xab\x80\x97\xaf\x7f+\xe6\xef\x82O\v\x8b\xe3\x17\x86\x1f\xd6\xd3\xc30\x14D\xb5\xcf\x87\xde\x95\x16\xab\x7f\x18|\x0e\x9bvV\xb6\xe8\x8d#n\a\xec\x92-\x05==\x18]\xa7_J\xc6I\xf6>\x10A\x9b]3RFnV', 0x0, 0x0, 0x0) 15:05:33 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05e4dde63e5d7499d9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a611aa99f54a05ac20a06f35517e1b6469a7808e16513f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e55cd1114b247369c9eeeefabec61884ed3aefba9ad514e4ec09db2f30d91a5dfac70964a4ade291f00ec7856efaccdce6aac34207008938bae72d296ab8d600a07cf43121507fa68af245c5047ca4e41cf1da2f9f7cbac1c59c74c01144935dd4c3f72a0dd067abac060ce665165360162a9aa552a84308266d5603c122e0a39f339559db31adeceea5ca95196826d8fe5896944251797224a9cf05599da9ac556352424cf239c", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xffffffffffffffff, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:05:33 executing program 5: openat$bsg(0xffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000000)) 15:05:33 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x20, r1, 0x5e236fc8dde912ab, 0x0, 0x0, {}, [@ETHTOOL_A_WOL_SOPASS={0xb, 0x3, "4588d71a5eb4b9"}]}, 0x20}}, 0x0) 15:05:33 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 15:05:33 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x19, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x374, 0xffffffff, 0x23c, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x3f8, 0x3f8, 0x3f8, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@mcast2, @local, [], [], 'ip_vti0\x00', 'gre0\x00'}, 0x0, 0xa4, 0xe4}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "9bd7fbab8a0a3409446d2ae700beca54273d7c53f604f61a99f4bab00842"}}, {{@ipv6={@loopback, @private0, [], [], 'vcan0\x00', 'veth1_to_batadv\x00'}, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00'}}, {{@ipv6={@local, @empty, [], [], 'veth0_to_team\x00', 'vlan0\x00'}, 0x0, 0xa4, 0x100}, @common=@inet=@HMARK={0x5c, 'HMARK\x00', 0x0, {@ipv4=@remote}}}], {{[], 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x3d0) 15:05:33 executing program 3: openat$zero(0xffffff9c, 0x0, 0x571400, 0x0) 15:05:33 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@dev, @local, @void, {@arp={0x8100, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @multicast, @empty, @multicast, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x0) 15:05:33 executing program 4: openat$bsg(0xffffff9c, 0x0, 0x0, 0x0) r0 = io_uring_setup(0x4f3b, &(0x7f00000001c0)) io_uring_register$IORING_REGISTER_FILES(r0, 0xa, &(0x7f0000000240), 0x0) 15:05:33 executing program 0: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00', 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000180)={'batadv_slave_0\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r0, 0x1, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x20}}, 0x0) 15:05:33 executing program 3: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:05:34 executing program 4: r0 = socket$inet(0x2, 0x3, 0x1) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00', r0) 15:05:34 executing program 5: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00', 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)={0x2c, r0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}]}]}, 0x2c}}, 0x0) 15:05:35 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xffffffffffffffff, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:05:35 executing program 3: add_key(&(0x7f0000000000)='rxrpc_s\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) 15:05:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000027c0)=[{0x0, 0x0, 0x0}, {&(0x7f0000000380)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)}], 0x2, 0x0) 15:05:35 executing program 0: timer_create(0x2, &(0x7f0000000000)={0x0, 0x0, 0x1, @tid=0xffffffffffffffff}, &(0x7f0000000040)) 15:05:35 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000080)=@raw=[@map, @exit], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 15:05:35 executing program 5: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00', 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000200)={'batadv0\x00'}) sendmsg$ETHTOOL_MSG_TSINFO_GET(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)={0x2c, r0, 0x20f, 0x0, 0x0, {0x14}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}]}, 0x2c}}, 0x0) 15:05:35 executing program 2: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00', 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000200)={'batadv0\x00'}) sendmsg$ETHTOOL_MSG_TSINFO_GET(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)={0x2c, r0, 0x20f, 0x0, 0x0, {0x2}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}]}, 0x2c}}, 0x0) 15:05:35 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x15}, 0x40) 15:05:35 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) 15:05:35 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDDISABIO(r0, 0x5437) 15:05:35 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f00000005c0)={0x18, 0x0, 0x2, 0x101, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4, 0xb}]}, 0x18}}, 0x0) 15:05:36 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x6, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x374, 0xffffffff, 0x23c, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x3f8, 0x3f8, 0x3f8, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@mcast2, @local, [], [], 'ip_vti0\x00', 'gre0\x00'}, 0x0, 0xa4, 0xe4}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "9bd7fbab8a0a3409446d2ae700beca54273d7c53f604f61a99f4bab00842"}}, {{@ipv6={@loopback, @private0, [], [], 'vcan0\x00', 'veth1_to_batadv\x00'}, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00'}}, {{@ipv6={@local, @empty, [], [], 'veth0_to_team\x00', 'vlan0\x00'}, 0x0, 0xa4, 0x100}, @common=@inet=@HMARK={0x5c, 'HMARK\x00', 0x0, {@ipv4=@remote}}}], {{[], 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x3d0) 15:05:37 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:05:37 executing program 0: socket(0x2, 0x0, 0x3dc7) 15:05:37 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0xc0189436, &(0x7f0000000540)={'batadv0\x00'}) 15:05:37 executing program 2: add_key$keyring(&(0x7f00000013c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) 15:05:37 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$unix(0x1, 0x1, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) sendmsg$unix(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@rights={{0x10, 0x1, 0x1, [r0]}}], 0x10}, 0x0) 15:05:37 executing program 4: r0 = openat$zero(0xffffff9c, &(0x7f0000000d40)='/dev/zero\x00', 0x0, 0x0) write$char_usb(r0, 0x0, 0x0) 15:05:37 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x20, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}]}, 0x20}}, 0x0) 15:05:37 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x7, &(0x7f0000000000)=@framed={{}, [@map_val, @initr0]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 15:05:37 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f00000005c0)={0x18, 0x3, 0x2, 0x101, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x4}]}, 0x18}}, 0x0) 15:05:37 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="4b73000000000000000011000000140001800800030000000000080001001b07"], 0x28}}, 0x0) 15:05:37 executing program 3: r0 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x3000006, 0x4004031, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r0, 0x0, 0x0, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x3000006, 0x4004031, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, 0x0, 0x0, 0x0) 15:05:38 executing program 3: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) 15:05:38 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05e4dde63e5d7499d9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a611aa99f54a05ac20a06f35517e1b6469a7808e16513f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e55cd1114b247369c9eeeefabec61884ed3aefba9ad514e4ec09db2f30d91a5dfac70964a4ade291f00ec7856efaccdce6aac34207008938bae72d296ab8d600a07cf43121507fa68af245c5047ca4e41cf1da2f9f7cbac1c59c74c01144935dd4c3f72a0dd067abac060ce665165360162a9aa552a84308266d5603c122e0a39f339559db31adeceea5ca95196826d8fe5896944251797224a9cf05599da9ac556352424cf239c", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:05:38 executing program 5: openat$pidfd(0xffffff9c, &(0x7f0000000b80)='/proc/self\x00', 0x200200, 0x0) 15:05:38 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x4}, 0x40) 15:05:38 executing program 0: r0 = openat$tun(0xffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) 15:05:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="70000000030601080000000054c5719514ef25fe0900020073797a31000000000500010007"], 0x70}}, 0x0) read$char_usb(0xffffffffffffffff, &(0x7f0000000180)=""/152, 0x98) 15:05:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) gettid() sendmsg$unix(r0, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)=[@rights={{0xc}}], 0xc}, 0x0) [ 711.028591][T18794] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.2'. 15:05:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000340)={0x14, 0x1, 0x1, 0x801}, 0x14}}, 0x0) 15:05:39 executing program 5: r0 = openat$rtc(0xffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_PIE_OFF(r0, 0x40247007) 15:05:39 executing program 0: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00', 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000200)={'batadv0\x00'}) sendmsg$ETHTOOL_MSG_TSINFO_GET(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)={0x2c, r0, 0x20f, 0x0, 0x0, {0x18}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}]}, 0x2c}}, 0x0) 15:05:39 executing program 3: add_key$fscrypt_v1(&(0x7f0000000040)='logon\x00', 0x0, &(0x7f00000000c0)={0x0, "ad7d2ba38162353fa8d29218aa09be2a7193cf15adf1b0012d6a13b96855be9af7d554bdb63fea8843331ece3e7d552497d77f1bc1b46443722810d4a1ef664b"}, 0x48, 0xfffffffffffffffc) 15:05:39 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000000ff01"], 0x20}}, 0x0) 15:05:39 executing program 4: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00', 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000200)={'batadv0\x00'}) sendmsg$ETHTOOL_MSG_TSINFO_GET(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)={0x2c, r0, 0x20f, 0x0, 0x0, {0x6}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}]}, 0x2c}}, 0x0) 15:05:40 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) exit_group(0x0) 15:05:40 executing program 5: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00', 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000200)={'batadv0\x00'}) sendmsg$ETHTOOL_MSG_TSINFO_GET(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)={0x2c, r0, 0x20f, 0x0, 0x0, {0xd}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}]}, 0x2c}}, 0x0) 15:05:40 executing program 0: openat$zero(0xffffff9c, &(0x7f0000000d40)='/dev/zero\x00', 0x0, 0x0) waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x4, 0x0) 15:05:40 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff}) write$P9_RATTACH(r0, 0xfffffffffffffffd, 0xf95493d2613bae12) 15:05:40 executing program 2: mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000006, 0xadca16ba09cb5cb6, 0xffffffffffffffff, 0x0) 15:05:40 executing program 4: r0 = socket(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000000)={@local, @private=0xa010102}, 0xc) 15:05:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) 15:05:41 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r0, &(0x7f0000003000), 0x0, 0x2000, &(0x7f00000030c0)={0x0, 0x3938700}) 15:05:41 executing program 0: r0 = socket(0x1, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:05:41 executing program 4: pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$9p(r0, &(0x7f0000000080)="119762509b0800341ac163c925f16d691449db5d34bb6568ffefdefd02cb43b9e600000000532edc719938aca3579ca3f1ba786e393856257ac761d3ac05ea39b1cfcb4a1f6e3ff8e4ad57c2c2558696b42dbd4a48ca3d2a59fc054201973ab581e44897565a74fb0b07930ebdd4bf3c261163b56ef197d5df003eb0eca394a35577398d7ea909f14f492d6a8a4efefdbe8cab00354aaa236f726c0629c138fd5bd3734eb9d01edef4220248405d6cb5a88d00"/192, 0xfffffe7a) 15:05:41 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xadca16ba09cb5cb6, r0, 0x0) 15:05:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0xadca16ba09cb5cb6, r0, 0x0) 15:05:42 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05e4dde63e5d7499d9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a611aa99f54a05ac20a06f35517e1b6469a7808e16513f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e55cd1114b247369c9eeeefabec61884ed3aefba9ad514e4ec09db2f30d91a5dfac70964a4ade291f00ec7856efaccdce6aac34207008938bae72d296ab8d600a07cf43121507fa68af245c5047ca4e41cf1da2f9f7cbac1c59c74c01144935dd4c3f72a0dd067abac060ce665165360162a9aa552a84308266d5603c122e0a39f339559db31adeceea5ca95196826d8fe5896944251797224a9cf05599da9ac556352424cf239c", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, 0x0) exit_group(0x0) 15:05:42 executing program 0: r0 = socket(0x2, 0x2, 0x0) getsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000080)={@private, @initdev}, &(0x7f00000000c0)=0x8) 15:05:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x0, 0x40002000, 0x0) 15:05:42 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000000000)=""/20, &(0x7f0000000040)=0x14) 15:05:42 executing program 5: pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RCREATE(r0, &(0x7f0000000000)={0x18}, 0xffffffffffffffc2) 15:05:42 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, 0x0, 0xfffffffffffffea1) 15:05:43 executing program 5: pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$FUSE_LSEEK(r0, 0xfffffffffffffffd, 0x0) 15:05:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, 0x0, 0xffffffffffffff6b) 15:05:43 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, 0x0, 0x2a) 15:05:43 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x0, 0x40002000, &(0x7f0000000040)={0x0, 0x989680}) 15:05:43 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000008480)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000000c0)=""/177, 0xb1}], 0x1}, 0x2000) dup3(r1, r0, 0x0) 15:05:43 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(r0, 0x0, 0x0, 0x40002001, 0x0) 15:05:44 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05e4dde63e5d7499d9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a611aa99f54a05ac20a06f35517e1b6469a7808e16513f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e55cd1114b247369c9eeeefabec61884ed3aefba9ad514e4ec09db2f30d91a5dfac70964a4ade291f00ec7856efaccdce6aac34207008938bae72d296ab8d600a07cf43121507fa68af245c5047ca4e41cf1da2f9f7cbac1c59c74c01144935dd4c3f72a0dd067abac060ce665165360162a9aa552a84308266d5603c122e0a39f339559db31adeceea5ca95196826d8fe5896944251797224a9cf05599da9ac556352424cf239c", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, 0x0) exit_group(0x0) 15:05:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) r2 = dup3(r0, r1, 0x0) getsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000080), &(0x7f00000000c0)=0x10) 15:05:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='geneve0\x00', 0x10) 15:05:44 executing program 2: r0 = inotify_init1(0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x4020940d, 0x4fc000) 15:05:44 executing program 3: r0 = getpid() setpgid(0xffffffffffffffff, r0) 15:05:44 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000003000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000007c80)={&(0x7f0000007bc0)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) 15:05:44 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 15:05:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000008480)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 15:05:45 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmmsg(r0, 0x0, 0x0, 0x101, 0x0) 15:05:45 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000008480)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, 0x0, 0x0, 0x120, &(0x7f0000003a80)={0x77359400}) 15:05:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$inet6_udp_int(r1, 0x11, 0xb, &(0x7f0000000040), 0x4) 15:05:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000008480)={0xffffffffffffffff}) r1 = epoll_create(0x8000000) r2 = dup3(r0, r1, 0x0) write$nbd(r2, 0x0, 0x0) 15:05:45 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, 0x0) exit_group(0x0) 15:05:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000008700)='/dev/null\x00', 0x0, 0x0) dup3(r0, r1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000140)={0x0, @private, @initdev}, &(0x7f0000000180)=0xc) 15:05:45 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)) 15:05:45 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) write$cgroup_netprio_ifpriomap(r2, &(0x7f0000000040)={'veth0_virt_wifi'}, 0x12) 15:05:46 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockname(r0, &(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f00000001c0)=0x80) dup3(r1, r2, 0x0) 15:05:46 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, 0x0, 0x0) 15:05:46 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup3(r1, r0, 0x0) write$cgroup_devices(r2, 0x0, 0x0) 15:05:46 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000008480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, 0x0, 0x0) 15:05:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) write$cgroup_int(r1, 0x0, 0x0) 15:05:46 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) write$cgroup_netprio_ifpriomap(r2, 0x0, 0x0) 15:05:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000008480)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x120, &(0x7f0000003a80)={0x77359400}) dup3(r1, r0, 0x0) 15:05:46 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, 0x0, 0x0) 15:05:47 executing program 0: pipe2$9p(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RGETATTR(r0, 0x0, 0x0) 15:05:47 executing program 3: pipe(&(0x7f0000000340)={0xffffffffffffffff}) openat$cgroup(r0, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) 15:05:47 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) 15:05:47 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) 15:05:47 executing program 5: pipe2$9p(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RAUTH(r0, 0x0, 0x0) 15:05:47 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_SPACE_INFO(r0, 0xc0109414, 0x0) 15:05:48 executing program 0: write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x5a) 15:05:48 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000007400)='/dev/fuse\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) 15:05:48 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, 0x0) 15:05:48 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000008240)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) 15:05:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, 0x0) 15:05:48 executing program 1: pipe(&(0x7f0000002b40)={0xffffffffffffffff}) accept4(r0, 0x0, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) 15:05:48 executing program 0: r0 = gettid() get_robust_list(r0, &(0x7f0000000140)=0x0, &(0x7f0000000180)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:05:48 executing program 4: r0 = epoll_create1(0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) 15:05:49 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, 0x0) 15:05:49 executing program 3: pipe(&(0x7f0000000340)={0xffffffffffffffff}) epoll_pwait(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:05:49 executing program 5: openat$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0)='io.bfq.weight\x00', 0x2, 0x0) 15:05:49 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) read$char_usb(r0, &(0x7f0000000100)=""/92, 0x5c) 15:05:49 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='gid_map\x00') getdents64(r0, 0x0, 0x0) 15:05:49 executing program 4: pipe2$9p(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSTATu(r0, 0x0, 0x5d) 15:05:49 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x400, 0x0) 15:05:49 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='gid_map\x00') write$P9_RCLUNK(r0, 0x0, 0x0) 15:05:49 executing program 3: pipe(&(0x7f0000000340)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) 15:05:49 executing program 0: openat$fuse(0xffffffffffffff9c, &(0x7f0000007400)='/dev/fuse\x00', 0x2, 0x0) 15:05:50 executing program 5: pipe2$9p(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSTATu(r0, &(0x7f0000000140)=ANY=[], 0x5d) 15:05:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='gid_map\x00') write$P9_RRENAMEAT(r0, 0x0, 0x0) 15:05:50 executing program 4: openat$cgroup_type(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) 15:05:50 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0x0) 15:05:50 executing program 0: pipe2$9p(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RMKDIR(r0, 0x0, 0x0) 15:05:50 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000008140)='io.stat\x00', 0x0, 0x0) 15:05:50 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f0000000640)={&(0x7f0000000580), 0xc, &(0x7f0000000600)={&(0x7f0000000680)=ANY=[@ANYBLOB="200000000506050000000000000000000c0000f9cf91"], 0x20}}, 0x0) 15:05:50 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@broadcast, @empty, @val, {@ipv4}}, 0x0) 15:05:50 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet_udp(0x2, 0x2, 0x0) 15:05:50 executing program 3: pipe(&(0x7f0000000340)={0xffffffffffffffff}) read$char_usb(r0, 0x0, 0x0) [ 722.841571][T19032] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 15:05:51 executing program 0: pipe2$9p(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RXATTRWALK(r0, 0x0, 0x0) 15:05:51 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) 15:05:51 executing program 4: ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000080)={'syztnl2\x00', 0x0}) pipe(&(0x7f0000003bc0)) 15:05:51 executing program 5: syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40)='nl80211\x00', 0xffffffffffffffff) 15:05:51 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r0, 0x8982, &(0x7f0000000b00)) 15:05:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 15:05:51 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$ethtool(&(0x7f0000000bc0)='ethtool\x00', r0) 15:05:51 executing program 4: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f0000000500)='./file0\x00'}, 0x10) 15:05:51 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r0, 0x8982, 0x0) 15:05:51 executing program 3: socketpair(0x11, 0x2, 0x2, &(0x7f0000000ac0)) 15:05:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socket(0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x14}, 0x14}}, 0x0) 15:05:51 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='pids.events\x00', 0x0, 0x0) 15:05:52 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000340)={'batadv0\x00'}) 15:05:52 executing program 4: sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, 0x0, 0x0) 15:05:52 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) 15:05:52 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x40) 15:05:52 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000b40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000002e40)={&(0x7f0000002cc0)=@l2, 0x80, 0x0}, 0x0) 15:05:52 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x1c, 0x1, &(0x7f0000000080)=@raw=[@exit], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:05:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@typedef={0x1}]}, {0x0, [0x6f, 0x30, 0x2e]}}, &(0x7f0000000ac0)=""/202, 0x29, 0xca, 0x1}, 0x20) 15:05:52 executing program 4: r0 = perf_event_open(&(0x7f00000187c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000280)={&(0x7f0000000000)="ace9aee454b243278c16e3ac019a1c544e648a", &(0x7f0000000040)=""/113, &(0x7f00000000c0)="9ca56d61776e957ee56e045db4212b73d4a672c4b8b9b04dfc83b677fcd6a8c3bbe832319fbd1ede6ba32060fa6e0ced5a8215426d8996998c146e845bc26f9e88b5ce4b2fee8225b696072dc9a8dbacce702f501de932461c8dbd2724af280cce3446a9187b55a93bf12a9917e90ba962ab7c889042f8f23115198733c372437a6d15c90f6338bf8b3827c5b5637c53295684dabfb770e4c47f8060ffc4e50d238494ad33ecd8b6baba254a960f8ccc2f580079b76fa6f4af5350627b34f029430da8388747c3f5d9eb946a1392890bf298554a1295f1", &(0x7f00000001c0)="e268d51422dc9f9643d8e0052fa92abed1c624cf223c471301c18be68cbf10ab7f697beb6639c02304588b7091b85d28f4199e6d00b1e8905693f67edd001efa52cca1dab3337787cdab9dec4651ed524decc8c694d0d6360bc775875cce3caf00b38c0f50db5c3425779588074a5118d0a3f1a0045394666ced4089fdcfb1e6c8f847ffd48d", 0x5, 0x1, 0x4}, 0x38) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000005c0), 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x3a7) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000980)={0xffffffffffffffff, 0x8b3, 0x8}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000b40)={r2, &(0x7f00000009c0)="683cecfc99b0bfce8c944cacd3ca065a29ac8dbd21832dfb3d557f67da27dcec9a8ba2712561dd9eef724b9b039e55de93c52c67c4b016521ee32b2c4bf88cbe55261cf02a505995888e04d35b38959f7e3b21f108b358f09e3b9190d151f520b65437992ec41ed7526480194be7de0bed33adc45c55295c4c25a0394c4fa55522a8fa60c1", &(0x7f0000000a80)=""/134, 0x4}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000580)={&(0x7f00000002c0)="ce1d8374c3833b3c55da882c45d8e41fdf6a3f0f0db13dd8feefe9439748ed5cc7286d", &(0x7f00000003c0)=""/188, &(0x7f0000000480)="42fac667e6a3c9", &(0x7f00000004c0)="2b0bbba2662bd214f37bf41379c38535cb684e9607d6c9827068475021c9c8ac2d83d63506390df69514aeb097606b6abbce4222246685552ef32ac64accfafd60a746cf1a83ea46e50733ad650b245d816dc737ce3179f75b4844f0fc8a809e5ded5c89c360c13024a13493c9ad97af258e61314f95bf6239d625dd9081e557cda6ea30", 0xffff, 0x1, 0x4}, 0x38) r3 = perf_event_open(&(0x7f0000000300)={0x6, 0x70, 0x3f, 0x4, 0x7f, 0x1f, 0x0, 0x3, 0x1000, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x10000, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x80, 0x1, 0x400, 0x6, 0x1, 0x7, 0x7}, 0xffffffffffffffff, 0xf, r0, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r0) socketpair(0x32, 0x800, 0x0, &(0x7f0000000900)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000940)) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000008c0)={&(0x7f0000000600)="69aebfa0a7f441267ea3fe1e5509c412ff0b1ccb85e4dafa1180dee95facd1bba1d1ebcfe81f57bc5e177cd71ad1ef86668336572fe9de0f1a23d429195800e42593a15a73623ad1433568c9522890ed62206bc08d5511f96c23aa095d4b5ab3ff86d1a37144742818132b9e565b271be04d0a1c293f6e9f869d6792e3fe460c168b45e5b34a4ab023a1d9cffd0dd26fa467bd0777523cfef40a13f8967f79c56e439daf803e5aab9b8c49bf7dbf742449e1fcec8e581aab3d75c7da31854b5d0f7232e106eaa52beb", &(0x7f0000000700)=""/90, &(0x7f0000000780)="7da40fd3194a793d89027ac0b0fe067e953a434b1e09f2317351ad17bb37a7e8053511b144a79ab4976b7da6c5c219550d5cc44cc4f74397fb45e4d089ac6aaff5914d0a95a78932f66afbbd7191fe3daf3413c8680b85b4a6bc026f29", &(0x7f0000000800)="ec018dca5309a0e85340757a38800baf31cdfd55ae6d62bbe6caade838877b55c1643c3cc6eab318e58762b6e41606cc986e3aa301843d7278355a2c4af2039ff0557422cc1f0a8798f73597a062d9976370bad5366102248e7ff1dd779f943b1f0a0574887dfc38a7784c0fce87bab55977e662836f5df60632218f3f045121dff14157902b7551d36e20c11527cc557bfb13646d55d5a83b750521f55e08bb5197", 0x5, 0x1}, 0x38) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b80)='./cgroup.cpu/syz1\x00', 0x1ff) 15:05:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x5}}]}}, &(0x7f0000000100)=""/151, 0x32, 0x97, 0x1}, 0x20) 15:05:53 executing program 3: recvmsg$kcm(0xffffffffffffffff, 0x0, 0xc6f04909e08d969) 15:05:53 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x5}, 0x40) 15:05:53 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, 0x0) 15:05:53 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x40107447, 0x2000ff00) 15:05:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000ac0)=""/202, 0x1a, 0xca, 0x1}, 0x20) 15:05:53 executing program 1: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)) 15:05:53 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000002140)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:05:53 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'veth1_to_bond\x00'}) 15:05:53 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0}, 0x0) 15:05:53 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000b40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000002e40)={0x0, 0x0, 0x0}, 0x0) 15:05:53 executing program 4: r0 = bpf$OBJ_GET_MAP(0x2, 0x0, 0xfffffc9e) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001180)='/dev/net/tun\x00', 0x400000, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f00000011c0)=r1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001200)='./cgroup/syz0\x00', 0x1ff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001140)={&(0x7f0000001100)='./file1\x00', 0x0, 0x8}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000010c0)={r0, &(0x7f0000000080)="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", &(0x7f0000001080)=""/18}, 0x20) 15:05:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x1}]}}, &(0x7f0000000ac0)=""/202, 0x26, 0xca, 0x1}, 0x20) 15:05:54 executing program 3: perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 15:05:54 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000080)=@raw=[@exit={0x95, 0x0, 0x0, 0x200000}], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:05:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000880)) 15:05:54 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x19, 0x1, &(0x7f0000000080)=@raw=[@exit], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:05:54 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000011740)={&(0x7f0000011580)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xa, 0x5}]}]}}, &(0x7f0000011640)=""/194, 0x2e, 0xc2, 0x1}, 0x20) 15:05:54 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 15:05:54 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x40002161) 15:05:54 executing program 5: perf_event_open(&(0x7f0000000300)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 15:05:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@typedef={0x1}]}, {0x0, [0x6f]}}, &(0x7f0000000ac0)=""/202, 0x27, 0xca, 0x1}, 0x20) 15:05:55 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x1, &(0x7f0000000080)=@raw=[@exit], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x2], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:05:55 executing program 2: bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000100)='./file0/../file0/file0\x00'}, 0x10) 15:05:55 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x40047459, 0x0) 15:05:55 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x23, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:05:55 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 15:05:55 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x24000, 0x0) 15:05:55 executing program 1: perf_event_open(&(0x7f00000187c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:05:55 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0), 0x4) 15:05:55 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001200)='./cgroup/syz0\x00', 0x1ff) 15:05:55 executing program 3: r0 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) 15:05:56 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) mkdirat$cgroup(r0, &(0x7f0000000140)='syz0\x00', 0x1ff) r1 = perf_event_open(&(0x7f00000187c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8018, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, @perf_config_ext={0xe82, 0x8}, 0x0, 0x0, 0xfffffffc, 0x0, 0xfffffffffffffffc}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) openat$cgroup_subtree(r0, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = getpid() r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000000c0), 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x9, 0x81, 0xd1, 0x1f, 0x0, 0x8001, 0x8002, 0xc, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000000), 0x1}, 0x200, 0x0, 0x2277, 0x7, 0x0, 0x401, 0x3}, r2, 0x9, r3, 0x8) r4 = perf_event_open$cgroup(&(0x7f00000001c0)={0x1, 0x70, 0x1c, 0x0, 0x2, 0x2, 0x0, 0x100000000, 0x20, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, @perf_config_ext={0x1}, 0x0, 0x5, 0x9, 0x6, 0x7, 0x8, 0x5383}, 0xffffffffffffffff, 0x1, r1, 0xd) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000240)) 15:05:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x5}}, @func={0xc}]}}, &(0x7f0000000100)=""/151, 0x3e, 0x97, 0x1}, 0x20) 15:05:56 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000014e00)={0x18, 0x1, &(0x7f0000000000)=@raw=[@func], &(0x7f0000000100)='GPL\x00', 0x4, 0x1000, &(0x7f0000002140)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:05:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array]}}, &(0x7f0000000100)=""/151, 0x32, 0x97, 0x1}, 0x20) 15:05:56 executing program 4: r0 = getpid() syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/user\x00') 15:05:56 executing program 3: mkdir(0x0, 0x9) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) 15:05:56 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xd8}, 0x0) 15:05:56 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4010744d, 0x20000000) 15:05:56 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x40047440, 0x0) 15:05:56 executing program 1: socketpair(0x28, 0x0, 0x80, &(0x7f0000000000)) 15:05:56 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='-!\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x40107447, 0x20000000) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) 15:05:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000011740)={&(0x7f0000011580)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x5}]}]}}, &(0x7f0000011640)=""/194, 0x2e, 0xc2, 0x1}, 0x20) 15:05:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@typedef={0x1}]}, {0x0, [0x6f, 0x30]}}, &(0x7f0000000ac0)=""/202, 0x28, 0xca, 0x1}, 0x20) 15:05:57 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x412001, 0x0) 15:05:57 executing program 2: socketpair(0x2c, 0x0, 0x0, &(0x7f00000022c0)) 15:05:57 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000180)) 15:05:57 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendfile(0xffffffffffffffff, r0, &(0x7f0000000140), 0x0) 15:05:57 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x4, &(0x7f0000000680)=@framed={{}, [@jmp]}, &(0x7f0000000700)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:05:57 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) 15:05:57 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$sock(r0, &(0x7f00000033c0)={0x0, 0x0, 0x0}, 0x0) 15:05:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func={0xc}]}}, &(0x7f0000000100)=""/151, 0x26, 0x97, 0x1}, 0x20) 15:05:57 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003880)=ANY=[], 0xd8}, 0x0) 15:05:57 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x16, 0x0, 0x0) 15:05:58 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0xa, &(0x7f00000000c0)=@framed={{}, [@btf_id, @btf_id, @btf_id, @jmp]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x4a, &(0x7f0000000240)=""/81, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140), 0x8, 0x10, &(0x7f0000000180), 0x10}, 0x19) 15:05:58 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) ioctl$sock_SIOCGIFCONF(r0, 0x8983, 0x0) 15:05:58 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) getpeername(r0, 0x0, &(0x7f0000000680)) 15:05:58 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x5, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:05:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$nl_route_sched(r0, &(0x7f0000003700)={&(0x7f0000001600)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000036c0)={&(0x7f0000001640)=@deltfilter={0xec4, 0x2d, 0x0, 0x0, 0x0, {}, [@TCA_CHAIN={0x8}, @filter_kind_options=@f_flow={{0x9, 0x1, 'flow\x00'}, {0xe8c, 0x2, [@TCA_FLOW_ADDEND={0x8}, @TCA_FLOW_MASK={0x8}, @TCA_FLOW_BASECLASS={0x8}, @TCA_FLOW_POLICE={0x410, 0xa, 0x0, 0x1, [@TCA_POLICE_RESULT={0x8}, @TCA_POLICE_PEAKRATE={0x404}]}, @TCA_FLOW_POLICE={0x408, 0xa, 0x0, 0x1, [@TCA_POLICE_PEAKRATE={0x404}]}, @TCA_FLOW_KEYS={0x8}, @TCA_FLOW_ACT={0x650, 0x9, 0x0, 0x1, [@m_ct={0xf8, 0x0, 0x0, 0x0, {{0x7, 0x1, 'ct\x00'}, {0x14, 0x2, 0x0, 0x1, [@TCA_CT_NAT_PORT_MIN={0x6}, @TCA_CT_NAT_IPV4_MIN={0x8, 0x9, @remote}]}, {0xbd, 0x6, "8c9e03bb466507c286982bdfa01d90ec57052f2defb41d6e22fd0d809ef89b7c9f550dc2323440c0ddcc6b597db7a2e58a9363f8138baa9139e356df70daf3a060da6e00283d01300ccb11b5b29c76f821a064f3c1e73542421b853ede9d1940e9d15178e94d3dc9024045d5809a3390bdeb070c3682a1da617caa7091c62aa31bcc60ad060b4396b8d74de8a6b27eb9c5b76ce28553f7ed1ba9ff9e3a854e3cfc1e4eb5bdefc4902f2e581c983e290fbe307807591ccb2bd5"}, {0xc}, {0xc}}}, @m_ife={0x554, 0x0, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x4}, {0x529, 0x6, "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"}, {0xc}, {0xc}}}]}]}}]}, 0xec4}}, 0x0) 15:05:58 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x21, &(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:05:58 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, 0x0}, 0x4c000) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=@raw={'raw\x00', 0x9, 0x3, 0x278, 0xd8, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x1a8, 0xffffffff, 0xffffffff, 0x1a8, 0xffffffff, 0x3, &(0x7f0000000000), {[{{@ipv6={@loopback, @private1={0xfc, 0x1, [], 0x1}, [], [0x0, 0xffffffff, 0xff000000], 'ip6tnl0\x00', 'nr0\x00', {}, {0xff}, 0x5c, 0x7d, 0x4, 0x4}, 0x0, 0xa8, 0xd8}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x0, 0x6, 0x1}, {0x1}}}}, {{@ipv6={@private0={0xfc, 0x0, [], 0x1}, @private1, [0xff000000, 0xffffffff, 0xffffff00, 0xff0000ff], [0x0, 0x0, 0x0, 0xffffff00], 'team0\x00', 'veth0_to_bridge\x00', {}, {0xff}, 0x3b, 0x81, 0x2, 0x6}, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x0, 0x6}, {0x4, 0x1, 0x1}}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x2d8) 15:05:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x16, 0x0, 0x1c, 0x6, 0x0, 0x1}, 0x40) 15:05:58 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000004080)={'team0\x00'}) 15:05:58 executing program 5: socketpair(0x25, 0x3, 0x9, &(0x7f0000000000)) 15:05:59 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x18, 0x1, &(0x7f0000000000)=@raw=[@jmp], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 730.942965][T19227] x_tables: duplicate underflow at hook 3 15:05:59 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xc, 0xffffffffffffffff, 0xfff}, 0x40) [ 731.008201][T19231] x_tables: duplicate underflow at hook 3 15:05:59 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) ioctl$sock_SIOCGIFCONF(r0, 0x5460, 0x0) 15:05:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc) 15:05:59 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000580), 0x4) 15:05:59 executing program 0: socketpair(0x2, 0xf, 0x0, &(0x7f00000007c0)) 15:05:59 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) 15:05:59 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8971, &(0x7f0000000540)={'batadv0\x00'}) 15:05:59 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x8, &(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:05:59 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req={0x8000, 0x9}, 0x10) 15:06:00 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000440)=@buf) 15:06:00 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) ioctl$sock_SIOCGIFCONF(r0, 0x8983, &(0x7f0000000200)=@buf) 15:06:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r1, 0x0, 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="df"], 0x1) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f00000001c0)=0xc) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="4c0000002c00270400"/20, @ANYRES32=r2, @ANYBLOB="00000400000000000600000208000100753332"], 0x4c}}, 0x0) 15:06:00 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=@nat={'nat\x00', 0x1b, 0x5, 0x470, 0x278, 0x118, 0xffffffff, 0x118, 0x0, 0x6b0, 0x6b0, 0xffffffff, 0x6b0, 0x6b0, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@private1, @ipv6=@private2, @gre_key, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @ipv4=@remote, @icmp_id, @gre_key}}}, {{@ipv6={@mcast2, @private1, [], [], 'veth0_to_hsr\x00', 'team_slave_0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@dev, @icmp_id}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4d0) 15:06:00 executing program 2: socketpair(0x11, 0x3, 0xfffffffd, &(0x7f00000007c0)) [ 732.368352][T19262] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.4'. 15:06:00 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=@nat={'nat\x00', 0x1b, 0x5, 0x470, 0x278, 0x118, 0xffffffff, 0x118, 0x0, 0x6b0, 0x6b0, 0xffffffff, 0x6b0, 0x6b0, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@private1, @ipv6=@private2, @gre_key, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @ipv4=@remote, @icmp_id, @gre_key}}}, {{@ipv6={@mcast2, @private1, [], [], 'veth0_to_hsr\x00', 'team_slave_0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@dev, @icmp_id}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4d0) [ 732.438245][T19265] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.4'. 15:06:00 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) ioctl$sock_SIOCGIFCONF(r0, 0x8916, &(0x7f0000000200)=@buf) 15:06:00 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x2, &(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:06:00 executing program 5: socket$inet6(0xa, 0xa2410d9b959d70a5, 0x0) 15:06:00 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x11, 0x0, 0x0) 15:06:00 executing program 2: pipe(&(0x7f0000000b80)={0xffffffffffffffff}) accept4$packet(r0, 0x0, 0x0, 0x9884e343fcbf7c24) 15:06:01 executing program 1: r0 = socket$inet(0x2, 0xa, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, 0x0, 0x0) 15:06:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000280)='SMC_PNETID\x00', r0) 15:06:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_script(r0, &(0x7f0000000800)={'#! ', './file0', [], 0xa, "ca6a616c7e"}, 0x10) 15:06:01 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x1c, 0x5, &(0x7f0000000240)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x1, 0xaa, &(0x7f0000000080)=""/170, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:06:01 executing program 4: unshare(0x8040000) [ 733.354402][T19287] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 15:06:01 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) pipe(&(0x7f0000000b80)={0xffffffffffffffff}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000002800)={@remote, @mcast1, @ipv4={[], [], @broadcast}}) accept$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14) socket$inet6(0xa, 0x3, 0x8) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f00000001c0)={'wg0\x00'}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000027c0)={'team0\x00'}) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000100), 0x10) 15:06:01 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=@raw={'raw\x00', 0x9, 0x3, 0x278, 0xd8, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x1a8, 0xffffffff, 0xffffffff, 0x1a8, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@loopback, @private1, [0xff000000], [], 'ip6tnl0\x00', 'nr0\x00'}, 0x0, 0xa8, 0xd8}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@private0, @private1, [], [], 'team0\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x2d8) 15:06:01 executing program 0: socketpair(0x2, 0xa, 0x0, &(0x7f00000007c0)) 15:06:01 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) ioctl$sock_SIOCGIFCONF(r0, 0x5452, &(0x7f0000000200)=@buf={0x1, &(0x7f0000000100)="f8"}) 15:06:01 executing program 5: socketpair(0x28, 0x0, 0x0, &(0x7f0000000440)) 15:06:01 executing program 4: pipe(&(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000080)={{r1}}) 15:06:02 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x18, 0x0, 0x0) [ 733.939294][T19300] x_tables: duplicate underflow at hook 3 15:06:02 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) ioctl$sock_SIOCGIFCONF(r0, 0x5421, &(0x7f0000000200)=@buf={0x1, &(0x7f0000000100)="f8"}) 15:06:02 executing program 0: socketpair(0x0, 0xc301, 0x0, 0x0) 15:06:02 executing program 3: r0 = socket$unix(0x1, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000003e40)={'batadv_slave_1\x00'}) 15:06:02 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x13, 0x0, 0x0) 15:06:02 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0xf, &(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:06:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000000040), 0xfffffffffffffe1e) 15:06:02 executing program 2: socket$inet(0x2, 0xa, 0x4) 15:06:02 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x20000059, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:06:02 executing program 5: pipe(&(0x7f0000000b80)={0xffffffffffffffff}) ioctl$sock_SIOCGIFCONF(r0, 0x5452, &(0x7f0000000200)=@buf={0xffffffffffffff77, &(0x7f0000000100)="f8"}) 15:06:02 executing program 0: pipe(&(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f00000002c0)) 15:06:03 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x15, 0x0, 0x0) 15:06:03 executing program 4: pipe(&(0x7f0000000f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, 0x0) 15:06:03 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 15:06:03 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @loopback, 0x0, 0xfff}) 15:06:03 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0xa, 0x0, 0x0) 15:06:03 executing program 3: socketpair(0x1, 0x0, 0x0, &(0x7f00000007c0)) 15:06:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x10, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}]}]}]}, 0x24}}, 0x0) 15:06:03 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) ioctl$sock_SIOCGIFCONF(r0, 0x8904, 0x0) 15:06:03 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x12, 0x0, 0x0) 15:06:03 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x9, 0x0, 0x0) 15:06:04 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) 15:06:04 executing program 4: pipe(&(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFCONF(r0, 0x5452, &(0x7f0000000040)=@buf={0x1, &(0x7f0000000100)="c4"}) 15:06:04 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000240)=@framed={{}, [@jmp]}, &(0x7f0000000180)='syzkaller\x00', 0x6, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:06:04 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x16, &(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:06:04 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={@mcast2, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, @private2, 0x0, 0x0, 0x1f}) 15:06:04 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) ioctl$sock_SIOCGIFCONF(r0, 0x5452, &(0x7f0000000200)=@buf) 15:06:04 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:06:04 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) ioctl$sock_SIOCGIFCONF(r0, 0x8916, 0x0) 15:06:04 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x4, 0x0, 0x4, 0x9}, 0x40) 15:06:04 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) ioctl$sock_SIOCGIFCONF(r0, 0x8982, &(0x7f0000000200)=@buf={0x4, &(0x7f0000000100)="f8ffe2fe"}) 15:06:05 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x15, &(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:06:05 executing program 0: pipe(&(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r0, 0x0, 0x0) 15:06:05 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 15:06:05 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x16, 0x0, 0x80000001, 0x6, 0x0, 0x1}, 0x40) 15:06:05 executing program 1: pipe(&(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={@map=r0, 0xffffffffffffffff, 0x4}, 0x10) 15:06:05 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) 15:06:05 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x7, &(0x7f0000000680)=@framed={{}, [@alu, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @alu]}, &(0x7f0000000700)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:06:05 executing program 4: pipe(&(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, 0x0) 15:06:05 executing program 3: pipe(&(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) 15:06:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$nl_route_sched(r0, &(0x7f0000003700)={0x0, 0x0, &(0x7f00000036c0)={0x0}}, 0x0) 15:06:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f00000024c0)={0x0, 0x0, &(0x7f0000002480)={&(0x7f0000000040)=ANY=[], 0x243c}}, 0x0) 15:06:05 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, 0x0, 0xaa) 15:06:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x2) sendmsg$SMC_PNETID_ADD(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000002c0)={0x0}}, 0x0) 15:06:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc) 15:06:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$nl_route_sched(r0, &(0x7f0000003700)={0x0, 0x0, &(0x7f00000036c0)={&(0x7f0000001640)=@deltfilter={0xec4, 0x2d, 0x0, 0x0, 0x0, {}, [@TCA_CHAIN={0x8}, @filter_kind_options=@f_flow={{0x9, 0x1, 'flow\x00'}, {0xe8c, 0x2, [@TCA_FLOW_ADDEND={0x8, 0x5, 0x32d1d20e}, @TCA_FLOW_MASK={0x8, 0x6, 0xfffffffa}, @TCA_FLOW_BASECLASS={0x8, 0x3, {0xf, 0x7}}, @TCA_FLOW_POLICE={0x410, 0xa, 0x0, 0x1, [@TCA_POLICE_RESULT={0x8}, @TCA_POLICE_PEAKRATE={0x404}]}, @TCA_FLOW_POLICE={0x408, 0xa, 0x0, 0x1, [@TCA_POLICE_PEAKRATE={0x404}]}, @TCA_FLOW_KEYS={0x8}, @TCA_FLOW_ACT={0x650, 0x9, 0x0, 0x1, [@m_ct={0xf8, 0x0, 0x0, 0x0, {{0x7, 0x1, 'ct\x00'}, {0x14, 0x2, 0x0, 0x1, [@TCA_CT_NAT_PORT_MIN={0x6}, @TCA_CT_NAT_IPV4_MIN={0x8, 0x9, @remote}]}, {0xbd, 0x6, "8c9e03bb466507c286982bdfa01d90ec57052f2defb41d6e22fd0d809ef89b7c9f550dc2323440c0ddcc6b597db7a2e58a9363f8138baa9139e356df70daf3a060da6e00283d01300ccb11b5b29c76f821a064f3c1e73542421b853ede9d1940e9d15178e94d3dc9024045d5809a3390bdeb070c3682a1da617caa7091c62aa31bcc60ad060b4396b8d74de8a6b27eb9c5b76ce28553f7ed1ba9ff9e3a854e3cfc1e4eb5bdefc4902f2e581c983e290fbe307807591ccb2bd5"}, {0xc}, {0xc}}}, @m_ife={0x554, 0x0, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x4}, {0x529, 0x6, "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"}, {0xc}, {0xc}}}]}]}}]}, 0xec4}, 0x1, 0x0, 0x0, 0x880}, 0x4000) 15:06:06 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) ioctl$sock_SIOCGIFCONF(r0, 0x8936, 0x0) 15:06:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001700)={0x18, 0x8, &(0x7f00000004c0)=@raw=[@alu={0x7}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @map_val, @generic, @exit, @func, @exit], &(0x7f0000000540)='GPL\x00', 0x7, 0x1000, &(0x7f0000000580)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:06:06 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x4}, 0x40) 15:06:06 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x63) 15:06:06 executing program 0: syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00', 0xffffffffffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001540)={0x11, 0x3, &(0x7f0000001400)=@framed, &(0x7f0000001440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:06:06 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:06:06 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x16, 0x0, 0x4, 0x6, 0x0, 0x1}, 0x40) 15:06:06 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) ioctl$sock_SIOCGIFCONF(r0, 0xc01047d0, 0x0) 15:06:07 executing program 2: socketpair(0x2, 0x2, 0x0, &(0x7f00000007c0)) 15:06:07 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xc}, 0x40) 15:06:07 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6(0xa, 0x3, 0x8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000027c0)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @multicast}, 0x10) 15:06:07 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001540)={0x11, 0x3, &(0x7f0000001400)=@framed, &(0x7f0000001440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000014c0), 0x8, 0x10, 0x0}, 0x78) 15:06:07 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x10, &(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:06:07 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) ioctl$sock_SIOCGIFCONF(r0, 0x5450, 0x0) 15:06:07 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) [ 739.568215][T19433] device team0 entered promiscuous mode [ 739.574327][T19433] device team_slave_0 entered promiscuous mode [ 739.580931][T19433] device team_slave_1 entered promiscuous mode 15:06:07 executing program 0: syz_genetlink_get_family_id$team(0x0, 0xffffffffffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001540)={0x11, 0x3, &(0x7f0000001400)=@framed, &(0x7f0000001440)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 739.745778][T19429] device team0 left promiscuous mode [ 739.751167][T19429] device team_slave_0 left promiscuous mode [ 739.757778][T19429] device team_slave_1 left promiscuous mode 15:06:07 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0xaa) [ 739.901229][T19433] device team0 entered promiscuous mode [ 739.907083][T19433] device team_slave_0 entered promiscuous mode [ 739.914043][T19433] device team_slave_1 entered promiscuous mode [ 739.934747][T19429] device team0 left promiscuous mode [ 739.940118][T19429] device team_slave_0 left promiscuous mode 15:06:08 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x9, &(0x7f0000000100), 0x10) [ 739.947247][T19429] device team_slave_1 left promiscuous mode 15:06:08 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_ABORT_SCAN(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={0x0}}, 0x0) 15:06:08 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0xd, &(0x7f0000000100), 0x10) 15:06:08 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) ioctl$sock_SIOCGIFCONF(r0, 0x8936, &(0x7f0000000200)=@buf) 15:06:08 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000000)='./file0\x00'}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00'}, 0x10) 15:06:08 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000001c0)={'team0\x00'}) 15:06:08 executing program 5: unshare(0x20000) unshare(0x8040000) 15:06:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x4) syz_genetlink_get_family_id$smc(&(0x7f0000000280)='SMC_PNETID\x00', r0) 15:06:08 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x4, &(0x7f0000000680)=@framed={{}, [@func]}, &(0x7f0000000700)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:06:08 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000002800)={@remote, @mcast1, @loopback, 0x0, 0x0, 0x9720}) 15:06:09 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x12, 0x5, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:06:09 executing program 5: syz_genetlink_get_family_id$ethtool(&(0x7f0000001700)='ethtool\x00', 0xffffffffffffffff) 15:06:09 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)={0xffffffffffffffff}, 0x4) 15:06:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$nl_route_sched(r0, &(0x7f0000003700)={&(0x7f0000001600)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000036c0)={&(0x7f0000001640)=@deltfilter={0xec4, 0x2d, 0x0, 0x0, 0x0, {}, [@TCA_CHAIN={0x8}, @filter_kind_options=@f_flow={{0x9, 0x1, 'flow\x00'}, {0xe8c, 0x2, [@TCA_FLOW_ADDEND={0x8}, @TCA_FLOW_MASK={0x8}, @TCA_FLOW_BASECLASS={0x8}, @TCA_FLOW_POLICE={0x410, 0xa, 0x0, 0x1, [@TCA_POLICE_RESULT={0x8}, @TCA_POLICE_PEAKRATE={0x404}]}, @TCA_FLOW_POLICE={0x408, 0xa, 0x0, 0x1, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e]}]}, @TCA_FLOW_KEYS={0x8}, @TCA_FLOW_ACT={0x650, 0x9, 0x0, 0x1, [@m_ct={0xf8, 0x0, 0x0, 0x0, {{0x7, 0x1, 'ct\x00'}, {0x14, 0x2, 0x0, 0x1, [@TCA_CT_NAT_PORT_MIN={0x6}, @TCA_CT_NAT_IPV4_MIN={0x8, 0x9, @remote}]}, {0xbd, 0x6, "8c9e03bb466507c286982bdfa01d90ec57052f2defb41d6e22fd0d809ef89b7c9f550dc2323440c0ddcc6b597db7a2e58a9363f8138baa9139e356df70daf3a060da6e00283d01300ccb11b5b29c76f821a064f3c1e73542421b853ede9d1940e9d15178e94d3dc9024045d5809a3390bdeb070c3682a1da617caa7091c62aa31bcc60ad060b4396b8d74de8a6b27eb9c5b76ce28553f7ed1ba9ff9e3a854e3cfc1e4eb5bdefc4902f2e581c983e290fbe307807591ccb2bd5"}, {0xc}, {0xc}}}, @m_ife={0x554, 0x0, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x4}, {0x529, 0x6, "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"}, {0xc}, {0xc}}}]}]}}]}, 0xec4}}, 0x0) 15:06:09 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001700)={0x18, 0x3, &(0x7f00000004c0)=@raw=[@func, @func, @exit], &(0x7f0000000540)='GPL\x00', 0x7, 0x1000, &(0x7f0000000580)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:06:09 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000140)=@buf={0x0, &(0x7f0000000100)}) 15:06:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r0, r1, 0x0, 0x0) 15:06:09 executing program 5: pipe(&(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONERANGE(r0, 0x4020940d, 0x0) 15:06:09 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000027c0)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000002800)={@remote, @mcast1, @ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200201, r2}) 15:06:09 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYRES32], &(0x7f0000000040)='GPL\x00', 0x1, 0xaa, &(0x7f0000000080)=""/170, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:06:09 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$BTRFS_IOC_SNAP_DESTROY(r0, 0x5000940f, 0x0) 15:06:09 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x63) 15:06:10 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x10, 0x0, 0x0) 15:06:10 executing program 5: bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000)=0xffffffffffffffff, 0xffffffffffffff6c) 15:06:10 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) ioctl$sock_SIOCGIFCONF(r0, 0x2, &(0x7f0000000200)=@buf) 15:06:10 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x4, &(0x7f0000000680)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}]}, &(0x7f0000000700)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:06:10 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x16, 0x0, 0x1300, 0x6, 0x0, 0x1}, 0x40) 15:06:10 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) ioctl$sock_SIOCGIFCONF(r0, 0x8907, 0x0) 15:06:10 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000001c0), 0x4) 15:06:10 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0)='batadv\x00', 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}}, 0x0) 15:06:10 executing program 3: r0 = epoll_create1(0x0) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r0, 0xf501, 0x0) 15:06:10 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=@security={'security\x00', 0xe, 0x4, 0x3a0, 0xffffffff, 0x0, 0x0, 0x108, 0xffffffff, 0xffffffff, 0x318, 0x318, 0x318, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'batadv_slave_1\x00', 'gretap0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@mcast1}}}, {{@ipv6={@local, @ipv4={[], [], @multicast1}, [], [], 'nr0\x00', 'bridge_slave_1\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {'2a'}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@ipv6={@private0, @private2, [], [], 'bond_slave_0\x00', 'nr0\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x400) 15:06:10 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f00000024c0)={0x0, 0x0, &(0x7f0000002480)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c2400000c0701", @ANYBLOB], 0x243c}}, 0x0) 15:06:11 executing program 4: socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x2, 0x300) 15:06:11 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x101, 0x4) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x10, 0x40010, r0, 0x4de34000) bind$inet(r0, &(0x7f0000000a00)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) epoll_create1(0x0) accept$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78600b5cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) recvmsg(r0, &(0x7f0000001500)={0x0, 0xf401, &(0x7f0000002200)=[{&(0x7f00000035c0)=""/4106, 0x200045ca}], 0x1, 0x0, 0x130a1a4b28e}, 0x100) 15:06:11 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x5, &(0x7f0000000680)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000700)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:06:11 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) recvmsg(r0, &(0x7f0000002d00)={0x0, 0x0, 0x0}, 0x102) 15:06:11 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001540)={0x11, 0x3, &(0x7f0000001400)=@framed, &(0x7f0000001440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001500), 0x10}, 0x78) 15:06:11 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x19, 0x5, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:06:11 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) ioctl$sock_SIOCGIFCONF(r0, 0x8918, &(0x7f0000000200)=@buf) 15:06:11 executing program 4: socketpair(0x26, 0x5, 0x2, &(0x7f0000000140)) 15:06:11 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x9, &(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:06:12 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) ioctl$sock_SIOCGIFCONF(r0, 0x541b, &(0x7f0000000200)=@buf) 15:06:12 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x16, 0x0, 0x1a00, 0x6, 0x0, 0x1}, 0x40) 15:06:12 executing program 0: syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00', 0xffffffffffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001540)={0x11, 0x3, &(0x7f0000001400)=@framed, &(0x7f0000001440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001500), 0x10}, 0x78) syz_genetlink_get_family_id$ethtool(&(0x7f0000001700)='ethtool\x00', 0xffffffffffffffff) 15:06:12 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 15:06:12 executing program 5: socket$unix(0x1, 0x3, 0x0) 15:06:12 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) ioctl$sock_SIOCGIFCONF(r0, 0x80108906, 0x0) 15:06:12 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) bind$unix(r0, &(0x7f0000000000)=@abs={0x8}, 0x8) 15:06:12 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) ioctl$sock_SIOCGIFCONF(r0, 0x890c, &(0x7f0000000200)=@buf) 15:06:12 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x14, 0x0, 0x0) 15:06:12 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$TIOCSPGRP(r1, 0x40047477, &(0x7f0000000040)) 15:06:12 executing program 4: mlock(&(0x7f0000fea000/0x13000)=nil, 0x13000) munlock(&(0x7f0000ff0000/0xe000)=nil, 0xe000) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) 15:06:13 executing program 2: mlock(&(0x7f0000ff9000/0x3000)=nil, 0x3000) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) munmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000) 15:06:13 executing program 1: syz_emit_ethernet(0x4a, &(0x7f0000000100)={@broadcast, @remote, @val, {@ipv4}}, 0x0) 15:06:13 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000540)) 15:06:13 executing program 0: mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x1015, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) munlock(&(0x7f0000ffa000/0x2000)=nil, 0x2000) 15:06:13 executing program 4: syz_emit_ethernet(0xe, &(0x7f0000000080)={@local, @local, @val, {@ipv6}}, 0x0) 15:06:13 executing program 5: sendmsg(0xffffffffffffff9c, &(0x7f0000004900)={&(0x7f0000000040)=@in6={0x18, 0x3}, 0x6c, &(0x7f0000002540), 0x9, &(0x7f0000002600)}, 0x0) 15:06:13 executing program 2: pipe2(&(0x7f0000000040), 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x1015, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) munlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) 15:06:13 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000080)="339468ebf119082c614816be3ba9d3fd286bcc70ed57f94eeaaf3b51643fc317974afcec69ae1811d72d156d762fffb2147de1c03a0b891ab312fd144e3607f223f9afcdebbc9164ce1a2ff42b55f7e60613bf48c97d0b7d88e3eed54055cd9ec45c8c0018a5c7560d", 0x69}, {&(0x7f0000000100)="851b7c9b6d28a8f1914d38c31ed9a90338", 0x11}, {&(0x7f0000000140)="e84c9e32c2db6956c8d9c99e4aa3a312ca42593c556abe", 0x17}], 0x3}, 0x40e) 15:06:13 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000540)={@random="493b12afdc40", @remote, @val, {@ipv4}}, 0x0) 15:06:13 executing program 4: mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 15:06:13 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@in={0x2, 0x1}, 0xc) 15:06:14 executing program 5: mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x1015, 0xffffffffffffffff, 0x0) 15:06:14 executing program 2: syz_emit_ethernet(0x62, &(0x7f0000000100)={@broadcast, @remote, @val, {@ipv4}}, 0x0) 15:06:14 executing program 1: pipe2(&(0x7f0000000c80)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = getpid() fcntl$setown(r0, 0x6, r1) fcntl$setown(r0, 0x6, r1) 15:06:14 executing program 3: mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) munlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) 15:06:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x0) 15:06:14 executing program 0: syz_emit_ethernet(0x3a, &(0x7f0000000100)={@broadcast, @remote, @val, {@ipv4}}, 0x0) 15:06:14 executing program 5: mlock(&(0x7f0000ff7000/0x3000)=nil, 0x3000) munlock(&(0x7f0000ff6000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x4) 15:06:14 executing program 2: mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0) 15:06:14 executing program 1: syz_emit_ethernet(0xc25, &(0x7f0000000440)={@local, @local, @val, {@ipv6}}, 0x0) 15:06:14 executing program 4: mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xb5d533313fe5317c, 0x10, 0xffffffffffffffff, 0x0) 15:06:15 executing program 0: mlock(&(0x7f0000fea000/0x13000)=nil, 0x13000) munmap(&(0x7f0000ff9000/0x2000)=nil, 0x2000) madvise(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x6) 15:06:15 executing program 3: mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x1015, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 15:06:15 executing program 5: pipe2(&(0x7f0000000c80)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = getpid() fcntl$setown(r0, 0x6, r1) fcntl$setown(r0, 0x6, 0x0) 15:06:15 executing program 2: mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x1815, 0xffffffffffffffff, 0x0) 15:06:15 executing program 0: mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x9010, 0xffffffffffffffff, 0x0) 15:06:15 executing program 1: mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4) mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) 15:06:15 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000000040)={0x0, 0x0, 0xfffffffffffffffe}) 15:06:15 executing program 5: mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000000)={{0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}}) munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) 15:06:15 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000180)={@local, @local, @val, {@ipv6}}, 0x0) 15:06:16 executing program 0: pipe2(&(0x7f0000000040), 0x0) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) mlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) 15:06:16 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000140), 0x4, 0x0, 0x0) 15:06:16 executing program 1: pipe2(&(0x7f0000000040), 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x1015, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) munlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) 15:06:16 executing program 4: mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x3015, 0xffffffffffffffff, 0x0) 15:06:16 executing program 5: mlock(&(0x7f0000800000/0x800000)=nil, 0x800000) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) 15:06:16 executing program 3: syz_emit_ethernet(0xe, &(0x7f0000000040)={@broadcast, @remote, @val, {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x0, 0x0, @random="6edae4fa0c87", "", @remote, "0a0865a9687d6aa086c7023709a87177"}}}}, 0x0) 15:06:16 executing program 2: syz_emit_ethernet(0x36, &(0x7f00000000c0)={@broadcast, @empty, @val, {@ipv6}}, 0x0) 15:06:16 executing program 1: syz_emit_ethernet(0x1fbf, &(0x7f00000000c0)={@broadcast, @empty, @val, {@ipv6}}, 0x0) 15:06:16 executing program 0: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x5, 0x0) 15:06:16 executing program 5: mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1015, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) 15:06:16 executing program 4: setrlimit(0x0, &(0x7f0000000000)) setrlimit(0x1, &(0x7f0000000040)) 15:06:16 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local, @random="7b13e64e2524", @val, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote, @loopback, @remote, @loopback}}}}, 0x0) 15:06:17 executing program 2: pipe2(&(0x7f0000000040), 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x1015, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) 15:06:17 executing program 1: syz_emit_ethernet(0x4f, &(0x7f0000000000)={@broadcast, @local, @val, {@ipv6}}, 0x0) 15:06:17 executing program 0: mlock(&(0x7f0000fea000/0x13000)=nil, 0x13000) munmap(&(0x7f0000ff9000/0x2000)=nil, 0x2000) 15:06:17 executing program 5: mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) munlock(&(0x7f0000ff6000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ff6000/0x2000)=nil, 0x2000, 0x6) 15:06:17 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@random="32a016b59a0b", @remote, @val, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @local, @multicast1, @broadcast}}}}, 0x0) 15:06:17 executing program 3: mlock(&(0x7f0000ff7000/0x3000)=nil, 0x3000) mprotect(&(0x7f0000bff000/0x400000)=nil, 0x400000, 0x1) 15:06:17 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000b40)="0f", 0x1}], 0x1) 15:06:17 executing program 1: mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x1014, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) 15:06:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000080)='3', 0x1}, {0x0}, {&(0x7f0000000140)="e8", 0x1}], 0x3}, 0x0) 15:06:17 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x400c55cb, 0x0) 15:06:17 executing program 4: syz_emit_ethernet(0x52, 0x0, 0x0) syz_emit_ethernet(0x31, &(0x7f0000000100)={@empty, @random="aa23f9ee618a", @val={@val={0x9100, 0x2, 0x0, 0x4}, {0x8100, 0x3, 0x0, 0x3}}, {@llc_tr={0x11, {@llc={0x0, 0x0, "924f", "a846b9bac38ea2f17e3398688b1eb2b22097b2954d3894"}}}}}, &(0x7f0000000140)={0x0, 0x0, [0xab4, 0xc96, 0x1e6, 0x969]}) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2y', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB=' '], 0x20}}, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e21, 0x0, @local}, 0x1c) syz_emit_ethernet(0x1e, &(0x7f0000000500)={@broadcast, @random="5f5bdc732de0", @void, {@can={0xc, {{0x3}, 0x2, 0x1, 0x0, 0x0, "ebb13fe6de2699ce"}}}}, 0x0) syz_emit_ethernet(0x26, &(0x7f0000000000)={@local, @multicast, @val={@val={0x9100, 0x0, 0x0, 0x3}, {0x8100, 0x7, 0x0, 0x1}}, {@can={0xc, {{0x4, 0x1}, 0x2, 0x3, 0x0, 0x0, "d024a47d930f1852"}}}}, &(0x7f0000000040)={0x0, 0x1, [0x330, 0x0, 0x100, 0xde1]}) 15:06:17 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/hwrng\x00', 0x204280, 0x0) signalfd4(r0, &(0x7f0000000080), 0x8, 0x0) 15:06:18 executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f00000003c0)=0x10120, 0x4) 15:06:18 executing program 1: perf_event_open(&(0x7f0000001540)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@empty, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402}, {}, 0x0, 0x0, 0x1}, {{@in=@local, 0x4d3, 0x3c}, 0x0, @in6=@private1={0xfc, 0x1, [], 0x1}, 0x0, 0x0, 0x3, 0x6, 0x0, 0xfffffffc}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = accept4(r1, &(0x7f0000000740)=@ethernet={0x0, @remote}, &(0x7f00000007c0)=0x80, 0x80000) setsockopt$inet6_IPV6_DSTOPTS(r2, 0x29, 0x3b, &(0x7f0000000800)={0x0, 0x4, [], [@ra={0x5, 0x2, 0x400}, @ra={0x5, 0x2, 0x7fff}, @hao={0xc9, 0x10, @empty}, @padn={0x1, 0x1, [0x0]}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}]}, 0x30) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='cpuset.memory_pressure\x00', 0x0, 0x0) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000140)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x3b0, 0x2e0, 0x1f8, 0x3b0, 0x2e0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x23, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={[], [], @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, [], [], 'tunl0\x00', 'ip6gre0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6f0) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x3b0, 0x2e0, 0x1f8, 0x3b0, 0x2e0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x23, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={[], [], @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, [], [], 'tunl0\x00', 'ip6gre0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6f0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r3, 0x4, 0x0, &(0x7f0000000880)='./file0\x00', r3) 15:06:18 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x0, 0x0, 0x16}) 15:06:18 executing program 4: socket$inet(0x2, 0x5, 0x6) 15:06:18 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000001200)={0x0, {0x0, 0x8000}}) 15:06:18 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f00000005c0)='net/vlan/config\x00') 15:06:18 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000940)=""/176, 0xb0}, {&(0x7f0000000a00)=""/224, 0xe0}], 0x2}}], 0x1, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x2d0}, {&(0x7f0000000140)=""/85, 0x36}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x62e}, {&(0x7f0000000740)=""/73, 0x3b3}, {&(0x7f0000000200)=""/77, 0x894}, {&(0x7f00000007c0)=""/154, 0x490}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 15:06:18 executing program 0: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x44, 0xf4, &(0x7f0000000040)="08aaaabda318ef038f2b86d14da89519e8fe2709afe105c444d16854134ae51d6e9ecab542ec214a9d57441002cdecfd92b716b8de44889548a45b2de78989fe038b2f7fdce6c449f27f3aee5dc7fca93c7091bd20e8d2ecccd3b792177f8d9d994a5d5d1a5f91c25c50dd8627050bae3325a2f60cd5ae3eada5529a5738fa710761c144be72ecb63a68011d21f94a71c72ec657421c22b92972b0a2c6509d77b3d10ebdd1cbd99a259270e5fa545faee303243139390f0fa49bfee9bdf742925e", &(0x7f0000000140)=""/244, 0x0, 0x0, 0x8f, 0xbc, &(0x7f0000000240)="93096f4257a9b3864707f4d533882afd03bd79e292adc1b5b6cb9f2ca05741ade6ea4d778d6029370fc517bda0675420aafdc7408061c6a5eab7912442d7826a5c1ab4d88b0b14fcddec111ebe0f27f1bf747c23580d0da04738c57692d8b6787091d02e2a241a617e4cb73558fc14b23c06b3df5bf906e5f20e196dcf15f1fabf94a33131270cad1f54e24e74e0bb", &(0x7f0000000300)="4e7b519f3dc305e63fb128a456e2d1378051cfe32af01638cd0c7b2fa12c46b02bfc33a50196bbdba430da1da7788f812d30973c1634afb8a2c7ab675c1b0fa4c2b6c98d20c92c663f944b2445ef7ea14ddb1c9afa1c5c1a86b2440e03e00dd76b04731e80c5bf4eb66ddb56805de3ee9150f1c391d873328e00d90b8900f496d0deef2d8d7b2a9a946eea48fdb76bf12ec0a7f03dda78056a13d74c86fafe7dbe48b30427ff0eda1c8849b8c00a18269388f714410e28a1128b0ed3", 0x0, 0x4}, 0xfd99) 15:06:19 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x5421, &(0x7f0000001a40)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @ramp}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 15:06:19 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfffffffffffeffff, 0x593501) 15:06:19 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x16, 0x0, 0x81, 0x3, 0x0, 0x1}, 0x40) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fork() sendmsg$unix(r1, &(0x7f0000002d00)={0x0, 0x0, &(0x7f0000000c40)=[{&(0x7f0000000980)="b0", 0x1}], 0x1, &(0x7f0000002cc0)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18}, 0x0) 15:06:19 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000940)=""/176, 0xb0}, {&(0x7f0000000a00)=""/224, 0xe0}], 0x2}}], 0x1, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x2d0}, {&(0x7f0000000140)=""/85, 0x36}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x62e}, {&(0x7f0000000740)=""/73, 0x3b3}, {&(0x7f0000000200)=""/77, 0x1344}, {&(0x7f00000007c0)=""/154, 0x490}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 15:06:19 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/psched\x00') 15:06:20 executing program 1: prctl$PR_SET_UNALIGN(0x2a, 0x0) 15:06:20 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x7) 15:06:20 executing program 3: bpf$BPF_GET_MAP_INFO(0x9, 0x0, 0x12) 15:06:20 executing program 2: bpf$BPF_GET_MAP_INFO(0xd, 0x0, 0x0) 15:06:20 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000180)) 15:06:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:06:20 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x801, 0x0) write(r0, &(0x7f0000000040)="2164c9eb0a8dc49012ea44bff7991c85f05bd9b598e1ab4108b352fc148ce610026e2eb0203645802aa1c4dc2522f823e4b309bc4dec195149ee1291d4be7184", 0x40) 15:06:20 executing program 2: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000380)) 15:06:20 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_EPOCH_SET(r0, 0x7006, 0x0) 15:06:20 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) bind$xdp(r0, &(0x7f0000000240), 0x10) 15:06:20 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_EPOCH_SET(r0, 0x5452, 0x4fc000) 15:06:21 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 15:06:21 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@generic={0x7f, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:06:21 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000001a40)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @ramp}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 15:06:21 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x14, 0x453, 0x0, 0x0, 0x0, '9'}, 0x14}}, 0x0) 15:06:21 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000001f40)=0x1000, 0x4) 15:06:21 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) lchown(&(0x7f0000000800)='./file0\x00', 0xee01, 0xffffffffffffffff) 15:06:21 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x0, 0x80034}) 15:06:21 executing program 2: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, 0x0) 15:06:21 executing program 3: syz_emit_ethernet(0x42, &(0x7f0000000240)={@local, @broadcast, @void, {@ipv4={0x800, @tcp={{0x8, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @private=0xa010101, {[@timestamp={0x44, 0x4, 0xb3}, @rr={0x7, 0x3, 0x9}, @rr={0x7, 0x3}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 15:06:22 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x314, 0x1}, 0x40) 15:06:22 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000940)=""/176, 0xb0}, {&(0x7f0000000a00)=""/224, 0xe0}], 0x2}}], 0x1, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x2d0}, {&(0x7f0000000140)=""/85, 0x36}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x62e}, {&(0x7f0000000740)=""/73, 0x3b3}, {&(0x7f0000000200)=""/77, 0xb08}, {&(0x7f00000007c0)=""/154, 0x490}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 15:06:22 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xb, 0x0, 0x0, 0x7}, 0x40) 15:06:22 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fork() 15:06:22 executing program 2: syz_open_dev$evdev(&(0x7f0000002480)='/dev/input/event#\x00', 0x0, 0x105000) 15:06:22 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000940)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x2d0}, {&(0x7f0000000140)=""/85, 0x36}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x62e}, {&(0x7f0000000740)=""/73, 0x3b3}, {&(0x7f0000000200)=""/77, 0xa4}, {&(0x7f00000007c0)=""/154, 0x490}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 15:06:22 executing program 0: socketpair(0x25, 0x0, 0x0, &(0x7f0000000100)) 15:06:22 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, 0x0) 15:06:22 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000940)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x2d0}, {&(0x7f0000000140)=""/85, 0x36}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x62e}, {&(0x7f0000000740)=""/73, 0x3b3}, {&(0x7f0000000200)=""/77, 0x6c}, {&(0x7f00000007c0)=""/154, 0x490}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 15:06:22 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x102500, 0x0) ioctl$RTC_EPOCH_SET(r0, 0x5452, 0xcfc000) 15:06:23 executing program 0: inotify_add_watch(0xffffffffffffffff, 0x0, 0x1000000) 15:06:23 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) 15:06:23 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/hwrng\x00', 0x204280, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11617, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x83}, 0x0, 0x0, r0, 0x6) 15:06:23 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_EPOCH_SET(r0, 0x5452, 0x0) 15:06:23 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:06:23 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) epoll_pwait(r0, &(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) 15:06:23 executing program 0: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x18}, 0xc) [ 755.626503][ T3130] ieee802154 phy0 wpan0: encryption failed: -22 [ 755.633388][ T3130] ieee802154 phy1 wpan1: encryption failed: -22 15:06:23 executing program 2: clock_gettime(0x2, 0x0) 15:06:23 executing program 4: unshare(0x400) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x2d0}, {&(0x7f0000000140)=""/85, 0x36}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x62e}, {&(0x7f0000000740)=""/73, 0x3b3}, {&(0x7f0000000200)=""/77, 0x8}, {&(0x7f00000007c0)=""/154, 0x490}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 15:06:23 executing program 3: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) fsetxattr$security_evm(r0, &(0x7f00000000c0)='security.evm\x00', 0x0, 0x0, 0x0) 15:06:23 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:06:24 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001740)={0x18, 0x4, &(0x7f0000001580)=@framed={{}, [@call]}, &(0x7f00000015c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001700)={0x0, 0x5, 0x2, 0x7}, 0x10}, 0x78) 15:06:24 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_EPOCH_SET(r0, 0xc0045878, 0x0) 15:06:24 executing program 2: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={@cgroup, 0xffffffffffffffff, 0x10}, 0x10) 15:06:24 executing program 5: prctl$PR_SET_UNALIGN(0x35, 0x0) 15:06:24 executing program 3: perf_event_open(&(0x7f0000001540)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@empty, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402}, {}, 0xfff, 0x0, 0x1}, {{@in=@local, 0x0, 0x3c}, 0x0, @in6=@private1, 0x0, 0x0, 0x3, 0x6, 0x0, 0xfffffffc}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xfe80) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = accept4(r1, &(0x7f0000000740)=@ethernet={0x0, @remote}, &(0x7f00000007c0)=0x80, 0x80000) setsockopt$inet6_IPV6_DSTOPTS(r2, 0x29, 0x3b, &(0x7f0000000800)={0x6c, 0x4, [], [@ra, @ra={0x5, 0x2, 0x7fff}, @hao={0xc9, 0x10, @empty}, @padn={0x1, 0x1, [0x0]}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}]}, 0x30) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='cpuset.memory_pressure\x00', 0x0, 0x0) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000140)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0x3b0, 0x2e0, 0x1f8, 0x3b0, 0x2e0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x0, 'system_u:object_r:etc_runtime_t:s0\x00'}}}, {{@ipv6={@loopback, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x23, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv6=@ipv4={[], [], @broadcast}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, [], [], 'tunl0\x00', 'ip6gre0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6f0) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x200, 0x0) 15:06:24 executing program 4: socketpair(0xa, 0x0, 0x0, &(0x7f0000000040)) 15:06:24 executing program 1: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @ipv4={[0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @empty}}}) 15:06:24 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={0x0, 0x11000, 0x1000, 0x0, 0x1}, 0x20) 15:06:24 executing program 2: perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:06:25 executing program 5: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d00)={@map, 0xffffffffffffffff, 0x1f}, 0x10) 15:06:25 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x11, 0x0, 0x5f, 0x0, 0x0, 0xffffffffffffffff}) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) 15:06:25 executing program 1: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000940)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x2d0}, {&(0x7f0000000140)=""/85, 0x36}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x62e}, {&(0x7f0000000740)=""/73, 0x3b3}, {&(0x7f0000000200)=""/77, 0x8}, {&(0x7f00000007c0)=""/154, 0x490}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 15:06:25 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)) 15:06:25 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0x405c5503, &(0x7f0000001a40)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @ramp}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 15:06:25 executing program 5: syz_emit_ethernet(0x52, &(0x7f0000000100)={@local, @remote, @void, {@ipv4={0x800, @tcp={{0xc, 0x4, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @private=0xa010101, {[@timestamp={0x44, 0x4, 0xb3}, @rr={0x7, 0x13, 0x9, [@rand_addr, @empty, @dev, @private]}, @rr={0x7, 0x3}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 15:06:26 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000040)={0xff}) 15:06:26 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ttyS3\x00', 0x882, 0x0) sendfile(r1, r0, 0x0, 0x20000000000000d8) 15:06:26 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x801, 0x0) write$vga_arbiter(r0, &(0x7f0000000080)=@other={'unlock', ' ', 'io'}, 0xa) 15:06:26 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000940)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x2d0}, {&(0x7f0000000140)=""/85, 0x36}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x62e}, {&(0x7f0000000740)=""/73, 0x3b3}, {&(0x7f0000000200)=""/77, 0xc0}, {&(0x7f00000007c0)=""/154, 0x490}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 15:06:26 executing program 5: syz_emit_ethernet(0x52, &(0x7f0000000100)={@local, @remote, @void, {@ipv4={0x800, @tcp={{0xc, 0x4, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @private=0xa010101, {[@timestamp={0x44, 0x4, 0xb3}, @rr={0x7, 0x13, 0x9, [@rand_addr, @empty, @dev, @private]}, @rr={0x7, 0x3}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 15:06:26 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xc, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 15:06:26 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc0189436, 0x0) 15:06:26 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x3, 0x0) fsconfig$FSCONFIG_SET_FD(r0, 0x5, 0x0, 0x0, 0xffffffffffffffff) 15:06:26 executing program 3: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001340)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x48) 15:06:26 executing program 5: syz_emit_ethernet(0x52, &(0x7f0000000100)={@local, @remote, @void, {@ipv4={0x800, @tcp={{0xc, 0x4, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @private=0xa010101, {[@timestamp={0x44, 0x4, 0xb3}, @rr={0x7, 0x13, 0x9, [@rand_addr, @empty, @dev, @private]}, @rr={0x7, 0x3}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 15:06:26 executing program 1: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x6) 15:06:26 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000002c0)={'gretap0\x00', 0x0}) 15:06:27 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x1, 0x1, 0x0, 0xffffffff}, 0x40) 15:06:27 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x0) 15:06:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', 0x0, 0x0, 0x0) 15:06:27 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0xb8a1cc5f5046817f}, 0x1c}}, 0x0) 15:06:27 executing program 5: syz_emit_ethernet(0x52, &(0x7f0000000100)={@local, @remote, @void, {@ipv4={0x800, @tcp={{0xc, 0x4, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @private=0xa010101, {[@timestamp={0x44, 0x4, 0xb3}, @rr={0x7, 0x13, 0x9, [@rand_addr, @empty, @dev, @private]}, @rr={0x7, 0x3}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 15:06:27 executing program 0: socketpair(0x1e, 0x0, 0x7, &(0x7f0000000100)) 15:06:27 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000080)) 15:06:27 executing program 4: prctl$PR_SET_UNALIGN(0x2, 0x550000) 15:06:27 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f0000000240)) 15:06:28 executing program 3: syz_emit_ethernet(0x52, &(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50ce1371f29303476b633f6c98c0bf0663c60c742a0e610b06d7adb137ce8b19f8e46df9ed23e1a1"], 0x0) syz_emit_ethernet(0x19, &(0x7f0000000100)={@empty, @random="aa23f9ee618a", @val={@val={0x9100, 0x2, 0x1, 0x4}, {0x8100, 0x3, 0x1, 0x3}}, {@llc_tr={0x11, {@llc={0x0, 0xe, "92"}}}}}, &(0x7f0000000140)={0x0, 0x3, [0xab4, 0x0, 0x1e6, 0x969]}) clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2y', 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB=' '], 0x20}}, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x820) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e21, 0x0, @local}, 0x1c) syz_emit_ethernet(0x1e, &(0x7f0000000500)={@broadcast, @random="5f5bdc732de0", @void, {@can={0xc, {{0x3}, 0x2, 0x0, 0x0, 0x0, "ebb13fe6de2699ce"}}}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000540)={@ipv4={[], [], @remote}, 0x7f, 0x1, 0x2, 0x7, 0x4, 0x8}, 0x20) syz_emit_ethernet(0x26, &(0x7f0000000000)={@local, @multicast, @val={@val={0x9100, 0x1, 0x0, 0x3}, {0x8100, 0x7, 0x0, 0x1}}, {@can={0xc, {{0x4, 0x1}, 0x2, 0x3, 0x0, 0x0, "d024a47d930f1852"}}}}, &(0x7f0000000040)={0x0, 0x1, [0x330, 0xcd2, 0x100, 0xde1]}) 15:06:28 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000080)) 15:06:28 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000940)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x2d0}, {&(0x7f0000000140)=""/85, 0x36}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x62e}, {&(0x7f0000000740)=""/73, 0x3b3}, {&(0x7f0000000200)=""/77, 0x74}, {&(0x7f00000007c0)=""/154, 0x490}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 15:06:28 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000940)=""/176, 0xb0}, {&(0x7f0000000a00)=""/224, 0xe0}], 0x2}}], 0x1, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x2d0}, {&(0x7f0000000140)=""/85, 0x36}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x62e}, {&(0x7f0000000740)=""/73, 0x3b3}, {&(0x7f0000000200)=""/77, 0x560}, {&(0x7f00000007c0)=""/154, 0x490}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 15:06:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x69fbc269cbe8e667, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r1, 0x400455c8, 0x0) 15:06:28 executing program 3: socketpair(0x2c, 0x3, 0xdb, &(0x7f0000000180)) 15:06:28 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000200)={&(0x7f0000000180)=""/79, 0x0, 0x800}, 0x20) 15:06:28 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000080)) [ 760.657309][ T109] Bluetooth: hci6: Frame reassembly failed (-84) 15:06:28 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000940)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x2d0}, {&(0x7f0000000140)=""/85, 0x36}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x62e}, {&(0x7f0000000740)=""/73, 0x3b3}, {&(0x7f0000000200)=""/77, 0x8c}, {&(0x7f00000007c0)=""/154, 0x490}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 15:06:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x6, 0x3c8, 0x220, 0x2e8, 0x220, 0x220, 0x188, 0x440, 0x440, 0x440, 0x440, 0x440, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}, {{@ip={@empty, @local, 0x0, 0x0, 'ip_vti0\x00', 'ipvlan1\x00'}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28, 'DSCP\x00'}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr, 0x0, 0x0, 'wg2\x00', 'vlan0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x428) 15:06:29 executing program 1: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x4, 0x0, 0x0) 15:06:29 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000940)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x2d0}, {&(0x7f0000000140)=""/85, 0x36}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x62e}, {&(0x7f0000000740)=""/73, 0x3b3}, {&(0x7f0000000200)=""/77, 0x4c}, {&(0x7f00000007c0)=""/154, 0x490}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 15:06:29 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000080)) 15:06:29 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00', r0) 15:06:29 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000140)) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:06:29 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='task\x00') getdents64(r0, 0x0, 0xfffffffffffffedd) [ 762.688167][ T8448] Bluetooth: hci6: command 0x1003 tx timeout [ 762.695130][T19951] Bluetooth: hci6: sending frame failed (-49) [ 764.742620][ T8832] Bluetooth: hci6: command 0x1001 tx timeout [ 764.748894][T19951] Bluetooth: hci6: sending frame failed (-49) [ 766.824523][ T8832] Bluetooth: hci6: command 0x1009 tx timeout 15:06:39 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='stack\x00') 15:06:39 executing program 4: perf_event_open(&(0x7f0000000000)={0x7, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:06:39 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000200)={0x0, {'syz1\x00', 'syz0\x00', 'syz1\x00', &(0x7f00000000c0)=""/15, 0xf}}, 0x120) write$UHID_DESTROY(r0, &(0x7f0000000180), 0x4) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000100), 0xa) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fork() 15:06:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x16, 0x0, 0x81, 0x3, 0x0, 0x1}, 0x40) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fork() sendmsg$unix(r3, &(0x7f0000002d00)={0x0, 0x0, &(0x7f0000000c40)=[{&(0x7f0000000980)="b0", 0x2000e980}], 0x1, &(0x7f0000002cc0)=[@rights={{0x14, 0x1, 0x1, [r2]}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xee01}}}], 0x38}, 0x0) 15:06:39 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x4, &(0x7f0000000140)=@raw=[@jmp, @jmp, @initr0], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:06:39 executing program 1: prctl$PR_SET_UNALIGN(0x21, 0x0) [ 771.253312][ T8448] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 771.261005][ T8448] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 771.270568][ T8448] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 771.278279][ T8448] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 771.285981][ T8448] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 771.293646][ T8448] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 771.301244][ T8448] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 771.308948][ T8448] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 771.316660][ T8448] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 771.324305][ T8448] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 771.331963][ T8448] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 771.339481][ T8448] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 771.347114][ T8448] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 771.354839][ T8448] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 771.362483][ T8448] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 15:06:39 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000040)={0x67446698, 0x0, 0x0, 0x0, 0x0, "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"}, 0xec1) 15:06:39 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x6, 0x0, 0x10001, 0x0, 0x60}) 15:06:39 executing program 5: fork() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b603803123f6ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c26a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) perf_event_open(0xffffffffffffffff, 0xffffffffffffffff, 0xc, r1, 0x2) sendfile(r1, r2, 0x0, 0x1c575) 15:06:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x6, 0x4d8, 0x220, 0x2e8, 0x220, 0x220, 0x188, 0x440, 0x440, 0x440, 0x440, 0x440, 0x6, 0x0, {[{{@uncond, 0x0, 0x128, 0x188, 0x0, {}, [@common=@unspec=@rateest={{0x68, 'rateest\x00'}, {'batadv0\x00', 'bond_slave_0\x00'}}, @common=@osf={{0x50, 'osf\x00'}, {'syz1\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}, {{@ip={@empty, @local, 0x0, 0x0, 'ip_vti0\x00', 'ipvlan1\x00'}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xa0, 0xc8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28, 'DSCP\x00'}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr, 0x0, 0x0, 'wg2\x00', 'vlan0\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x538) 15:06:39 executing program 0: epoll_wait(0xffffffffffffffff, &(0x7f0000000080)=[{}], 0x1, 0x0) [ 771.877739][ T8448] hid-generic 0000:0000:0000.0009: hidraw0: HID v0.00 Device [syz1] on syz0 15:06:40 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000200)={0x0, {'syz1\x00', 'syz0\x00', 'syz1\x00', &(0x7f00000000c0)=""/15, 0xf}}, 0x120) write$UHID_DESTROY(r0, &(0x7f0000000180), 0x4) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000100), 0xa) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fork() [ 772.129190][T20030] x_tables: duplicate underflow at hook 1 15:06:40 executing program 1: read$FUSE(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000006000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x20e, 0xe, 0x14000000, &(0x7f00000004c0)="b91804b700030703009e40f088ca1fff06ffffff8700008477fbac141412e0000801c699da153f08e0e6e380f60104f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b333c20c9ec0c222d644bdcb178c1cc53d6960fbb842d6a33dfcde3a1e1848135214baf139753866cadcbe3ce52505e992818cc452bee339d9ab076f484020eaa348a21d7911e4c44905256ec2cc54cca47a198b00c10aff62a4bed43a2ebcad92743fb22c593f28fd4bb7c703cde9cae0569d4c8d9a823f2c12863f7a6c0cf88ed22aae4f6f084508833b61429a25773eedf63dd9f33d430f2a0a30a7761db16fe0f743b95ded898c28aac1256ce2751b3d738899b8b19d9052b7f13ff94", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 15:06:40 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0xc0000103}]}) [ 772.513465][ T8832] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 772.521186][ T8832] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 772.529093][ T8832] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 772.536830][ T8832] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 772.544480][ T8832] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 772.552943][ T8832] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 772.562797][ T8832] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 772.570436][ T8832] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 772.578462][ T8832] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 772.586083][ T8832] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 772.593681][ T8832] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 772.601199][ T8832] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 772.608919][ T8832] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 772.616531][ T8832] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 772.624122][ T8832] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 15:06:40 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0a0775b0d5e383e5b3c066ff000000e2", 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000005e40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002640)=""/69, 0x45}}, {{&(0x7f0000002740)=@ipx, 0x80, &(0x7f0000003b40)=[{0x0}, {&(0x7f0000003a00)=""/241, 0xf1}], 0x2}}, {{0x0, 0x0, &(0x7f0000004180)}, 0x80}, {{0x0, 0x0, &(0x7f0000004580)=[{0x0}, {&(0x7f0000004380)=""/82, 0x52}, {0x0}], 0x3}, 0x3}], 0x4, 0x1, &(0x7f0000006040)={0x0, 0x3938700}) sendmmsg$alg(r1, &(0x7f0000002700)=[{0x1000000000000000, 0x0, &(0x7f00000003c0)=[{0x0}, {&(0x7f0000000140)="0272f8e661d82e2f7a19243ccd5cef7165de1e59931f71baa88f", 0x1a}, {0x0}, {&(0x7f0000002900)="c9", 0x7fffefe6}], 0x2}], 0x7fffefe6, 0x0) 15:06:40 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='hugetlbfs\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 772.654869][ T8832] hid-generic 0000:0000:0000.000A: hidraw0: HID v0.00 Device [syz1] on syz0 15:06:40 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0x1d9}]}) 15:06:41 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000200)={0x0, {'syz1\x00', 'syz0\x00', 'syz1\x00', &(0x7f00000000c0)=""/15, 0xf}}, 0x120) write$UHID_DESTROY(r0, &(0x7f0000000180), 0x4) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000100), 0xa) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fork() 15:06:41 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) setfsuid(0xee00) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='hugetlbfs\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000080004103) 15:06:41 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0x4b564d04, 0x0, 0x7}]}) 15:06:41 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0x1fc}]}) [ 773.414257][ T8832] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 773.422002][ T8832] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 773.429523][ T8832] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 773.437149][ T8832] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 773.444760][ T8832] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 773.452668][ T8832] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 773.460314][ T8832] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 773.468029][ T8832] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 773.475666][ T8832] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 773.485733][ T8832] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 773.493631][ T8832] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 773.501189][ T8832] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 15:06:41 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0xc0010058, 0x0, 0x1}]}) [ 773.508796][ T8832] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 773.516426][ T8832] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 773.524036][ T8832] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 15:06:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0x48, 0x0, 0x10}]}) [ 773.819698][T20097] kvm [20096]: vcpu0, guest rIP: 0xfff0 unimplemented MMIO_CONF_BASE wrmsr: 0x1 15:06:42 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0x4b564d04, 0x0, 0x7}]}) [ 774.054291][ T8832] hid-generic 0000:0000:0000.000B: hidraw0: HID v0.00 Device [syz1] on syz0 15:06:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = perf_event_open(&(0x7f00000023c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r2, 0x0) 15:06:42 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000200)={0x0, {'syz1\x00', 'syz0\x00', 'syz1\x00', &(0x7f00000000c0)=""/15, 0xf}}, 0x120) write$UHID_DESTROY(r0, &(0x7f0000000180), 0x4) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000100), 0xa) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fork() 15:06:42 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0xc0010058, 0x0, 0x1}]}) 15:06:42 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0x48, 0x0, 0x10}]}) 15:06:43 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0x4b564d04, 0x0, 0x7}]}) [ 774.804804][ T4687] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 15:06:43 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0x10b, 0x0, 0x1}]}) [ 774.805066][ T4687] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 774.805240][ T4687] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 774.805349][ T4687] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 774.805484][ T4687] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 774.805602][ T4687] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 774.805720][ T4687] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 774.805846][ T4687] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 774.805989][ T4687] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 774.806112][ T4687] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 774.806238][ T4687] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 774.806360][ T4687] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 774.806480][ T4687] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 774.806603][ T4687] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 774.806728][ T4687] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 774.823472][ T4687] hid-generic 0000:0000:0000.000C: hidraw0: HID v0.00 Device [syz1] on syz0 [ 774.955798][T20151] kvm [20143]: vcpu0, guest rIP: 0xfff0 unimplemented MMIO_CONF_BASE wrmsr: 0x1 15:06:45 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0x4b564d00}]}) 15:06:45 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0xc0010058, 0x0, 0x1}]}) 15:06:45 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0x4b564d04, 0x0, 0x7}]}) 15:06:45 executing program 2: r0 = perf_event_open(&(0x7f00000023c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) 15:06:45 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0x48, 0x0, 0x10}]}) 15:06:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e71b0fb1f147a8378f364602812c66538d750f6fe1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153ec1f3b18d6d3525078cb798f1bcb6739875acfa16bfb6a4f7018b31a53bad1ec3533c791a753a1fef2c560001000000000000fb8005128e7e4d939951f8ac396203784000400f573fbf002000000000000761f35e959f130dec95128ce7ec2f60fe123d9366a8a5bad4e4bf5b58a06b2bc882e561ceb028eab6b04fa74b6891d5c8d471b21fdf4cf4245dced21ccce3a85e67d15ff57b54187a257096", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 777.672592][T20203] ptrace attach of "/root/syz-executor.4"[20197] was attempted by "/root/syz-executor.4"[20203] 15:06:45 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0x40000080}]}) 15:06:46 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0x48, 0x0, 0x10}]}) 15:06:46 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff03c}, {0x6}]}, 0x10) 15:06:46 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0xc0010058, 0x0, 0x1}]}) 15:06:46 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='pstore\x00', 0x0, 0x0) [ 778.275090][T20231] kvm [20228]: vcpu0, guest rIP: 0xfff0 unimplemented MMIO_CONF_BASE wrmsr: 0x1 15:06:46 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x200000000204a100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x30) wait4(0x0, 0x0, 0x0, 0x0) 15:06:46 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 15:06:46 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0x4b564d01}]}) 15:06:46 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000480)='/dev/hwrng\x00', 0x88c00, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000400)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes128\x00'}, 0x58) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0a0775b0d5e383e5b3c066ff000000e2", 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000005e40)=[{{0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/163, 0xa3}, {&(0x7f00000000c0)=""/3, 0x3}, {&(0x7f0000000200)=""/222, 0xde}, {0x0}, {&(0x7f0000000300)=""/83, 0x53}], 0x5, &(0x7f0000001480)=""/4096, 0x1000}, 0x3}, {{&(0x7f0000002480)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000002600)=[{&(0x7f0000002500)=""/75, 0x4b}, {&(0x7f0000002580)=""/103, 0x67}, {0x0}, {&(0x7f0000002940)=""/4096, 0x1000}], 0x4, &(0x7f0000002640)=""/69, 0x45}, 0x8000}, {{0x0, 0x0, &(0x7f0000003e80)=[{&(0x7f0000003c40)=""/215, 0xd7}, {&(0x7f0000003d40)=""/3, 0x3}], 0x2, &(0x7f0000003ec0)=""/236, 0xec}, 0x9}, {{0x0, 0x0, &(0x7f0000004580)=[{0x0}, {0x0}], 0x2, &(0x7f0000004600)=""/196, 0xc4}, 0x3}], 0x4, 0x1, &(0x7f0000006040)={0x0, 0x3938700}) sendmmsg$alg(r1, &(0x7f0000002700)=[{0x1000000000000000, 0x0, &(0x7f00000003c0)=[{0x0}, {&(0x7f0000000140)="0272f8e661d82e2f7a19243ccd5cef7165de1e59931f71baa88f", 0x1a}, {0x0}, {&(0x7f0000002900)="c9", 0x7fffefe6}], 0x2}], 0x7fffefe6, 0x0) 15:06:46 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0x11, 0x0, 0x1}]}) 15:06:46 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000340)=""/145, 0x3e, 0x91, 0x1}, 0x20) 15:06:46 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x233c0000}]}]}, 0x50}}, 0x0) 15:06:47 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0x4d0, 0x0, 0x10}]}) 15:06:47 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x3fc, 0x0) flock(r2, 0x1) r3 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) flock(r3, 0x2) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) [ 779.119346][T20279] syz-executor.2: vmalloc: allocation failure: 8589934616 bytes, mode:0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0-1 [ 779.135944][T20279] CPU: 0 PID: 20279 Comm: syz-executor.2 Not tainted 5.11.0-rc7-syzkaller #0 [ 779.144841][T20279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 779.145442][T20279] Call Trace: [ 779.145442][T20279] dump_stack+0x21c/0x280 [ 779.145442][T20279] warn_alloc+0x4f9/0x6a0 [ 779.145442][T20279] ? stack_trace_save+0x117/0x1a0 [ 779.145442][T20279] ? __vmalloc_node_range+0x1cd/0x1310 [ 779.145442][T20279] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 779.145442][T20279] __vmalloc_node_range+0x25d/0x1310 [ 779.145442][T20279] __vmalloc_node+0x154/0x170 [ 779.145442][T20279] ? ip_set_alloc+0x5a/0x70 [ 779.145442][T20279] ? ip_set_alloc+0x5a/0x70 [ 779.145442][T20279] kvmalloc_node+0x399/0x3d0 [ 779.145442][T20279] ip_set_alloc+0x5a/0x70 [ 779.145442][T20279] hash_ip_create+0xa3b/0x1c80 [ 779.145442][T20279] ? bitmap_port_same_set+0x450/0x450 [ 779.145442][T20279] ip_set_create+0xb3d/0x1d10 [ 779.145442][T20279] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 779.145442][T20279] ? ip_set_protocol+0x930/0x930 [ 779.145442][T20279] nfnetlink_rcv_msg+0xc4d/0xdc0 [ 779.145442][T20279] ? kmsan_get_metadata+0x116/0x180 [ 779.145442][T20279] ? kmsan_get_metadata+0x116/0x180 [ 779.145442][T20279] ? kmsan_internal_set_origin+0x85/0xc0 [ 779.145442][T20279] ? kmsan_get_metadata+0x116/0x180 [ 779.145442][T20279] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 779.145442][T20279] netlink_rcv_skb+0x6fa/0x810 [ 779.145442][T20279] ? nfnetlink_bind+0x230/0x230 [ 779.145442][T20279] nfnetlink_rcv+0x511/0x4340 [ 779.145442][T20279] ? kmsan_get_metadata+0x116/0x180 [ 779.145442][T20279] ? __dev_direct_xmit+0xc41/0xcb0 [ 779.145442][T20279] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 779.145442][T20279] ? skb_clone+0x444/0x660 [ 779.145442][T20279] ? kmsan_get_metadata+0x116/0x180 [ 779.145442][T20279] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 779.145442][T20279] ? __msan_get_context_state+0x9/0x20 [ 779.145442][T20279] ? rcu_read_unlock_strict+0x9/0x10 [ 779.145442][T20279] ? netlink_deliver_tap+0xd1/0xea0 [ 779.145442][T20279] ? __netlink_lookup+0x7dc/0x860 [ 779.145442][T20279] ? kmsan_get_metadata+0x116/0x180 [ 779.145442][T20279] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 779.145442][T20279] netlink_unicast+0x11d6/0x14a0 [ 779.145442][T20279] ? nfnetlink_net_exit_batch+0x280/0x280 [ 779.145442][T20279] netlink_sendmsg+0x1740/0x1840 [ 779.145442][T20279] ____sys_sendmsg+0xcfc/0x12f0 [ 779.145442][T20279] ? netlink_getsockopt+0x1830/0x1830 [ 779.145442][T20279] __sys_sendmsg+0x714/0x830 [ 779.145442][T20279] ? kmsan_copy_to_user+0x9c/0xb0 [ 779.145442][T20279] ? _copy_to_user+0x1d2/0x270 [ 779.145442][T20279] ? kmsan_get_metadata+0x116/0x180 [ 779.145442][T20279] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 779.145442][T20279] ? kmsan_get_metadata+0x116/0x180 [ 779.145442][T20279] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 779.145442][T20279] __se_sys_sendmsg+0x97/0xb0 [ 779.145442][T20279] __x64_sys_sendmsg+0x4a/0x70 [ 779.145442][T20279] do_syscall_64+0x9f/0x140 [ 779.145442][T20279] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 779.145442][T20279] RIP: 0033:0x466459 [ 779.145442][T20279] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 779.145442][T20279] RSP: 002b:00007fdf3c873188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 779.145442][T20279] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 779.145442][T20279] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000004 [ 779.145442][T20279] RBP: 00000000004bf9fb R08: 0000000000000000 R09: 0000000000000000 [ 779.145442][T20279] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60 [ 779.145442][T20279] R13: 0000000000a9fb1f R14: 00007fdf3c873300 R15: 0000000000022000 [ 779.509597][T20279] Mem-Info: [ 779.512846][T20279] active_anon:8884 inactive_anon:166168 isolated_anon:0 [ 779.512846][T20279] active_file:6523 inactive_file:74243 isolated_file:0 [ 779.512846][T20279] unevictable:768 dirty:60 writeback:0 [ 779.512846][T20279] slab_reclaimable:7467 slab_unreclaimable:21183 [ 779.512846][T20279] mapped:98482 shmem:51968 pagetables:3983 bounce:0 [ 779.512846][T20279] free:195705 free_pcp:1025 free_cma:0 [ 779.552285][T20279] Node 0 active_anon:1348kB inactive_anon:541796kB active_file:25928kB inactive_file:279660kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:208536kB dirty:216kB writeback:0kB shmem:54896kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 499712kB writeback_tmp:0kB kernel_stack:4928kB pagetables:11048kB all_unreclaimable? no [ 779.584607][T20279] Node 1 active_anon:34188kB inactive_anon:122792kB active_file:164kB inactive_file:17312kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:185392kB dirty:24kB writeback:0kB shmem:152976kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:976kB pagetables:4884kB all_unreclaimable? no [ 779.616211][T20279] Node 0 DMA free:4096kB min:160kB low:200kB high:240kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:4096kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 779.644820][T20279] lowmem_reserve[]: 0 900 1212 1212 1212 [ 779.650783][T20279] Node 0 DMA32 free:46308kB min:36076kB low:45092kB high:54108kB reserved_highatomic:0KB active_anon:76kB inactive_anon:433932kB active_file:1536kB inactive_file:252428kB unevictable:0kB writepending:148kB present:3129332kB managed:930628kB mlocked:0kB bounce:0kB free_pcp:2504kB local_pcp:1304kB free_cma:0kB [ 779.682239][T20279] lowmem_reserve[]: 0 0 312 312 312 [ 779.687697][T20279] Node 0 Normal free:15600kB min:12504kB low:15628kB high:18752kB reserved_highatomic:0KB active_anon:1272kB inactive_anon:107864kB active_file:24392kB inactive_file:27232kB unevictable:1536kB writepending:68kB present:1048576kB managed:319488kB mlocked:0kB bounce:0kB free_pcp:452kB local_pcp:208kB free_cma:0kB [ 779.717475][T20279] lowmem_reserve[]: 0 0 0 0 0 [ 779.722517][T20279] Node 1 Normal free:716816kB min:41364kB low:51704kB high:62044kB reserved_highatomic:0KB active_anon:34188kB inactive_anon:122792kB active_file:164kB inactive_file:17312kB unevictable:1536kB writepending:24kB present:4194304kB managed:1056768kB mlocked:0kB bounce:0kB free_pcp:1216kB local_pcp:416kB free_cma:0kB [ 779.752430][T20279] lowmem_reserve[]: 0 0 0 0 0 [ 779.757377][T20279] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 1*4096kB (M) = 4096kB 15:06:47 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x2, 0x0, [{0x40000020, 0x0, 0x1}, {0x40000099}]}) [ 779.770977][T20279] Node 0 DMA32: 425*4kB (UME) 134*8kB (M) 305*16kB (UME) 390*32kB (UME) 209*64kB (UME) 28*128kB (M) 10*256kB (UME) 5*512kB (UM) 4*1024kB (UM) 0*2048kB 0*4096kB = 46308kB [ 779.789079][T20279] Node 0 Normal: 86*4kB (E) 191*8kB (UME) 90*16kB (UME) 80*32kB (UME) 24*64kB (ME) 10*128kB (ME) 5*256kB (UE) 5*512kB (UME) 3*1024kB (U) 0*2048kB 0*4096kB = 15600kB [ 779.806715][T20279] Node 1 Normal: 2*4kB (ME) 3*8kB (E) 70*16kB (UME) 38*32kB (UME) 28*64kB (ME) 10*128kB (UME) 5*256kB (M) 5*512kB (UM) 5*1024kB (UME) 1*2048kB (M) 171*4096kB (UM) = 716864kB [ 779.825201][T20279] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 779.834950][T20279] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 779.844458][T20279] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 779.854237][T20279] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 779.863768][T20279] 83042 total pagecache pages [ 779.868509][T20279] 0 pages in swap cache 15:06:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000280)='./file0\x00', 0x3fc, 0x0) flock(r1, 0x1) r2 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) flock(r2, 0x2) [ 779.872829][T20279] Swap cache stats: add 0, delete 0, find 0/0 [ 779.878984][T20279] Free swap = 0kB [ 779.883609][T20279] Total swap = 0kB [ 779.887403][T20279] 2097051 pages RAM [ 779.892055][T20279] 0 pages HighMem/MovableOnly [ 779.896788][T20279] 1519306 pages reserved [ 779.901093][T20279] 0 pages cma reserved 15:06:48 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0x11, 0x0, 0x1}]}) 15:06:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0x10b}]}) 15:06:49 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000023c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x59) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0x40000099}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:06:49 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0xff, 0x0, 0x40, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, @perf_bp={0x0, 0x2}, 0x10000, 0x7000000000, 0x800, 0x5, 0x7, 0x77, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x233c0000}]}]}, 0x50}}, 0x0) 15:06:49 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0x11, 0x0, 0x1}]}) 15:06:49 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, 0x0) 15:06:49 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0x122, 0x0, 0x10}]}) 15:06:49 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0xff, 0x0, 0x40, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, @perf_bp={0x0, 0x2}, 0x10000, 0x7000000000, 0x800, 0x5, 0x7, 0x77, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x233c0000}]}]}, 0x50}}, 0x0) 15:06:49 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0x11, 0x0, 0x1}]}) 15:06:51 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="070000000000000040010000000000000100000000000000500200000000000002"]) 15:06:51 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0x40000002}]}) 15:06:51 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000480)='/dev/hwrng\x00', 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000400)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes128\x00'}, 0x58) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0a0775b0d5e383e5b3c066ff000000e2", 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000005e40)=[{{0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/163, 0xa3}, {&(0x7f00000000c0)=""/3, 0x3}, {&(0x7f0000000200)=""/222, 0xde}, {0x0}, {&(0x7f0000000300)=""/83, 0x53}], 0x5}, 0x3}, {{&(0x7f0000002480)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000002600)=[{0x0}, {&(0x7f0000002580)=""/103, 0x67}, {0x0}, {&(0x7f0000002940)=""/4096, 0x1000}], 0x4, &(0x7f0000002640)=""/69, 0x45}, 0x8000}, {{&(0x7f0000002740)=@ipx, 0x80, &(0x7f0000003b40)=[{0x0}, {&(0x7f0000002800)=""/197, 0xc5}, {&(0x7f0000003940)=""/182, 0xb6}, {&(0x7f0000003a00)=""/241, 0xf1}], 0x4}, 0x101}, {{&(0x7f0000003bc0)=@can, 0x80, 0x0, 0x0, &(0x7f0000003ec0)=""/236, 0xec}, 0x9}, {{0x0, 0x0, &(0x7f0000004180)=[{&(0x7f0000004100)=""/103, 0x67}], 0x1, &(0x7f00000041c0)=""/19, 0x13}, 0x80}, {{&(0x7f0000004200)=@tipc, 0x80, 0x0}, 0x3}], 0x6, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002700)=[{0x1000000000000000, 0x0, &(0x7f00000003c0)=[{0x0}, {&(0x7f0000000140)="0272f8e661d82e2f7a19243ccd5cef7165de1e59931f71baa88f", 0x1a}, {0x0}, {&(0x7f0000002900)="c9", 0x7fffefe6}], 0x2}], 0x7fffefe6, 0x0) 15:06:51 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0x277, 0x0, 0x10}]}) 15:06:51 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0xff, 0x0, 0x40, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, @perf_bp={0x0, 0x2}, 0x10000, 0x7000000000, 0x800, 0x5, 0x7, 0x77, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x233c0000}]}]}, 0x50}}, 0x0) 15:06:51 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f00000043c0)=[{{0x0, 0x0, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000), 0xc4c00) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') preadv(r0, &(0x7f00000017c0), 0x2c2, 0x0, 0x0) 15:06:51 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0xff, 0x0, 0x40, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, @perf_bp={0x0, 0x2}, 0x10000, 0x7000000000, 0x800, 0x5, 0x7, 0x77, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x233c0000}]}]}, 0x50}}, 0x0) 15:06:51 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0x277, 0x0, 0x10}]}) 15:06:51 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0xc0000100}]}) 15:06:51 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000480)='/dev/hwrng\x00', 0x88c00, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) bind$alg(0xffffffffffffffff, &(0x7f0000000400)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes128\x00'}, 0x58) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="0a0775b0d5e383e5b3c066ff000000e2", 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000005e40)=[{{0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000000)=""/163, 0xa3}, {&(0x7f00000000c0)=""/3, 0x3}, {&(0x7f0000000200)=""/222, 0xde}, {0x0}, {&(0x7f0000000300)=""/83, 0x53}], 0x5, &(0x7f0000001480)=""/4096, 0x1000}, 0x3}, {{&(0x7f0000002480)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000002600)=[{&(0x7f0000002500)=""/75, 0x4b}, {&(0x7f0000002580)=""/103, 0x67}, {&(0x7f0000000380)=""/36, 0x24}, {&(0x7f0000002940)=""/4096, 0x1000}], 0x4, &(0x7f0000002640)=""/69, 0x45}, 0x8000}, {{&(0x7f0000003bc0)=@can, 0x80, &(0x7f0000003e80)=[{&(0x7f0000003c40)=""/215, 0xd7}, {&(0x7f0000003d40)=""/3, 0x3}, {&(0x7f0000003d80)=""/216, 0xd8}], 0x3, &(0x7f0000003ec0)=""/236, 0xec}, 0x9}, {{&(0x7f0000003fc0)=@tipc, 0x80, &(0x7f0000004180)=[{&(0x7f0000004040)=""/182, 0xb6}, {&(0x7f0000004100)=""/103, 0x67}], 0x2, &(0x7f00000041c0)=""/19, 0x13}, 0x80}, {{&(0x7f0000004200)=@tipc, 0x80, &(0x7f0000004580)=[{0x0}, {&(0x7f00000042c0)=""/130, 0x82}, {&(0x7f0000004380)=""/82, 0x52}, {&(0x7f0000004400)=""/95, 0x5f}], 0x4, &(0x7f0000004600)=""/196, 0xc4}}], 0x5, 0x1, &(0x7f0000006040)={0x0, 0x3938700}) sendmmsg$alg(r3, &(0x7f0000002700)=[{0x1000000000000000, 0x0, &(0x7f00000003c0)=[{0x0}, {&(0x7f0000000140)="0272f8e661d82e2f7a19243ccd5cef7165de1e59931f71baa88f", 0x1a}, {0x0}, {&(0x7f0000002900)="c9", 0x7fffefe6}], 0x2}], 0x7fffefe6, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r0, 0x942e, 0x0) 15:06:51 executing program 1: clone(0x200000000204a100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) ptrace$setopts(0x4206, r0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) tkill(r0, 0x30) wait4(0x0, 0x0, 0x0, 0x0) 15:06:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0xb, &(0x7f00000000c0)=0x1e, 0x4) 15:06:52 executing program 2: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5409, 0x0) [ 784.068780][T20416] not chained 10000 origins [ 784.071849][T20416] CPU: 1 PID: 20416 Comm: syz-executor.0 Not tainted 5.11.0-rc7-syzkaller #0 [ 784.071849][T20416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 784.071849][T20416] Call Trace: [ 784.071849][T20416] dump_stack+0x21c/0x280 [ 784.071849][T20416] kmsan_internal_chain_origin+0x6f/0x130 [ 784.101899][T20416] ? _raw_spin_unlock_bh+0x4b/0x60 [ 784.101899][T20416] ? release_sock+0x26a/0x2d0 [ 784.101899][T20416] ? hash_sendmsg+0x111b/0x1290 [ 784.101899][T20416] ? __msan_instrument_asm_store+0x25/0x130 [ 784.101899][T20416] ? kmsan_get_metadata+0x116/0x180 [ 784.101899][T20416] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 784.101899][T20416] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 784.101899][T20416] ? kmsan_get_metadata+0x116/0x180 [ 784.101899][T20416] ? kmsan_internal_set_origin+0x85/0xc0 [ 784.101899][T20416] ? kmsan_internal_unpoison_shadow+0x42/0x70 [ 784.101899][T20416] ? _copy_from_user+0x1fd/0x300 [ 784.101899][T20416] ? kmsan_get_metadata+0x116/0x180 [ 784.101899][T20416] __msan_chain_origin+0x57/0xa0 [ 784.101899][T20416] __copy_msghdr_from_user+0x4cf/0xc10 [ 784.101899][T20416] ? kmsan_get_metadata+0x116/0x180 [ 784.101899][T20416] __sys_sendmmsg+0x673/0x1010 [ 784.101899][T20416] ? kmsan_internal_check_memory+0xb1/0x520 [ 784.101899][T20416] ? should_fail+0x72/0x9e0 [ 784.101899][T20416] __se_sys_sendmmsg+0xbd/0xe0 [ 784.101899][T20416] __x64_sys_sendmmsg+0x56/0x70 [ 784.101899][T20416] do_syscall_64+0x9f/0x140 [ 784.101899][T20416] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 784.101899][T20416] RIP: 0033:0x466459 [ 784.101899][T20416] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 784.101899][T20416] RSP: 002b:00007fda152df188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 784.101899][T20416] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 784.101899][T20416] RDX: 000000007fffefe6 RSI: 0000000020002700 RDI: 0000000000000005 [ 784.262012][T20416] RBP: 00000000004bf9fb R08: 0000000000000000 R09: 0000000000000000 [ 784.262012][T20416] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60 [ 784.262012][T20416] R13: 0000000000a9fb1f R14: 00007fda152df300 R15: 0000000000022000 [ 784.262012][T20416] Uninit was stored to memory at: [ 784.262012][T20416] kmsan_internal_chain_origin+0xad/0x130 [ 784.262012][T20416] __msan_chain_origin+0x57/0xa0 [ 784.262012][T20416] __copy_msghdr_from_user+0x4cf/0xc10 [ 784.262012][T20416] __sys_sendmmsg+0x673/0x1010 [ 784.262012][T20416] __se_sys_sendmmsg+0xbd/0xe0 [ 784.262012][T20416] __x64_sys_sendmmsg+0x56/0x70 [ 784.262012][T20416] do_syscall_64+0x9f/0x140 [ 784.262012][T20416] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 784.262012][T20416] [ 784.262012][T20416] Uninit was stored to memory at: [ 784.262012][T20416] kmsan_internal_chain_origin+0xad/0x130 [ 784.262012][T20416] __msan_chain_origin+0x57/0xa0 [ 784.262012][T20416] __copy_msghdr_from_user+0x4cf/0xc10 [ 784.262012][T20416] __sys_sendmmsg+0x673/0x1010 [ 784.262012][T20416] __se_sys_sendmmsg+0xbd/0xe0 [ 784.262012][T20416] __x64_sys_sendmmsg+0x56/0x70 [ 784.262012][T20416] do_syscall_64+0x9f/0x140 [ 784.262012][T20416] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 784.262012][T20416] [ 784.262012][T20416] Uninit was stored to memory at: [ 784.262012][T20416] kmsan_internal_chain_origin+0xad/0x130 [ 784.262012][T20416] __msan_chain_origin+0x57/0xa0 [ 784.262012][T20416] __copy_msghdr_from_user+0x4cf/0xc10 [ 784.262012][T20416] __sys_sendmmsg+0x673/0x1010 [ 784.262012][T20416] __se_sys_sendmmsg+0xbd/0xe0 [ 784.262012][T20416] __x64_sys_sendmmsg+0x56/0x70 [ 784.262012][T20416] do_syscall_64+0x9f/0x140 [ 784.262012][T20416] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 784.262012][T20416] [ 784.262012][T20416] Uninit was stored to memory at: [ 784.262012][T20416] kmsan_internal_chain_origin+0xad/0x130 [ 784.262012][T20416] __msan_chain_origin+0x57/0xa0 [ 784.262012][T20416] __copy_msghdr_from_user+0x4cf/0xc10 [ 784.262012][T20416] __sys_sendmmsg+0x673/0x1010 [ 784.262012][T20416] __se_sys_sendmmsg+0xbd/0xe0 [ 784.262012][T20416] __x64_sys_sendmmsg+0x56/0x70 [ 784.262012][T20416] do_syscall_64+0x9f/0x140 [ 784.262012][T20416] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 784.262012][T20416] [ 784.262012][T20416] Uninit was stored to memory at: [ 784.262012][T20416] kmsan_internal_chain_origin+0xad/0x130 [ 784.262012][T20416] __msan_chain_origin+0x57/0xa0 [ 784.262012][T20416] __copy_msghdr_from_user+0x4cf/0xc10 [ 784.262012][T20416] __sys_sendmmsg+0x673/0x1010 [ 784.262012][T20416] __se_sys_sendmmsg+0xbd/0xe0 [ 784.262012][T20416] __x64_sys_sendmmsg+0x56/0x70 [ 784.262012][T20416] do_syscall_64+0x9f/0x140 [ 784.262012][T20416] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 784.262012][T20416] [ 784.262012][T20416] Uninit was stored to memory at: [ 784.262012][T20416] kmsan_internal_chain_origin+0xad/0x130 [ 784.262012][T20416] __msan_chain_origin+0x57/0xa0 [ 784.262012][T20416] __copy_msghdr_from_user+0x4cf/0xc10 [ 784.262012][T20416] __sys_sendmmsg+0x673/0x1010 [ 784.262012][T20416] __se_sys_sendmmsg+0xbd/0xe0 [ 784.262012][T20416] __x64_sys_sendmmsg+0x56/0x70 [ 784.262012][T20416] do_syscall_64+0x9f/0x140 [ 784.262012][T20416] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 784.262012][T20416] [ 784.262012][T20416] Uninit was stored to memory at: [ 784.262012][T20416] kmsan_internal_chain_origin+0xad/0x130 [ 784.262012][T20416] __msan_chain_origin+0x57/0xa0 [ 784.262012][T20416] __copy_msghdr_from_user+0x4cf/0xc10 [ 784.262012][T20416] __sys_sendmmsg+0x673/0x1010 [ 784.262012][T20416] __se_sys_sendmmsg+0xbd/0xe0 [ 784.262012][T20416] __x64_sys_sendmmsg+0x56/0x70 [ 784.262012][T20416] do_syscall_64+0x9f/0x140 [ 784.262012][T20416] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 784.262012][T20416] [ 784.262012][T20416] Local variable ----msg_sys@__sys_sendmmsg created at: [ 784.262012][T20416] __sys_sendmmsg+0xbd/0x1010 [ 784.262012][T20416] __sys_sendmmsg+0xbd/0x1010 15:06:52 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0x277, 0x0, 0x10}]}) 15:06:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000a00)='nl80211\x00', 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x0, 0x0, 0x0, 0x0, {}, [@NL80211_ATTR_WIPHY_FRAG_THRESHOLD={0x8}, @NL80211_ATTR_WIPHY_DYN_ACK={0x4}]}, 0x20}}, 0x0) sendmsg$NL80211_CMD_SET_COALESCE(r0, &(0x7f0000000200)={0x0, 0xffffffffffffff8c, &(0x7f0000000b00)={&(0x7f0000000040)={0x28, r1, 0x1, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r3}, @void}}}, 0x28}}, 0x0) 15:06:52 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCGPTPEER(r0, 0x4b71, 0x0) 15:06:52 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x104}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) [ 785.923399][T20451] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 15:06:54 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/locks\x00', 0x0, 0x0) lseek(r0, 0x1000000000000003, 0x0) 15:06:54 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0x277, 0x0, 0x10}]}) 15:06:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000003500)={0x0, 0x0, &(0x7f00000034c0)={0x0}, 0x8}, 0x0) 15:06:54 executing program 2: setresuid(0xffffffffffffffff, 0xee01, 0xffffffffffffffff) setresuid(0xee00, 0xee00, 0xffffffffffffffff) 15:06:54 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_ifreq(r0, 0x8918, &(0x7f0000000040)={'ipvlan0\x00', @ifru_addrs=@vsock}) 15:06:54 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETENCODER(r0, 0xc01464a6, &(0x7f00000001c0)) 15:06:54 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8901, &(0x7f0000000000)={'batadv_slave_0\x00'}) 15:06:54 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000040)) 15:06:54 executing program 1: openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x115040, 0x0) 15:06:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000003500)={0x0, 0x0, &(0x7f00000034c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="240000002d000300"/20, @ANYRES32, @ANYBLOB="b007aa922c08a32439f30f"], 0x24}}, 0x0) 15:06:55 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00', r0) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000004c0)={0x5c, 0x0, 0x0, 0x0, 0x0, {}, [{{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5c}}, 0x0) 15:06:55 executing program 4: r0 = socket$inet(0x2, 0xa, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00', r0) 15:06:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0xc, &(0x7f00000000c0)=0x1e, 0x4) 15:06:55 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) unlinkat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x200) 15:06:55 executing program 2: setresuid(0xffffffffffffffff, 0xee01, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) 15:06:55 executing program 1: unshare(0x400) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000400)=ANY=[], 0x60}}, 0x0) 15:06:55 executing program 4: linkat(0xffffffffffffffff, &(0x7f0000000580)='\x00', 0xffffffffffffffff, 0x0, 0x0) 15:06:55 executing program 0: write$usbip_server(0xffffffffffffffff, &(0x7f0000000300)=@ret_submit={{}, 0x0, 0x0, 0x0, 0x2ce, 0x0, 0x0, "", [{0x613, 0x5}, {0x0, 0x8000, 0x8a, 0x3}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {0x0, 0x8}, {0x0, 0x6}, {0x1}, {0x0, 0x7}, {}, {0x0, 0x0, 0x6}, {0x664}, {0x0, 0x0, 0x1}, {}, {0x2}, {}, {}, {}, {}, {}, {0x400}, {}, {0x0, 0x0, 0x2, 0x1ff}, {}, {0x3, 0x7}, {0x8}, {0x0, 0x0, 0x0, 0x8}, {0x0, 0x6}, {0x0, 0x8}, {0x0, 0x0, 0x80}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x0, 0x0, 0x80000000}, {}, {0x0, 0x10001}, {}, {0x0, 0x0, 0x0, 0x7ff80000}, {}, {}, {0x0, 0x0, 0x21a}, {0x0, 0x0, 0x0, 0x4dc0}, {0x9}, {0x2}, {}, {}, {}, {0x0, 0x0, 0x20}, {}, {}, {0x0, 0x0, 0x0, 0x101}, {}, {0x0, 0x6}, {0x0, 0x0, 0x2}, {0x0, 0x0, 0x1f, 0x10001}, {}, {}, {}, {0x0, 0x0, 0x0, 0x8}, {0x6}, {}, {0x0, 0x0, 0x8}, {}, {}, {0x0, 0x50}, {}, {0x0, 0x0, 0x4}, {0xfffff05a}, {}, {}, {}, {}, {0x0, 0x0, 0xeb7}, {0x0, 0x8351}, {}, {}, {0xfffffffb}, {0x6}, {}, {0x0, 0x959}, {0x0, 0x39d0}, {0x0, 0x0, 0x6, 0x101}, {}, {}, {}, {}, {0x0, 0xb4}, {}, {0x0, 0x400}, {}, {}, {}, {}, {}, {}, {}, {0x3}, {0x60}, {0x0, 0x0, 0x0, 0x5}, {}, {}, {0x7}, {}, {}, {0x5}, {0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x70000000}, {}, {}, {0x1}, {0x2}, {}, {}, {}, {}, {}, {0x0, 0x3}, {}, {0x9, 0x3}, {}, {}, {}, {0x0, 0x0, 0x0, 0x7}, {}, {}, {0x0, 0x0, 0x0, 0x4c}, {0x1f}, {0x0, 0x0, 0xd06}, {0x0, 0x0, 0xfffffff7}, {0x0, 0x2}, {0x2, 0x0, 0x0, 0x1}, {}, {0x0, 0x0, 0x0, 0xe36c}, {0x0, 0x0, 0x0, 0x56}, {0x0, 0x0, 0x0, 0x8}, {0x0, 0x20}, {0x0, 0x0, 0x7}, {0x0, 0x2f}, {0x0, 0x10001}, {}, {}, {}, {}, {0x7ff}, {}, {0x8}, {}, {}, {}, {}, {}, {0x0, 0x17, 0x3}, {}, {0x0, 0x32}, {}, {}, {0x0, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {}, {}, {}, {0x2}, {}, {}, {0x0, 0xaf}, {0x3}, {}, {}, {0x0, 0x0, 0x0, 0x10001}, {}, {0x0, 0x0, 0x1}, {0x0, 0x0, 0x3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0xffffffff}, {0x0, 0x0, 0x0, 0x20}, {0x0, 0x0, 0xa64}, {}, {}, {0x0, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x0, 0x0, 0xe7}, {}, {}, {0x0, 0x0, 0x0, 0x9000000}, {}, {}, {0x0, 0x0, 0x0, 0x31}, {}, {}, {}, {0x0, 0x0, 0x0, 0x101}, {}, {0x0, 0x5}, {}, {0x0, 0x0, 0x0, 0x7}, {0x1, 0x0, 0x0, 0x9}, {}, {0x0, 0x0, 0xf1}, {0x0, 0x7}, {0xfffff001}, {0x5cf0b115, 0x1000}, {0xffffff7f}, {0x101}, {0x0, 0x7}, {0x0, 0x0, 0x0, 0x2}, {}, {0x0, 0x0, 0x0, 0xe78}, {0x0, 0x0, 0x0, 0x1}, {}, {0x9457, 0x7e9, 0x678, 0xb}, {0x0, 0x0, 0x7fff}, {}, {}, {0x7fffffff}, {0x0, 0x0, 0x800}, {}, {0x0, 0x2}, {}, {}, {}, {}, {0x0, 0x0, 0x7}, {}, {0x0, 0x0, 0x3}, {0x0, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x0, 0x5eb}, {}, {}, {0x0, 0x0, 0x0, 0x83d9}, {0x0, 0x0, 0xfffffff8}, {}, {}, {0x0, 0x0, 0x5, 0x8c}, {0xf9fc}, {0x8}, {0x0, 0x9}, {}, {0x0, 0x0, 0x8}, {0x9, 0x20}, {0x0, 0x0, 0x40}, {0x9, 0x0, 0x80000001}, {}, {0x9}, {0x0, 0x0, 0x0, 0xd2}, {}, {}, {}, {}, {}, {0x0, 0x80}, {}, {0x8, 0x0, 0x0, 0x2}, {}, {0x0, 0x0, 0x0, 0x7f}, {}, {0x7}, {0x0, 0x0, 0x8000}, {}, {0x0, 0xa9d}, {}, {0x0, 0x0, 0x9}, {}, {0x96f9}, {}, {0x10001}, {}, {}, {}, {0x0, 0x0, 0x81}, {0x6, 0x0, 0x8}, {}, {0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {}, {0x7}, {0xffff}, {0x0, 0x1f}, {0x0, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xbc7b}, {0x0, 0x0, 0x0, 0x9}, {0x0, 0x0, 0x0, 0x5}, {}, {0x0, 0x0, 0x0, 0x3}, {}, {0x8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x3, 0x8}, {}, {}, {0x0, 0x0, 0x1}, {}, {0x0, 0x0, 0x9}, {}, {}, {0x0, 0x7}, {}, {}, {}, {0x0, 0x0, 0x80000001}, {0x0, 0x0, 0x0, 0x5}, {}, {0x0, 0x0, 0x0, 0x8}, {}, {0x0, 0xfffffc00}, {0x2}, {}, {}, {}, {}, {0x0, 0x0, 0xfffffffd}, {}, {}, {}, {}, {0x0, 0x0, 0xe976}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x9}, {}, {}, {0x0, 0x5}, {}, {}, {}, {}, {0x1000}, {0x0, 0x0, 0x0, 0x8}, {}, {}, {0x5, 0x5, 0x1}, {0x2}, {}, {}, {}, {0x0, 0x0, 0x7fff}, {0x4}, {}, {}, {}, {}, {0x1000}, {0x0, 0x0, 0x0, 0x48d}, {0x0, 0x80}, {}, {0x0, 0x100}, {}, {}, {}, {0x0, 0x0, 0xe53c, 0x80}, {}, {}, {0x0, 0x0, 0x40}, {}, {0x4000}, {}, {}, {0x0, 0x0, 0x0, 0x4}, {}, {0x0, 0x0, 0x0, 0x53c}, {0x0, 0x0, 0xffffffff}, {0x8}, {}, {}, {}, {}, {0x5}, {}, {0xfffffffb}, {}, {0xfff}, {0x0, 0xefd8}, {}, {0x5, 0x0, 0x8}, {}, {0x0, 0x0, 0x401}, {0x0, 0x0, 0x3}, {}, {}, {}, {0x0, 0x0, 0x2}, {0x0, 0x0, 0x8000}, {}, {0x0, 0x7}, {0x0, 0x0, 0xeb2, 0xfffffff8}, {}, {}, {}, {0x0, 0xfffffffa}, {0x0, 0x7}, {0x0, 0x0, 0x0, 0x1f}, {0x0, 0x0, 0x400}, {}, {}, {0x2, 0x979, 0x7fffffff}, {0x5b, 0x10000, 0x0, 0x6}, {}, {}, {0x0, 0x400}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x1, 0x5f}, {}, {}, {}, {}, {0x0, 0x0, 0xf25}, {}, {}, {}, {0x0, 0x0, 0x8, 0x8}, {}, {0x0, 0x80000}, {0x0, 0x0, 0x0, 0xff}, {0x0, 0xffffffff}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x5}, {0x0, 0x3ff}, {}, {}, {0x0, 0x7}, {}, {0x8000}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x71}, {0x0, 0x3, 0x3, 0x6}, {0x0, 0x0, 0x640e}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xffff}, {0x0, 0x8}, {}, {}, {0x0, 0x0, 0x0, 0x400}, {}, {}, {}, {}, {0xffffffc1}, {0x0, 0x0, 0x6}, {}, {}, {0x2}, {}, {}, {}, {}, {0x3}, {}, {}, {0x5}, {0x0, 0x0, 0x5}, {}, {0x1}, {}, {}, {0x0, 0x101}, {0x0, 0x3ff, 0x0, 0x1}, {0x0, 0x5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x7fff}, {}, {0x0, 0x0, 0x6}, {0x0, 0x0, 0xffff}, {}, {0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x401}, {}, {}, {0x8}, {0x0, 0x4, 0x7fffffff}, {}, {}, {}, {0x0, 0x0, 0x0, 0x4}, {0x0, 0x0, 0x0, 0x4}, {}, {0x0, 0x1ff}, {}, {0x6ae, 0x0, 0xfffffffa}, {}, {}, {0x1000, 0x0, 0x80}, {0x0, 0x0, 0x7f, 0x7ff}, {0x5, 0x0, 0x8}, {0x0, 0x0, 0x0, 0xff}, {}, {}, {}, {0x0, 0x0, 0x0, 0x5}, {0x0, 0x0, 0x0, 0x5}, {}, {}, {0x0, 0x0, 0x0, 0x400}, {}, {}, {}, {}, {0x80000000}, {}, {0x0, 0x0, 0x0, 0x9910}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x10000}, {}, {0x0, 0x0, 0x0, 0x4}, {0xdd}, {0x0, 0x101}, {0x0, 0x0, 0x80000}, {}, {0x0, 0x3, 0x1}, {}, {0x0, 0x100, 0x0, 0x3f}, {0x0, 0x0, 0x81}, {}, {0x0, 0x40}, {}, {0x0, 0x3}, {}, {}, {0x0, 0x0, 0x0, 0x16400}, {}, {}, {}, {0x0, 0x0, 0x0, 0xfa4}, {0x0, 0xa0a5}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xfffffff9}, {}, {}, {}, {0x0, 0x0, 0x1}, {0x0, 0x0, 0x1, 0x101}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x0, 0xffff238b}, {}, {}, {}, {0x0, 0x3ff}, {}, {0x5}, {}, {}, {}, {}, {}, {}, {0x9}, {0x40}, {}, {}, {}, {}, {0xfffffffc}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xffffff57}, {0x0, 0x4}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xffff}, {0x0, 0x0, 0x1}, {0x1, 0x7}, {}, {}, {}, {0x0, 0x0, 0x5}, {}, {0x0, 0x0, 0x1}, {}, {0x0, 0x0, 0x0, 0x2}, {0x2a0a}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, 0x2d10) io_setup(0xdf9c, &(0x7f00000039c0)) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) 15:06:55 executing program 3: r0 = socket(0x1, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00'}) 15:06:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000003500)={0x0, 0x0, &(0x7f00000034c0)={0x0}, 0x1, 0x0, 0x8100}, 0x0) 15:06:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000001340)=ANY=[], 0x33fe0}}, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000280)={0x64, 0x0, 0x0, 0x0, 0x0, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6}, {0x5}, {0x6}, {0x8}}]}, 0x64}}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000012c0)={&(0x7f0000001480)=ANY=[], 0x94c}}, 0x0) 15:06:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000003500)={0x0, 0x0, &(0x7f00000034c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="4c0000002e00db"], 0x4c}}, 0x4004090) [ 788.239218][T20517] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. 15:06:56 executing program 4: prctl$PR_SET_MM_MAP_SIZE(0x22, 0xf, 0x0) 15:06:56 executing program 3: setresuid(0xffffffffffffffff, 0xee01, 0xffffffffffffffff) setreuid(0x0, 0xffffffffffffffff) 15:06:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000003500)={0x0, 0x0, &(0x7f00000034c0)={0x0}, 0x300}, 0x0) 15:06:56 executing program 0: shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x5000) madvise(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x9) 15:06:56 executing program 1: prctl$PR_SET_MM_MAP_SIZE(0x1a, 0xf, 0x0) 15:06:56 executing program 2: setresuid(0xffffffffffffffff, 0xee01, 0xffffffffffffffff) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) 15:06:56 executing program 4: setresuid(0xffffffffffffffff, 0xee01, 0xffffffffffffffff) setresuid(0xffffffffffffffff, 0x0, 0xee01) 15:06:57 executing program 3: r0 = socket(0x1, 0x5, 0x0) bind$netlink(r0, &(0x7f0000000000), 0xc) 15:06:57 executing program 5: setresuid(0xffffffffffffffff, 0xee01, 0xffffffffffffffff) setresuid(0x0, 0xee00, 0x0) 15:06:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0xa, &(0x7f00000000c0)=0x1e, 0x4) 15:06:57 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x5421, &(0x7f00000028c0)=""/153) 15:06:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f000000a6c0)=@newtaction={0x48, 0x30, 0x1, 0x0, 0x0, {}, [{0x34, 0x1, [@m_vlan={0x11, 0x1, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) 15:06:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f000000a6c0)=@newtaction={0x14, 0x12, 0x1}, 0x14}}, 0x0) 15:06:57 executing program 3: setresuid(0xffffffffffffffff, 0xee01, 0xffffffffffffffff) socket$inet(0xa, 0x3, 0x6) 15:06:57 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x400445a0, 0x0) 15:06:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, 0x0, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f00000000c0)=0x1e, 0x4) 15:06:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000400)={0x60, 0x0, 0x0, 0x0, 0x0, {}, [{{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8}}, {0x8}}}]}}]}, 0xec0}}, 0x0) 15:06:57 executing program 2: prctl$PR_SET_MM_MAP_SIZE(0x21, 0xf, 0x0) 15:06:57 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f000000a6c0)=@newtaction={0x48, 0x30, 0x1, 0x0, 0x0, {}, [{0x34, 0x1, [@m_vlan={0x30, 0x1, 0x0, 0x0, {{0x2c, 0x1, 'vlan\x00'}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) 15:06:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x89b1, &(0x7f0000000000)={'veth1\x00', @ifru_data=0x0}) 15:06:58 executing program 1: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000003500)={0x0, 0x0, &(0x7f00000034c0)={0x0}, 0x38}, 0x4048031) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4) unlinkat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x200) 15:06:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000003500)={0x0, 0x0, &(0x7f00000034c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="4c0000002e00dbdf2500000000010000000000003e9a792b3cfe4596cacbd84626ecb20316"], 0x4c}}, 0x0) 15:06:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@ipv6_delroute={0x2c, 0x19, 0x309, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0xfd}, [@RTA_OIF={0x8}, @RTA_EXPIRES={0x8}]}, 0x2c}}, 0x0) 15:06:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000200)=0xfffffffc, 0x4) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000001340)=ANY=[], 0x33fe0}}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000012c0)={&(0x7f0000001480)=ANY=[], 0x94c}}, 0x0) 15:06:58 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000400)={0x60, 0x0, 0x0, 0x0, 0x0, {}, [{{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8}}, {0x8}}}]}}]}, 0x33fe0}}, 0x0) 15:06:58 executing program 4: r0 = socket(0x1, 0x5, 0x0) bind$netlink(r0, 0x0, 0x0) [ 790.489370][T20571] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 15:06:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f000000a6c0)=@newtaction={0x48, 0x1c, 0x1, 0x0, 0x0, {}, [{0x34, 0x1, [@m_vlan={0x30, 0x0, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) 15:06:58 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40084503, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, "5b24c767e5f0805254970c2cf47f8f974d69da8751eba9ec4827c0d982e44d95"}) 15:06:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000003500)={0x0, 0x0, &(0x7f00000034c0)={&(0x7f000000a680)=@deltfilter={0x24}, 0xfffffdef}}, 0x0) [ 790.869211][T20580] netlink: 'syz-executor.1': attribute type 6 has an invalid length. 15:06:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getdents64(r1, &(0x7f00000000c0)=""/109, 0x6d) 15:06:59 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x42) write$cgroup_netprio_ifpriomap(r0, 0x0, 0x11) 15:06:59 executing program 2: setresuid(0xffffffffffffffff, 0xee01, 0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz0\x00', 0x200002, 0x0) 15:06:59 executing program 1: setresuid(0xffffffffffffffff, 0xee01, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000180)='devlink\x00', r0) 15:06:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@ipv6_delroute={0x2c, 0x19, 0x309, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x7}, [@RTA_OIF={0x8}, @RTA_EXPIRES={0x8}]}, 0x2c}}, 0x0) 15:06:59 executing program 5: setresuid(0xffffffffffffffff, 0xee01, 0xffffffffffffffff) setresuid(0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff) 15:06:59 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0206416, &(0x7f0000000080)) 15:06:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0)={0x0, 0x9}, 0x14) 15:06:59 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0xc0189436, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, "5b24c767e5f0805254970c2cf47f8f974d69da8751eba9ec4827c0d982e44d95"}) 15:06:59 executing program 2: socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='fd/3\x00') 15:06:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={0x0, 0xf0ff7f00000000}, 0x1, 0x0, 0x5000}, 0x0) 15:07:00 executing program 5: setresuid(0xffffffffffffffff, 0xee01, 0xffffffffffffffff) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) 15:07:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x89b0, &(0x7f00000000c0)={'lo\x00', @ifru_ivalue}) 15:07:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f000000a6c0)=@newtaction={0x18, 0x31, 0x1, 0x0, 0x0, {}, [{0x4}]}, 0x18}}, 0x0) 15:07:00 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x42) write$cgroup_netprio_ifpriomap(r0, &(0x7f0000000080)={'bridge_slave_1'}, 0xffffffffffffff59) 15:07:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x200}, 0x14) 15:07:00 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$DEVLINK_CMD_SB_POOL_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0xa0}}, 0x40085) 15:07:00 executing program 4: unshare(0x400) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00'}) 15:07:00 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40044590, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, "5b24c767e5f0805254970c2cf47f8f974d69da8751eba9ec4827c0d982e44d95"}) 15:07:00 executing program 3: prctl$PR_SET_MM_MAP_SIZE(0x8, 0xf, 0x0) 15:07:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x220422}, 0xc, &(0x7f0000000040)={&(0x7f0000003540)=@newtaction={0xec4, 0x30, 0x0, 0x0, 0x0, {}, [{0x37c, 0x1, [@m_xt={0x108, 0x0, 0x0, 0x0, {{0x7, 0x1, 'xt\x00'}, {0x14, 0x2, 0x0, 0x1, [@TCA_IPT_INDEX={0x8}, @TCA_IPT_HOOK={0x8}]}, {0xcd, 0x6, "5c2e38587ed1d89c8b18061a97a72c577f127e748f65f994a5de9523bac71ce644078110d120d203c69e99fdc8122a8c86365eff4c82705e76a8fafc09ca763087af7db4adac6698aeae05e128bd1f1e9410af47f974ae851d69d55a331a4dc28d6042c024206e03ae984033193713d40f1ac3635e3ac6c4cb9e71cbf1d2bde37097529d79eef4f5ebefc6451111411ce0821b91753ac0d0b41ec1b503b46f32664f04170640033a4f6db686a14b524607376d80ab331c3e9d146b39d647851af545b04693103969eb"}, {0xc}, {0xc}}}, @m_ife={0xa8, 0x0, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x7c, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c}, @TCA_IFE_DMAC={0xa, 0x3, @multicast}, @TCA_IFE_DMAC={0xa, 0x3, @multicast}, @TCA_IFE_PARMS={0x1c}, @TCA_IFE_PARMS={0x1c}, @TCA_IFE_SMAC={0xa, 0x4, @dev}]}, {0x5, 0x6, 'L'}, {0xc}, {0xc}}}, @m_mpls={0x5c, 0x0, 0x0, 0x0, {{0x9, 0x1, 'mpls\x00'}, {0x4}, {0x2d, 0x6, "11fe9774396e35a3ce77fc504010518592a40e6b7b5821b80052db06930ef66b9817962ed5aa0a5fce"}, {0xc}, {0xc}}}, @m_ife={0x16c, 0x0, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x9c, 0x2, 0x0, 0x1, [@TCA_IFE_METALST={0x38, 0x6, [@IFE_META_PRIO={0x4, 0x3, @void}, @IFE_META_SKBMARK={0x8}, @IFE_META_SKBMARK={0x4, 0x1, @void}, @IFE_META_SKBMARK={0x8}, @IFE_META_PRIO={0x8}, @IFE_META_TCINDEX={0x4, 0x5, @void}, @IFE_META_TCINDEX={0x4, 0x5, @void}, @IFE_META_SKBMARK={0x8}, @IFE_META_SKBMARK={0x4, 0x1, @void}]}, @TCA_IFE_SMAC={0xa, 0x4, @remote}, @TCA_IFE_PARMS={0x1c}, @TCA_IFE_TYPE={0x6}, @TCA_IFE_TYPE={0x6}, @TCA_IFE_DMAC={0xa, 0x3, @link_local}, @TCA_IFE_PARMS={0x1c}]}, {0xa9, 0x6, "411dec57711eccd851f26703ebb5101ccaa0f64e949d2e99ead78548ca2b14bdaad10e48db0800efee96f95a4be152ff1a7bdae45e6f7bfb2ed7f9d3a14fb461017b02b874ce6caa87e28900d36ed6cf099840f12bf109334ccd08b943775269574dbd5fa559fdf687e3446ca2de5b373cef114358e439a0a16af50f6e272a150db1ea119008029e966bec478dd6cc9d5fda4f3e3ca11db579677e765a001d17136922d9a2"}, {0xc}, {0xc}}}]}, {0x4}, {0x6e0, 0x1, [@m_police={0xec, 0x0, 0x0, 0x0, {{0xb, 0x1, 'police\x00'}, {0xc, 0x2, 0x0, 0x1, [[@TCA_POLICE_AVRATE={0x8}]]}, {0xb5, 0x6, "70e54afb428f7733f791e3e7560c1b698544931631707d7a896049a34d6237208d6dfcb1eaa42f3ed1a90249d54bf26c007ff2a7eccf4d5681fa95032744398097b9abc3d0fa359518a8f8f2c01ac134be4a52e0aeaf8b4cb4699ee20ccb0d82ba7b55937a617ba1f37ba197014481d96866980eb39ac4d8127ba258c56253c38067105de0d8618a922a0eb861f59dc2b397fb1d08c0c9923d9dc4179c0d677ab1b97fa7f30bca33528e148a4ca6fbf2ba"}, {0xc}, {0xc}}}, @m_connmark={0x138, 0x0, 0x0, 0x0, {{0xd, 0x1, 'connmark\x00'}, {0x58, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c}, @TCA_CONNMARK_PARMS={0x1c}, @TCA_CONNMARK_PARMS={0x1c}]}, {0xb1, 0x6, "53bfa650b30c2a6f11ed736053b36d08f66656a71e0e22d0b7fb353d4d849c5d5a45ce6d820d24d2c942185ecfc7f783ed76ef0b6010189d98f56a9803eea08c103f14ccfd0ee37d6a2e4d149d92adbc536182611baf9433ab70f201af1570fd185d60ddf3b675cacb605b2f6252a08ff2b57be7d69d9cefcfa13518edb0747bd507572b7e569dcf1c1b51e0f308f1c84716fd5dde4d1aec56033f518f12eb29d100d8bf33e16c58dd8cc7e5de"}, {0xc}, {0xc}}}, @m_csum={0x118, 0x0, 0x0, 0x0, {{0x9, 0x1, 'csum\x00'}, {0x90, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c}, @TCA_CSUM_PARMS={0x1c}, @TCA_CSUM_PARMS={0x1c}, @TCA_CSUM_PARMS={0x1c}, @TCA_CSUM_PARMS={0x1c}]}, {0x5d, 0x6, "d0085eed4d7f08f5847205125b8b37e8404c285910f892a328e3862a8c6e09b06c9aa3bb302587a8334b1ec6383d26d8fbd9106351f73e08f2af1340c3bed21200c9ae52382ad177e1aa00b6ea03c510b67898bf27202a38fa"}, {0xc}, {0xc}}}, @m_sample={0x9c, 0x0, 0x0, 0x0, {{0xb, 0x1, 'sample\x00'}, {0xc, 0x2, 0x0, 0x1, [@TCA_SAMPLE_RATE={0x8}]}, {0x65, 0x6, "df15651e8b63925421fef44ebf2f829c338e8bcd00adc9bcec6edb1f95fdf6c9d043ffec04efda4c465ffc62fc467d8eb49282d504c5cff601f8711163e581316edea5d0568a0020f38710fb8871d2418db577829d36e8295684aee4810cfe5155"}, {0xc}, {0xc}}}, @m_vlan={0x128, 0x0, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x40, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PRIORITY={0x5}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6}, @TCA_VLAN_PARMS={0x1c}]}, {0xbd, 0x6, "4a3cb69a736236ecf570e2a058ffd6ffeefc4d851e9de96d88670e571232066ced69fd1d9862985ac2be5ad3d227d2f9317634109b540d7a0d53e8087f7ddc0deff75849157859db4759e28cac66f5edd5d9cbd3869c5b9e245def8ee61351bcca562c0de4a6872edd05831616fad8df9e8086a87434088d34061a76db28edb17897820c51002561ce70a8ff868b37f19d3593213cd648722f4a68eb75814299452616736be8cf6ef26d15b7445121fb85356a36253be641c9"}, {0xc}, {0xc}}}, @m_gact={0xd0, 0x0, 0x0, 0x0, {{0x9, 0x1, 'gact\x00'}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18}]}, {0x89, 0x6, "e43479d5506c4099bdc10e4e4eccef21975adff00113e9f06fb37ab4953021c07becf655f557893af18e0401f510d58ebe56c8f6b667ea2dadbce59f0d5fa047a63827c7312f701ed7a910b4b8a2eecf762c15444c6b09ac38733f3404d8ad19b6c72b9962445fb8f4049f110b07882a8c2854d9a55ec42040046582ba1bbd11d0a9903efc"}, {0xc}, {0xc}}}, @m_ipt={0x10c, 0x0, 0x0, 0x0, {{0x8, 0x1, 'ipt\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_IPT_INDEX={0x8}, @TCA_IPT_TABLE={0x24, 0x1, 'security\x00'}]}, {0xb5, 0x6, "94e80037f64f5bf6fc0a346771dd59bcbc60b7e4bfe0ca90110bb4f0830b2e1ea677fdf4df406d592207bd694e70d0e4b084b8e6d2393d8882b6ef8a7b69b07abacf7b739047967dbb5ae13a3b6d7d81ab513e41fb7d15779aa65af8c2ec54a8cd7a74a2de17ab96a677faed392b5cceafae23c29c9c24356964565901434c96b888d980c7072e5f1a242e2e51a21077378583287752d7f6163590d8979d326fd7119afdc0343d902e29153a661981967d"}, {0xc}, {0xc}}}]}, {0x450, 0x1, [@m_police={0x44c, 0x0, 0x0, 0x0, {{0xb, 0x1, 'police\x00'}, {0x408, 0x2, 0x0, 0x1, [[@TCA_POLICE_PEAKRATE={0x404}]]}, {0x19, 0x6, "e2de1627ad55b67ed0aa36c852c89534c087617ad3"}, {0xc}, {0xc}}}]}]}, 0xec4}}, 0x0) 15:07:00 executing program 0: fanotify_mark(0xffffffffffffffff, 0x0, 0xbb4214c02068c0a2, 0xffffffffffffffff, 0x0) 15:07:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000001340)=ANY=[], 0x33fe0}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SPLIT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x44, 0x0, 0x0, 0x0, 0x0, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}}]}, 0x33fe0}}, 0x0) 15:07:01 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80004519, 0x0) 15:07:01 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40044591, 0x0) 15:07:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000001340)=ANY=[], 0x33fe0}}, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x9, 0x4) sendmsg$DEVLINK_CMD_PORT_SPLIT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x44, 0x0, 0x0, 0x0, 0x0, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}}]}, 0x44}}, 0x0) 15:07:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000003500)={0x0, 0x0, &(0x7f00000034c0)={&(0x7f0000000040)=@gettfilter={0x24, 0x2e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {}, {0x0, 0x4}}}, 0x24}}, 0x0) 15:07:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000003500)={0x0, 0x0, &(0x7f00000034c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="240000002d000300"/20, @ANYRES32=r0], 0x24}}, 0x0) 15:07:01 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001bc0)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001780)=[@pktinfo={{0x24, 0x29, 0x32, {@private1}}}], 0x28}, 0x0) 15:07:01 executing program 4: setresuid(0xee00, 0xee01, 0x0) setresuid(0x0, 0x0, 0x0) 15:07:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[@ANYBLOB="ec010040"], 0x1ec}}, 0x0) 15:07:01 executing program 0: syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0xe8da, 0x4000) 15:07:01 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8927, &(0x7f0000000000)={'batadv_slave_0\x00'}) 15:07:01 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80004507, 0x0) 15:07:02 executing program 2: r0 = socket(0x1, 0x5, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 15:07:02 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x4b47, 0x0) 15:07:02 executing program 0: setresuid(0xffffffffffffffff, 0xee01, 0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/time_for_children\x00') 15:07:02 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80044501, 0x0) 15:07:02 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x42) write$cgroup_netprio_ifpriomap(r0, &(0x7f0000000080), 0x3) 15:07:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f000000a6c0)=@newtaction={0x14, 0x1e, 0x1}, 0x14}}, 0x0) 15:07:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000003500)={0x0, 0x0, &(0x7f00000034c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="4c0000002e00dbdf2500000000010000000000003e9a792b3cfe4596cacbd84626ecb2031698"], 0x4c}}, 0x0) 15:07:02 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80044584, 0x0) 15:07:02 executing program 0: setresuid(0xffffffffffffffff, 0xee01, 0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') [ 794.897146][T20680] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. 15:07:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000003500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f000000a680)=@deltfilter={0x24}, 0xffffffffffffff04}}, 0x0) 15:07:03 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f00000003c0)={0x0, 0x2, 0x0, 0x0, "5b24c767e5f0805254970c2cf47f8f974d69da8751eba9ec4827c0d982e44d95"}) 15:07:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f000000a6c0)=@newtaction={0x48, 0x30, 0x1, 0x0, 0x0, {}, [{0x34, 0x1, [@m_vlan={0x30, 0x1, 0x0, 0x0, {{0x9, 0x7, 'vlan\x00'}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) 15:07:03 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x3, &(0x7f00000000c0)=0x1e, 0x4) 15:07:03 executing program 2: r0 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(\x00'/118, 0x0) write(r0, &(0x7f00000004c0)='1', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000240), 0x463) add_key(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 15:07:03 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80084504, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, "5b24c767e5f0805254970c2cf47f8f974d69da8751eba9ec4827c0d982e44d95"}) 15:07:03 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000400)={0x60, 0x0, 0x0, 0x0, 0x0, {}, [{{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8}}, {0x8}}}]}}]}, 0xfffffdef}}, 0x0) 15:07:03 executing program 5: prctl$PR_SET_MM_MAP_SIZE(0x2a, 0xf, 0x0) 15:07:03 executing program 1: prctl$PR_SET_MM_MAP_SIZE(0x1d, 0xf, 0x0) 15:07:03 executing program 4: setresuid(0xee01, 0xee01, 0xffffffffffffffff) setfsuid(0x0) 15:07:04 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$DEVLINK_CMD_SB_POOL_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0xa0}}, 0x0) 15:07:04 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80004518, 0x0) 15:07:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000000)={'lo\x00', @ifru_names}) 15:07:04 executing program 1: unshare(0x400) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) 15:07:04 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8903, &(0x7f0000000000)={'batadv_slave_0\x00'}) 15:07:04 executing program 4: setresuid(0xffffffffffffffff, 0xee01, 0xffffffffffffffff) getresuid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) setresuid(r0, 0x0, 0x0) 15:07:04 executing program 0: prctl$PR_SET_MM_MAP_SIZE(0x15, 0xf, 0x0) 15:07:04 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x80044584, &(0x7f00000028c0)=""/153) 15:07:05 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8918, &(0x7f00000001c0)={'ipvlan0\x00', @ifru_data=0x0}) 15:07:05 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x0) read$char_usb(r0, &(0x7f00000000c0)=""/4096, 0x1000) 15:07:05 executing program 2: prctl$PR_SET_MM_MAP_SIZE(0x19, 0xf, 0x0) 15:07:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8916, &(0x7f0000000000)={'veth1_vlan\x00', @ifru_map}) 15:07:05 executing program 5: perf_event_open(&(0x7f0000000040)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:07:05 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40044590, 0x0) 15:07:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000003500)={0x0, 0x2, &(0x7f00000034c0)={0x0}, 0x300}, 0x0) 15:07:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f000000a6c0)=@newtaction={0x48, 0x30, 0x1, 0x0, 0x0, {}, [{0x34, 0x1, [@m_vlan={0xf, 0x1, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) 15:07:06 executing program 0: write$usbip_server(0xffffffffffffffff, 0x0, 0x0) 15:07:06 executing program 4: write$usbip_server(0xffffffffffffffff, &(0x7f0000000300)=@ret_submit={{}, 0x0, 0x0, 0x0, 0x2ce, 0x0, 0x0, "", [{}, {}, {}, {}, {0x0, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {}, {0x7ff, 0x0, 0x0, 0xd13}, {}, {}, {0x1}, {0x0, 0x7}, {}, {0x0, 0x3}, {}, {}, {0x0, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x1}, {0x0, 0x0, 0x5}, {}, {0x5}, {0x0, 0x5}, {0x1, 0x8}, {0x3, 0x0, 0x0, 0xffff}, {}, {0x6}, {}, {0x0, 0x0, 0x0, 0x3}, {0x0, 0x8000, 0x0, 0xfff}, {}, {0x8f}, {0x0, 0x0, 0xc88}, {}, {0x0, 0x0, 0x2c0}, {}, {0x8, 0x2, 0x6}, {0x0, 0x0, 0x5}, {}, {}, {0x0, 0x9}, {0x0, 0x10001}, {}, {0x0, 0x0, 0x9}, {0x0, 0x0, 0x0, 0x7}, {}, {0x2}, {0x0, 0x0, 0xf08}, {0x0, 0x0, 0x0, 0x44}, {}, {}, {}, {0x0, 0x0, 0x0, 0x3}, {0x0, 0x0, 0x20}, {0x9, 0x0, 0x0, 0x7addfdfe}, {}, {}, {0x0, 0x4}, {}, {0x0, 0x0, 0x2}, {}, {}, {0x0, 0x0, 0x0, 0x3}, {}, {0x0, 0x5}, {}, {0x5}, {}, {}, {}, {0x0, 0x50}, {}, {}, {0x0, 0x0, 0x6}, {0x2}, {0x0, 0x0, 0x0, 0x3}, {}, {0x0, 0xfffffff8, 0xc13}, {}, {0x0, 0x0, 0x2}, {}, {}, {0xfffffffb}, {}, {0xdfc2}, {0x0, 0x0, 0x0, 0x80}, {}, {0x0, 0x0, 0x6}, {}, {0x0, 0x101}, {}, {}, {0x0, 0x0, 0x0, 0x1007}, {0x5}, {0x7fff}, {}, {0x40, 0xf4, 0x3}, {}, {0xc308fe9c, 0x2}, {0x0, 0x3}, {}, {0xbfb}, {}, {0x0, 0x7fffffff}, {}, {0x0, 0x8}, {0x0, 0x0, 0xd2e}, {0x7}, {}, {}, {}, {}, {0x0, 0x7fff}, {}, {0x0, 0x4, 0x3f}, {}, {0x0, 0x0, 0x0, 0x401}, {0x0, 0x7cb7}, {}, {}, {}, {}, {0x0, 0x0, 0x80000000}, {}, {0x0, 0x5}, {0x400}, {}, {0x0, 0x9, 0x10001}, {}, {}, {}, {0x4204195e, 0x9, 0x0, 0x2}, {0x0, 0x3}, {0x0, 0x0, 0x1}, {}, {0x0, 0xffffffff}, {}, {}, {}, {0x5}, {0x0, 0x0, 0x9}, {0x0, 0x0, 0xd06}, {0x8}, {}, {}, {0x0, 0x5, 0x36e}, {}, {0x0, 0x0, 0x0, 0x56}, {}, {}, {0x0, 0x0, 0x7}, {0x6, 0x0, 0x0, 0x6}, {}, {0x0, 0x0, 0x3}, {0x10000}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x2}, {}, {0x0, 0x0, 0x0, 0xfffffff9}, {0x0, 0x0, 0x8001}, {0x0, 0xfff}, {0x0, 0x0, 0x0, 0x2}, {}, {0x1f}, {}, {}, {}, {0x7}, {0x0, 0x0, 0x7}, {}, {0x0, 0x3}, {0x0, 0x0, 0x0, 0x8}, {0x0, 0x0, 0x0, 0x7f}, {0x0, 0x0, 0x0, 0x7ff}, {0x0, 0x0, 0x0, 0x7}, {}, {0x0, 0x0, 0x7}, {}, {}, {0x0, 0xc68}, {}, {0x0, 0x8f74}, {}, {}, {0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x8}, {0x0, 0xffffffff}, {0x0, 0x10001, 0x0, 0x20}, {0x0, 0x0, 0x0, 0xabf}, {0x1, 0x0, 0x0, 0x6}, {0x0, 0x2}, {0xffff}, {0x0, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {0x0, 0x20}, {}, {}, {}, {0x0, 0x1f}, {}, {0x0, 0x80000000}, {}, {0x0, 0x0, 0x6e07}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x9}, {}, {0x9}, {0x0, 0x7, 0x0, 0xfcb}, {0x0, 0x0, 0x48}, {0x0, 0x0, 0x5}, {}, {}, {}, {}, {}, {0x429e, 0x0, 0x401}, {0x0, 0xfffffff8}, {0x0, 0x0, 0x8}, {0x9457}, {0xff}, {}, {0x0, 0x0, 0x1}, {0x0, 0x0, 0x0, 0x1}, {}, {}, {0x0, 0x2, 0x0, 0x200}, {}, {0x9}, {}, {0x0, 0xffffffff}, {0x0, 0x3f}, {}, {0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x0, 0x0, 0x1, 0xb8b1}, {0x0, 0x5eb}, {0x0, 0x101}, {}, {}, {}, {}, {0x0, 0x0, 0x8}, {}, {0xf9fc}, {}, {0x0, 0x0, 0x0, 0x100}, {0x0, 0x3}, {0x0, 0x4, 0x8}, {0x9}, {}, {}, {}, {}, {0x1}, {0x0, 0x0, 0x547}, {0x4, 0xa6c3969}, {}, {}, {0x9}, {}, {}, {0x8, 0x80, 0x7f}, {}, {}, {0x0, 0x243, 0x0, 0xc0cf}, {0x7, 0x0, 0x5}, {0x0, 0x200}, {0x0, 0x1}, {0x0, 0x0, 0x9, 0x2}, {0x0, 0x0, 0x0, 0x5}, {0x9}, {0x0, 0x0, 0x3}, {}, {0x0, 0x0, 0x0, 0x5}, {}, {0x401, 0x4002}, {}, {}, {0x0, 0x0, 0x81}, {0x0, 0x0, 0x8}, {}, {0x0, 0x0, 0x9}, {0x0, 0x0, 0x0, 0x401}, {}, {0x0, 0xffff0001, 0x0, 0x4}, {}, {}, {}, {}, {0x0, 0x1ff}, {0x0, 0x0, 0xffff0000}, {0x0, 0x0, 0x401}, {0x8001, 0x545}, {0x80000001}, {0x0, 0x9, 0x17, 0x3}, {0x5}, {0x0, 0x7}, {}, {0x0, 0x20}, {0x0, 0x0, 0x0, 0x9}, {}, {0x0, 0xdd9}, {}, {0x0, 0x4, 0x8c}, {0x0, 0x0, 0x0, 0x400}, {0x1be3}, {0x9, 0x5, 0x7}, {0x9, 0x0, 0x0, 0x6}, {0x0, 0x0, 0x7}, {0x0, 0x40, 0x5}, {}, {0x0, 0x0, 0x0, 0x7fff}, {0x0, 0x0, 0xa1}, {0x0, 0x0, 0x6}, {0x0, 0x0, 0x4e}, {0x6}, {}, {0xfffffffe, 0x0, 0x0, 0x1ff}, {0x0, 0x0, 0x0, 0x9}, {0x0, 0x200, 0x9}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x200}, {0x0, 0x0, 0x0, 0x10000}, {}, {}, {0x9}, {}, {}, {0x2, 0xfffffc00, 0x0, 0x4}, {0x0, 0x3}, {0x0, 0x3}, {}, {}, {0x0, 0xac}, {}, {0x0, 0x0, 0x0, 0x7b9}, {0x0, 0x4, 0x1}, {}, {0x8}, {}, {}, {}, {0x0, 0x9}, {}, {}, {0x0, 0x0, 0xfffffffa}, {}, {}, {}, {0x9, 0x5, 0xa9}, {}, {}, {}, {0x0, 0x0, 0x0, 0x1}, {0x0, 0x1}, {0x0, 0x0, 0xfffffffd}, {}, {0x0, 0x0, 0x6}, {}, {0x0, 0xfffffffb}, {0x5}, {}, {}, {0x3, 0x5, 0x0, 0x3}, {0x0, 0x1eb5}, {}, {}, {0x0, 0x5}, {}, {0x0, 0x0, 0x10000}, {0x1000}, {0xcc83}, {0x0, 0x0, 0xfffffffd}, {0x0, 0x100}, {}, {}, {}, {0x0, 0x0, 0xe53c}, {}, {}, {}, {}, {}, {0x7fff, 0x6}, {0x0, 0x0, 0x4d}, {0x0, 0x0, 0x5}, {0x0, 0x4, 0x0, 0xffffffe0}, {0x2, 0x7, 0x0, 0x53c}, {0x0, 0x0, 0x0, 0x6}, {0x0, 0x0, 0x1000}, {}, {0x6}, {}, {0x8a2, 0x0, 0x0, 0x7}, {}, {0x4, 0x0, 0xd99}, {}, {}, {0xfff, 0x0, 0x0, 0x7}, {}, {0x0, 0x0, 0x3}, {0x0, 0x0, 0x8}, {0x0, 0x0, 0x0, 0xd1}, {}, {}, {}, {0x0, 0x4}, {0x0, 0x1f}, {}, {}, {0x8, 0x0, 0x40}, {0x0, 0x7, 0x8, 0x80}, {0x0, 0x0, 0x0, 0xfffffff8}, {0x0, 0x0, 0x0, 0x9}, {}, {}, {0x0, 0xfffffffa}, {0x3}, {0x0, 0x0, 0x20}, {0xffff5b09}, {}, {0x0, 0x9}, {}, {}, {0x0, 0x0, 0x0, 0x1}, {0x0, 0x6, 0x4}, {0x0, 0x0, 0x0, 0x7ff}, {}, {}, {}, {0x0, 0x0, 0x0, 0x10000}, {}, {0x0, 0x4}, {}, {}, {}, {0x5, 0x0, 0x0, 0x968}, {}, {}, {0x600000}, {0x0, 0x6}, {}, {}, {}, {}, {0x401}, {0x0, 0xffffffff}, {0x0, 0x0, 0x11e}, {0x8000}, {0x0, 0x9}, {}, {}, {0x0, 0x0, 0xffffffff}, {0x0, 0x0, 0x2a13, 0x1}, {0x0, 0x0, 0x0, 0x100}, {0x100, 0x0, 0x0, 0x80000000}, {0x0, 0x0, 0x6, 0xfffffffb}, {}, {0x0, 0x4, 0x5}, {}, {}, {0x0, 0x0, 0x10000}, {0x0, 0x0, 0x0, 0xfffffc00}, {}, {}, {0x0, 0x0, 0x3}, {}, {0x80000001}, {}, {}, {}, {}, {0xc1}, {}, {0x0, 0x0, 0x0, 0x2}, {}, {}, {}, {0x0, 0x0, 0x3, 0x1}, {0x0, 0xffff8000}, {0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0xffffffff}, {}, {}, {0x0, 0x0, 0x0, 0x8}, {}, {0x1ff}, {0x9, 0x0, 0x3af, 0x2}, {}, {}, {0x4, 0x81, 0x4}, {}, {0x5}, {0x316f}, {0x0, 0x1}, {}, {0x9, 0x5}, {}, {}, {0x3}, {0x0, 0x0, 0x0, 0x9}, {}, {0x7}, {0x7}, {}, {}, {0x0, 0x0, 0x86, 0x5}, {0xfffffffb, 0x0, 0x9}, {}, {0x0, 0x9}, {}, {}, {0x0, 0x1f}, {0x6}, {}, {0x0, 0x2, 0xfdac}, {0x0, 0x2, 0x80000001, 0x156}, {}, {}, {}, {}, {0x0, 0xcd7c}, {}, {0x0, 0x0, 0x0, 0x3f}, {0x5}, {0x0, 0x60712d7c}, {}, {0x0, 0x0, 0xc6f8}, {0x0, 0x0, 0x0, 0x3}, {0x0, 0x0, 0x0, 0x2}, {}, {0x0, 0x0, 0xffffffff}, {0x0, 0x2}, {}, {0x0, 0x0, 0x0, 0x1703}, {}, {}, {0x0, 0x200}, {0x2}, {0x0, 0x0, 0x1}, {}, {}, {}, {0x0, 0x0, 0x3f, 0x5e5d}, {0x0, 0x0, 0x0, 0x2}, {0xfffff000}, {}, {0x1000, 0x0, 0x0, 0x20}, {0x0, 0x0, 0x0, 0x7ff}, {0x0, 0x0, 0x0, 0x6}, {}, {0x0, 0x1ff, 0x2}, {}, {0x7fe00000}, {0x0, 0x0, 0x0, 0x5}, {0xfffeffff}, {}, {0x0, 0x7f}, {0x0, 0x6e, 0x8}, {0x0, 0x7, 0x2}, {}, {0x4}, {0x0, 0x0, 0x0, 0x2}, {0x80000000, 0x0, 0x493}, {0x0, 0x4800000}, {}, {}, {0x8, 0x1}, {}, {}, {}, {}, {}, {0x80000000}, {0x0, 0x0, 0x101}, {}, {}, {}, {0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x40}, {0x0, 0x40}, {0x0, 0x0, 0x0, 0x20}, {0x0, 0x0, 0x7}, {}, {0x0, 0x0, 0x0, 0x3}, {}, {}, {}, {0x0, 0x1ff}, {0x0, 0x8000, 0x80}, {0x0, 0x0, 0xc7d3, 0x3}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x8}, {0x0, 0x0, 0x1}, {}, {}, {}, {0x0, 0x0, 0x7}, {0x7}, {0x0, 0x0, 0x8}, {0x0, 0x3}, {}, {}, {}, {}, {}, {}, {0x4, 0x0, 0x0, 0x76}, {}, {0x0, 0x0, 0x1f}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x8}, {}, {0x5}, {}, {}, {}, {}, {0x0, 0x0, 0x7ff, 0x7}, {}, {}, {0x0, 0x0, 0x4}, {}, {}, {0xfc7, 0x9}, {}, {}, {}, {}, {0x0, 0x4, 0x80000001}, {0x0, 0xb000000}, {}, {}, {}, {}, {}, {0x0, 0x1f, 0x1}, {}, {}, {0x0, 0x0, 0x0, 0x3}, {0x0, 0x7ff, 0x0, 0x8}, {}, {0x0, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x6}, {}, {}, {0x0, 0x0, 0x5}]}, 0x2d10) io_setup(0xdf9c, &(0x7f00000039c0)) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) 15:07:06 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000040)={'nr0\x00'}) 15:07:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, 0x0, 0x0) 15:07:06 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x400445a0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, "5b24c767e5f0805254970c2cf47f8f974d69da8751eba9ec4827c0d982e44d95"}) 15:07:06 executing program 3: setresuid(0xffffffffffffffff, 0xee01, 0xffffffffffffffff) setresuid(0x0, 0x0, 0xee00) 15:07:06 executing program 0: r0 = socket$inet(0xa, 0x3, 0x6) setsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) 15:07:06 executing program 2: setresuid(0xffffffffffffffff, 0xee01, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) 15:07:06 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80004506, 0x0) 15:07:06 executing program 1: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dri/renderD128\x00', 0x0, 0x0) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dri/renderD128\x00', 0x0, 0x0) 15:07:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), 0x14) 15:07:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f000000a6c0)=@newtaction={0x5c, 0x30, 0x1, 0x0, 0x0, {}, [{0x48, 0x1, [@m_vlan={0x44, 0x1, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x4}, {0x15, 0x6, "5b3c9ec530dad3da3ab4cbb404cc9be0a4"}, {0xc}, {0xc}}}]}]}, 0x5c}}, 0x0) 15:07:07 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80004509, 0x0) 15:07:07 executing program 0: setresuid(0xffffffffffffffff, 0xee01, 0xffffffffffffffff) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x9, 0x40) 15:07:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f000000a6c0)=@newtaction={0x48, 0x30, 0x1, 0x0, 0x0, {}, [{0x34, 0x1, [@m_vlan={0x30, 0x1, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x4}, {0x4}, {0xc, 0x7, {0x9}}, {0xc}}}]}]}, 0x48}}, 0x0) 15:07:07 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f000000a6c0)=@newtaction={0x14, 0x2e, 0x1}, 0x14}}, 0x0) 15:07:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={0x0}, 0x7}, 0x0) 15:07:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x16, 0x0, 0x81, 0x3, 0x0, 0x1}, 0x40) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fork() sendmsg$unix(r2, &(0x7f0000002d00)={0x0, 0x0, &(0x7f0000000c40)=[{&(0x7f0000000980)="b0", 0x1}], 0x1, &(0x7f0000002cc0)=[@cred={{0x1c, 0x1, 0x2, {r3, 0xee01}}}], 0x20}, 0x0) 15:07:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000001340)=ANY=[], 0x33fe0}}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000012c0)={&(0x7f0000001480)=ANY=[], 0x94c}}, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000001c0)='batadv\x00', r0) 15:07:07 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80284504, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, "5b24c767e5f0805254970c2cf47f8f974d69da8751eba9ec4827c0d982e44d95"}) 15:07:07 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, 0x0, 0x4a) 15:07:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8942, &(0x7f0000000140)={'syz_tun\x00', @ifru_mtu}) 15:07:08 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x3, &(0x7f00000000c0), 0x4) 15:07:08 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x42) write$cgroup_netprio_ifpriomap(r0, &(0x7f0000000080)={'bridge_slave_1'}, 0x11) write$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040)={'veth0_vlan'}, 0xd) 15:07:08 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000003500)={0x0, 0x0, &(0x7f00000034c0)={0x0}, 0x1, 0x0, 0x81000000}, 0x0) 15:07:08 executing program 1: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000001240)=""/4085, 0x26, 0xff5, 0x903e}, 0x20) 15:07:08 executing program 5: prctl$PR_SET_MM_MAP_SIZE(0xd, 0xf, 0x0) 15:07:08 executing program 4: setresuid(0xffffffffffffffff, 0xee01, 0xffffffffffffffff) getresuid(&(0x7f0000000000), &(0x7f0000000040)=0x0, &(0x7f0000000080)) getresuid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) setreuid(r0, r1) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) setreuid(r2, r0) 15:07:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) write$UHID_GET_REPORT_REPLY(r0, 0x0, 0x0) 15:07:08 executing program 0: ustat(0x6, &(0x7f00000000c0)) 15:07:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0xa, &(0x7f00000000c0), 0x4) 15:07:08 executing program 2: setresuid(0xffffffffffffffff, 0xee01, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x6) syz_genetlink_get_family_id$devlink(&(0x7f0000000180)='devlink\x00', r0) 15:07:09 executing program 5: prctl$PR_SET_MM_MAP_SIZE(0x1b, 0xf, 0x0) 15:07:09 executing program 3: prctl$PR_SET_MM_MAP_SIZE(0x25, 0xf, 0x0) 15:07:09 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80044584, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, "5b24c767e5f0805254970c2cf47f8f974d69da8751eba9ec4827c0d982e44d95"}) 15:07:09 executing program 1: unshare(0x400) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) 15:07:09 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, "5b24c767e5f0805254970c2cf47f8f974d69da8751eba9ec4827c0d982e44d95"}) 15:07:09 executing program 2: prctl$PR_SET_MM_MAP_SIZE(0x2f, 0xf, 0x0) 15:07:09 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername(r0, &(0x7f0000000480)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f0000000500)=0x80) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, 0x0) 15:07:09 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x2, &(0x7f00000028c0)=""/153) 15:07:09 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc565, 0x8ea00) 15:07:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f000000a6c0)=@newtaction={0x48, 0x30, 0x1, 0x0, 0x0, {}, [{0x34, 0x1, [@m_vlan={0x30, 0x1, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) 15:07:10 executing program 0: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000001240)=""/4085, 0x0, 0xff5, 0x903e}, 0x20) 15:07:10 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@newlinkprop={0x20, 0x6c, 0x1}, 0x20}}, 0x0) 15:07:10 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f000000a6c0)=@newtaction={0x48, 0x11, 0x1, 0x0, 0x0, {}, [{0x34, 0x1, [@m_vlan={0x30, 0x0, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) 15:07:10 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x42) write$cgroup_netprio_ifpriomap(r0, 0x0, 0x11) 15:07:10 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x8000451a, 0x0) [ 802.318297][T20858] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. 15:07:10 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, "5b24c767e5f0805254970c2cf47f8f974d69da8751eba9ec4827c0d982e44d95"}) 15:07:10 executing program 1: prctl$PR_SET_MM_MAP_SIZE(0x36, 0xf, 0x0) 15:07:10 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f00000003c0)={0x1, 0x0, 0x1ff, 0x2, "5b24c767e5f0805254970c2cf47f8f974d69da8751eba9ec4827c0d982e44d95"}) 15:07:10 executing program 5: linkat(0xffffffffffffffff, &(0x7f0000000580)='\x00', 0xffffffffffffffff, 0x0, 0x1000) 15:07:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000400)={0x60, 0x0, 0x0, 0x0, 0x0, {}, [{{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8}}, {0x8}}}]}}]}, 0x33fe0}}, 0x0) 15:07:10 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@ipv6_delroute={0x1c, 0x19, 0x309, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x3}}, 0x1c}}, 0x0) 15:07:11 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8916, 0x0) 15:07:11 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x42) write$cgroup_netprio_ifpriomap(r0, &(0x7f0000000080)={'bridge_slave_1'}, 0x20000091) 15:07:11 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) unlinkat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x200) 15:07:11 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000240)}, 0x10) 15:07:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(aes)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="feb74d19d2ca104c62175e7c8324ffe0", 0x10) sendmsg$alg(r1, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="72cd6c302137b848012a13233e", 0xd}, {&(0x7f0000000840)="7d186cabb451e80e52d7e256716ef3575ffa378622a8fda1354d12cc0ac36b71c09a39dd0ed1695cfbcfa2b7e29069690887e2918e190136c18a1f1a53de8f4f3f75a639303fddb8e35115618005540f8af90ef5a2e33dc35e3c1de49f0b499e70032a691eb05471417f9aa09dd3c0", 0x6f}], 0x2}, 0x4000044) 15:07:11 executing program 3: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 15:07:11 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/ip_mr_cache\x00') r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000140)=""/219, 0xdb}, {&(0x7f0000000040)=""/117, 0x75}, {&(0x7f0000000240)=""/135, 0x87}], 0x3, 0x1, 0x200) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r2, r0, 0x0, 0x20000000000000d8) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x41, 0x0) 15:07:11 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r0, &(0x7f0000000040)="f5e3", 0x2, 0x0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) [ 803.744993][T20888] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:07:11 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000), 0x4) [ 803.912948][T20895] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:07:12 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x380, 0xffffffff, 0x250, 0x250, 0x148, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz0\x00'}}, @common=@icmp={{0x28, 'icmp\x00'}, {0x0, "3ec9"}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@ip={@local, @dev, 0x0, 0x0, 'veth0_vlan\x00', 'vlan0\x00', {}, {}, 0x0, 0x0, 0x96}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) 15:07:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) r2 = socket(0x2, 0x803, 0xff) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x31}}, 0x10) r3 = dup(r2) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) creat(&(0x7f0000000000)='./bus\x00', 0x0) 15:07:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x4, 0xb98, 0x0, 0x1c0, 0x258, 0x258, 0x1c0, 0x310, 0xb00, 0xb00, 0xb00, 0x310, 0x4, 0x0, {[{{@ip={@loopback, @remote, 0x0, 0x0, 'gretap0\x00', 'dummy0\x00'}, 0x0, 0x198, 0x1c0, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0xfffd, 0x0, 0x21, 0x0, 'syz1\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ip={@loopback, @remote, 0x0, 0x0, 'veth1_to_bridge\x00', 'batadv_slave_0\x00'}, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0x880, 0x8a8, 0x0, {}, [@common=@unspec=@u32={{0x7e0, 'u32\x00'}, {[{[], [], 0x7, 0x3}], 0xa, 0x1}}, @common=@unspec=@realm={{0x30, 'realm\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0xb10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000040)=0x1, 0x4) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x4) 15:07:12 executing program 2: fork() wait4(0x0, 0x0, 0x0, 0x0) 15:07:12 executing program 5: migrate_pages(0x0, 0x9, &(0x7f0000000000)=0x123, &(0x7f0000000040)=0x1) 15:07:12 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x4, 0xb98, 0x0, 0x1c0, 0x258, 0x258, 0x1c0, 0x310, 0xb00, 0xb00, 0xb00, 0x310, 0x4, 0x0, {[{{@ip={@loopback, @remote, 0x0, 0x0, 'gretap0\x00', 'dummy0\x00'}, 0x0, 0x198, 0x1c0, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0xfffd, 0x0, 0x21, 0x0, 'syz1\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ip={@loopback, @remote, 0x0, 0x0, 'veth1_to_bridge\x00', 'batadv_slave_0\x00'}, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0x880, 0x8a8, 0x0, {}, [@common=@unspec=@u32={{0x7e0, 'u32\x00'}, {[{[{}, {}, {0x0, 0x1}, {}, {}, {}, {0x0, 0x2}], [{0xbabe}], 0x7, 0x3}], 0xa}}, @common=@unspec=@realm={{0x30, 'realm\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0xb10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000040)=0x1, 0x4) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x4) [ 804.704944][T20911] x_tables: duplicate underflow at hook 2 15:07:12 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000340)={'veth1_virt_wifi\x00', {0x2, 0x0, @private}}) [ 804.782453][T20911] x_tables: duplicate underflow at hook 2 [ 804.842212][T20920] x_tables: duplicate underflow at hook 2 [ 804.868667][T20920] x_tables: duplicate underflow at hook 2 15:07:13 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') 15:07:13 executing program 0: rt_sigaction(0x1b, &(0x7f0000008c00)={0x0, 0x0, 0x0}, &(0x7f0000008d00)={0x0, 0x0, 0x0}, 0x8, &(0x7f0000008d40)) 15:07:13 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x200000000204a100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$alg(0xffffffffffffffff, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f0000000000)=ANY=[@ANYBLOB='changehat Q'], 0x1d) 15:07:13 executing program 5: add_key(&(0x7f0000000080)='logon\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f00000005c0)="fb", 0x1, 0xfffffffffffffffe) 15:07:13 executing program 1: rt_sigaction(0x1b, 0x0, 0x0, 0x8, &(0x7f0000008d40)) 15:07:13 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="3cc5ae53a839cac2fea0fa167782e45e7c2b317fbe280b7842f4e93a3a7a7fcceb556bea03f11811c48af369d3795fe80a2a7c5aab49f00caeb8d7c50d9c31c188eef68762cc5f7e6d063336cab2ac32ea57da526d47c1a1c4f545c2bbbc25715d01356d49e65f40cc88584893dfa5ae89d1d12346c2d0167a605a3a31e120623fd3a296dce3d7c7da6458e3c95e134106f89bfb97b4", 0x96}, {&(0x7f0000001400)}], 0x2}, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000180)=ANY=[@ANYBLOB="1c1c4e22000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e600000000000000000000000700"/128, @ANYRES32=0x0, @ANYBLOB="000000000002000092"], 0x98) 15:07:13 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x30b6224abed13f68, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 15:07:13 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$lock(r0, 0xc, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 15:07:14 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8, &(0x7f0000000000)=0x3ff, 0x4) 15:07:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x0) 15:07:14 executing program 5: shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000540)={{0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 15:07:14 executing program 3: r0 = socket(0x1c, 0x5, 0x0) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000040)=@un=@abs={0x8}, 0x8, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x270}, 0x0) 15:07:14 executing program 0: getresuid(0x0, &(0x7f0000001580), 0x0) 15:07:14 executing program 4: mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3, 0x410, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000fec000/0x12000)=nil, 0x12000, 0x0) 15:07:14 executing program 2: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x1c, 0x1c}, 0x1c) 15:07:14 executing program 1: r0 = socket(0x2, 0x1, 0x0) sendmsg$unix(r0, &(0x7f0000000500)={&(0x7f0000000000)=@abs={0x8}, 0x8, &(0x7f00000002c0)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) 15:07:14 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x2e, &(0x7f0000000200)={@remote={0xfe, 0x80, [], 0x0}}, 0x14) 15:07:14 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in={0x10, 0x2}, 0x10, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000180)="86", 0x1}], 0x2, &(0x7f00000002c0)=[{0x10}], 0x10}, 0x0) 15:07:14 executing program 4: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) getpeername(r0, 0x0, &(0x7f0000000040)) 15:07:14 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0xfffffffffffffeac, 0x2}, 0x10) listen(r0, 0xe9) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000340)=ANY=[@ANYBLOB="10024e21ac1400aa"], 0x8c) [ 805.475920][T20934] AppArmor: change_hat: Invalid input 'Q' [ 807.139062][T20980] raw_sendmsg: syz-executor.0 forgot to set AF_INET. Fix it! 15:07:15 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x52, &(0x7f0000000000)={0x0, {{0x10, 0x2}}, {{0x10, 0x2}}}, 0x118) 15:07:15 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) 15:07:15 executing program 2: readlinkat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) 15:07:15 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f0000000040)="46549337", 0x4) 15:07:15 executing program 0: r0 = socket(0x1c, 0x5, 0x0) getsockname$inet(r0, 0x0, &(0x7f0000000080)) 15:07:15 executing program 4: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup2(r0, r1) 15:07:15 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0xfffffffffffffeac, 0x2}, 0x10) listen(r0, 0xe9) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000340)=ANY=[], 0x8c) 15:07:15 executing program 2: r0 = socket(0x1c, 0x3, 0x0) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000080)=@file={0xa}, 0xa, 0x0}, 0x103) 15:07:15 executing program 3: socket(0x10, 0x0, 0x8e) 15:07:16 executing program 5: rename(&(0x7f0000000100)='./file0\x00', 0x0) 15:07:16 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) getsockname$inet(r0, 0x0, &(0x7f00000000c0)) 15:07:16 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x26, &(0x7f0000000040), 0x8) 15:07:16 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$lock(r0, 0xb, &(0x7f0000000040)) 15:07:16 executing program 3: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x33, &(0x7f0000000740)={0x0, 0x2, 0x0, 0x0, 0x0, [@ipv4={[], [], @loopback}]}, 0x18) 15:07:16 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x1a, &(0x7f0000000440), 0x8) 15:07:16 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x40000, 0x0) 15:07:16 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x0, "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"}, 0x243, 0x0) execve(0x0, &(0x7f0000000380), 0x0) 15:07:17 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x9, 0x0, 0xffffffc0}, 0x10) 15:07:17 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0xfffffffffffffeac, 0x2}, 0x10) listen(r0, 0xe9) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x107, &(0x7f0000000080), &(0x7f0000000180)=0x18) 15:07:17 executing program 3: getegid() openat(0xffffffffffffffff, 0x0, 0x0, 0x0) madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) 15:07:17 executing program 2: clock_nanosleep(0xf, 0x0, &(0x7f0000000000), 0x0) 15:07:17 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreq(r0, 0x0, 0xc, 0x0, 0x0) 15:07:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') unlinkat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x800) 15:07:17 executing program 0: accept4$inet6(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0) 15:07:17 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ptmx\x00', 0x0, 0x0) fsync(r0) 15:07:17 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) copy_file_range(r0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 15:07:17 executing program 2: msgctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000840)) 15:07:17 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xfffffffd}, 0x14) 15:07:18 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_buf(r0, 0x29, 0x32, &(0x7f0000000000)=""/124, &(0x7f0000000080)=0x7c) 15:07:18 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x9, &(0x7f0000000040)=0x80, 0x4) 15:07:18 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fchown(r0, 0x0, 0x0) 15:07:18 executing program 1: accept(0xffffffffffffff9c, 0x0, 0x0) getresgid(&(0x7f0000001940), &(0x7f0000001980), 0x0) 15:07:18 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x200, 0x0) 15:07:18 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000200), 0x8c) 15:07:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000004c0)=""/4081, 0xff1}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xffffff68, 0x0, 0x0, 0x800e00547) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000000)=""/29, 0x1d}, {0x0}, {0x0}, {0x0}], 0x4}, 0x2) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xfec5, 0x0, 0x0, 0x800e00505) shutdown(r3, 0x0) shutdown(r4, 0x0) 15:07:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000004c0)=""/4081, 0xff1}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xffffff68, 0x0, 0x0, 0x800e00547) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000000)=""/29, 0x1d}, {0x0}, {0x0}, {0x0}], 0x4}, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xfec5, 0x0, 0x0, 0x800e00505) shutdown(r3, 0x0) r5 = socket$inet_sctp(0x2, 0x1, 0x84) connect(r5, &(0x7f0000000180)=@in={0x10, 0x2}, 0x10) shutdown(r4, 0x0) 15:07:18 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x1, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) 15:07:18 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0xfffffffffffffeac, 0x2}, 0x10) listen(r0, 0xe9) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x9, 0x0, 0xffffffc0}, 0x10) 15:07:18 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x0) open(&(0x7f0000000140)='./file0/file0\x00', 0xe66e0acf89ffa4a4, 0x0) 15:07:19 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000080)="3127605f2969de8b70db168c5cb4dfa3d69b73", 0x13}, {&(0x7f0000000100)="b0efebe755ab991431efe1833bbb7d78400db6c8f54b63a828dc79c828c544ea350ab2c56e24b6e4d87eb417630e662136e6b8b23d064c5a684efecd064385c4de0f5b74ec8f29de719a", 0x4a}], 0x2}, 0x0) 15:07:19 executing program 4: mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x1010, 0xffffffffffffffff, 0x0) 15:07:19 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x6) 15:07:19 executing program 1: getegid() openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4) 15:07:19 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000140)={0x0, @in, 0x394b6fa4}, 0xa0) 15:07:19 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x19, &(0x7f0000000180), 0x8) 15:07:19 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) getsockname$inet(r0, 0x0, &(0x7f00000000c0)) 15:07:20 executing program 0: execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=[&(0x7f0000000040)='%#\'*\x00', &(0x7f0000000080)='=\x00'], &(0x7f0000000340)=[&(0x7f0000000280)='#\x00', &(0x7f00000002c0)='(&*,P\\\'#-_\x00']) 15:07:20 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) 15:07:20 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0, 0x0, &(0x7f0000000240)}, 0x0) 15:07:20 executing program 5: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) getsockopt$sock_linger(r0, 0xffff, 0x80, 0x0, &(0x7f0000000140)) 15:07:20 executing program 4: getresuid(0x0, 0x0, &(0x7f00000015c0)) 15:07:20 executing program 2: fcntl$lock(0xffffffffffffff9c, 0x10, 0x0) 15:07:20 executing program 1: execve(0x0, &(0x7f0000000240)=[&(0x7f0000000040)='%#\'*\x00'], &(0x7f0000000340)) 15:07:20 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f0000000080)={0xffe0, 0x1f, 0x1, 0x8001}, 0x8) 15:07:20 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r0, 0x0, 0x48, &(0x7f0000000000)={@loopback}, 0xc) 15:07:20 executing program 4: getresgid(0x0, &(0x7f0000001980), 0x0) 15:07:20 executing program 3: r0 = socket(0x1c, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f00000000c0)={0x10, 0x2}, 0x10) 15:07:20 executing program 2: accept(0xffffffffffffffff, &(0x7f0000000000)=@un=@abs, &(0x7f0000000040)=0x8) 15:07:21 executing program 1: fchownat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x400) 15:07:21 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r0, &(0x7f0000000040)="16", 0x1, 0x0, &(0x7f00000000c0)={0x10, 0x2}, 0x10) 15:07:21 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f0000000080)={0x0, 0x0, 0x1}, 0x8) 15:07:21 executing program 4: sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:07:21 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0xfffffffffffffeac, 0x2}, 0x10) listen(r0, 0xe9) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000180)=ANY=[], 0x9) 15:07:21 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x9, &(0x7f00000000c0)=0x116, 0x4) 15:07:21 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="3cc5ae53a839cac2fea0fa167782e45e7c2b317fbe280b7842f4e93a3a7a7fcceb556bea03f11811c48af369d3795fe80a2a7c5aab49f00caeb8d7c50d9c31c188eef68762cc5f7e6d063336cab2ac32ea57da526d47c1a1c4f545c2bbbc25715d01356d49e65f40cc88584893dfa5ae89d1d12346c2d0167a605a3a31e120623fd3a296dce3d7c7da6458e3c95e134106f89bfb97b4", 0x96}, {&(0x7f0000000840)="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", 0x4c5}, {&(0x7f0000001400)="1fd70e995ce652c22dfb4a256031c94f69f01e67ec76072d653203395fe23cf35ddddebc957b7050d09c51607d366da344d89de509af876d6506d7b0f5bbcba3ee52", 0x42}], 0x3}, 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x903, &(0x7f0000000dc0)={0x0, 0x9}, 0x8) 15:07:21 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r1, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x1a, &(0x7f0000000000)={r4}, 0x8) 15:07:21 executing program 0: open(&(0x7f0000000040)='./file1\x00', 0x30b6224abed13e60, 0x0) execve(&(0x7f0000000000)='./file1\x00', &(0x7f0000000380), 0x0) 15:07:21 executing program 2: r0 = socket$inet6(0x1c, 0x3, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x1c, &(0x7f0000000200)="fc811ee8d3a652771e3886cf8ea4ffb2", 0x10) 15:07:21 executing program 4: pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) accept4$inet6(r0, &(0x7f0000000180), &(0x7f00000001c0)=0x1c, 0x0) 15:07:21 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="3cc5ae53a839cac2fea0fa167782e45e7c2b317fbe280b7842f4e93a3a7a7fcceb556bea03f11811c48af369d3795fe80a2a7c5aab49f00caeb8d7c50d9c31c188eef68762cc5f7e6d063336cab2ac32ea57da526d47c1a1c4f545c2bbbc25715d01356d49e65f40cc88584893dfa5ae89d1d12346c2d0167a605a3a31e120623fd3a296dce3d7c7da6458e3c95e134106f89bfb97b4", 0x96}, {&(0x7f0000000840)="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", 0x4c5}, {&(0x7f0000001400)="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", 0x206}], 0x3}, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000180)=ANY=[@ANYBLOB="1c1c4e22000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e600000000000000000000000700"/128, @ANYRES32=0x0, @ANYBLOB="000000000002000092"], 0x98) 15:07:22 executing program 5: r0 = socket(0x1c, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) 15:07:22 executing program 0: r0 = open(&(0x7f0000000040)='./file1\x00', 0x30b6224abed13e60, 0x0) getpeername(r0, 0x0, &(0x7f00000000c0)) 15:07:22 executing program 1: r0 = socket(0x1c, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x62) 15:07:22 executing program 3: getsockname(0xffffffffffffff9c, 0x0, 0x0) 15:07:22 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000140)={0x0, @in, 0x9, 0x0, 0x1}, 0x98) 15:07:22 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) 15:07:22 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x9}, 0x10) 15:07:22 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_timeval(r0, 0xffff, 0x1005, &(0x7f00000002c0), &(0x7f0000000300)=0x10) 15:07:23 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r0, 0x0, 0x46, &(0x7f0000000000)={@broadcast, @loopback, @remote={0xac, 0x14, 0x0}}, 0xc) 15:07:23 executing program 1: socket(0x1, 0x3, 0x19) 15:07:23 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0xfffffffffffffeac, 0x2}, 0x10) listen(r0, 0xe9) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000180)=ANY=[], 0x9) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000340)=ANY=[@ANYBLOB="10024e21ac1400aa"], 0x8c) 15:07:23 executing program 0: r0 = socket$inet6(0x1c, 0x3, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x1c, 0x0, 0x0) 15:07:23 executing program 4: r0 = socket(0x1c, 0x3, 0x0) sendmsg(r0, &(0x7f0000000980)={&(0x7f00000000c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f0000000480)=[{&(0x7f0000000100)="b2469a6aa4d7a1476bb84aadfd4d3055c6a353ff2861d9ab65defe9a4ea441cf76dc671d5266f2b6cc295b3e9cf47d90d0b6e725e9991d38a140e0c66354894214b0b3fe5817", 0x46}, {&(0x7f0000000180)="1e64f64489fbad6bff4ca8fb66fd7b5fea2d1787dd1b662e8ca0da0e8c28af247e97c1cda9a8e74c6ca5e65acb229cffb5a509eb7137278a722326ea02e6c13b35cebe44f748359a0d85c5d6b29e3f6470f120da219507388577f836197fae50d4d6d0357f40f3b6ce703998c6712bf95b9c2975154afe6d89baf553dec6d34f74ff728b4e56e7322318109c43fdc20cc91fdf73604e999951980f235362b15d69cb2db450a54a56d0ae391c3eb0b6d7e6140074d018bf6cc252b807df25131f2d464847fffbdea712ff", 0xca}, {&(0x7f0000000280)="6359011c8ffed6d4fb3f6340ac0b33fb77f4fbf370fe64addedd86bc601612393e2bb640106cefd56490682f0e828873750acd511b828408a5f7dbdb57ea9b02e36ab7a3a92004904f5c4148b139e33282a0661a8d898244b869ff5bc592f4496079ebc08e27478e780f6aa093e2a213c500a1b411d77b06666ab8e777d3f7863ba3c6b3ebba48aa549a406a01ee684c167d51834513dfcb959ad8ff5b21bea844b96976f9bcb3563f35934c8a28fe123ee8f8b6156d8bfc43272052e798093745ea2e93ab4e6c2746ea3cde6bb4468805bd4786e8e8228d29bababab040c3", 0xdf}, {&(0x7f00000009c0)="39903c2fe49288572af7f3f3ced698077df70c2719c0edb90ff08944afd4d9e26928b519d1f9742f9a8446a164ff43bf156d92c8091bf95afbdd8550c03b987478ad8c4ffa1c78e0c6b30d687ed1caf00c0e190e8b49ac3e870d66d83a4fa38ba48bc957c3b5e6e4c314b91240844c28112020ae89546bbe18bbf2981786bd80420593ce44881a117b49accbd3e757e1e5ba1521dd462bd246d93bafdf8ff81264e29eda6388c97fcab3a2d35a10af06c12baa30434358bf9a8d13fd5565c776677f9bccf0fa31c32778da69ade75869370137c6665b3d8ba13833e4f321ae3e9e9ec001dec323ce994379d29beff88120fc51ef45b55ce0f8c2a34267e4c8692e38a6c309b794614032b3e75a43457e440f6172ae24853e259a318bba3f0292631920813c63be5a43c9e6dc2276a72857689a416827e1a753b294e3e561c14f88354d062957b493ac93eda9a322ecf5de44db409f9f66cfb174ec2aa62f88a1d6210e8edfa3091900dac56db76062c2b9ead31156be938ef7c3b646f2a4dd4d45a01ef6828493cffec5c626938e7bb974b304f87b2366a1cedb60bf0412130d22f62604f641d69402545bc4225599c664806523e3097fa45a229d3ed63d7b67a96a4baec093a099074bc6f62fd7052d90f5081d10a864301eed0bceb30e60442ac6287f55de6ba82c351ad5f8b8214ff3af753c07452ddcb510167059d793bf340cb69999994f9d4bfab00b8e7d6219ed734b868e9e526c619b5372909ffcaff43dcc14c8ee5a198bb0c3309df828fa497987ac7e7f8bdead2b62ef136760d5bb02b60669ae121e85be67db6ceb1f08d6711d709452116f4e5dd4b140d19225861a73c0d328f790c6a467ba003f360698e348284ecc5d190a891e75419142cbea6f03a40acaee2e123e651b453563f3bbd86927127bde8fad841686612c03f4670102fe14f3042c54db44df90ce021f1b3c04b24ea3805ea2682d9613c5e13d512dd728d9c9ed43b91335dec222668c87c918d4022c52b854fae4de7ded57483324c34da62bbadf7acbb8deb60af045fe3fe706c581b0b18268e5fa65f0cb86329189d8c5d1c4f88f58e4708109dd54eadf3cfaddf259ea2a5ef7057156f3c99989403c80bf6179e53b050159e80834b12c04326f0679fc51be95b6514c36c699097a6670a24d242227fdfddf0ce881d20df1fcbbc58f0ae02900cec034554d417c34262728b452a101442ef4864fd635e78c22e459671d2bf83021fa03d19a20b964848b0d27a0e2f06640ebe9ba9a3484b06ccceb7242e1a7224a7d0785ec2809de927ec70e8b229a2dbaa94e22e1384341a29e7bc2b6a04106eb0f1970d9402acae35658bc803868d6e4f675889a28243f2de76d58e506705a2782a070ab2da6c09b5996fb507e1a20786cf8a6ccfc381c3e710ccc88bbda8bbdf0c918123b2544de489c16b305de2c0750feb72f0697b56ce245751f1a2d96baaefc7186bf368efd8d7d8b6136f05526dd768483bfa2a751e5e5ef8066f00ab810b92d33fad9ab5911daafa6316c948d6f739b29750e4682ab9e7e0335389857d472cc1d8d88a78b960b63da0491348f4b224e42c18d02c2c57a9515eef574d4cdf136431402fc55103f72f2cdee28ce1922fe1a13a766e20317ecd5cb45e079a74cbf769ceb8b191ade09f70148828e359c105b5d457972e590365ce8f64c6e8b3c73a8fcac0315ca950c895a08fc072a451f09bc885219b0b371c70a56dd1776394173092cc949f8d69c6a236c8ba05ce6932b8396cdd3163825a8d595a182a470ec0dcdff37303276392164ffba1b8cf2e9334f3fd79381c8fbb81b337540cd313c095dddc08f36cf882f334f0b59dc1489f950d80b9129df36e05b1acfd21435bfb8a882ef4d7d9fc4694c1fcfc1c300ff2c72e2e071dbc18c310e1667f97e3bfacebbffe70c5370960e5b19a91961b2c7b6fdca83857deff58d38fc97a5e63fece7cb02ca838226f37a50f3f6cdbdd625e76f18346b5c893bc3b163a57a1a50e997248e0dd684513b0efcc942bf8690cd91838ee747dfa9e9ea21021643c38aea52d7926ca19b99e2d75e2d2540f5da13a99089cee86e31b237818b29f60afbe03fc2200dde26d75454b77097c80130d375f7ba9896356a187d1246b608a8e1d3bb3462294c9a25c34843024f4bd0c65225510fa1d5abf52cda626aeac935fccc295e19232deb3e483320f1176bb656cc652e9c0ba8fc8eb58f9f8e778efd4dbfb69f117364272430b5fb7c923bcbba01bbf0c4c1615a49287f44d7ddbf8bdb133a51b6c1280df27492103b1eb8f8366a0066706cc951c98fb13cf2d45816d23986ed8bc7110209502c7e8d23741c6ac3ab897353af6872a75a6b5bac0787ea091fc11b7246460b306c3045f015edb5795fa56b11b974035471479521173252ae5b1a2a197e534383ee7b5591626511cdabe0da55321b30aed0ccd201f3312b1e27ab8cdede27e0248026aa5943190816f4e7290311f513ad209997ea3f15c0a6706083d4b3753f6219c695d4eca5b83d3001add40eddd082ac3f8f71da87446f4ed154246c6ab87e87e25e71140f540588b2b133d3e15c05538afe098ea5f7c9d591f7e6037e98f9d9fb2a2ed4758d78434d6de48a9c4dcd054a9cff36acb8c8cfba27f5f3d7946b8c7efef369b2740f627a284942f008ab90c5857cece9353fc8de26ffa399d9f9c201484bb16ca0cc895ff81cf1f039e9ac464d6037a9dc226b2e79c0d04f2ddcf37a3a1c700786177c02a18c4e07d33d3e83983f6f50e784345e8d77652a0b12b08af0af82caf909ab259daf976d48d0bceb13fb77a152f999adaa5dd7590fabffc4c3a0bfc957138e40e0f83a6862a4d5e3cc247393039f3a82f5ff88623122aaeadc5770d0e35129fe48cab45d5f2a831bdcd898778f0b14c26e4f70a8bfa7e1d964d066b59bed00d79f3c929e1df000120c557b10ef94c8a9bf9059ab35b0bdc321c70bbe796dc18f2a8e1c6e97160c1fb233d6b64849ada577b97fb0609510089ae8cffdfedd19df5cfca1e8036ecdf769c828667e9e6e7c9e563581393ccc82ddf13243b59a6d65e9cefc324e69985078d745fe2c576b9bd25c441521efe429d9892bf1ab97122fefda1b1a77ac20ca57faa84b1bc16833c3c999407c654d7aa25037a5bbe8eaa5cb56c82fbabc4fa25f48c5550380f636edaeb2a0be744e4a0e8718e265fd820c015ac649006a165a71ca27aad376d4a9b2263f4598cfd41bd3e211290d6245a593af748cb7a2693f0bf48ac37e3e6b5418c61df7e14da6d9ad3f3ea9453aebee17a06aa0569074b3db580291d3c2998cb67d6372c29d16aa6b506f8426e37bf2acd1856d59554a55ae60dccb64e9ce4563", 0x962}], 0x4}, 0x0) 15:07:23 executing program 5: recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000480)=@in6={0x1c, 0x1c, 0x3}, 0x1c) 15:07:23 executing program 3: renameat(0xffffffffffffffff, &(0x7f0000000180)='\x00', 0xffffffffffffffff, 0x0) 15:07:23 executing program 1: getresgid(0x0, 0x0, &(0x7f00000019c0)) 15:07:23 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = getpid() fcntl$setown(r0, 0x6, r1) 15:07:23 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) r4 = dup2(r2, r3) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x105, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x900, &(0x7f0000000000)={r5}, &(0x7f0000000040)=0x8) 15:07:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x0) open$dir(&(0x7f0000000200)='./file0/file0/file0\x00', 0x0, 0x0) unlink(&(0x7f00000001c0)='./file0\x00') mkdir(&(0x7f0000000080)='./file0/file0/file0\x00', 0x0) 15:07:24 executing program 3: madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) 15:07:24 executing program 4: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) readlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 15:07:24 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0xfffffffffffffeac, 0x2}, 0x10) listen(r0, 0xe9) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000340)=ANY=[@ANYBLOB="10024e21ac"], 0x8c) 15:07:24 executing program 2: link(&(0x7f0000000080)='./file0\x00', 0x0) 15:07:24 executing program 3: sendfile(0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x0) 15:07:24 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x13, 0x0, &(0x7f0000000040)) 15:07:24 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x107, &(0x7f0000000080), &(0x7f0000000180)=0x18) 15:07:24 executing program 0: semget$private(0x0, 0x0, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)=@in6={0x1c, 0x1c, 0x3}, 0x1c) 15:07:24 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) sendto$unix(r0, 0x0, 0xffffffffffffffbd, 0x0, 0x0, 0x0) 15:07:25 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000640)='/dev/ptmx\x00', 0x2, 0x0) 15:07:25 executing program 3: r0 = socket(0x1c, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0x1c, 0x1c}, 0x1c, 0x0}, 0x0) [ 817.066430][ T3130] ieee802154 phy0 wpan0: encryption failed: -22 [ 817.073113][ T3130] ieee802154 phy1 wpan1: encryption failed: -22 15:07:25 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$getown(r0, 0x5) 15:07:25 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) 15:07:25 executing program 1: getegid() openat(0xffffffffffffffff, 0x0, 0x0, 0x0) madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4) 15:07:25 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_timeval(r0, 0xffff, 0x0, 0x0, 0x0) 15:07:25 executing program 5: unlinkat(0xffffffffffffff9c, 0x0, 0x800) 15:07:25 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000080)) 15:07:25 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) 15:07:25 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000080)=0x10000000) 15:07:26 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000080)=0x8) 15:07:26 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000140)={0x29}) 15:07:26 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000140)=0x3) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) 15:07:26 executing program 0: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) 15:07:26 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000140)) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) 15:07:26 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000000)) 15:07:26 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000080)) 15:07:26 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f00000000c0)) 15:07:27 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGDEBUG(r0, 0x80047441, &(0x7f0000000140)) 15:07:27 executing program 5: capget(&(0x7f0000000240)={0x20071026}, &(0x7f0000000280)) 15:07:27 executing program 4: inotify_add_watch(0xffffffffffffffff, 0x0, 0x6000010) 15:07:27 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x14, 0x7, 0x6, 0x101}, 0x14}}, 0x0) 15:07:27 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001080)={&(0x7f0000001100)={0xfffffffffffffd60, 0x464, 0x0, 0x0, 0x0, "fdb433a74042f1f2c8230d57214d693acb5f5d679e963c764edd354270c8355c123d9027b2c971ce16055bb6cc666f02b24cb0c2242f523401f795fd04d32bc862a1fef2876e224d9489b8afb2f33bb939db32c8a2fb521aca9160d7acfa62c7d04ed277a8399cb50987db69985a648964b6fdbd3306f4d57410065764fad3fc46a6967c7e482d5a562b370d8ada8ccafcaa7a23f41f69581b3780767ee925415cd8f2cca23cfd2602524750e2ce760123a2393c1cd4a67f0bdb454b967a19fd5f6ef40d6a8e45f60ce53c05c8d44c9c375f59a307706d278ee96087efe1570951856db08cc53eaff6f0a2829cbed562a9376944ae97f9861a69c948453fcf3aa15812df0501d9bdc4da4c9eb9ccc45080c020a2edb91cf8e1fce74cd8872f89e6138e2d75721a01ab087a25825d18ce46403fdb989117ce5b0e46ff7fe9a4dec1a8ccbb319af1941900fed01e6112a97e2d38cedc0ec36f10d354d678674e672e00765f992400f514605dfcccf7022b5113c4b5b1776490ffbf8acb763835ea411a02907cb117bba81ef8000000000000000037594e50c78429c442ff16b176d17b8fa92af7a542c2c94759ab5570ea9f65245020d5298d187875a16405388a654100d4d1aef8c37f36ef52920c8bba2c240e90d3efd2778c0296f9af8e42352b13011a69e6b430cbf4e2979d757d1de5b7930d34ee1802573d3f656bac46b7270fe71e2d5dc53eeae729d5ac9ae59cf98a0b53190ded0bd70d6b5e7caa218c27084c0e741d5137eff4b836ebbb65ef3f77129e09c060b07fbc8d89db78147d5f8af22d298f0ebfa8928de1a972b5f97b0937233ae28b6c9458065cd13bb60f5db1d57911cd008c921d2a7524e2a11ac78c6714f6d59a4fd349a3cdc401541568e13b767e23457a965b765732e63ae737f2dd27bfcfe519b23e1bfc1169184eaa103977a67b9be4503cd977363bd0ea51034432a57d116fd422a1f4540e1d413872dccc89bc8b3215f4e10efcc98f9c4162ff33dac5846cd4858e534c6509d261c3a18dd8014928a2c40f21d33b583fe0a536f639d23ecf674b6a6180c2b7daf5d883364a32141b549f8d2233e2ad6a5a614c03f2d3ddd01a2f32bf4fc697450aee9775e15e04f9f013123432c84759ec80ac537fe245e021507ca71743c5b674ac289e64487056a1213e2a47b0dabdb5c9cea0c52316282972dad32079ac56528ee93d2514a04f47e1f6c029958b37cf7e53c2322dc6e188796a02fd536b882e55badc8711d645574d6f252bddd09b55a8bdd40895f1a189dc5bf541d7c4fc8f03ad0ec2b163ff19b10e3a5e2312977ce2de158569eaacb7a41352df84a2ffeac863dd56a67225d0311e6deb57396e55fc278e43ed4d8bf2a0c0574631b4d1b743f37ce5f2812c8bccc2cca3386e1b1851fafadb28c8ce5267070f3884b22aba6f4f61edde150199afa515b6f1ac563f1928a30b73bf2d94ca41f1286c6d13ac5a351db2ea975c070982c5ccdb81c46a197e6b65b3d690fc870cc1c275fe726cee9a1539331210d404e7191d9460ab6d07ba5c8d7d4ac893e087aad68e6702cd9ce8fbfe8a61000f5347876d0616a6e05de1024b121f775cb23f736a4b22b33f1b8cc8df8365b6d641b056be6242aa0040f3c39de7c15602e5d74a9e3f5b302548d5e76316559a3317be0468f6d14005c627e8f04d1ef757200edf7514337048515bf0e385f57dcae11a3734819f698c52dd59b2f0f5456f73ffe36f3f6ca24f9173a5b28968e4e668f7f23d8118ecc3946ab34bcb0b346aa7c9d436bb87182c51c8a076770d190a2bde3d4b086f042dffa1f4defe4ee9233aa3f924d333e5c91ce6b26097a6d42175d83dbbb709ae76ab8d10e336576be1965ccf2ad6ade2870ba6576cafdb78550ca8dffd1ab4df18a3e4d4e87803795c3e6568dbd46f5583f13e058ea1999e672003ba8c84f8c16319a0dacfdb5b7b304213974d054c219478d3c2614f0c0f8a6fe6723bb2a50e34eb6f0caa2463870653e8c7998319b75728df580c0d3d6278400f1efa78fd10faf3e99a0a7a3f7f0c0eebdf7e154c23ceee034cfc909d65d94ee03875014c03ef9c138e1eaa677ef734e4188b9f09cdbe462e646a89364d93de992bc13fdbc14a0d657b3ba42af1c1415e38c9027da8ef71a32d64aeca25e578e127f7495303fb0b664d0a6123c4bd1e7dbdc2ed085acc91dcf79a51241e1a42a78f505d4289e2f0ab29a0ae229874e1cd1f6f6f89c0f1692773036463e338a462000899f2c63381068180357d2de05c1ce064b0446f4e6805d1b3fd799d2901541c5a882aae6fac9549794dce2d68a9122b27fa97a41c993652c566376384b207df72cfc9b63a13e3387637e009979631a9e73a2511fccf01a840bc35388bed6c055bf92f87bf12856cd556d5d143ffebe6ac627acaade2efe7246c7a4fd2549658e695bc2d81aff14f5f1b07fa1818c14b8397b48b1f7b65f21283603ec0a78aa37ace490a0db20acc4c2cdf38326a28386b1c70000a20f4c992903e5d098046c62e9a42836f1759937a82a62245f458573c2ab99b5457fb4ad300deeda6d856b13e615794acaaeb8fe88f9793921a2617cfbc00911a55965db2089209006bd40ba0875b4d555c1d733e0e98cd8a017899bb8fb21e17fc227cf98d4e8859be9967e9d3b5726ef05de3d002e79dd7ccfa78f08d6df3cb565ff6e11f22f0a341e7cee330a80d50aaa919891cd219f9e18132b61fb151c2e16a4fe851b0351540762fc39b1a3db5e1a3ea2143369176f15648d9cb4fb378fd17140d6ef43df246ba786aa524dee34dbdbec380e7aa92e5ebe45e32b751a55472529e6b2b9269ff8afdfd29a6e9778e880f17760a6791a86e23279386a132ec0a16d98a8e5879428923b0682d6bf4f3bbff43d2104a6cf45fc5dc7bbe10727363562417e87f71262cce58882da93868e519f43b7fd5228af0e151482f16dadb0e56191edc2a722c45e757aa7e4b9f7fd1d201dcfa534a5ea49e0d1e2f4bbef889812108347e466b2970e20e93ad297e4a2cdd1c510ca6d67c5c55f22d82034ae7f835f42002e07f5b4ad632164fe47680ffa403b796d27060563d6cf19a77781dad7eecff0abd5ce18acca8e6e5d3c863eb85657f90913221dadf080a68a6bab257e79ae05f92ca0eb0d00479be5f0e479062dc9b5de70572e172024940771aa08225fae36c5d9ac55eb328e9f164888de88a7e75c2299ba87138223aa2b87937c8cc4dae9655fdaeca1c561a46b3b858df6caf5bd257642836862b33da4de3dbe06bbd21e29f024d465a98a840c063c2c3712b1201983272b0650d144c259d5af79d547a3f7cac2e6bb09b523cc8e5a75b82f9570f959b64b004c7aa886c944964633f3a03d49125d33950a19f63188c0404c82b7a729ec3659a9caae80424c91d2cbb0af7e4fd88bbbeac86da2cefdad087cc88b31c06962a07d7c431a57bd43207370cb702a67c01dd99ba47f794eb5bbb17ba8a0b36f59d197ec6fde1f5445c78d3eed84f2b9a0aae947b7858039d8359ce38b82c8d42ff3e3df84515be0429b084cc3f9fced355111a109aea2134299ff714dc4ddfcd7b7e6479acd3cfd876393ab48b029fca6c0d5260f0835c63580b03de2488ab4588956b099344cbcc664e61ec4e1911dd93dbab0917270ba29e605368b4c88ae6ab7912e94e9532b6602f9cbe7b0123306fd90cf68cdbadad726da8bb0be8ebd055fe373c8529d3fb81e51151d0511ebe151932329e7c27948c36738aa6f83356014ef7611312c76eb01ced479ca09e6d1beec845e350ea3ebd59ac912d82d5deda04edc361b63a45f3ee64f7fae061eeedd4852264b1774dd60f028b5715a7458a1f0de5784081160c64f09500f635a6d8acad2bef7c2b222278cadf95afcb87effcdc167fc340fbd2777ad1183787d81832548dddbb95bda82c671b9eb0ff2411c203b5871208ceb2169f02d2382e699924644a4c7536ba5ddbb9cb45bd237aa97517bb07aa36b44bf3ec6370ee965b168d0f2a68a18b5b2e42eabed3538bf24f9525ec8032c88dc89943bfc64e8ee999d463034ed7221a40dfa45fe716a995689214aeaf05127579bf1c3e100996b5edab197def3d82b3673041e3a8357a5445404d0c80815707ff4a585529a9457ab199f7382177d48ae0dc2eeee0cf124fd22902156a80abe1dc11d3eb0dd9b0408f7556298c465e96c8ed46748c954412f3b57f0e8ff8fadcb0164a065fe83a7a7edac1ac4891cc851bd4906a089fb99a41745795301445494fde83c1c4923887469c83b6436e9d10839f002eed1ecdb2dff0f786335890c8c5e0391f1e452c0102ab7c4aac1cfd638ac9d0290d082ecc8317ea622c42b9923231ca921a71582e283ef090130a48b90d192ba58ffe3196995386543f27a5b40cb20f295ea227e1046aa5bfd6a266f22dc0ad200da51b0967fe4d0fd71db098547b932f6287e016a2bbf304320b686a817d9d40c6bc4f1f4a58b5acc1ba0ae801c91d8ffcba120d30f04964348b24f56753b20c1eb48ff1f3c38345cd542d34b97d9baaf003ff8228de1f8ef0172d1d4f84cddfd3f8aa063fc6b2dc535f42df7bd93e16c6ab54592c25e81d8ab68c861323a0f1fe933f3cc8763cd4be0f007da1081c2c0aa60cd48909ba3ae51a5303a3fb6fb0449a71128b335fe56d7eb391ffe896fb0e4f0dbb8765125b37aba566d7c76b9135c58ab6201090f58a2d330ac87a5fd11f43af06783042dadf5864dc0afc115f41e6f9482b05556f5454061b3188ea43dc17d64ac8eee1630fd5e54ee173ceadd95dc638a4081f2dd1de701808ccc27f583b0eb42dcb499a840dd70e740d46d9ed86018a8cba76faae69bfb35e6ee00e2f5d1765ad59831e4e4d16382beb88f1e388ad62a255dcca97fc19ec8eab12785bac9d29c556c7d11cf06e6e145edc82c0999868143c8dcf94028da7dd6bc2dee86aae97b25943a21ad513a910bcbde74b40ff9a9a7932689fe2bd8cd06b79ca9a440df0d6c0ae5e4c9399e05ad0f7fcfc1df5dffd8b1e25ba91fb2f1477e67d8af5da0088e25dec2bcb147b7e455d2290536100700673a1543187557c22ceca7a703f0891e1bcd88757b34edf58e56771d8ddf07bcfc573ef25a2b3ba8ebed6f17a6e3fe4afbc98ddf1658aba31b6d862aacab53abf7415bba09dab2e1b93ecf2055fc9e32152cc4ace42fbe2d9f5d088870891cc182e75dc3e9f0a3f3f9f614a45b52ac97c4b8a05f622cdcd8913700c60f3b1b933adc345f40223eb3a15e6930a69b2cc4814b36cfd56f88a46e2e1582f548b66840ff087f4bb341a9442ee1120a2cbd15d0ae1ff0ced16"}, 0xee4}, 0x1, 0x0, 0x0, 0x8000}, 0x40000064) 15:07:27 executing program 1: rt_sigaction(0xe, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f00000004c0)) [ 819.586481][T21431] capability: warning: `syz-executor.5' uses deprecated v2 capabilities in a way that may be insecure 15:07:27 executing program 0: sched_rr_get_interval(0xffffffffffffffff, &(0x7f0000000000)) 15:07:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000003500)={0x0, 0x0, &(0x7f00000034c0)={0x0, 0xf0ff7f00000000}, 0x8}, 0x0) 15:07:27 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x8}]}) 15:07:28 executing program 5: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000040)=')$\x00') 15:07:28 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 15:07:28 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0xe, &(0x7f0000000040)="911c89c7", 0x4) 15:07:28 executing program 2: socketpair(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000700)={0xfffffffffffffffe, 0x0, &(0x7f00000006c0)={0x0}}, 0x40) 15:07:28 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect(r0, &(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) 15:07:28 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000580)={0x2, 0x10, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}]}, 0x18}}, 0x0) 15:07:28 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1b, 0x0, &(0x7f0000000000)) 15:07:28 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000001840)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x14, 0x1, 0x9, 0x301}, 0x14}}, 0x0) 15:07:28 executing program 1: write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000b40)='ns/user\x00') 15:07:29 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect(r0, &(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @remote}, 0x80) 15:07:29 executing program 4: rt_sigaction(0x3d, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x8, &(0x7f00000001c0)) 15:07:29 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, 0x0) 15:07:29 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000000c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, 0x0, "86cf3d52b2a4cc5dffa312f889526f2835c5f57576b9a6adaa0f9fe04c0bfa33fc12fa0ad6c3467b34349772c1457b6408616c4186dca84998ac8d8dca718417970f16281096e54631b256ae390945ef"}, 0xd8) 15:07:29 executing program 2: openat$tun(0xffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x2802, 0x0) 15:07:29 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0xfffffffffffffffc, 0x4) 15:07:29 executing program 5: r0 = socket$inet(0x2, 0xa, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) 15:07:29 executing program 4: r0 = openat$apparmor_task_exec(0xffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, 0x0) 15:07:30 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0xd, &(0x7f0000000100)=""/4096, &(0x7f0000000000)=0x1000) 15:07:30 executing program 3: r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x25000100) 15:07:30 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)='\xc6!\x00') 15:07:30 executing program 2: inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000000) 15:07:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x19, 0x0, &(0x7f0000000300)) 15:07:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$AUDIT_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x20000005) 15:07:30 executing program 0: ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480)="da") waitid(0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 15:07:30 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x9}]}) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0xfffffffffffffff8) 15:07:30 executing program 1: r0 = openat$apparmor_task_exec(0xffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x0) 15:07:30 executing program 2: capget(&(0x7f0000000200)={0x20071026, 0xffffffffffffffff}, &(0x7f0000000240)) 15:07:31 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000004100)=[{{&(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x39}}, 0x10, 0x0, 0x0, &(0x7f0000002d00)=[@ip_pktinfo={{0x18, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x23}, @initdev={0xac, 0x1e, 0x0, 0x0}}}}], 0x18}}], 0x1, 0x0) [ 822.996944][ T34] kauditd_printk_skb: 767 callbacks suppressed [ 822.997000][ T34] audit: type=1326 audit(1616339251.044:4372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=21498 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x7ffe937569fd code=0x0 15:07:31 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x14, 0x0, &(0x7f0000000040)=0xfffffd2c) 15:07:31 executing program 0: capget(&(0x7f0000000200)={0x20071026, 0xffffffffffffffff}, 0x0) 15:07:31 executing program 1: r0 = openat$nvram(0xffffff9c, &(0x7f0000000100)='/dev/nvram\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, 0x0) 15:07:31 executing program 2: r0 = openat$nvram(0xffffff9c, &(0x7f0000000100)='/dev/nvram\x00', 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000880)='devlink\x00', r0) 15:07:31 executing program 4: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000080)='fuseblk\x00', 0x0, 0x0) 15:07:31 executing program 0: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)=')$\x00') 15:07:31 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f00000002c0), 0x8c) [ 823.808177][ T34] audit: type=1326 audit(1616339251.854:4373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=21498 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x7ffe937569fd code=0x0 15:07:32 executing program 2: execve(0x0, &(0x7f00000000c0), &(0x7f00000001c0)=[0x0]) 15:07:32 executing program 3: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0xb, 0x0, &(0x7f0000000000)) 15:07:32 executing program 1: capset(&(0x7f0000000180)={0x19980330}, &(0x7f00000001c0)) 15:07:32 executing program 4: clock_gettime(0x6, &(0x7f0000000040)) clock_gettime(0x0, 0x0) 15:07:32 executing program 0: openat$nvram(0xffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x480, 0x0) [ 824.529751][T21529] capability: warning: `syz-executor.1' uses 32-bit capabilities (legacy support in use) 15:07:32 executing program 5: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) recvmsg(r0, &(0x7f00000004c0)={0x0, 0x36, 0x0, 0x0, &(0x7f00000003c0)=""/248, 0xf8}, 0x0) 15:07:33 executing program 2: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x2e, &(0x7f0000000080)={@mcast2}, 0x14) 15:07:33 executing program 4: open$dir(0x0, 0x4ef06355bc5572d2, 0x0) 15:07:33 executing program 1: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c, 0x1}, 0x1c) 15:07:33 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r0, 0x0, 0x46, 0x0, 0x0) 15:07:33 executing program 3: open$dir(&(0x7f0000000080)='./file0\x00', 0xcd7b321882804cf5, 0x0) 15:07:33 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r0, r1) 15:07:33 executing program 5: socketpair(0x1, 0x3, 0x81, 0x0) 15:07:33 executing program 2: utimes(&(0x7f0000000ac0)='./file1\x00', 0x0) 15:07:33 executing program 0: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000e00)=ANY=[], 0xa, 0x0}, 0x0) getresgid(&(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000180)) 15:07:33 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$unix(r0, &(0x7f0000002680)=@abs={0x8}, 0x8) 15:07:33 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x5b55156066bae85f, 0x1c}, 0x1c) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x23, &(0x7f0000000000)=0x1c00, 0xfe6a) 15:07:34 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x0, 0x10000}, 0x10) 15:07:34 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) socket$inet6_sctp(0x1c, 0x0, 0x84) 15:07:34 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) 15:07:34 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) recvfrom$inet6(r0, 0x0, 0x0, 0x40043, 0x0, 0x0) 15:07:34 executing program 2: execve(0x0, &(0x7f00000000c0), 0x0) 15:07:34 executing program 3: syz_emit_ethernet(0xd9, &(0x7f0000001700)={@broadcast, @remote, @val, {@ipv6}}, 0x0) 15:07:34 executing program 5: accept4$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x0, 0x0) 15:07:35 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$sock_int(r0, 0xffff, 0x100, 0x0, &(0x7f0000000340)) 15:07:35 executing program 0: msgctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000040)={{0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff}}) 15:07:35 executing program 1: r0 = semget$private(0x0, 0x9, 0x0) semop(r0, &(0x7f0000000040)=[{0x0, 0x1939}, {0x0, 0x5}, {0x0, 0x5}, {0x0, 0xdf80}], 0x4) 15:07:35 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000280)=ANY=[@ANYBLOB="1c1c4e2300040000fe"], 0x98) 15:07:35 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000180)={0x0, @in, 0x9}, 0xa0) 15:07:35 executing program 3: setgroups(0x1, &(0x7f0000000040)=[0x0]) 15:07:35 executing program 4: readlinkat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 15:07:35 executing program 2: execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=[&(0x7f0000000040)='\xf5(\xc8{-\'-,!\x00', &(0x7f0000000080)='!#}#-%\x00'], &(0x7f00000001c0)=[&(0x7f0000000100)='[\x00', &(0x7f0000000140)='#+\x00']) 15:07:35 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0xc, &(0x7f0000000080)={@broadcast}, 0xc) 15:07:35 executing program 5: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) bind$inet6(r0, &(0x7f00000001c0)={0x1c, 0x1c, 0x1}, 0x1c) 15:07:36 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x22, &(0x7f00000000c0)={0xf}, 0xc) 15:07:36 executing program 4: mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) 15:07:36 executing program 2: fcntl$getown(0xffffffffffffffff, 0x2) 15:07:36 executing program 0: r0 = socket$inet(0x2, 0x3, 0x0) sendmsg(r0, &(0x7f0000001640)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f00000012c0)=[{&(0x7f0000000240)="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", 0x7ed}], 0x1}, 0x0) 15:07:36 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$sock_int(r0, 0xffff, 0x800, &(0x7f0000000200), 0x4b) 15:07:36 executing program 4: fcntl$getown(0xffffffffffffffff, 0x10) 15:07:36 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000280)=ANY=[@ANYBLOB="1c1c4e2300040000fe8000000000000000000000000000bbff0300000000000000b700"/124, @ANYRES32, @ANYBLOB="01000080020000000500000051"], 0x98) 15:07:36 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_int(r0, 0x0, 0x44, 0x0, &(0x7f0000000040)) 15:07:36 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) connect$inet(r2, &(0x7f00000001c0)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) 15:07:37 executing program 5: r0 = socket$inet(0x2, 0x3, 0x0) sendmsg(r0, &(0x7f0000001640)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f00000012c0)=[{&(0x7f0000000240)="45fdbf8b6384b338c5e4048ca4bb83878af3a9248dcc43f2c655239a6284cdba3894fca8e88f40448f3f3f152e1a6c1c50c8d8fe0ef14decbf3b0dd901aacbe0abaae8124fa4bc52846347135b1ea398dbd16bfe0c5f8cb855982bef44", 0x5d}], 0x1}, 0x0) 15:07:37 executing program 4: shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000000)=""/243) 15:07:37 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) connect$inet6(r0, &(0x7f0000000000)={0x5b55156066bae85f, 0x1c}, 0x1c) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x23, &(0x7f0000000000), 0xfe6a) 15:07:37 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:07:37 executing program 3: syz_emit_ethernet(0x2e, &(0x7f0000000040)={@local, @broadcast, @val, {@ipv4}}, 0x0) 15:07:37 executing program 2: syz_emit_ethernet(0x11b, &(0x7f0000001700)={@broadcast, @remote, @val, {@ipv6}}, 0x0) 15:07:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x50, &(0x7f0000000140)={0x0, {{0x10, 0x2}}}, 0x8c) 15:07:38 executing program 3: r0 = socket$inet(0x2, 0x3, 0x0) sendmsg(r0, &(0x7f0000001640)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f00000012c0)=[{&(0x7f0000000240)="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", 0xfb5}], 0x1}, 0x0) 15:07:38 executing program 1: shmat(0xffffffffffffffff, &(0x7f0000ffe000/0x1000)=nil, 0x0) shmdt(0x0) 15:07:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000002640)={0x0, 0x0, 0x0}, 0x0) 15:07:38 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r1, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x22, &(0x7f00000000c0), 0xc) 15:07:38 executing program 4: accept4$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, &(0x7f00000000c0)=0x8, 0x0) 15:07:38 executing program 1: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x31, 0x0, 0x0) 15:07:38 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xb, &(0x7f0000000180), 0x20) 15:07:38 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000180)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0, 0x0, &(0x7f00000002c0)=[{0xc, 0x11}], 0xc}, 0x0) 15:07:39 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x22, &(0x7f00000000c0), &(0x7f0000000180)=0xc) 15:07:39 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f0000000000), &(0x7f00000000c0)=0xa0) 15:07:39 executing program 1: r0 = socket$inet(0x2, 0x3, 0x0) sendmsg(r0, &(0x7f0000001640)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f00000012c0)=[{&(0x7f0000000240)='E', 0x1}, {0x0}, {&(0x7f0000001240)="87", 0x1}], 0x3}, 0x0) 15:07:39 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) dup2(r0, 0xffffffffffffffff) 15:07:39 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind$inet6(r0, &(0x7f00000001c0)={0x1c, 0x1c, 0x1}, 0x1c) 15:07:39 executing program 5: fcntl$getown(0xffffffffffffffff, 0xe) 15:07:39 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x22, &(0x7f00000000c0), 0xc) 15:07:39 executing program 2: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x17, 0x0, &(0x7f0000000180)) 15:07:39 executing program 0: getgroups(0x3, &(0x7f00000000c0)=[0x0, 0x0, 0x0]) setregid(0x0, r0) 15:07:40 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_buf(r0, 0x0, 0x41, &(0x7f0000000240)="9f9368a507", 0x5) 15:07:40 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000400)=[{0x0}, {0x0}], 0x2, &(0x7f0000000440)=""/124, 0x7c}, 0x0) 15:07:40 executing program 5: execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), &(0x7f00000001c0)=[&(0x7f0000000100)='[\x00', &(0x7f0000000140)='#+\x00']) 15:07:40 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000080)={@remote}, 0xc) 15:07:40 executing program 4: setgroups(0x1, &(0x7f0000000040)=[0xffffffffffffffff]) 15:07:40 executing program 0: mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) chdir(0x0) r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x1000) 15:07:40 executing program 5: r0 = socket$inet(0x2, 0x3, 0x0) sendmsg(r0, &(0x7f0000001640)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000001300)=[{0xc}], 0xc}, 0x0) 15:07:40 executing program 2: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000001c0)={0x1c, 0x1c}, 0x1c) 15:07:40 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)=@un=@abs={0x8}, 0x8) 15:07:40 executing program 1: msgsnd(0xffffffffffffffff, &(0x7f0000000000), 0x4, 0x0) 15:07:41 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mreq(r0, 0x0, 0x9, 0x0, &(0x7f0000000140)) 15:07:41 executing program 0: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x3b, 0x0, &(0x7f0000000040)) 15:07:41 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000000), 0x98) 15:07:41 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000280)=ANY=[@ANYBLOB="1c1c4e2300040000fe8000000000000000000000000000bbff0300000000000000b700"/116, @ANYRES32, @ANYBLOB="01000080020000000500000051"], 0x98) 15:07:41 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000280)=ANY=[], 0x98) 15:07:41 executing program 3: r0 = socket$inet(0x2, 0x3, 0x0) sendmsg(r0, &(0x7f0000001640)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f00000012c0)=[{&(0x7f0000000240)="45fdbf8b6384b338c5e4048ca4bb83878af3a9248dcc43f2c655239a6284cdba3894fca8e88f40448f3f3f152e1a6c1c50c8d8fe0ef14decbf3b0dd901aacbe0abaae8124fa4bc52846347135b1ea398dbd16bfe0c5f8cb855982bef44687fe88790e007ce8a3228a517c05b24d9e1e769bc3f280f6377d3e025e09895500f25d53750bf3c37a4bfa60669f14124e4616ef27efb21e11d792945090ca07dd3f2871ea256f28214cf4a5f9ba380b9adeee909e97fd460d32758a4767700d8d28bdb53f98f7f6f61d73399b459197ec0f65c74b9059ce9ea480b34c6ec5069a8a5ac946ce945556eeb67704abccafb1d1c37edd5f693f1a29ceb200c80b4101c0cf7a377661ae7b0b91bad4642e47a67394d0f566680a43989efa7957144f967e6be472c298d7b4dc0a9a176453476b5a5578b042c06719ba00fa54b770dfadeec1b61be79c3316d9282a0f19077708924cbde47bdd0cffe4fc840e09f7b8243a00f5eb7371cb96ff6c2b2b1a2198c5437226028575df66319815d869df65b8218a1b599dba822e3d41382241d94a6bfcb66b8203e31284f3eb18661ef64e922906c55d47e5a18ebe54fb2ab1eec72a2a4c41dc825c777f7e089087e9c65d4c0c6f8937c9f3d2f80b5f462ce36e204b3ab7779708dcd58fb888de506204d3aab006a01777cd38ea71f0921b2202a05d3d1cca641c3e9922887fba714d8d908d331e6efd6dc0fb0c165647969f790eb6fca694bf1190d05140ec1b0b411a5122a0c587a9eb4ed9ffc9f270bb17b89e409c146f44bce87c39d7815502f809f5dc1e006e2daf5591274631a69adee796f755013f83dee8a1ae7ff905c9381fdbc01ce218b69ab418307c434cdcc845bfe0acd94b98345045fab354ce54c1426e6468dcb1f0911e79e3bf258c073b5b76378d3e179b3a7cdf60ea310215b26c85f876a754eca70e3ed7ad4a1f89abc0d0782fd61d854e0dee6d1417d7ba2f0866c5a2a34a52596affaa09cf84963a27547bc2a8338bb8c03b40261dad5fa6487f22a89e2c839acc47118a18ef6d74745329b1af2e9fd995ef008d065132d529dfef75af06ffd3445fe6173e7974b949186f6bd3bd06eaa3de3d81a0adaf069cf62764b1d62db71896fdc47a8750ace9065098680117f3b9dd7e707d4eef802e43189b556b2de9123f6af05e8600dfa7bbd7af8cddbd86de6fbae608327e962ff967b6cf38b5e57d53bd403acd79f78fb65f64ede78f1e94f7a0df66bca3f107ec2e5c915c0e210c0511f54d7c22b808adc8b9d18cf4c1083833e4b98a43880b096509334a0f276d93a88914302b1d29651845248bd0c9a3fe23d43148298153f51a7925c190f70994edc93f42e1dbb7cdba37c8b5dfd828d131321f97ee75afef7605ddf1c1363aee78916e3fef38f0a46bd904103066ad414b0c928efe53b3067c3086fc76757b14ad5578310311ac540a3bc78b994c4ab3ddeea7b6533b169524cef50b86facdabe98cd7cd810d36e830deec48defa9c985f7692cae9658083b667387f78e53ca45f7f128870e2207b802555c9776c8234c7eaaacfd38e6024fef60e8a4b8e81ea76112d9ed1e794d6e60e4b8e5a46c5ce94a96b460e8448a26714ec87d2dde894b1a34021d45c8f587842bbd608e6ad45eca35a50743cade4bbc9280f3c4a522f8e659b54693b2ef25e6638c718e7d91c13a19edd783af8f9820a5deb2684d1d47a67111e007f3144a1f3b4bdf5e13cf44832879414344a1c3686f9c946fe420c9056ce26d349fbd76ca41d692c4e059bd8a99373f24bbef91b032df0b73ea584fe951c2c2acf342b26525e0c4a7463e838b52d32501b886206bd7619e5044be4cd9d634df08a8f8257ccf270c447360dd1f72a2773c97c6980defb6fd3ab41be126855f03f5dc8aa455595c8591ec43d2165c0456daac21ff13f3c459ccbcc684bf6542f892ca6cf90c2a30574ef6ccf7c16cedca57eedcc3b97d4694562edb3930f20bbe2e78aa93acf16048b8cbb67153ef23fa1f2afa7f3ddade9cf1b2608364b296b201bf8758448a6d5961aba1d1596a809fa893486a92daefeac963b965c4e6f08c4f7f1485e7fe1ed09cb7c82a3e113c50f185b5f91334fb2eef1f65ef995beba4c2cd202d61813fe8a5f3685f149e111bede4350e0affe2c9099d1be24fce9be912bb0d73e4f9f0eba5b3cc9692fdd45ad7ec45e944c13eef3441941b177f81f0e07d932a9cf7355e20dd57d26dd3551b3a06a058835bec3b70f35ae9f40271950647de83294ef2bd680fc9cbab4f75453e26444dacc520c4dc4236192a996d35709fedc4bb8cac591e78f9a46f3bcb75a9fb1cb9e85de2a00329b464c43e44fe9ec572e9b27e0b363e20b3d3a25ca0a21636b3110734e9ef9b8210ad627c76321d26e2fcd59972546415fedf2e11b0ce98040e77b82d2e26427f5303e432579e19f601a84f4bbf9357264c03fb7846d8d1d9a586d4af7b4cae2503e35f402f8119e70d3924d1958a98c37e30243e622f6ea019ddbfe174048ec7ec4eb8c9e5a5cddd0a1c72967170479a5f55fc3ca51f99a1542d19c3ab5839c3fb7208a3dedb4eec36642490a19d030485184490c0c5348241fc99398ca54341a65d3e4f4089baf87d6a9a59eeb01ccab0e4832c419651f5d98eb6095a66a7c05eb21d6d11223981d8a9728c89c80b1bc6c26cfdbf6eedf7bf599c1d2afc9ddcc4d37ba31bd31ea2219989106926146306d3d766b58195645e7fd8687b45eb5901da580260967ea1da096a64b97adbdf55270a66d250de3e26f5f09af33e102a9abe447009429905fe1ba1e9847d1d0e76156fd1fdae8df5b9bb2695df16c2325f7cf6073775517b6d517835f83417659656d2823b4eab13664a14026e873cf947e2e3baf163eef6f85e672d3bd5af2f9945b938688d3815489df761813ad30000243cecc9f49eae273b2c3793481002ed398444f4d06104e54a9920be90bc69f31f733034829255afa27ed9213198aba1bbfb4f6a2e6df006886a7d23f74d38acffb21e1553525e68be88a6f5ff197356f1b0f1c8e90e7e6a1d6bb17cbe09a036dd42eeeda0ec81215c50d17c4adaf4ae31a7d1bf55dabefba4f4754cd9196e4dfad649fbbbc973e787cdcb25e355b525ad29ce489fbcc3ee87ce8b2996bd12f97fc0779b43f0cc03e2819cf311b60acf09f910e6b33db5bee678848a87a6d1733a53b4cf9b74ffde6c3a31cc1e36750501d997aa4eac058d7486612494b72713f8d349b458758e103be48657d29c3bd975f393898968fc6db18b95537d5503337d7810d782843abe97e8b7f5d8612004fc9d82c59ace4434fbeba784426d13e54d7ab3c50db86e3e0a1c2fab57543b99185ed55fa323ac326e84f3ddaff885fa5984e0f5380b780c781fdbed6a92ad8ea83c583eaff5a68c828134ff2ec314e65f958fcc16d545e38fae0c4e80c28fb87b6e03b322222d7dbb95dc77c08c8051ed81e85a794d572996fee32569a3ca53d02617e04db1a2029e912732cda4b468421a3af08120956c6113585334b184d5657c80e6893aaf269fffac9991ee7add4bad14e404555f4e47f7e2ab9eebada54ba108356500d27eb7d4b577b877384f5e043a2d29ef870ff7d83fdc00730c4e1d5ea69993969b8400d6d7c468fd36f91ee6fcd5228e66170f9a0f13718bcc18a24f75bf64773df6e42dc8cdb70bc09dfa04d4f816163b96ad31e3dc9ba7046ab8d0b50271201fb9520d8bb6e7519b1d7cd34f394e9a1b0a999bbfc88cdf91cab392ed6e2d4d531504d9a116c16a92d1ca95054cdd5d1ce1b8ba147c0f31b14e6ba38a602d1bbb907daf6d9d0be9b6ae2caba3864677d2d0fc94b70d106b2d3b4d3dec16c86a53e0931322da73a150ca06ef3c6b32ac1a618a4586274b41fba51933e324ff008ab2d8128f165dd4e86217546a20d20a5c0c76717cf773869dab841c6c6abec2500443bd43bbc40c38a87b949dc4fed9e8594c82fa99cc6d9ce5792c4cd9e9ecde0edd8301d59a136c8b0f95fae98a60997d069cc9e97a72cd40f32eccb013d84d4d90932497b942fe066b571e11336355aa3015f9e6042d11c27791ae22a41ca3af1c0f567793c2bafc3e01850e7700305b9dd9645d52232a11110f5dd9a24a08cc952fef3d1e90120f42c46a70f2670cebfdbbce7977e26f8f6e4c5aa01a219218cc603e57ea2317fec91f6997199c59c6adac5ac4f14683ce0d020b47a9f2a94054ef726606956687c02e3224224177ccff6f008c6d202ff9075e2dec60d8389ce2be44b5ea60285a3ba800fafa44e41a61e4610fd9ec8d63d01a078c43008818a253e83c83f4d78b2d6c77e6b716ece60326e2ac5f8f6009ce9374ea75a1dc86ea74b5c83e80d5df00b31dcdf97e593f2136d736871ee8d208907b83243a86397db2365ad7f44f18ed0812d00572279545723ec28267e84aa8748c841105e20d7ee68db25e3c7c6fc6b1bed7122b2b9b885ceb56eb9f11d85be49b18a413843131759dcc5b891d48f70ee4806809621766a54260c8eaa8b55eb884cfe7305df018c6898685387f6993424471b656b83f49af3cd9feee8ecfce7f21dab83855acd3386342168d64ffa25c3b59e2c4fd43dc14b7ff45985f1a1aae9c5f7276567ba6a085c2f700f2f98e0daa0a497db9f156f73b54e69caf93fdc5092e15b5d562c9ce826df98f9ab90f74a14e0315d084ad5961f8a8b12f25c819833f500bf680f92501564eaf5a66f80bffa7968f0267cb719b00093926ee13e3d81cce84313152b14c340a7080002772b04e8e8146fdaaf9a9a9e075a0d4345a72d09356776b52892e03cfbb0f64de45388b5df95f2e8f7980591ffa22f59c138aa8c3f039091f8a32866a582b216d56cd25793e918acefa5e183f28c91176c3bef758b557f3ab8b3cfca3c7f1130c7dc9b7333dda8e0611ac8db396faf6fb4165e98e5a05d44e9f27cf9cb9ebccd1538d99dae993f3853896b566419e750fff35dda4ea919272cb51d68f57a8a2df851e8fc77e615436751afca4668f6046e9adc52cdc958652944e2577fd9a78b2665d22cb6f7b820f249373b37c5ea7bb1abb4a41ad5625731fbf688d0e39f053fb3da580c7d8f6effab26f777da961c425f7607fcf2be526102686613193619713ded261b29e9216b4c1262097d3511b2ffef44e169ae85192362d9db800ce41ab412ae77f3d7a9135358d932fc4def7532fad2d3a7f4aa24542bed9f5da22a9bae084261c305b3ff6c0b9a4522a33b2e9d9f25f00780f3d0455360d8e41b7198994c46a804a9c65ea4ebe638b1199879801dabd154a597493c30ac93006c1a8ba187714b9f58e313af6126fae9247b06c6c32ad5f1ac4682304f23f83899684f47f9ee70702f838b52c1ac0370d065a635405c0256e791abffba03424d022a38b5b641be41bde368f6e4d1406cd69f7d441165b201b4fbb7267a901187c0004f7749d0f3ef032392b1e0501ed29549ef05bb01cd7427e9774bdaa6f6977386e6f3041dd39c082dc61640d2211c59127a142f388371468609821bab5bb50e3c5bc7d02091f9b4742b28bdedfcdddc8e7c4eb9236dd0037a0938b843ded96bce9f7fac53c2fa14bbb3e454bf7ffe4ed0682d7af08584e820c8c2aca29255352a563386873a6fd2209e6ad36abae6375128c5a281ae1eb9c2593ed1d7973eff0debf245fd41d44dad3f4ece305ec26a2d43262dc684ec3141863c0606a9ad0ff9d7e92e5713fe9e9bfc73b431a0894005a42ecd8533efaae8374b2", 0x1000}, {&(0x7f0000000040)="4b1983231b87439ab3758bc74caf362f1bcb640974e9be21b96a7e5d5e0a07ffd29fbd856e1cffee14a1875128cdea9f8e8b003ad41888a0d163fe8b01ae5da98f08d9bd7f222e7d2b79f4b1716110fec9bd211c355c1d72bf13172b86dc0bbd8a78f885c30d6304ba238cf40cd53713630cfe8007bfaf5f450e67021b19ec18bd31c3256a6c5a0ed3ef3252020201e64e5be2e1577a946815c75be2c5a77d8b617b01e4543962a6ea6436cdb24b62fd766e", 0xb2}, {&(0x7f0000001240)="877e0d8f4eb53f134befac7ca42154b741a8575c7dd15b21804d3d51e7440e6d51995467e61f15b3c6d9df0fcf5cb5", 0x2f}], 0x3, &(0x7f0000001300)=[{0x30, 0x0, 0x0, "094fd216df3cf0c3857d8189a3b4afeaa47570ceb89947830c29b71c7b1ab37dc4"}, {0x38, 0x0, 0x0, "a5c2e56aafe96c2dc340489cf64539ef51a685e1216d497d8050413951f5a285799be2d826814c399b"}, {0x28, 0x0, 0x0, "16fda0927f3a86071c06166c5c211fd586439c8d6a64effc71"}, {0x38, 0x0, 0x0, "421d891d43d8dd70760e4bfd58886807b3e13b2afea661a61955d101411df218cd7464680de6ee1ea8"}], 0xc8}, 0x20089) 15:07:41 executing program 5: socket(0x1, 0x3, 0x8) 15:07:41 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xd8da1fe12a08c261, 0x0, 0xfffffeda, 0x0, 0xffffffffffffffd7}, 0x0) 15:07:42 executing program 2: clock_getres(0x0, &(0x7f0000000140)) 15:07:42 executing program 1: mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x1013, 0xffffffffffffffff, 0x0) 15:07:42 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0xa41, 0x0) 15:07:42 executing program 5: connect$unix(0xffffffffffffff9c, 0x0, 0x0) 15:07:42 executing program 0: r0 = socket$inet6(0x18, 0x1, 0x0) sendmsg(r0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=[{0x10}], 0x10}, 0x0) 15:07:42 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) sendto$unix(r0, 0x0, 0x0, 0x8, &(0x7f00000000c0)=@abs, 0x8) 15:07:42 executing program 3: socket(0x20, 0x0, 0x4d) 15:07:42 executing program 2: r0 = semget(0x0, 0x0, 0x0) semctl$GETZCNT(r0, 0x3, 0x7, 0x0) 15:07:43 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x0) write(r0, 0x0, 0x0) 15:07:43 executing program 4: setuid(0xffffffffffffffff) syz_open_pts(0xffffffffffffffff, 0x0) 15:07:43 executing program 0: shmget(0x0, 0x3000, 0x771, &(0x7f0000ffd000/0x3000)=nil) 15:07:43 executing program 1: recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xa) 15:07:43 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)=[{0x0}], 0x1}, 0x0) 15:07:43 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) recvmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/158, 0x9e}, 0x401) 15:07:43 executing program 5: r0 = shmget(0x2, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmat(r0, &(0x7f0000ffb000/0x3000)=nil, 0x0) 15:07:43 executing program 4: r0 = socket$inet(0x2, 0x3, 0x0) recvmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0xc01) 15:07:43 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x40010001) 15:07:43 executing program 1: r0 = semget(0x0, 0x0, 0x0) semctl$SETALL(r0, 0x0, 0x9, &(0x7f0000000400)) 15:07:43 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x0) write(r0, &(0x7f00000000c0)="900485", 0x3) 15:07:43 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) fcntl$lock(r0, 0x227023d92a4c8b1b, 0x0) 15:07:44 executing program 3: setrlimit(0x8, &(0x7f0000000280)) 15:07:44 executing program 0: pipe2(&(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) listen(r0, 0x0) 15:07:44 executing program 1: r0 = shmget(0x2, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/31) 15:07:44 executing program 2: r0 = semget(0x0, 0x0, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x3, 0x1000}], 0x1) 15:07:44 executing program 4: msgget(0x2, 0x320) 15:07:44 executing program 3: r0 = shmget(0x2, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_STAT(r0, 0x2, 0x0) 15:07:44 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) r1 = dup2(r0, r0) getsockname(r1, 0x0, 0x0) 15:07:44 executing program 0: pipe2(&(0x7f0000001300)={0xffffffffffffffff}, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:07:44 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x4301, 0x0) 15:07:44 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x0, 0x0, 0x0, 0x48, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x4, 0x5}, 0x40) 15:07:45 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x3e5b02, 0x0) 15:07:45 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) write$cgroup_freezer_state(r0, &(0x7f0000000380)='FROZEN\x00', 0xe) 15:07:45 executing program 5: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000340)="9c", &(0x7f0000000380)='X'}, 0x48) 15:07:45 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000004480)={0x0, 0x0, &(0x7f0000003f80)=[{&(0x7f0000001d40)='c', 0x1}], 0x1, &(0x7f0000004000)}, 0x0) 15:07:45 executing program 1: mkdir(&(0x7f0000001440)='./file0\x00', 0x0) 15:07:45 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) close(r1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000180)={0x0, 0x70, 0x0, 0xdd, 0xc, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x431035ad, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x0, 0x3, 0x3ff, 0x0, 0x0, 0x0, 0x200}) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000000)={'bridge_slave_1\x00'}) 15:07:45 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f00000019c0)) 15:07:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000001400)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)="94d59833195353950197088f87bd2f4ecf0746dbe6cae0cc1a9d249f8d8d3693698a13a760f3b59be04b96e79163fea8c749497571bf191e2e555fcdaa05de65e1754f954db6c0a3d80ff99de639ec7654d214694b3941477795f116450fa8942705a5b82c9d695b264ba9d3750148cc5c4162632e9146e25e382dc233042fe042813815cd46eadb0e646570d2ce7f191a0b7273886d6cadb9949b38fa35700bad75306f491cfffed7f42d5b36", 0xad}, {&(0x7f0000000100)="1e90d719db983a02b0ef8fc41c63c81745175a20e8bd62536d2b84c66fd33135537794d61523e73694299da8d7fca4c64488e836e3c926665f7e8d1b3c99735d1d2bfb941cb50b3a7dd57cfe426e3a19e04066f661ff18ca4a2d6673356d", 0x5e}], 0x2, &(0x7f00000001c0)=[{0x1010, 0x10b, 0x3, "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"}, {0x78, 0x116, 0x7ff, "4a5d49c3c0ab85b91c0a4ebc96813dfebb49a4e9456c1d239dd6790ab0cf9384fe895d32dd4d2653f4a7e3c6c6d5bc4b3b6634132433713b87edd6b3f07986015ce9dee3051919bfba3a18f0cc15c32cad8633cf08c5e38493212b9f35ec96db5969592b"}, {0x48, 0x1, 0xfffffc60, "895d741e5478e5d1819eeff85134ba26fc16fb521ac28f735601b7c1cc08b46ab64f05f52ddada509c3614582972fe99ac7217"}, {0x60, 0x10b, 0x0, "4c0aae24a220bed3fc1dcad96cb148827c1d4e2026a6471cb2d6af0d2afab40b19a017236c6729b1f0ebc1b10031ba3ffc226c5e73bca3282efa9df6d3c9b06b060c90ff7baa02cca9ff42"}, {0x30, 0x103, 0x6, "6bdaf4d2844bf21a4cd8bf238c82c0226f48f9d273d1fc7d1f9bed325fc5a0bc"}, {0xb8, 0x0, 0xdbb, "231bce516209546401e9a594ec1a16059ddd3ed0f60a6326b2db0df8e1524cbb70a21eaf29e281e76fcc180bf7d54d8c6888006edce8b1b7ea48b3dfdaaf7e1f01f9bc42473a0797b2cd33ce45a19bd2f6fe8484087b1e6b1d3a043c975ecdaef26f47b32ec860ac8a0fa55b253042ddc642cd53e4cd6a9fe5702533c27dd176905a263c2d3b652ac06e51f54a9576f7479e9171908d92ced4e8fda96c438da8c8186d03a52c1b68"}], 0x1218}, 0x40000) mkdir(&(0x7f0000001440)='./file0\x00', 0x94) 15:07:45 executing program 5: bpf$BPF_PROG_GET_FD_BY_ID(0x18, 0x0, 0x0) 15:07:45 executing program 1: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000), 0x8) 15:07:46 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000013d9351c947d8934ad"], &(0x7f0000000080)='syzkaller\x00', 0x6, 0xb8, &(0x7f00000000c0)=""/184, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:07:46 executing program 4: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x40000) mkdir(&(0x7f0000001440)='./file0\x00', 0x94) 15:07:46 executing program 3: perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x1278, &(0x7f0000000100)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207a07e4f1e000000880306fb0a000200030ada1b40d805000304c50083b8", 0x2e}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 15:07:46 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) 15:07:46 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000004480)={0x0, 0x0, &(0x7f0000003f80)=[{&(0x7f0000001d40)='c', 0x1}, {&(0x7f0000002d40)='c', 0x1}, {&(0x7f0000002e40)="fa", 0x1}], 0x3, &(0x7f0000004000)=[{0x28, 0x0, 0x0, "f3956ef451f9cb96fc39a6708c66377694"}], 0x28}, 0x0) 15:07:46 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x70}, 0x0) 15:07:46 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x4000, 0x0) [ 838.477155][T21922] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.3'. [ 838.540361][T21925] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.3'. 15:07:46 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) 15:07:46 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0x13, 0x0, 0x0) 15:07:46 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x11}]}}, 0x0, 0x2a}, 0x20) 15:07:46 executing program 3: perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x1278, &(0x7f0000000100)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207a07e4f1e000000880306fb0a0002000e0ada1b40d805000304c50083b8", 0x2e}], 0x1}, 0x0) 15:07:47 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x18, 0x5, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x9e}, @ldst={0x1, 0x0, 0x3, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f00000000c0)='GPL\x00', 0x5, 0xffa, &(0x7f0000000100)=""/4090, 0x0, 0x0, [0x48], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:07:47 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8943, &(0x7f0000000780)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0xa, 0x2) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) [ 839.115857][T21938] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.3'. 15:07:47 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) close(r1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuset.memory_pressure\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0x1) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000180)={0x0, 0x70, 0x3f, 0xdd, 0xc, 0x5, 0x0, 0xd5d1, 0x48194, 0x4, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x431035ad, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x18900, 0x3, 0x3ff, 0x9, 0x18, 0x8, 0x200}) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000000)={'bridge_slave_1\x00'}) 15:07:47 executing program 2: perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 839.212607][T21940] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.3'. 15:07:47 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x9, 0x3, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 839.360896][T21943] device syzkaller1 entered promiscuous mode 15:07:47 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000611200000000000095000000000000007c0493250b892e97c689c050ff0473608c1d28d9d608"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) socket$kcm(0xa, 0x2, 0x73) 15:07:47 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x8, 0x3, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:07:47 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x7, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x2, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:07:47 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x19, 0x4, 0x0, 0x7}, 0x40) 15:07:48 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000180)) 15:07:48 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x200000, 0x0) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, 0x0) [ 840.137348][T21962] device syzkaller1 entered promiscuous mode 15:07:48 executing program 4: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0), 0xffffff3b) socketpair(0x2c, 0x0, 0x0, &(0x7f0000000000)) 15:07:48 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000004480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000004000)=[{0x10}], 0x10}, 0x0) 15:07:48 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000004480)={0x0, 0x0, &(0x7f0000003f80)=[{&(0x7f0000001d40)='c', 0x1}], 0x1}, 0x0) 15:07:48 executing program 5: mkdir(&(0x7f0000001440)='./file0\x00', 0x94) 15:07:48 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000001b00)={0x0, 0x0, 0x0}, 0x0) 15:07:48 executing program 4: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x77, 0x39, &(0x7f0000000080)="37d262a355d57e441d761b998b213d4b9a151e55c7fdfcad63c13b4d06406033c4363fdba180dd7e3a26b634e6302aba99d5d65ea93f58f42826f1feb29f717e15583511672fe0073d0b8deb7dcb3d21c9e548d4058b22feb85d6c167c5f2e4f1de34c37af016d512dce76083c29e353b0bee64ccc9a6d", &(0x7f0000000100)=""/57, 0x0, 0x0, 0x18b, 0xa4, &(0x7f00000007c0)="992c264c4ebda0a6c818a3ba4c2ee0ac159d81175b929a095860fc3da34419f2f610df266dc4c93d2bf16b6f5964c865a4ad35fe1f61b4c17f6023da99b5dec2cf0baf4a1daa359ad9997b192d9e2d63cb92a1814a108eebb387abef78bcd483c347d11bbfc74540bc35fcdef23cd0cd1ee5d7ffbb9d702b9051a9eea2751b0642044cdc0c806f736f8e232de9046e9a0200000000000000da70d5cad2b2361eb543859800d99b3e044e5a6271f4b186902e90ea58cc151931be2dd7430cce3e2964ce35d0f34a6d939359ee9f39cb4fa056ca029700000000000000000000a27ae94d1184c90652335fca4fd974b88873093fce86d7903fc2e8100f0800fc8fa45c22eddfd10100ca930699c56286457ec7624cfafa308d70380d3a13e930125bf51ae8af1c5d7af3182f5379b6fc9c1167d0ee5bc2266eade63e9157b7d279d41d0fbf59a7e98d0f7a1b618d83601daea8d0c3b7ba15487a3980ccc4f47563a114f4ae8aefc1a13eaf5b8fbd229dee02dabe96560ba8f0719df4312d02a3338682000000000000000000", &(0x7f0000000280)="fef5e5a51b66851b9c39881a4d4d8a2ab0b3824c14b2be84a143de8435b101319583901be6e10efddc05eba4d8869bef008d6e58a780914c5e348d713db37c8d81ba5bc9a9ee8de3b42e42e9ef57c7b28010eea307193813205110c47f9592692f01a45f85a9de97947bb3f25ff7226f71a9ef60aaa241032e40e09a6f4cef0249c21b0ec66b56bed8a536208dd6b3144ff5dc4bb69798835248d9e6f6ea10ed9fcea126", 0x1, 0x9}, 0xfffffffffffffe1a) 15:07:48 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000004480)={0x0, 0x0, 0x0}, 0x0) 15:07:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) write$cgroup_freezer_state(r0, &(0x7f0000000380)='FROZEN\x00', 0xfdef) 15:07:49 executing program 4: r0 = socket$inet6(0x18, 0x3, 0x0) setsockopt$sock_int(r0, 0x3a, 0x12, 0x0, 0x0) 15:07:49 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f00000000c0)) 15:07:49 executing program 5: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x4, 0x6, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008500000000001f94c9680000feffffff9500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x5, 0xb6, &(0x7f0000000400)=""/182, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140), 0x2}, 0x70) 15:07:49 executing program 1: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) write$cgroup_freezer_state(r0, &(0x7f0000000380)='FROZEN\x00', 0xfdef) 15:07:49 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) write$cgroup_freezer_state(r0, &(0x7f0000000380)='FROZEN\x00', 0x4) 15:07:49 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x4, &(0x7f0000000140)=@framed={{}, [@generic]}, &(0x7f0000000180)='syzkaller\x00', 0x7, 0x87, &(0x7f00000001c0)=""/135, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:07:49 executing program 2: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000001340)=[{&(0x7f0000000000)=""/47, 0x2f}], 0x1, &(0x7f00000018c0)=[{&(0x7f0000001380)=""/250, 0xfa}], 0x1, 0x0) 15:07:49 executing program 5: io_setup(0x4, &(0x7f0000000040)) io_setup(0x100, &(0x7f0000000180)) io_setup(0xa0, &(0x7f00000000c0)) 15:07:50 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x5460, 0x0) 15:07:50 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3f, 0x62486) write$nbd(r0, &(0x7f00000001c0)=ANY=[], 0x47f4000) read$eventfd(r0, &(0x7f0000000040), 0x8) 15:07:50 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x2000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40000020, 0x0) 15:07:50 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001340)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000140)="d2", 0x1}, {0x0}, {&(0x7f0000001200)="d4", 0x1}], 0x4}, 0x0) 15:07:50 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "2d5d155627834eea"}) 15:07:50 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNISCRNMAP(r0, 0x4b61, &(0x7f0000000380)='d') [ 842.554557][T22033] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 15:07:50 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'team_slave_1\x00', &(0x7f0000000000)=@ethtool_sfeatures={0x28}}) 15:07:50 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) fsetxattr(r0, &(0x7f0000000080)=@known='trusted.overlay.nlink\x00', 0x0, 0x0, 0x2) 15:07:50 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001480)='/dev/bsg\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xb, 0x10, r0, 0x0) 15:07:50 executing program 3: prctl$PR_SET_TSC(0x4, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/pid\x00') 15:07:50 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x6, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x8, 0x40002) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x400, 0x400}]}) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0xe0002001}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xf9, 0x20, 0x0, 0xdf, 0x0, 0x6, 0x10000, 0x7, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6b7, 0x2, @perf_config_ext={0xbe, 0xfffffffff7fffffc}, 0x40658, 0x400, 0xe1d, 0x6, 0x1016, 0x35b, 0xdc7}, 0x0, 0x5, 0xffffffffffffffff, 0x2) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000200)=0x2) pipe2(0x0, 0x0) msgget(0x0, 0x204) ioctl$TIOCL_PASTESEL(r1, 0x541c, &(0x7f0000000100)) ioctl$KIOCSOUND(r1, 0x4b2f, 0x664) sync() ptrace$cont(0x18, 0x0, 0x0, 0x0) 15:07:51 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'team_slave_1\x00', &(0x7f0000000000)=@ethtool_sfeatures={0x28}}) 15:07:51 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x6, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x8, 0x40002) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x400, 0x400}]}) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0xe0002001}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x7a, 0x15, 0x0, 0x0, 0x0, 0x0, 0x1, 0x824b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8000}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r6, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r7, 0x6612) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xf9, 0x20, 0x0, 0xdf, 0x0, 0x6, 0x10000, 0x7, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xf1, 0x2, @perf_config_ext={0xbe, 0xfffffffff7fffffc}, 0x40658, 0x400, 0xe1d, 0x6, 0x1016, 0x35b, 0xdc7}, 0x0, 0x5, 0xffffffffffffffff, 0x2) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000200)=0x2) ioctl$TIOCL_PASTESEL(r1, 0x541c, &(0x7f0000000100)) 15:07:51 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SG_IO(0xffffffffffffffff, 0x2201, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$key(0xf, 0x3, 0x2) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) clone(0x0, &(0x7f00000001c0)="b0bfc71564cdcfee1b587359b15f0a270457ce53ca15650a68e4916e41081d5e5f8aa079ca08371c9c9918ee5e64f17d0627c595d57a93b5151fae7a0df727203d87806e422bdcc54647b85a6a694e4559f2b7", 0x0, &(0x7f0000000680), &(0x7f0000000340)="fb") sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20000082, &(0x7f0000000080)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) getpid() ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000280)={r1, 0x1f, 0x0, 0x7}) finit_module(r2, &(0x7f00000002c0)='}\xc4+*.}-,\x00', 0x4) socket$inet_udplite(0x2, 0x2, 0x88) 15:07:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$setpipe(r0, 0x407, 0x0) 15:07:51 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x7a, 0x15, 0x0, 0x0, 0x0, 0x0, 0x1, 0x824b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000100)=0x7) 15:07:51 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300000020000000002000000000000040000000000008000000", 0x32fd2}], 0x2) 15:07:51 executing program 1: munlock(&(0x7f0000fed000/0x13000)=nil, 0x13000) 15:07:51 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'team_slave_1\x00', &(0x7f0000000000)=@ethtool_sfeatures={0x28}}) 15:07:51 executing program 5: ftruncate(0xffffffffffffffff, 0xffffffffffffffe0) 15:07:52 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SG_IO(0xffffffffffffffff, 0x2201, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockname$inet(0xffffffffffffffff, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) clone(0x0, &(0x7f00000001c0)="b0bfc71564cdcfee1b587359b15f0a270457ce53ca15650a68e4916e41081d5e5f8aa079ca08371c9c9918ee5e64f17d0627c595d57a93b5151fae7a0d", &(0x7f0000000000), &(0x7f0000000680), &(0x7f0000000340)="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") getpid() finit_module(0xffffffffffffffff, &(0x7f00000002c0)='}\xc4+*.}-,\x00', 0x4) setpriority(0x0, 0x0, 0x8000) 15:07:52 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/full\x00', 0x0, 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000000)='trusted.overlay.origin\x00', &(0x7f0000000040)='y\x00', 0x2, 0x2) 15:07:52 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'team_slave_1\x00', &(0x7f0000000000)=@ethtool_sfeatures={0x28}}) 15:07:52 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000580)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)={0x420}, 0x420}}, 0x0) 15:07:52 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$sock(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 15:07:52 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x6, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x4b52, &(0x7f0000000100)) 15:07:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 15:07:52 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2201, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockname$inet(r0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) getpid() finit_module(0xffffffffffffffff, &(0x7f00000002c0)='}\xc4+*.}-,\x00', 0x0) 15:07:53 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SG_IO(0xffffffffffffffff, 0x2201, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockname$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) clone(0x0, &(0x7f00000001c0)="b0bfc71564cdcfee1b587359b15f0a270457ce53ca15650a68e4916e41081d5e5f8aa079ca08371c9c9918ee5e64f17d0627c595d57a93b5151fae7a0df727203d87806e422bdcc54647b85a6a694e4559f2b7", 0x0, &(0x7f0000000680), &(0x7f0000000340)="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") sendto$inet(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000080)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = getpid() ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000280)={r1, 0x1f, 0x400}) finit_module(r3, &(0x7f00000002c0)='}\xc4+*.}-,\x00', 0x4) socket$inet_udplite(0x2, 0x2, 0x88) setpriority(0x0, r2, 0x8000) 15:07:53 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f00000001c0)="b0bfc71564cdcfee1b587359b15f0a270457ce53ca15650a68e4916e41081d5e5f8aa079ca08371c9c9918ee5e64f17d0627c595d57a93b5151fae7a0df727203d87806e422bdcc54647b85a6a694e4559f2b78b5c", &(0x7f0000000000), &(0x7f0000000680), &(0x7f0000000340)="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") sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20000082, &(0x7f0000000080)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r1 = getpid() socket$inet_udplite(0x2, 0x2, 0x88) setpriority(0x0, r1, 0x8000) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000300)) 15:07:53 executing program 5: openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x2, 0x0) 15:07:53 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000100)) gettid() 15:07:56 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SG_IO(0xffffffffffffffff, 0x2201, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockname$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) clone(0x0, &(0x7f00000001c0)="b0bfc71564cdcfee1b587359b15f0a270457ce53ca15650a68e4916e41081d5e5f8aa079ca08371c9c9918ee5e64f17d0627c595d57a93b5151fae7a0df727203d87806e422bdcc54647b85a6a694e4559f2", &(0x7f0000000000), &(0x7f0000000680), &(0x7f0000000340)="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") sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20000082, &(0x7f0000000080)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = getpid() ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000280)={r1, 0x1f, 0x400, 0x7}) finit_module(r3, &(0x7f00000002c0)='}\xc4+*.}-,\x00', 0x4) socket$inet_udplite(0x2, 0x2, 0x88) setpriority(0x0, r2, 0x8000) 15:07:56 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x7a, 0x15, 0x0, 0x0, 0x0, 0x0, 0x1, 0x824b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x4b70, &(0x7f0000000100)) 15:07:56 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x7a, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x824b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8000}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000100)=0x2) 15:07:56 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x7a, 0x15, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000100)=0x11) 15:07:56 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x7a, 0x15, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000100)=0xc) 15:07:56 executing program 2: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x6, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x7a, 0x15, 0x0, 0x0, 0x0, 0x0, 0x1, 0x824b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8000}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, 0x0) 15:07:56 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x6, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x8, 0x40002) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x400, 0x400}]}) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0xe0002001}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x7a, 0x15, 0x0, 0x0, 0x0, 0x0, 0x1, 0x824b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8000}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCL_PASTESEL(r1, 0x541c, &(0x7f0000000100)) 15:07:56 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockname$inet(0xffffffffffffffff, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000082, 0x0, 0x0) getpid() finit_module(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:07:57 executing program 4: pselect6(0x40, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000100), 0x0) 15:07:57 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/partitions\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) 15:07:57 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCGPTPEER(r0, 0x5406, 0x7fffffffefff) 15:07:57 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) 15:07:57 executing program 0: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x121180, 0x0) 15:07:57 executing program 1: r0 = fsopen(&(0x7f0000000000)='vfat\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x3, &(0x7f0000000040)=':#\x00', 0x0, 0x0) 15:07:58 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x7a, 0x15, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000100)=0x4) 15:07:58 executing program 1: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @empty}, {0x2, 0x0, @private}}) 15:07:58 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SG_IO(0xffffffffffffffff, 0x2201, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockname$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) clone(0x0, &(0x7f00000001c0)="b0bfc71564cdcfee1b587359b15f0a270457ce53ca15650a68e4916e41081d5e5f8aa079ca08371c9c9918ee5e64f17d0627c595d57a93b5151fae7a0df727203d87806e422bdcc54647b85a6a694e4559f2b7", &(0x7f0000000000), &(0x7f0000000680), &(0x7f0000000340)="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") sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20000082, &(0x7f0000000080)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = getpid() ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000280)={r1, 0x1f, 0x400, 0x7}) finit_module(r3, &(0x7f00000002c0)='}\xc4+*.}-,\x00', 0x4) socket$inet_udplite(0x2, 0x2, 0x88) setpriority(0x0, r2, 0x8000) 15:07:58 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f00000012c0)="20048a927f1f6588b927481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1", 0x25, 0x0, 0x0, 0x0) 15:07:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_VERDICT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x3, 0x3, 0x201, 0x0, 0x0, {}, [@NFQA_VERDICT_HDR={0xc}]}, 0x20}}, 0x0) 15:07:58 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x60, 0x0, 0x0) 15:07:58 executing program 2: socket(0x10, 0x2, 0x184) 15:07:59 executing program 1: accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0xc1800) 15:07:59 executing program 3: bpf$MAP_CREATE(0xa, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 15:07:59 executing program 4: timer_create(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f0000000200)) timer_settime(0x0, 0x1, &(0x7f0000000300)={{}, {0x77359400}}, 0x0) 15:07:59 executing program 2: r0 = fsopen(&(0x7f0000000000)='vfat\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x2, &(0x7f0000000040)=':#\x00', 0x0, 0x0) 15:07:59 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_buf(r0, 0x107, 0xa, &(0x7f0000003740)="02000000", 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x4}, 0x1c) 15:07:59 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, 0x0, 0xfffffffffffffe95) 15:07:59 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) chdir(&(0x7f0000000080)='./bus\x00') creat(&(0x7f0000000300)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)=ANY=[], 0x1a0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1c00}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:08:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @remote}, 0x26, {0x2, 0x0, @multicast1}, 'veth1_virt_wifi\x00'}) 15:08:00 executing program 5: fanotify_mark(0xffffffffffffffff, 0x31, 0x20, 0xffffffffffffffff, 0x0) 15:08:00 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_buf(r0, 0x107, 0x13, &(0x7f0000003740)="cea46889", 0x4) 15:08:00 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000600)='/dev/vcs\x00', 0x0, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000640), 0x2, 0x0) 15:08:00 executing program 1: r0 = fsopen(&(0x7f0000000000)='vfat\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x2, &(0x7f0000000040)=':#\x00', &(0x7f0000000080)='!\xc1\x00', 0x0) 15:08:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xb, 0x0, 0x0, 0x7f}, 0x40) 15:08:00 executing program 2: socket$inet(0x2, 0x0, 0x401) 15:08:00 executing program 3: timer_create(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x3d2b7973610f73b6}, 0x0) 15:08:00 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000002080)=@req={0x28, &(0x7f0000002040)={'ip6gretap0\x00', @ifru_names}}) 15:08:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xa, &(0x7f0000000080)=""/86, &(0x7f0000000100)=0x56) 15:08:00 executing program 5: r0 = fsopen(&(0x7f0000000000)='vfat\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x2, 0x0, 0x0, 0x0) 15:08:00 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000005800)={&(0x7f0000004580)={0xec4, 0x13, 0x4, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0xd7, 0x1, "c4741d20affae4d89d361ec7f6fb6e67c20d6163c6e4ac18763b5a93686a9dc89736206e04cb17c9ddb1a173b9109c486753a9aab385d136cd23380267dd5c8601dd1cbb936f1c97d5360608c547ebeea01f3fefedd8e2b2496a56caee8b7ba760e5d5ce339f982710631d116015f25e4d830b05235a0e69443350e6967873f24747a9a830a83c8a1841588d6fb9efd2680f13fcf12994d1c10d724cf1bc4ad1d31cb26cf30a60d8920a2b56146e0728b73a1331d8b01b706800f4904d23557eb7423069e44a5bd0facaed3ada795446da327f"}, @INET_DIAG_REQ_BYTECODE={0x25, 0x1, "cd2a1faf024c61ca021b51e120bdef49b210ed25d56e8163806ded60581851a912"}, @INET_DIAG_REQ_BYTECODE={0xd75, 0x1, "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"}]}, 0xec4}, 0x1, 0x0, 0x0, 0x20000080}, 0x20044084) 15:08:01 executing program 3: timer_create(0x2, 0x0, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000300)={{}, {0x0, r0+10000000}}, 0x0) timer_delete(0x0) 15:08:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f00000035c0)=[{{&(0x7f0000000d40)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c, &(0x7f0000000f00)}}], 0x1, 0x20000010) 15:08:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x23, 0x0, &(0x7f0000000100)) 15:08:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, @hci, @vsock={0x28, 0x0, 0x0, @host}, @qipcrtr={0x2a, 0x0, 0x3fff}}) 15:08:01 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x6, 0x0, 0x0, 0x0, 0x4}, 0x40) 15:08:01 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2b, 0x0, 0x0) 15:08:01 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000002040)=@req3, 0x1c) 15:08:01 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000020c0)={&(0x7f0000002040)='rxrpc_rx_lose\x00'}, 0x10) 15:08:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockname$packet(r0, 0x0, &(0x7f0000000300)) 15:08:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x8940, &(0x7f0000000040)) 15:08:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x9, 0x0, &(0x7f0000000100)) 15:08:02 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) 15:08:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x2, &(0x7f0000000080)=""/86, &(0x7f0000000100)=0x56) 15:08:02 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) write$FUSE_GETXATTR(r0, &(0x7f0000002040)={0x18, 0x0, r1, {0x374}}, 0x18) 15:08:02 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004300)={0x18, 0x2, &(0x7f00000020c0)=@raw=[@map_val], &(0x7f0000002140)='GPL\x00', 0x0, 0xa0, &(0x7f0000004200)=""/160, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:08:02 executing program 3: bpf$MAP_CREATE(0x14, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 15:08:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x40049409, &(0x7f0000000040)) 15:08:02 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0x4) 15:08:02 executing program 5: r0 = fsopen(&(0x7f0000000080)='ramfs\x00', 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-vsock\x00', 0x2, 0x0) fsconfig$FSCONFIG_SET_FD(r0, 0x5, &(0x7f00000000c0)='vfat\x00', 0x0, r1) 15:08:02 executing program 1: timer_create(0x8b3c097f250e8e1, 0x0, &(0x7f0000001400)) 15:08:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1b, 0x0, &(0x7f0000000100)) 15:08:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x12, 0x0, &(0x7f0000000100)) 15:08:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc0189436, 0x0) 15:08:03 executing program 4: timer_create(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f0000000200)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x3938700}}, 0x0) 15:08:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x4020940d, 0x0) 15:08:03 executing program 2: openat$nvram(0xffffffffffffff9c, 0x0, 0x1a1680, 0x0) 15:08:03 executing program 5: bpf$MAP_CREATE(0x10, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 15:08:03 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000007500)=[{{&(0x7f0000000300)={0xa, 0x4e22, 0x0, @local}, 0x1c, 0x0}}], 0x1, 0x0) 15:08:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000540)={'tunl0\x00', 0x0}) 15:08:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f0000000140)) 15:08:03 executing program 1: r0 = fsopen(&(0x7f0000000000)='vfat\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000100)=':\x8d]\x90\x9d\x0f^o\xf9\x99.\xc7\x83\x99\x94d\x166Z\xda\x99\x9bm\\\xe9s\x1a\xd6\xeaOl\xde\x87s\b\xd2L\xe3\xc1eq\a\xaa\x11M\xbe>9\xcc=Xoh\xc8N($\xac)\xff\xdeGa\xd8|\x8c\r\x7f\xfb\xd4S\b\xdd\xe4\xdb\xa8\x04;n\xe1\xab\x1e\x06&\x96', &(0x7f0000000080)='!\xc1\x00', 0x0) 15:08:03 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vcs\x00', 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000002600)='ethtool\x00', r0) pselect6(0x40, &(0x7f0000002740), &(0x7f0000002780), &(0x7f00000027c0)={0xfffffffffffff7ed}, &(0x7f0000002800)={0x0, 0x989680}, &(0x7f0000002880)={&(0x7f0000002840)={[0xfffffffffffffffc]}, 0x8}) 15:08:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x26, &(0x7f0000000000)={@remote, @dev, @dev}, 0xc) 15:08:04 executing program 0: socket$inet(0x2, 0xa, 0x40000008) 15:08:04 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3) getsockopt$inet6_tcp_buf(r0, 0x3a, 0x0, 0x0, 0x0) 15:08:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000180)="3fe44aa0ec3bf439ae80605b15f16c60", 0x10) 15:08:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x8918, &(0x7f0000000040)) 15:08:04 executing program 5: r0 = fsopen(&(0x7f0000000000)='vfat\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x3, &(0x7f0000000040)=':#\x00', &(0x7f0000000080)='!\xc1\x00', 0x0) 15:08:04 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@hyper}) 15:08:04 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1c000000180039030000008cb61427000a0200000000000600"], 0x1c}}, 0x0) 15:08:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f00000007c0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0xf89cc9252f04d65c) 15:08:04 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) accept4(r0, 0x0, 0x0, 0x0) [ 856.886861][T22339] IPv6: Can't replace route, no match found 15:08:05 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) sendmmsg$inet6(r0, &(0x7f0000001580)=[{{&(0x7f0000000200)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c, 0x0, 0x0, &(0x7f0000001900)=[@dstopts={{0x18}}, @flowinfo={{0x14, 0x29, 0xb, 0x87}}], 0x30}}], 0x1, 0x4000000) [ 856.957552][T22340] IPv6: Can't replace route, no match found 15:08:05 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3) getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, 0x0, 0x0) 15:08:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xd, &(0x7f0000000100)=""/166, &(0x7f00000001c0)=0xa6) 15:08:05 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1c000000180039030000008cb61427000a0200000000000600"], 0x1c}}, 0x0) 15:08:05 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 15:08:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x894b, &(0x7f0000000040)) 15:08:05 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004300)={0x18, 0x2, &(0x7f00000020c0)=@raw=[@map_val], &(0x7f0000002140)='GPL\x00', 0x6, 0xa0, &(0x7f0000004200)=""/160, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:08:05 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) ioctl$TUNSETOWNER(r1, 0x400454cc, 0xee00) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) [ 857.559212][T22353] IPv6: Can't replace route, no match found 15:08:05 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vcs\x00', 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000002600)='ethtool\x00', r0) pselect6(0x40, &(0x7f0000002740), &(0x7f0000002780), &(0x7f00000027c0), &(0x7f0000002800)={0x0, 0x989680}, &(0x7f0000002880)={&(0x7f0000002840)={[0xfffffffffffffffc]}, 0x8}) 15:08:05 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1c000000180039030000008cb61427000a0200000000000600"], 0x1c}}, 0x0) 15:08:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f00000007c0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c, 0x0}}], 0x1, 0xf89cc9252f04d65c) 15:08:05 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f0000002080)='ns/time_for_children\x00') 15:08:06 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) 15:08:06 executing program 5: write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000000)={0x18}, 0x18) time(&(0x7f0000004380)) [ 858.142334][T22369] IPv6: Can't replace route, no match found 15:08:06 executing program 1: pipe2$9p(0x0, 0x2000) 15:08:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x4020940d, &(0x7f0000000040)) 15:08:06 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1c000000180039030000008cb61427000a0200000000000600"], 0x1c}}, 0x0) 15:08:06 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/stat\x00', 0x0, 0x0) 15:08:06 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000007500)=[{{&(0x7f0000000300)={0xa, 0x4e22, 0x0, @local}, 0x1c, 0x0}}], 0x1, 0x7ffffff7) 15:08:06 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0xc0, 0x0, 0x80, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f00000000c0), 0xb}}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x80020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000003c0), 0x2}}, 0x0, 0x0, r0, 0x8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcsu\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000001d000/0x18000)=nil, &(0x7f0000000380)=[@text32={0x20, &(0x7f0000000300)="0f20c035010000000f22c00f32660f3882b00300000066baf80cb858005b8fef66bafc0c66b8008866ef9ae04b00002501653e0f01ca64360f01d166b82e008ed00fc73c3c66baf80cb810a7788bef66bafc0ced", 0x54}], 0x1, 0x1, &(0x7f00000003c0), 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r4 = syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0xb000000000000000, 0x20000) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000280)={0x10000, 0x1, 0xf000, 0x2000, &(0x7f000001e000/0x2000)=nil}) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f00000001c0)={[0xffffffffffffff7f, 0xfffffffffffffffe, 0x0, 0xffffffff, 0x20000, 0x80000000000800, 0x10000020000000db, 0x3], 0x100000, 0x800}) ioctl$KVM_RUN(r5, 0xae80, 0x0) 15:08:06 executing program 1: timer_create(0x0, 0x0, &(0x7f0000000200)) timer_create(0x0, 0x0, &(0x7f0000000040)) timer_delete(0x0) [ 858.819204][T22383] IPv6: Can't replace route, no match found 15:08:07 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @remote}}, {{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, 0x108) 15:08:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) 15:08:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd, 0xd, 0x2, [@datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "01"}]}}, &(0x7f0000000cc0)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 15:08:07 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) getsockopt$sock_timeval(r0, 0x1, 0x43, 0x0, &(0x7f0000000140)) 15:08:07 executing program 2: fsopen(0xfffffffffffffffe, 0x0) 15:08:07 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000180)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @empty, 0x0, 0x1}}) 15:08:07 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1}, 0x40) 15:08:07 executing program 5: r0 = syz_io_uring_setup(0x83, &(0x7f0000000080), &(0x7f0000ee7000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_OPENAT2={0x1c, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)='./file0\x00', 0x18}, 0x0) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) 15:08:07 executing program 1: keyctl$setperm(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x2, &(0x7f00000008c0)=@raw=[@map], &(0x7f0000000900)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x800}, 0x10}, 0x78) 15:08:07 executing program 0: add_key$fscrypt_v1(&(0x7f00000028c0)='logon\x00', 0x0, 0x0, 0xfeffff, 0x0) 15:08:07 executing program 2: add_key(&(0x7f0000000000)='asymmetric\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000380)='pkcs7_test\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) 15:08:08 executing program 4: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="a2", 0x1, 0xffffffffffffffff) keyctl$link(0x8, 0x0, r0) 15:08:08 executing program 3: keyctl$chown(0x11, 0x0, 0xffffffffffffffff, 0xee00) 15:08:08 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x83, &(0x7f0000000080), &(0x7f0000ee7000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x513340}, 0x0) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) 15:08:08 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="a2", 0x1, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f00000000c0)={r0}, &(0x7f0000000100)={'enc=', 'raw', ' hash=', {'ghash-clmulni\x00'}}, 0x0, 0x0) 15:08:08 executing program 2: semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000740)=""/46) 15:08:08 executing program 5: sched_getattr(0x0, &(0x7f0000000140)={0x38}, 0x38, 0x0) 15:08:08 executing program 4: ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000040)='SMC_PNETID\x00', 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000080000000001000000090001"], 0x20}}, 0x0) sendmsg$SMC_PNETID_FLUSH(0xffffffffffffffff, 0x0, 0x0) 15:08:08 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000140)="80", 0x1, 0xffffffffffffffff) keyctl$invalidate(0x15, r0) add_key$fscrypt_v1(&(0x7f00000028c0)='logon\x00', 0x0, 0x0, 0x0, r0) 15:08:09 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="a2", 0x1, 0xffffffffffffffff) keyctl$chown(0x10, r0, 0xffffffffffffffff, 0xee00) 15:08:09 executing program 2: add_key(&(0x7f0000000000)='asymmetric\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000180)='rxrpc_s\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0) 15:08:09 executing program 1: keyctl$set_timeout(0xf, 0x0, 0x2) r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="a2cb20073ba92f119c9e573f62ed82377a8c9a4bf44d2a6f104e4932b9df0d0c45543764dac712ee2420493da26dccfb8f531861f753995a67ccea859d2a83c7acf995bae39d47405988561168248d5ad6fe4260c1c0d46e2b327373a55368cd3f19721a865e22cb4d71d54deccbd84442532836f1e5dc1d372acdc4658416dbf92ec12f36c100b8ae257ba04cf39da638405a275caf265e7f5e2a31645dcc4576e3ac119bbac1d253b38a105834c155111366becafddf08046395ae01161526add720", 0xc3, 0xffffffffffffffff) keyctl$read(0xb, r0, &(0x7f0000000180)=""/4096, 0x1000) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001180)={r0, 0x53, 0x70}, 0x0, &(0x7f00000011c0)="10e8527d84428e804d65eb478dfe5d8848a930385d5d4da488fb497e2d346ec5ebec0c2a23a9ba1234d394953d077f7dc17ad36f182a3bcf10ed8838e58865b43842dd5691741b0dc3e8a3c5c5ca8e9240b6f0", &(0x7f0000001240)="5f666b85db19a022c8b6b0438a035cd5c5e5859a830c66a09415f7564a756b3ee411050442feafcf2767474e7f315dc85d52acc338b6d5b1ab2c012c208f1016aead26b84d793dbab44ed1c13c9505592760be23381a494bf81c79be12beae4d2f6ee4a9da6fd2e64affc9270b366432") keyctl$chown(0x4, r0, 0xffffffffffffffff, 0xee00) r1 = request_key(&(0x7f00000012c0)='keyring\x00', &(0x7f0000001300)={'syz', 0x2}, &(0x7f0000001340)='$+{\x00', 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000001380)=""/219, 0xdb) keyctl$negate(0xd, r1, 0x8001, r0) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000001480)='\xf0:\x00', &(0x7f00000014c0)) keyctl$update(0x2, r0, &(0x7f0000001500)="baadd6194bb02f1278061bf746a2bebed2125df4504faa4f6a2afcb54f87d7336da8eb8351a02d4f47ed2f824ca7feae21e305df702355c2ad647b6f448f642f6a883988d7995b386b55853e0fa8331c8ab5c1b37292adcdb27ba5", 0x5b) r2 = request_key(&(0x7f0000001580)='pkcs7_test\x00', &(0x7f00000015c0)={'syz', 0x0}, &(0x7f0000001600)='\x00', r0) keyctl$KEYCTL_PKEY_QUERY(0x18, r2, 0x0, &(0x7f0000001640)='\x00', &(0x7f0000001680)) r3 = add_key$fscrypt_v1(&(0x7f00000016c0)='logon\x00', &(0x7f0000001700)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000001740)={0x0, "0d84dd1782c73df5e285d3a8c6f35b4e77507b419f9176e18bfd444b77b23591a3702ab584913f23b06147cc57b1793956ced22de1f69788e218fe586a5cbc9a", 0x20}, 0x48, r1) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000017c0)={r3, 0x21, 0x1000}, &(0x7f0000001800)={'enc=', 'oaep', ' hash=', {'wp256\x00'}}, &(0x7f0000001880)="d03b54d6c1401a4cbf5391eeae55c7fc98438080dfe1dea727a2806a90e8f8de4f", &(0x7f00000018c0)=""/4096) r4 = add_key$fscrypt_v1(&(0x7f00000028c0)='logon\x00', &(0x7f0000002900)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000002940)={0x0, "982e81e5ca060adba1c1437936d119d64fa721538113730977fc81704da0b74a73661d57f204247e8ea57b5e61c8839335f97c326372862dd50f9c4facc104b8", 0x18}, 0x48, r0) keyctl$unlink(0x9, r1, r4) keyctl$describe(0x6, r3, &(0x7f00000029c0)=""/139, 0x8b) 15:08:09 executing program 5: r0 = syz_io_uring_setup(0x83, &(0x7f0000000080), &(0x7f0000ee7000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000040)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./file0\x00'}, 0x0) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) 15:08:09 executing program 4: write$P9_RFSYNC(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x0, 0x2, &(0x7f00000008c0)=@raw=[@map={0x18, 0x4}], &(0x7f0000000900)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:08:09 executing program 3: request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0) 15:08:09 executing program 0: syz_open_dev$vcsu(0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x2, &(0x7f00000008c0)=@raw=[@map], &(0x7f0000000900)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000b40), 0x10}, 0x78) 15:08:09 executing program 2: openat$vimc1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video1\x00', 0x2, 0x0) write$P9_RFSYNC(0xffffffffffffffff, 0x0, 0x0) 15:08:09 executing program 1: add_key(&(0x7f0000000200)='dns_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) 15:08:09 executing program 4: pselect6(0x40, &(0x7f00000004c0), &(0x7f0000000500)={0xfffffffffffffe01}, &(0x7f0000000540), &(0x7f0000000580)={0x77359400}, 0x0) 15:08:09 executing program 5: r0 = syz_io_uring_setup(0x83, &(0x7f0000000080), &(0x7f0000ee7000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000040)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./file0\x00'}, 0x0) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) 15:08:10 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="a2", 0x1, 0xffffffffffffffff) keyctl$read(0xb, r0, &(0x7f0000000180)=""/4096, 0x1000) 15:08:10 executing program 0: request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0) 15:08:10 executing program 1: request_key(&(0x7f0000001540)='syzkaller\x00', &(0x7f0000001580)={'syz', 0x2}, 0x0, 0x0) 15:08:10 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="a2cb20073ba92f119c9e573f62ed82377a8c9a4bf44d2a6f104e4932b9df0d0c45543764dac712ee2420493da26dccfb8f531861f753995a67ccea859d2a83c7acf995bae39d47405988561168248d5ad6fe4260c1c0d46e2b327373", 0x5c, 0xffffffffffffffff) keyctl$update(0x2, r0, &(0x7f0000001500)="ba", 0x1) 15:08:10 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/stat\x00', 0x0, 0x0) 15:08:10 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x40) 15:08:10 executing program 5: r0 = syz_io_uring_setup(0x83, &(0x7f0000000080), &(0x7f0000ee7000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000040)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./file0\x00'}, 0x0) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) 15:08:10 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/zoneinfo\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 15:08:10 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0x5}, 0x40) 15:08:10 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/zoneinfo\x00', 0x0, 0x0) 15:08:10 executing program 4: add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000001c0)="046dee247a88616cf75408141a9ad43577e64863e3f403d621e098ff9a4c2bf7c6bdd3fdef0512054fb3cac332d23acca4b53134ab5566726ec09a773ce4c49b94dacd486e2db9d40dcd5cdc8b19e06bba065b0f2bd6d4a2b28cf20dc9ef64c248d8cb29a045ec8e0406bdfae6c1654033d8720a09290ae49e6aa85f841589ef700acfae4dfd51fe1484eecd00f26b034cad91f1bae934b1a479da9c443e304c32bb3808b76b55b45070e2fdecb5b5f5f6525edc314f1110e9f759c99fb66fd16165ea09e8ee71dbdac5d8447aac51f72ad05d6c6b14babb7667d0b909f06631dbda1e7e", 0xe4, 0xffffffffffffffff) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)='keyring\x00', 0x0) 15:08:11 executing program 3: add_key$fscrypt_v1(&(0x7f0000000240)='logon\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) 15:08:11 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="a2", 0x1, 0xffffffffffffffff) keyctl$chown(0x16, r0, 0xffffffffffffffff, 0xee00) 15:08:11 executing program 5: r0 = syz_io_uring_setup(0x83, &(0x7f0000000080), &(0x7f0000ee7000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000040)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./file0\x00'}, 0x0) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) 15:08:11 executing program 2: syz_io_uring_setup(0x2517, &(0x7f0000000100)={0x0, 0x0, 0x6}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) 15:08:11 executing program 1: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x83, &(0x7f0000000080), &(0x7f0000ee7000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, 0x5}, &(0x7f0000000680)='./file0\x00', 0x18}, 0x0) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) 15:08:11 executing program 3: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$fscrypt_v1(&(0x7f0000000140)='logon\x00', &(0x7f0000000180)={'fscrypt:'}, &(0x7f00000001c0)={0x0, "fb94e4a27866ad23b2201070145f9690dc101f24232b0efc2d63526af18516830cc64bb2fb6948d24aeabc55ad851046ab4289cd120289c9272995fca520a5df"}, 0x48, r0) keyctl$unlink(0x9, 0x0, r1) 15:08:11 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8400fffffffa) r3 = open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) sendfile(r0, r3, 0x0, 0x8400fffffffa) 15:08:12 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x400}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002440)={0x0, 0x4, &(0x7f00000000c0)=@framed={{}, [@jmp]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0xf4, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) preadv(r0, &(0x7f00000017c0), 0xf4, 0x0, 0x0) 15:08:12 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x0, 0x2, &(0x7f00000008c0)=@raw=[@map], &(0x7f0000000900)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000b40), 0x10}, 0x78) 15:08:12 executing program 5: r0 = syz_io_uring_setup(0x83, &(0x7f0000000080), &(0x7f0000ee7000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000040)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) 15:08:12 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="a2", 0x1, 0xffffffffffffffff) keyctl$chown(0x3, r0, 0xffffffffffffffff, 0xee00) 15:08:12 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000340)=@encrypted_new={'new ', 'default', 0x20, 'user:', '\\^]-%\''}, 0x2d, 0xfffffffffffffffe) 15:08:12 executing program 0: semtimedop(0x0, &(0x7f0000000440)=[{}], 0x1, &(0x7f0000000480)) 15:08:12 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x83, &(0x7f0000000080), &(0x7f0000ee7000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)='./file0\x00', 0x18}, 0x0) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x8000000) openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) 15:08:12 executing program 1: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x56a, 0x331, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000240)={0x24, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='\x00\"'], 0x0}, 0x0) syz_open_dev$hidraw(&(0x7f0000000180)='/dev/hidraw#\x00', 0x0, 0x0) 15:08:12 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x83, &(0x7f0000000080), &(0x7f0000ee7000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x513340}, 0x0) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) 15:08:13 executing program 5: r0 = syz_io_uring_setup(0x83, &(0x7f0000000080), &(0x7f0000ee7000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000040)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) 15:08:13 executing program 4: syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) 15:08:13 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/zoneinfo\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) accept$phonet_pipe(0xffffffffffffffff, 0x0, 0x0) accept4$phonet_pipe(0xffffffffffffffff, 0x0, 0x0, 0x0) write$eventfd(r0, 0x0, 0x0) 15:08:13 executing program 3: add_key$fscrypt_v1(&(0x7f0000000240)='logon\x00', 0x0, &(0x7f00000002c0)={0x0, "b0ab69e8408b3ba84ebf71abd7c14ac6ba48b9a109539831792bfdac7cdb0768f0429c89ee7d94a49017b6560bc1aa1272fb2eaba54b282c50fc97bd351e5696"}, 0x48, 0xfffffffffffffffc) 15:08:13 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000740)='/proc/locks\x00', 0x0, 0x0) [ 865.245480][ T923] usb 2-1: new high-speed USB device number 19 using dummy_hcd 15:08:13 executing program 5: r0 = syz_io_uring_setup(0x83, &(0x7f0000000080), &(0x7f0000ee7000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000040)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) 15:08:13 executing program 3: keyctl$set_timeout(0xf, 0x0, 0x2) r0 = add_key(0x0, &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="a2cb20073ba92f119c9e573f62ed82377a8c9a4bf44d2a6f104e4932b9df0d0c45543764dac712ee2420493da26dccfb8f531861f753995a67ccea859d2a83c7acf995bae39d47405988561168248d5ad6fe4260c1c0d46e2b327373a55368cd3f19721a865e22cb4d71d54deccbd84442532836f1e5dc1d372acdc4658416dbf92ec12f36c100b8ae257ba04cf39da638405a275caf265e7f5e2a31645dcc4576e3ac119bbac1d253b38a105834c155111366becafddf08046395ae01161526add720", 0xc3, 0xffffffffffffffff) keyctl$read(0xb, r0, &(0x7f0000000180)=""/4096, 0x1000) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001180)={r0, 0x53, 0x70}, 0x0, &(0x7f00000011c0)="10e8527d84428e804d65eb478dfe5d8848a930385d5d4da488fb497e2d346ec5ebec0c2a23a9ba1234d394953d077f7dc17ad36f182a3bcf10ed8838e58865b43842dd5691741b0dc3e8a3c5c5ca8e9240b6f0", &(0x7f0000001240)="5f666b85db19a022c8b6b0438a035cd5c5e5859a830c66a09415f7564a756b3ee411050442feafcf2767474e7f315dc85d52acc338b6d5b1ab2c012c208f1016aead26b84d793dbab44ed1c13c9505592760be23381a494bf81c79be12beae4d2f6ee4a9da6fd2e64affc9270b366432") keyctl$chown(0x4, r0, 0xffffffffffffffff, 0xee00) r1 = request_key(&(0x7f00000012c0)='keyring\x00', &(0x7f0000001300)={'syz', 0x2}, &(0x7f0000001340)='$+{\x00', 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000001380)=""/219, 0xdb) keyctl$negate(0xd, r1, 0x8001, r0) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000001480)='\xf0:\x00', &(0x7f00000014c0)) keyctl$update(0x2, r0, &(0x7f0000001500)="baadd6194bb02f1278061bf746a2bebed2125df4504faa4f6a2afcb54f87d7336da8eb8351a02d4f47ed2f824ca7feae21e305df702355c2ad647b6f448f642f6a883988d7995b386b55853e0fa8331c8ab5c1b37292adcdb27ba5", 0x5b) r2 = request_key(&(0x7f0000001580)='pkcs7_test\x00', &(0x7f00000015c0)={'syz', 0x0}, &(0x7f0000001600)='\x00', r0) keyctl$KEYCTL_PKEY_QUERY(0x18, r2, 0x0, &(0x7f0000001640)='\x00', &(0x7f0000001680)) 15:08:13 executing program 4: add_key(&(0x7f00000000c0)='rxrpc_s\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) [ 865.633350][ T923] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 865.646560][ T923] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 865.656947][ T923] usb 2-1: New USB device found, idVendor=056a, idProduct=0331, bcdDevice= 0.40 [ 865.668837][ T923] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 15:08:13 executing program 0: add_key(&(0x7f0000000080)='cifs.idmap\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) 15:08:13 executing program 2: keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f00000001c0)='\x88@#\x00', 0x0) [ 865.822749][ T923] usb 2-1: config 0 descriptor?? [ 866.552426][ T923] usbhid 2-1:0.0: can't add hid device: -71 [ 866.558887][ T923] usbhid: probe of 2-1:0.0 failed with error -71 [ 866.577017][ T923] usb 2-1: USB disconnect, device number 19 [ 867.302975][ T923] usb 2-1: new high-speed USB device number 20 using dummy_hcd [ 867.682877][ T923] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 867.696021][ T923] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 867.708925][ T923] usb 2-1: New USB device found, idVendor=056a, idProduct=0331, bcdDevice= 0.40 [ 867.720804][ T923] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 867.762043][ T923] usb 2-1: config 0 descriptor?? 15:08:16 executing program 1: request_key(&(0x7f00000012c0)='keyring\x00', &(0x7f0000001300)={'syz', 0x2}, 0x0, 0xfffffffffffffffe) 15:08:16 executing program 5: r0 = syz_io_uring_setup(0x83, &(0x7f0000000080), &(0x7f0000ee7000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000040)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./file0\x00'}, 0x0) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) 15:08:16 executing program 3: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000004240)='/dev/btrfs-control\x00', 0x0, 0x0) 15:08:16 executing program 4: request_key(&(0x7f00000000c0)='rxrpc\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0) 15:08:16 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002440)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') preadv(r0, &(0x7f00000017c0), 0xf4, 0x10, 0x0) 15:08:16 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x200, 0x86, &(0x7f00000000c0)=""/134, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 868.132318][ T923] usbhid 2-1:0.0: can't add hid device: -71 [ 868.138615][ T923] usbhid: probe of 2-1:0.0 failed with error -71 [ 868.196795][ T923] usb 2-1: USB disconnect, device number 20 15:08:16 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x83, &(0x7f0000000080), &(0x7f0000ee7000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_OPENAT2={0x1c, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, 0x4}, &(0x7f0000000680)='./file0\x00', 0x18}, 0x0) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) 15:08:16 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000740)='/proc/locks\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r0, 0x7, 0x0, 0x1) 15:08:16 executing program 4: add_key$keyring(&(0x7f0000000500)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) 15:08:16 executing program 5: r0 = syz_io_uring_setup(0x83, &(0x7f0000000080), &(0x7f0000ee7000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000040)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./file0\x00'}, 0x0) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) 15:08:16 executing program 2: keyctl$chown(0x17, 0x0, 0xffffffffffffffff, 0xee00) 15:08:16 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:08:17 executing program 3: write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$setperm(0x5, r1, 0x2000020) 15:08:17 executing program 5: r0 = syz_io_uring_setup(0x83, &(0x7f0000000080), &(0x7f0000ee7000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000040)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./file0\x00'}, 0x0) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) 15:08:17 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000200)='/dev/vcsu#\x00', 0x19c, 0x0) read$eventfd(r0, &(0x7f0000000540), 0x8) 15:08:17 executing program 4: bpf$MAP_CREATE(0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 15:08:17 executing program 1: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000040)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 15:08:17 executing program 0: add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000140)='6', 0x1, 0xfffffffffffffffc) 15:08:17 executing program 3: semtimedop(0x0, 0x0, 0x0, &(0x7f0000000740)={0x77359400}) 15:08:17 executing program 2: request_key(&(0x7f00000004c0)='id_legacy\x00', &(0x7f0000000500)={'syz', 0x3}, &(0x7f0000000540)='big_key\x00', 0x0) [ 869.714122][T22697] encrypted_key: insufficient parameters specified 15:08:17 executing program 1: request_key(&(0x7f0000000380)='pkcs7_test\x00', 0x0, 0x0, 0xffffffffffffffff) 15:08:17 executing program 4: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000340), 0x0) 15:08:17 executing program 5: r0 = syz_io_uring_setup(0x83, &(0x7f0000000080), &(0x7f0000ee7000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000040)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./file0\x00'}, 0x0) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) [ 869.776612][T22697] encrypted_key: insufficient parameters specified 15:08:18 executing program 0: add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="a2", 0x1, 0xffffffffffffffff) 15:08:18 executing program 3: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x56a, 0x331, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000240)={0x24, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='\x00\"'], 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000180)='/dev/hidraw#\x00', 0x0, 0x0) ioctl$HIDIOCGRDESCSIZE(r1, 0x80044801, 0x0) 15:08:18 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x86, &(0x7f00000000c0)=""/134, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:08:18 executing program 4: syz_open_dev$vcsu(0x0, 0x0, 0x0) r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(0x0, &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0x0) write$P9_RFSYNC(0xffffffffffffffff, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) keyctl$setperm(0x5, r0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x2, &(0x7f00000008c0)=@raw=[@map], &(0x7f0000000900)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:08:18 executing program 2: r0 = syz_io_uring_setup(0x83, &(0x7f0000000080), &(0x7f0000ee7000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000040)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x513340}, 0x0) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) 15:08:18 executing program 5: r0 = syz_io_uring_setup(0x83, &(0x7f0000000080), &(0x7f0000ee7000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000040)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./file0\x00'}, 0x0) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) 15:08:18 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000008c0)={0x1d, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x1, 0x5}, 0x40) [ 870.602201][T10808] usb 4-1: new high-speed USB device number 20 using dummy_hcd 15:08:18 executing program 1: add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) 15:08:18 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r0, 0x4b40, &(0x7f0000000000)) 15:08:19 executing program 2: keyctl$chown(0xe, 0x0, 0xffffffffffffffff, 0xee00) [ 870.972840][T10808] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 870.984167][T10808] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 870.994506][T10808] usb 4-1: New USB device found, idVendor=056a, idProduct=0331, bcdDevice= 0.40 [ 871.003852][T10808] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 15:08:19 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="a2", 0x1, 0xffffffffffffffff) keyctl$set_timeout(0xf, r0, 0x8) [ 871.246325][T10808] usb 4-1: config 0 descriptor?? 15:08:19 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="a2", 0x1, 0xffffffffffffffff) keyctl$chown(0xe, r0, 0xffffffffffffffff, 0xee00) 15:08:19 executing program 5: r0 = syz_io_uring_setup(0x83, &(0x7f0000000080), &(0x7f0000ee7000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000040)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./file0\x00'}, 0x0) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) [ 871.992368][T10808] usbhid 4-1:0.0: can't add hid device: -71 [ 871.998745][T10808] usbhid: probe of 4-1:0.0 failed with error -71 [ 872.039421][T10808] usb 4-1: USB disconnect, device number 20 [ 872.722209][T10808] usb 4-1: new high-speed USB device number 21 using dummy_hcd [ 873.082248][T10808] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 873.093703][T10808] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 873.103920][T10808] usb 4-1: New USB device found, idVendor=056a, idProduct=0331, bcdDevice= 0.40 [ 873.113201][T10808] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 873.127407][T10808] usb 4-1: config 0 descriptor?? 15:08:21 executing program 3: request_key(&(0x7f0000000180)='rxrpc_s\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='\x00', 0x0) 15:08:21 executing program 4: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000340), &(0x7f00000003c0)={&(0x7f0000000380), 0x8}) 15:08:21 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 15:08:21 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 15:08:21 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mremap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x1000, 0x7, &(0x7f00006a9000/0x1000)=nil) 15:08:21 executing program 5: r0 = syz_io_uring_setup(0x83, &(0x7f0000000080), &(0x7f0000ee7000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000040)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./file0\x00'}, 0x0) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) [ 873.542179][T10808] usbhid 4-1:0.0: can't add hid device: -71 [ 873.548623][T10808] usbhid: probe of 4-1:0.0 failed with error -71 [ 873.627404][T10808] usb 4-1: USB disconnect, device number 21 15:08:21 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x2, &(0x7f00000008c0)=@raw=[@map], &(0x7f0000000900)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:08:22 executing program 1: semtimedop(0x0, &(0x7f0000000440)=[{}], 0x1, 0x0) 15:08:22 executing program 0: pselect6(0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0)={&(0x7f0000000380)={[0x7]}, 0x8}) 15:08:22 executing program 4: add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000140)="36782c019f5a58c557c647a5e96ce9ab11647e0aa739bce62a38d7126e5d3851560f2a4cdbc739e4c2c5955f540dac9f621ea4077d17784fef421f8c0d33578d5af5201f4e832cf60eeffe9ce959d18f145d6c25dd4397c8642c2c8abce7d7c1d4b7fe5c43490fa752d61e37b11efde4bfd7900a", 0x74, 0xfffffffffffffffc) 15:08:22 executing program 3: semtimedop(0x0, &(0x7f0000000700)=[{0x0, 0x2}, {0x0, 0x0, 0x1000}], 0x2, &(0x7f0000000740)={0x77359400}) 15:08:22 executing program 5: r0 = syz_io_uring_setup(0x83, &(0x7f0000000080), &(0x7f0000ee7000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000040)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./file0\x00'}, 0x0) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) [ 874.233908][T22807] encrypted_key: master key parameter 'Nƒ,öïþœéYÑ]l%ÝC—Èd,,Š¼ç×ÁÔ·þ\CI§RÖ7±ýä¿× [ 874.233908][T22807] ' is invalid 15:08:22 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x6, &(0x7f0000000580)=ANY=[@ANYRESHEX], &(0x7f0000000080)='GPL\x00', 0x4, 0xa7, &(0x7f00000001c0)=""/167, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:08:22 executing program 1: shmget$private(0x0, 0x1000, 0x800, &(0x7f0000ffb000/0x1000)=nil) 15:08:22 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x83, &(0x7f0000000080), &(0x7f0000ee7000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000040)=0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./file0\x00', 0x42, 0x513340}, 0x0) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) 15:08:22 executing program 4: keyctl$chown(0x16, 0x0, 0xffffffffffffffff, 0xee00) 15:08:22 executing program 3: semtimedop(0x0, &(0x7f0000000440)=[{0x0, 0x8}, {}], 0x2, 0x0) 15:08:22 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000080)={0x0, "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"}) 15:08:22 executing program 5: r0 = syz_io_uring_setup(0x83, &(0x7f0000000080), &(0x7f0000ee7000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000040)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./file0\x00'}, 0x0) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) 15:08:23 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) msgctl$MSG_INFO(0x0, 0xb, &(0x7f0000000100)=""/3) 15:08:23 executing program 0: add_key(&(0x7f0000000000)='asymmetric\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000180)='rxrpc_s\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='\x00', 0x0) 15:08:23 executing program 4: add_key$fscrypt_provisioning(&(0x7f00000000c0)='fscrypt-provisioning\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) 15:08:23 executing program 3: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={0x0, 0x0, 0x18}, 0x10) 15:08:23 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x12, &(0x7f00000003c0), 0x64) listen(r0, 0x1) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) r2 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r2, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000080)='0', 0x1}], 0x1}, 0x0) 15:08:23 executing program 5: r0 = syz_io_uring_setup(0x83, &(0x7f0000000080), &(0x7f0000ee7000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000040)=0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./file0\x00'}, 0x0) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) 15:08:23 executing program 0: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f0000000040)={0x0, @output}) 15:08:23 executing program 3: pselect6(0x0, 0x0, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0)={&(0x7f0000000380)={[0x7]}, 0x8}) 15:08:23 executing program 1: add_key(&(0x7f0000000000)='asymmetric\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000240)='logon\x00', &(0x7f0000000280)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f00000002c0)={0x0, "b0ab69e8408b3ba84ebf71abd7c14ac6ba48b9a109539831792bfdac7cdb0768f0429c89ee7d94a49017b6560bc1aa1272fb2eaba54b282c50fc97bd351e5696"}, 0x48, 0xfffffffffffffffc) keyctl$unlink(0x9, 0x0, r0) 15:08:23 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, 0x0) 15:08:23 executing program 2: add_key(&(0x7f0000000000)='asymmetric\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000080)='logon\x00', 0x0, &(0x7f0000000100)={0x0, "f67082fa2e5808738bb796b48a7ae9259bbc57ada60d32ce4dcf4d400355579a724604f1674f8eddac6dc770a37c2cceb9a9393c0956b8047c6988c2f51a9016", 0x29}, 0x48, 0x0) request_key(&(0x7f0000000180)='rxrpc_s\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='\x00', 0x0) keyctl$link(0x8, r0, 0x0) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000380)='pkcs7_test\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0xffffffffffffffff) keyctl$describe(0x6, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, r0) add_key$fscrypt_provisioning(0x0, &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, 0x0) keyctl$unlink(0x9, 0x0, 0x0) [ 876.033613][ T34] audit: type=1326 audit(1616339304.084:4374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=22865 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x7ffe7e1f09fd code=0x0 15:08:24 executing program 5: r0 = syz_io_uring_setup(0x83, &(0x7f0000000080), &(0x7f0000ee7000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000040)=0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./file0\x00'}, 0x0) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) 15:08:24 executing program 0: keyctl$set_timeout(0xf, 0x0, 0x2) r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="a2cb20073ba92f119c9e573f62ed82377a8c9a4bf44d2a6f104e4932b9df0d0c45543764dac712ee2420493da26dccfb8f531861f753995a67ccea859d2a83c7acf995bae39d47405988561168248d5ad6fe4260c1c0d46e2b327373a55368cd3f19721a865e22cb4d71d54deccbd84442532836f1e5dc1d372acdc4658416dbf92ec12f36c100b8ae257ba04cf39da638405a275caf265e7f5e2a31645dcc4576e3ac119bbac1d253b38a105834c155111366becafddf08046395ae01161526add720", 0xc3, 0xffffffffffffffff) keyctl$update(0x2, r0, &(0x7f0000001500)="baadd6194bb02f1278061bf746a2bebed2125df4504faa4f6a2afcb54f87d7336da8eb8351a02d4f47ed2f824ca7feae21e305df702355c2ad647b6f448f642f6a883988d7995b386b55853e0fa8331c8ab5c1b37292adcdb27ba5", 0x5b) request_key(&(0x7f0000001580)='pkcs7_test\x00', &(0x7f00000015c0)={'syz', 0x0}, &(0x7f0000001600)='\x00', r0) 15:08:24 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="a2", 0x1, 0xffffffffffffffff) keyctl$update(0x2, r0, &(0x7f0000001500)="ba", 0x1) 15:08:24 executing program 1: keyctl$reject(0x13, 0x0, 0x0, 0x6, 0x0) 15:08:24 executing program 2: getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x4) setsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000100)='mptcp_pm\x00', 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, 0x0, 0x8001) syz_open_dev$vcsu(&(0x7f0000000200)='/dev/vcsu#\x00', 0x19c, 0x0) accept4$phonet_pipe(0xffffffffffffffff, 0x0, 0x0, 0x0) write$eventfd(0xffffffffffffffff, 0x0, 0x0) 15:08:24 executing program 5: r0 = syz_io_uring_setup(0x83, &(0x7f0000000080), &(0x7f0000ee7000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000040)=0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./file0\x00'}, 0x0) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) 15:08:24 executing program 1: openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x10440, 0x0) 15:08:24 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000340)='/dev/vcsu#\x00', 0x0, 0x20002) write$P9_RFSYNC(r0, &(0x7f00000005c0)={0x7}, 0x7) 15:08:24 executing program 3: semctl$GETALL(0x0, 0x0, 0xd, &(0x7f00000000c0)=""/206) [ 876.847910][ T34] audit: type=1326 audit(1616339304.894:4375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=22865 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x7ffe7e1f09fd code=0x0 15:08:25 executing program 2: syz_emit_ethernet(0x32, &(0x7f0000000000)={@broadcast, @broadcast, @val, {@arp={0x806, @generic={0x1, 0x0, 0x6, 0x0, 0x0, @local, "", @remote, "06a565ec74e6417b077a8ffa29482424"}}}}, 0x0) 15:08:25 executing program 4: request_key(&(0x7f0000000380)='pkcs7_test\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0xffffffffffffffff) 15:08:25 executing program 1: add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) 15:08:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./file0\x00'}, 0x0) io_uring_enter(0xffffffffffffffff, 0x2039, 0x0, 0x0, 0x0, 0x0) 15:08:25 executing program 0: add_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) 15:08:25 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:08:25 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip6_flowlabel\x00') 15:08:25 executing program 4: keyctl$chown(0x2, 0x0, 0xffffffffffffffff, 0xee00) 15:08:25 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="a2", 0x1, 0xffffffffffffffff) keyctl$update(0x2, r0, &(0x7f0000001500)="ba", 0x1) request_key(&(0x7f0000001580)='pkcs7_test\x00', &(0x7f00000015c0)={'syz', 0x0}, 0x0, r0) 15:08:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./file0\x00'}, 0x0) io_uring_enter(0xffffffffffffffff, 0x2039, 0x0, 0x0, 0x0, 0x0) 15:08:26 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000240)='logon\x00', &(0x7f0000000280)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f00000002c0)={0x0, "b0ab69e8408b3ba84ebf71abd7c14ac6ba48b9a109539831792bfdac7cdb0768f0429c89ee7d94a49017b6560bc1aa1272fb2eaba54b282c50fc97bd351e5696"}, 0x48, 0xfffffffffffffffc) keyctl$unlink(0x9, 0x0, r0) 15:08:26 executing program 3: keyctl$chown(0x1d, 0x0, 0xffffffffffffffff, 0xee00) 15:08:26 executing program 2: openat$vimc1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video1\x00', 0x2, 0x0) 15:08:26 executing program 4: add_key(&(0x7f0000000080)='logon\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f00000000c0)="a2", 0x1, 0xffffffffffffffff) 15:08:26 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="a2", 0x1, 0xffffffffffffffff) keyctl$invalidate(0x15, r0) 15:08:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./file0\x00'}, 0x0) io_uring_enter(0xffffffffffffffff, 0x2039, 0x0, 0x0, 0x0, 0x0) 15:08:26 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000080)={0x0, 0x0}) [ 878.505430][ T3130] ieee802154 phy0 wpan0: encryption failed: -22 [ 878.512237][ T3130] ieee802154 phy1 wpan1: encryption failed: -22 15:08:26 executing program 3: syz_open_dev$vcsu(&(0x7f0000000200)='/dev/vcsu#\x00', 0x19c, 0x40) 15:08:26 executing program 2: pselect6(0x40, &(0x7f00000004c0), &(0x7f0000000500)={0xfffffffffffffe01}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x8, 0x9}, &(0x7f0000000580)={0x77359400}, 0x0) 15:08:26 executing program 4: add_key(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000012c0)='keyring\x00', &(0x7f0000001300)={'syz', 0x2}, &(0x7f0000001340)='$+{\x00', 0xfffffffffffffffe) 15:08:26 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/key-users\x00', 0x0, 0x0) read$eventfd(r0, &(0x7f0000000700), 0x8) 15:08:27 executing program 5: r0 = syz_io_uring_setup(0x0, &(0x7f0000000080), &(0x7f0000ee7000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000040)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./file0\x00'}, 0x0) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) 15:08:27 executing program 0: r0 = syz_io_uring_setup(0x83, &(0x7f0000000080), &(0x7f0000ee7000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x0) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) 15:08:27 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="a2", 0x1, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f00000028c0)='logon\x00', 0x0, 0x0, 0x0, r0) 15:08:27 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)) 15:08:27 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="a2", 0x1, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000000c0)={r0}, &(0x7f0000000100)={'enc=', 'raw', ' hash=', {'md5-generic\x00'}}, 0x0, 0x0) 15:08:27 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000007c0)=@bpf_ext={0x1c, 0x1, &(0x7f0000000640)=@raw=[@call], &(0x7f0000000680)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:08:27 executing program 5: r0 = syz_io_uring_setup(0x0, &(0x7f0000000080), &(0x7f0000ee7000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000040)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./file0\x00'}, 0x0) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) 15:08:27 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/zoneinfo\x00', 0x0, 0x0) connect$rxrpc(r0, &(0x7f0000000640)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}, 0x24) 15:08:27 executing program 3: setsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, 0x0, 0x0) 15:08:27 executing program 1: r0 = perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x83, &(0x7f0000000080), &(0x7f0000ee7000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_OPENAT2={0x1c, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, 0x4}, &(0x7f0000000680)='./file0\x00', 0x18}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x1f, 0x9, 0xd8, 0xef, 0x0, 0x51, 0x1001, 0xc, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x2, @perf_config_ext={0x2, 0x2}, 0x404, 0x20, 0x5, 0x1, 0x1, 0x44, 0xffe1}, 0xffffffffffffffff, 0x8, r0, 0x9) r4 = socket$caif_seqpacket(0x25, 0x5, 0x0) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) dup3(r4, r5, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r4, 0x8982, &(0x7f0000000000)={0x0, 'ip6tnl0\x00', {0x3}, 0x20}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/schedstat\x00', 0x0, 0x0) io_uring_enter(r1, 0x2039, 0x0, 0x0, 0x0, 0x0) 15:08:28 executing program 4: add_key(&(0x7f00000000c0)='rxrpc\x00', 0x0, &(0x7f00000003c0)="a290bcdd74147d115bb37fba95f51d488238855de4bd6f05933d85db649e594df760879c8222bc994bd80c700ed1e405b0770312640548b055b4a8f1ff", 0x3d, 0xffffffffffffffff) 15:08:28 executing program 5: r0 = syz_io_uring_setup(0x0, &(0x7f0000000080), &(0x7f0000ee7000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000040)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./file0\x00'}, 0x0) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) 15:08:28 executing program 0: r0 = add_key(&(0x7f0000000040)='id_resolver\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000080)="a2", 0x1, 0xffffffffffffffff) keyctl$set_timeout(0xf, r0, 0x2) 15:08:28 executing program 3: r0 = request_key(&(0x7f00000012c0)='keyring\x00', &(0x7f0000001300)={'syz', 0x2}, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000001380)=""/219, 0xdb) 15:08:28 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x28, r2, 0x1, 0x0, 0x0, {{}, {0x0, 0x5}, {0x3, 0x19, 'syz0\x00'}}}, 0x28}}, 0x0) 15:08:28 executing program 2: pselect6(0x40, &(0x7f00000004c0), &(0x7f0000000500)={0xfffffffffffffe01}, 0x0, 0x0, 0x0) 15:08:28 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="a2", 0x1, 0xffffffffffffffff) keyctl$chown(0x4, r0, 0x0, 0xee01) 15:08:28 executing program 0: syz_open_dev$video(&(0x7f0000002880)='/dev/video#\x00', 0x0, 0x260000) 15:08:28 executing program 3: add_key(&(0x7f00000000c0)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 15:08:28 executing program 5: r0 = syz_io_uring_setup(0x83, 0x0, &(0x7f0000ee7000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000040)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./file0\x00'}, 0x0) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) [ 880.908994][T23002] ===================================================== [ 880.912214][T23002] BUG: KMSAN: uninit-value in tipc_nl_compat_name_table_dump+0x5be/0xd10 [ 880.912214][T23002] CPU: 0 PID: 23002 Comm: syz-executor.4 Not tainted 5.11.0-rc7-syzkaller #0 [ 880.912214][T23002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 880.912214][T23002] Call Trace: [ 880.912214][T23002] dump_stack+0x21c/0x280 [ 880.912214][T23002] kmsan_report+0xfb/0x1e0 [ 880.912214][T23002] __msan_warning+0x5f/0xa0 [ 880.912214][T23002] tipc_nl_compat_name_table_dump+0x5be/0xd10 [ 880.912214][T23002] ? kmsan_get_metadata+0x116/0x180 [ 880.912214][T23002] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 880.912214][T23002] ? tipc_nl_compat_name_table_dump_header+0x2e0/0x2e0 [ 880.912214][T23002] __tipc_nl_compat_dumpit+0xe98/0x1490 [ 880.912214][T23002] tipc_nl_compat_dumpit+0xb89/0xd50 [ 880.912214][T23002] tipc_nl_compat_recv+0x1182/0x2bb0 [ 880.912214][T23002] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 880.912214][T23002] ? kmsan_internal_set_origin+0x85/0xc0 [ 880.912214][T23002] ? tipc_nl_compat_link_reset_stats+0x550/0x550 [ 880.912214][T23002] ? tipc_nametbl_stop+0x2a00/0x2a00 [ 880.912214][T23002] ? tipc_nl_compat_name_table_dump_header+0x2e0/0x2e0 [ 881.026233][T23002] ? tipc_netlink_compat_stop+0x40/0x40 [ 881.026233][T23002] genl_rcv_msg+0x1319/0x1610 [ 881.026233][T23002] ? tipc_netlink_compat_stop+0x40/0x40 [ 881.026233][T23002] ? kmsan_internal_set_origin+0x85/0xc0 [ 881.026233][T23002] netlink_rcv_skb+0x6fa/0x810 [ 881.026233][T23002] ? genl_rcv+0x80/0x80 [ 881.026233][T23002] genl_rcv+0x63/0x80 [ 881.026233][T23002] netlink_unicast+0x11d6/0x14a0 [ 881.026233][T23002] ? genl_pernet_exit+0x90/0x90 [ 881.026233][T23002] netlink_sendmsg+0x1740/0x1840 [ 881.026233][T23002] ____sys_sendmsg+0xcfc/0x12f0 [ 881.026233][T23002] ? netlink_getsockopt+0x1830/0x1830 [ 881.026233][T23002] __sys_sendmsg+0x714/0x830 [ 881.026233][T23002] ? kmsan_copy_to_user+0x9c/0xb0 [ 881.026233][T23002] ? _copy_to_user+0x1d2/0x270 [ 881.026233][T23002] ? kmsan_get_metadata+0x116/0x180 [ 881.026233][T23002] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 881.026233][T23002] ? kmsan_get_metadata+0x116/0x180 [ 881.026233][T23002] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 881.026233][T23002] __se_sys_sendmsg+0x97/0xb0 [ 881.026233][T23002] __x64_sys_sendmsg+0x4a/0x70 [ 881.026233][T23002] do_syscall_64+0x9f/0x140 [ 881.026233][T23002] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 881.026233][T23002] RIP: 0033:0x466459 [ 881.026233][T23002] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 881.026233][T23002] RSP: 002b:00007fc1da347188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 881.026233][T23002] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 881.026233][T23002] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000004 [ 881.026233][T23002] RBP: 00000000004bf9fb R08: 0000000000000000 R09: 0000000000000000 [ 881.026233][T23002] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60 [ 881.026233][T23002] R13: 0000000000a9fb1f R14: 00007fc1da347300 R15: 0000000000022000 [ 881.026233][T23002] [ 881.026233][T23002] Uninit was created at: [ 881.026233][T23002] kmsan_internal_poison_shadow+0x5c/0xf0 [ 881.026233][T23002] kmsan_slab_alloc+0x8d/0xe0 [ 881.026233][T23002] __kmalloc_node_track_caller+0xa37/0x1430 [ 881.026233][T23002] __alloc_skb+0x2f8/0xb30 [ 881.026233][T23002] netlink_sendmsg+0xdbc/0x1840 [ 881.026233][T23002] ____sys_sendmsg+0xcfc/0x12f0 [ 881.026233][T23002] __sys_sendmsg+0x714/0x830 [ 881.026233][T23002] __se_sys_sendmsg+0x97/0xb0 [ 881.026233][T23002] __x64_sys_sendmsg+0x4a/0x70 [ 881.026233][T23002] do_syscall_64+0x9f/0x140 [ 881.026233][T23002] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 881.026233][T23002] ===================================================== [ 881.026233][T23002] Disabling lock debugging due to kernel taint [ 881.293692][T23002] ===================================================== [ 881.300617][T23002] BUG: KMSAN: uninit-value in tipc_nl_compat_name_table_dump+0x5d7/0xd10 [ 881.303288][T23002] CPU: 0 PID: 23002 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 881.303288][T23002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 881.303288][T23002] Call Trace: [ 881.303288][T23002] dump_stack+0x21c/0x280 [ 881.336958][T23002] kmsan_report+0xfb/0x1e0 [ 881.337445][T23002] __msan_warning+0x5f/0xa0 [ 881.337445][T23002] tipc_nl_compat_name_table_dump+0x5d7/0xd10 [ 881.337445][T23002] ? kmsan_get_metadata+0x116/0x180 [ 881.337445][T23002] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 881.337445][T23002] ? tipc_nl_compat_name_table_dump_header+0x2e0/0x2e0 [ 881.337445][T23002] __tipc_nl_compat_dumpit+0xe98/0x1490 [ 881.337445][T23002] tipc_nl_compat_dumpit+0xb89/0xd50 [ 881.337445][T23002] tipc_nl_compat_recv+0x1182/0x2bb0 [ 881.337445][T23002] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 881.337445][T23002] ? kmsan_internal_set_origin+0x85/0xc0 [ 881.337445][T23002] ? tipc_nl_compat_link_reset_stats+0x550/0x550 [ 881.337445][T23002] ? tipc_nametbl_stop+0x2a00/0x2a00 [ 881.337445][T23002] ? tipc_nl_compat_name_table_dump_header+0x2e0/0x2e0 [ 881.337445][T23002] ? tipc_netlink_compat_stop+0x40/0x40 [ 881.337445][T23002] genl_rcv_msg+0x1319/0x1610 [ 881.337445][T23002] ? tipc_netlink_compat_stop+0x40/0x40 [ 881.337445][T23002] ? kmsan_internal_set_origin+0x85/0xc0 [ 881.337445][T23002] netlink_rcv_skb+0x6fa/0x810 [ 881.337445][T23002] ? genl_rcv+0x80/0x80 [ 881.337445][T23002] genl_rcv+0x63/0x80 [ 881.337445][T23002] netlink_unicast+0x11d6/0x14a0 [ 881.337445][T23002] ? genl_pernet_exit+0x90/0x90 [ 881.337445][T23002] netlink_sendmsg+0x1740/0x1840 [ 881.337445][T23002] ____sys_sendmsg+0xcfc/0x12f0 [ 881.337445][T23002] ? netlink_getsockopt+0x1830/0x1830 [ 881.337445][T23002] __sys_sendmsg+0x714/0x830 [ 881.337445][T23002] ? kmsan_copy_to_user+0x9c/0xb0 [ 881.337445][T23002] ? _copy_to_user+0x1d2/0x270 [ 881.337445][T23002] ? kmsan_get_metadata+0x116/0x180 [ 881.337445][T23002] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 881.337445][T23002] ? kmsan_get_metadata+0x116/0x180 [ 881.337445][T23002] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 881.337445][T23002] __se_sys_sendmsg+0x97/0xb0 [ 881.337445][T23002] __x64_sys_sendmsg+0x4a/0x70 [ 881.337445][T23002] do_syscall_64+0x9f/0x140 [ 881.337445][T23002] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 881.337445][T23002] RIP: 0033:0x466459 [ 881.337445][T23002] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 881.337445][T23002] RSP: 002b:00007fc1da347188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 881.562999][T23002] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 881.562999][T23002] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000004 [ 881.562999][T23002] RBP: 00000000004bf9fb R08: 0000000000000000 R09: 0000000000000000 [ 881.562999][T23002] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60 [ 881.562999][T23002] R13: 0000000000a9fb1f R14: 00007fc1da347300 R15: 0000000000022000 15:08:29 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') preadv(r0, &(0x7f00000017c0), 0xf4, 0x500, 0x0) 15:08:29 executing program 3: semtimedop(0x0, &(0x7f0000000440)=[{0x0, 0x0, 0x1000}], 0x1, 0x0) [ 881.562999][T23002] [ 881.562999][T23002] Uninit was created at: [ 881.562999][T23002] kmsan_internal_poison_shadow+0x5c/0xf0 [ 881.562999][T23002] kmsan_slab_alloc+0x8d/0xe0 [ 881.562999][T23002] __kmalloc_node_track_caller+0xa37/0x1430 [ 881.562999][T23002] __alloc_skb+0x2f8/0xb30 [ 881.562999][T23002] netlink_sendmsg+0xdbc/0x1840 [ 881.562999][T23002] ____sys_sendmsg+0xcfc/0x12f0 [ 881.562999][T23002] __sys_sendmsg+0x714/0x830 [ 881.562999][T23002] __se_sys_sendmsg+0x97/0xb0 [ 881.562999][T23002] __x64_sys_sendmsg+0x4a/0x70 [ 881.562999][T23002] do_syscall_64+0x9f/0x140 [ 881.562999][T23002] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 881.562999][T23002] ===================================================== 15:08:29 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="a2", 0x1, 0xffffffffffffffff) keyctl$set_timeout(0xf, r0, 0x0) 15:08:29 executing program 5: r0 = syz_io_uring_setup(0x83, 0x0, &(0x7f0000ee7000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000040)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./file0\x00'}, 0x0) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) 15:08:30 executing program 2: syz_open_procfs(0x0, &(0x7f0000000040)='net/nf_conntrack_expect\x00') 15:08:30 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="a2", 0x1, 0xffffffffffffffff) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$setperm(0x5, r0, 0x0) 15:08:30 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x28, r2, 0x1, 0x0, 0x0, {{}, {0x0, 0x5}, {0x3, 0x19, 'syz0\x00'}}}, 0x28}}, 0x0) 15:08:30 executing program 5: r0 = syz_io_uring_setup(0x83, 0x0, &(0x7f0000ee7000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000040)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./file0\x00'}, 0x0) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) 15:08:30 executing program 0: keyctl$assume_authority(0x10, 0x0) request_key(&(0x7f0000001200)='big_key\x00', &(0x7f0000001240)={'syz', 0x2}, &(0x7f0000001280)='\'.^}\x00', 0x0) 15:08:30 executing program 3: pipe2$9p(&(0x7f0000001180)={0xffffffffffffffff}, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c09425, 0x0) 15:08:30 executing program 2: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000340), 0x0) 15:08:30 executing program 1: add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) [ 883.060154][T23045] ===================================================== [ 883.062304][T23045] BUG: KMSAN: uninit-value in tipc_nl_compat_name_table_dump+0x5be/0xd10 [ 883.062304][T23045] CPU: 1 PID: 23045 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 883.062304][T23045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 883.089532][T23045] Call Trace: [ 883.089532][T23045] dump_stack+0x21c/0x280 [ 883.089532][T23045] kmsan_report+0xfb/0x1e0 [ 883.089532][T23045] __msan_warning+0x5f/0xa0 [ 883.089532][T23045] tipc_nl_compat_name_table_dump+0x5be/0xd10 [ 883.089532][T23045] ? kmsan_get_metadata+0x116/0x180 [ 883.089532][T23045] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 883.089532][T23045] ? tipc_nl_compat_name_table_dump_header+0x2e0/0x2e0 [ 883.089532][T23045] __tipc_nl_compat_dumpit+0xe98/0x1490 [ 883.142050][T23045] tipc_nl_compat_dumpit+0xb89/0xd50 [ 883.142050][T23045] tipc_nl_compat_recv+0x1182/0x2bb0 [ 883.142050][T23045] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 883.142050][T23045] ? kmsan_internal_set_origin+0x85/0xc0 [ 883.142050][T23045] ? tipc_nl_compat_link_reset_stats+0x550/0x550 [ 883.142050][T23045] ? tipc_nametbl_stop+0x2a00/0x2a00 [ 883.142050][T23045] ? tipc_nl_compat_name_table_dump_header+0x2e0/0x2e0 [ 883.142050][T23045] ? tipc_netlink_compat_stop+0x40/0x40 [ 883.142050][T23045] genl_rcv_msg+0x1319/0x1610 [ 883.142050][T23045] ? tipc_netlink_compat_stop+0x40/0x40 [ 883.142050][T23045] ? kmsan_internal_set_origin+0x85/0xc0 [ 883.142050][T23045] netlink_rcv_skb+0x6fa/0x810 [ 883.142050][T23045] ? genl_rcv+0x80/0x80 [ 883.142050][T23045] genl_rcv+0x63/0x80 [ 883.142050][T23045] netlink_unicast+0x11d6/0x14a0 [ 883.142050][T23045] ? genl_pernet_exit+0x90/0x90 [ 883.142050][T23045] netlink_sendmsg+0x1740/0x1840 [ 883.142050][T23045] ____sys_sendmsg+0xcfc/0x12f0 [ 883.142050][T23045] ? netlink_getsockopt+0x1830/0x1830 [ 883.142050][T23045] __sys_sendmsg+0x714/0x830 [ 883.142050][T23045] ? kmsan_copy_to_user+0x9c/0xb0 [ 883.142050][T23045] ? _copy_to_user+0x1d2/0x270 [ 883.142050][T23045] ? kmsan_get_metadata+0x116/0x180 [ 883.142050][T23045] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 883.142050][T23045] ? kmsan_get_metadata+0x116/0x180 [ 883.142050][T23045] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 883.142050][T23045] __se_sys_sendmsg+0x97/0xb0 [ 883.142050][T23045] __x64_sys_sendmsg+0x4a/0x70 [ 883.142050][T23045] do_syscall_64+0x9f/0x140 [ 883.142050][T23045] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 883.142050][T23045] RIP: 0033:0x466459 [ 883.142050][T23045] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 883.142050][T23045] RSP: 002b:00007fc1da347188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 883.331950][T23045] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 883.331950][T23045] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000004 [ 883.331950][T23045] RBP: 00000000004bf9fb R08: 0000000000000000 R09: 0000000000000000 15:08:31 executing program 2: add_key$fscrypt_provisioning(&(0x7f00000001c0)='fscrypt-provisioning\x00', 0x0, &(0x7f0000000380)=ANY=[], 0xd, 0xffffffffffffffff) [ 883.331950][T23045] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60 [ 883.331950][T23045] R13: 0000000000a9fb1f R14: 00007fc1da347300 R15: 0000000000022000 [ 883.331950][T23045] [ 883.331950][T23045] Uninit was created at: [ 883.331950][T23045] kmsan_internal_poison_shadow+0x5c/0xf0 [ 883.331950][T23045] kmsan_slab_alloc+0x8d/0xe0 [ 883.331950][T23045] __kmalloc_node_track_caller+0xa37/0x1430 [ 883.331950][T23045] __alloc_skb+0x2f8/0xb30 [ 883.331950][T23045] netlink_sendmsg+0xdbc/0x1840 [ 883.331950][T23045] ____sys_sendmsg+0xcfc/0x12f0 [ 883.331950][T23045] __sys_sendmsg+0x714/0x830 [ 883.331950][T23045] __se_sys_sendmsg+0x97/0xb0 [ 883.331950][T23045] __x64_sys_sendmsg+0x4a/0x70 [ 883.331950][T23045] do_syscall_64+0x9f/0x140 [ 883.331950][T23045] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 883.331950][T23045] ===================================================== [ 883.446666][T23045] ===================================================== [ 883.451850][T23045] BUG: KMSAN: uninit-value in tipc_nl_compat_name_table_dump+0x5d7/0xd10 [ 883.453835][T23045] CPU: 1 PID: 23045 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 883.472312][T23045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 883.472312][T23045] Call Trace: [ 883.472312][T23045] dump_stack+0x21c/0x280 [ 883.472312][T23045] kmsan_report+0xfb/0x1e0 [ 883.472312][T23045] __msan_warning+0x5f/0xa0 [ 883.472312][T23045] tipc_nl_compat_name_table_dump+0x5d7/0xd10 [ 883.501945][T23045] ? kmsan_get_metadata+0x116/0x180 [ 883.501945][T23045] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 883.501945][T23045] ? tipc_nl_compat_name_table_dump_header+0x2e0/0x2e0 [ 883.501945][T23045] __tipc_nl_compat_dumpit+0xe98/0x1490 [ 883.501945][T23045] tipc_nl_compat_dumpit+0xb89/0xd50 [ 883.501945][T23045] tipc_nl_compat_recv+0x1182/0x2bb0 [ 883.501945][T23045] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 883.501945][T23045] ? kmsan_internal_set_origin+0x85/0xc0 [ 883.501945][T23045] ? tipc_nl_compat_link_reset_stats+0x550/0x550 [ 883.501945][T23045] ? tipc_nametbl_stop+0x2a00/0x2a00 15:08:31 executing program 3: add_key(&(0x7f0000000000)='ceph\x00', 0x0, &(0x7f00000000c0)="a2", 0x1, 0xfffffffffffffffe) [ 883.501945][T23045] ? tipc_nl_compat_name_table_dump_header+0x2e0/0x2e0 [ 883.501945][T23045] ? tipc_netlink_compat_stop+0x40/0x40 [ 883.501945][T23045] genl_rcv_msg+0x1319/0x1610 [ 883.501945][T23045] ? tipc_netlink_compat_stop+0x40/0x40 [ 883.501945][T23045] ? kmsan_internal_set_origin+0x85/0xc0 [ 883.501945][T23045] netlink_rcv_skb+0x6fa/0x810 [ 883.501945][T23045] ? genl_rcv+0x80/0x80 [ 883.501945][T23045] genl_rcv+0x63/0x80 [ 883.501945][T23045] netlink_unicast+0x11d6/0x14a0 15:08:31 executing program 5: r0 = syz_io_uring_setup(0x83, &(0x7f0000000080), &(0x7f0000ee7000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, &(0x7f0000000040)=0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(0x0, r1, &(0x7f0000000200)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./file0\x00'}, 0x0) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) [ 883.501945][T23045] ? genl_pernet_exit+0x90/0x90 [ 883.501945][T23045] netlink_sendmsg+0x1740/0x1840 [ 883.501945][T23045] ____sys_sendmsg+0xcfc/0x12f0 [ 883.622113][T23045] ? netlink_getsockopt+0x1830/0x1830 [ 883.622113][T23045] __sys_sendmsg+0x714/0x830 [ 883.622113][T23045] ? kmsan_copy_to_user+0x9c/0xb0 [ 883.622113][T23045] ? _copy_to_user+0x1d2/0x270 [ 883.622113][T23045] ? kmsan_get_metadata+0x116/0x180 [ 883.651008][T23045] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 883.651008][T23045] ? kmsan_get_metadata+0x116/0x180 [ 883.651008][T23045] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 883.651008][T23045] __se_sys_sendmsg+0x97/0xb0 [ 883.651008][T23045] __x64_sys_sendmsg+0x4a/0x70 [ 883.651008][T23045] do_syscall_64+0x9f/0x140 [ 883.651008][T23045] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 883.651008][T23045] RIP: 0033:0x466459 [ 883.651008][T23045] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 883.651008][T23045] RSP: 002b:00007fc1da347188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 883.651008][T23045] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 883.651008][T23045] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000004 [ 883.651008][T23045] RBP: 00000000004bf9fb R08: 0000000000000000 R09: 0000000000000000 [ 883.651008][T23045] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60 [ 883.651008][T23045] R13: 0000000000a9fb1f R14: 00007fc1da347300 R15: 0000000000022000 [ 883.651008][T23045] [ 883.651008][T23045] Uninit was created at: [ 883.651008][T23045] kmsan_internal_poison_shadow+0x5c/0xf0 [ 883.651008][T23045] kmsan_slab_alloc+0x8d/0xe0 [ 883.651008][T23045] __kmalloc_node_track_caller+0xa37/0x1430 [ 883.651008][T23045] __alloc_skb+0x2f8/0xb30 [ 883.651008][T23045] netlink_sendmsg+0xdbc/0x1840 [ 883.651008][T23045] ____sys_sendmsg+0xcfc/0x12f0 [ 883.651008][T23045] __sys_sendmsg+0x714/0x830 [ 883.651008][T23045] __se_sys_sendmsg+0x97/0xb0 15:08:31 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000200)='/dev/vcsu#\x00', 0x0, 0x0) read$eventfd(r0, 0x0, 0x0) 15:08:31 executing program 1: add_key(&(0x7f00000000c0)='rxrpc\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) [ 883.651008][T23045] __x64_sys_sendmsg+0x4a/0x70 [ 883.651008][T23045] do_syscall_64+0x9f/0x140 [ 883.651008][T23045] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 883.651008][T23045] ===================================================== 15:08:32 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x28, r2, 0x1, 0x0, 0x0, {{}, {0x0, 0x5}, {0x3, 0x19, 'syz0\x00'}}}, 0x28}}, 0x0) 15:08:32 executing program 2: io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) 15:08:32 executing program 0: io_setup(0x1, &(0x7f0000000300)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x802, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f00000000c0)='system.posix_acl_access\x00', 0x0, 0x4c, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)) io_submit(r0, 0xa, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000040), 0xff66}]) 15:08:32 executing program 5: r0 = syz_io_uring_setup(0x83, &(0x7f0000000080), &(0x7f0000ee7000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, &(0x7f0000000040)=0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(0x0, r1, &(0x7f0000000200)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./file0\x00'}, 0x0) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) 15:08:32 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="a2", 0x1, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='syz', r0) [ 884.594989][T23062] ===================================================== [ 884.601859][T23062] BUG: KMSAN: uninit-value in tipc_nl_compat_name_table_dump+0x5be/0xd10 [ 884.601859][T23062] CPU: 1 PID: 23062 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 884.601859][T23062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 884.601859][T23062] Call Trace: [ 884.601859][T23062] dump_stack+0x21c/0x280 [ 884.601859][T23062] kmsan_report+0xfb/0x1e0 [ 884.601859][T23062] __msan_warning+0x5f/0xa0 [ 884.601859][T23062] tipc_nl_compat_name_table_dump+0x5be/0xd10 [ 884.601859][T23062] ? kmsan_get_metadata+0x116/0x180 [ 884.601859][T23062] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 884.601859][T23062] ? tipc_nl_compat_name_table_dump_header+0x2e0/0x2e0 [ 884.601859][T23062] __tipc_nl_compat_dumpit+0xe98/0x1490 [ 884.601859][T23062] tipc_nl_compat_dumpit+0xb89/0xd50 [ 884.601859][T23062] tipc_nl_compat_recv+0x1182/0x2bb0 [ 884.601859][T23062] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 884.601859][T23062] ? kmsan_internal_set_origin+0x85/0xc0 [ 884.601859][T23062] ? tipc_nl_compat_link_reset_stats+0x550/0x550 [ 884.601859][T23062] ? tipc_nametbl_stop+0x2a00/0x2a00 [ 884.601859][T23062] ? tipc_nl_compat_name_table_dump_header+0x2e0/0x2e0 [ 884.601859][T23062] ? tipc_netlink_compat_stop+0x40/0x40 [ 884.601859][T23062] genl_rcv_msg+0x1319/0x1610 [ 884.601859][T23062] ? tipc_netlink_compat_stop+0x40/0x40 [ 884.601859][T23062] ? kmsan_internal_set_origin+0x85/0xc0 [ 884.601859][T23062] netlink_rcv_skb+0x6fa/0x810 [ 884.601859][T23062] ? genl_rcv+0x80/0x80 [ 884.601859][T23062] genl_rcv+0x63/0x80 [ 884.601859][T23062] netlink_unicast+0x11d6/0x14a0 [ 884.601859][T23062] ? genl_pernet_exit+0x90/0x90 [ 884.601859][T23062] netlink_sendmsg+0x1740/0x1840 [ 884.601859][T23062] ____sys_sendmsg+0xcfc/0x12f0 [ 884.601859][T23062] ? netlink_getsockopt+0x1830/0x1830 [ 884.601859][T23062] __sys_sendmsg+0x714/0x830 [ 884.601859][T23062] ? kmsan_copy_to_user+0x9c/0xb0 [ 884.601859][T23062] ? _copy_to_user+0x1d2/0x270 [ 884.601859][T23062] ? kmsan_get_metadata+0x116/0x180 [ 884.601859][T23062] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 884.601859][T23062] ? kmsan_get_metadata+0x116/0x180 [ 884.601859][T23062] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 884.601859][T23062] __se_sys_sendmsg+0x97/0xb0 [ 884.601859][T23062] __x64_sys_sendmsg+0x4a/0x70 [ 884.601859][T23062] do_syscall_64+0x9f/0x140 [ 884.601859][T23062] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 884.601859][T23062] RIP: 0033:0x466459 [ 884.601859][T23062] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 884.601859][T23062] RSP: 002b:00007fc1da347188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 884.601859][T23062] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 884.601859][T23062] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000004 [ 884.601859][T23062] RBP: 00000000004bf9fb R08: 0000000000000000 R09: 0000000000000000 [ 884.601859][T23062] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60 [ 884.601859][T23062] R13: 0000000000a9fb1f R14: 00007fc1da347300 R15: 0000000000022000 [ 884.601859][T23062] [ 884.601859][T23062] Uninit was created at: [ 884.601859][T23062] kmsan_internal_poison_shadow+0x5c/0xf0 [ 884.601859][T23062] kmsan_slab_alloc+0x8d/0xe0 [ 884.601859][T23062] __kmalloc_node_track_caller+0xa37/0x1430 [ 884.601859][T23062] __alloc_skb+0x2f8/0xb30 [ 884.601859][T23062] netlink_sendmsg+0xdbc/0x1840 [ 884.601859][T23062] ____sys_sendmsg+0xcfc/0x12f0 [ 884.601859][T23062] __sys_sendmsg+0x714/0x830 [ 884.601859][T23062] __se_sys_sendmsg+0x97/0xb0 [ 884.601859][T23062] __x64_sys_sendmsg+0x4a/0x70 [ 884.601859][T23062] do_syscall_64+0x9f/0x140 [ 884.601859][T23062] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 884.601859][T23062] ===================================================== [ 884.981124][T23062] ===================================================== [ 884.983917][T23062] BUG: KMSAN: uninit-value in tipc_nl_compat_name_table_dump+0x5d7/0xd10 [ 884.983917][T23062] CPU: 1 PID: 23062 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 884.983917][T23062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 884.983917][T23062] Call Trace: [ 884.983917][T23062] dump_stack+0x21c/0x280 [ 884.983917][T23062] kmsan_report+0xfb/0x1e0 [ 884.983917][T23062] __msan_warning+0x5f/0xa0 [ 885.032207][T23062] tipc_nl_compat_name_table_dump+0x5d7/0xd10 [ 885.032207][T23062] ? kmsan_get_metadata+0x116/0x180 [ 885.032207][T23062] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 885.032207][T23062] ? tipc_nl_compat_name_table_dump_header+0x2e0/0x2e0 [ 885.032207][T23062] __tipc_nl_compat_dumpit+0xe98/0x1490 [ 885.032207][T23062] tipc_nl_compat_dumpit+0xb89/0xd50 [ 885.032207][T23062] tipc_nl_compat_recv+0x1182/0x2bb0 [ 885.032207][T23062] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 885.032207][T23062] ? kmsan_internal_set_origin+0x85/0xc0 [ 885.032207][T23062] ? tipc_nl_compat_link_reset_stats+0x550/0x550 [ 885.032207][T23062] ? tipc_nametbl_stop+0x2a00/0x2a00 [ 885.032207][T23062] ? tipc_nl_compat_name_table_dump_header+0x2e0/0x2e0 [ 885.032207][T23062] ? tipc_netlink_compat_stop+0x40/0x40 [ 885.032207][T23062] genl_rcv_msg+0x1319/0x1610 [ 885.032207][T23062] ? tipc_netlink_compat_stop+0x40/0x40 [ 885.032207][T23062] ? kmsan_internal_set_origin+0x85/0xc0 [ 885.032207][T23062] netlink_rcv_skb+0x6fa/0x810 [ 885.032207][T23062] ? genl_rcv+0x80/0x80 [ 885.032207][T23062] genl_rcv+0x63/0x80 [ 885.032207][T23062] netlink_unicast+0x11d6/0x14a0 [ 885.032207][T23062] ? genl_pernet_exit+0x90/0x90 [ 885.032207][T23062] netlink_sendmsg+0x1740/0x1840 [ 885.032207][T23062] ____sys_sendmsg+0xcfc/0x12f0 [ 885.032207][T23062] ? netlink_getsockopt+0x1830/0x1830 [ 885.032207][T23062] __sys_sendmsg+0x714/0x830 [ 885.032207][T23062] ? kmsan_copy_to_user+0x9c/0xb0 [ 885.032207][T23062] ? _copy_to_user+0x1d2/0x270 [ 885.032207][T23062] ? kmsan_get_metadata+0x116/0x180 [ 885.032207][T23062] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 885.032207][T23062] ? kmsan_get_metadata+0x116/0x180 [ 885.032207][T23062] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 885.032207][T23062] __se_sys_sendmsg+0x97/0xb0 [ 885.032207][T23062] __x64_sys_sendmsg+0x4a/0x70 [ 885.032207][T23062] do_syscall_64+0x9f/0x140 [ 885.032207][T23062] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 885.032207][T23062] RIP: 0033:0x466459 [ 885.032207][T23062] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 885.032207][T23062] RSP: 002b:00007fc1da347188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 885.032207][T23062] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 885.032207][T23062] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000004 [ 885.032207][T23062] RBP: 00000000004bf9fb R08: 0000000000000000 R09: 0000000000000000 [ 885.032207][T23062] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60 [ 885.032207][T23062] R13: 0000000000a9fb1f R14: 00007fc1da347300 R15: 0000000000022000 [ 885.032207][T23062] [ 885.032207][T23062] Uninit was created at: [ 885.032207][T23062] kmsan_internal_poison_shadow+0x5c/0xf0 [ 885.032207][T23062] kmsan_slab_alloc+0x8d/0xe0 [ 885.032207][T23062] __kmalloc_node_track_caller+0xa37/0x1430 [ 885.032207][T23062] __alloc_skb+0x2f8/0xb30 [ 885.032207][T23062] netlink_sendmsg+0xdbc/0x1840 [ 885.032207][T23062] ____sys_sendmsg+0xcfc/0x12f0 [ 885.032207][T23062] __sys_sendmsg+0x714/0x830 [ 885.032207][T23062] __se_sys_sendmsg+0x97/0xb0 [ 885.032207][T23062] __x64_sys_sendmsg+0x4a/0x70 [ 885.032207][T23062] do_syscall_64+0x9f/0x140 [ 885.032207][T23062] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 885.032207][T23062] ===================================================== 15:08:33 executing program 3: add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000380)='pkcs7_test\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='\x00', 0xffffffffffffffff) add_key$keyring(0x0, &(0x7f0000000580)={'syz', 0x3}, 0x0, 0x0, 0x0) 15:08:33 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$GIO_CMAP(r0, 0x4b40, &(0x7f00000004c0)) 15:08:34 executing program 5: r0 = syz_io_uring_setup(0x83, &(0x7f0000000080), &(0x7f0000ee7000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, &(0x7f0000000040)=0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(0x0, r1, &(0x7f0000000200)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./file0\x00'}, 0x0) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) 15:08:34 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000002a00)={0x0, 0x0, &(0x7f00000029c0)={&(0x7f0000002a40)=@newtaction={0x18, 0x32, 0x1, 0x0, 0x0, {}, [{0x4}]}, 0x18}}, 0x0) 15:08:34 executing program 1: setuid(0xee00) mq_open(&(0x7f0000000280)='%!%\x00', 0x40, 0x0, &(0x7f00000002c0)={0x80, 0x10000, 0x4, 0x3}) 15:08:34 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) msgrcv(0x0, 0x0, 0x0, 0xb303002000000000, 0x0) 15:08:34 executing program 2: syslog(0x2, &(0x7f0000000000)=""/127, 0x7f) 15:08:35 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x28, r2, 0x1, 0x0, 0x0, {{}, {0x0, 0x5}, {0x3, 0x19, 'syz0\x00'}}}, 0x28}}, 0x0) 15:08:35 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x4001, 0x3, 0x268, 0x0, 0x0, 0x148, 0xe0, 0x148, 0x1d0, 0x240, 0x240, 0x1d0, 0x240, 0x3, 0x0, {[{{@ip={@remote, @empty, 0xffffff00, 0x0, 'veth0_macvtap\x00', 'veth1_to_batadv\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@ip={@local, @private, 0x0, 0x0, 'veth0_vlan\x00', 'veth1\x00'}, 0x0, 0xc0, 0xf0, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz0\x00'}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c8) 15:08:35 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0xd, 0x0, 0x0) 15:08:35 executing program 5: r0 = syz_io_uring_setup(0x83, &(0x7f0000000080), &(0x7f0000ee7000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000002c0)=0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, 0x0, &(0x7f0000000200)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./file0\x00'}, 0x0) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) 15:08:35 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 887.232628][T23118] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables [ 887.242444][T23118] x_tables: ip_tables: osf match: only valid for protocol 6 [ 887.346059][T23122] ===================================================== [ 887.351857][T23122] BUG: KMSAN: uninit-value in tipc_nl_compat_name_table_dump+0x5be/0xd10 [ 887.351857][T23122] CPU: 0 PID: 23122 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 887.351857][T23122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 887.351857][T23122] Call Trace: [ 887.351857][T23122] dump_stack+0x21c/0x280 [ 887.351857][T23122] kmsan_report+0xfb/0x1e0 [ 887.351857][T23122] __msan_warning+0x5f/0xa0 [ 887.351857][T23122] tipc_nl_compat_name_table_dump+0x5be/0xd10 [ 887.351857][T23122] ? kmsan_get_metadata+0x116/0x180 [ 887.351857][T23122] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 887.351857][T23122] ? tipc_nl_compat_name_table_dump_header+0x2e0/0x2e0 [ 887.351857][T23122] __tipc_nl_compat_dumpit+0xe98/0x1490 [ 887.351857][T23122] tipc_nl_compat_dumpit+0xb89/0xd50 [ 887.351857][T23122] tipc_nl_compat_recv+0x1182/0x2bb0 [ 887.351857][T23122] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 887.351857][T23122] ? kmsan_internal_set_origin+0x85/0xc0 [ 887.351857][T23122] ? tipc_nl_compat_link_reset_stats+0x550/0x550 [ 887.351857][T23122] ? tipc_nametbl_stop+0x2a00/0x2a00 [ 887.457033][T23122] ? tipc_nl_compat_name_table_dump_header+0x2e0/0x2e0 [ 887.457033][T23122] ? tipc_netlink_compat_stop+0x40/0x40 [ 887.457033][T23122] genl_rcv_msg+0x1319/0x1610 [ 887.457033][T23122] ? tipc_netlink_compat_stop+0x40/0x40 [ 887.457033][T23122] ? kmsan_internal_set_origin+0x85/0xc0 [ 887.457033][T23122] netlink_rcv_skb+0x6fa/0x810 [ 887.457033][T23122] ? genl_rcv+0x80/0x80 [ 887.457033][T23122] genl_rcv+0x63/0x80 [ 887.457033][T23122] netlink_unicast+0x11d6/0x14a0 [ 887.457033][T23122] ? genl_pernet_exit+0x90/0x90 [ 887.457033][T23122] netlink_sendmsg+0x1740/0x1840 [ 887.457033][T23122] ____sys_sendmsg+0xcfc/0x12f0 [ 887.457033][T23122] ? netlink_getsockopt+0x1830/0x1830 [ 887.457033][T23122] __sys_sendmsg+0x714/0x830 [ 887.457033][T23122] ? kmsan_copy_to_user+0x9c/0xb0 [ 887.457033][T23122] ? _copy_to_user+0x1d2/0x270 [ 887.457033][T23122] ? kmsan_get_metadata+0x116/0x180 [ 887.457033][T23122] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 887.457033][T23122] ? kmsan_get_metadata+0x116/0x180 [ 887.457033][T23122] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 887.457033][T23122] __se_sys_sendmsg+0x97/0xb0 [ 887.457033][T23122] __x64_sys_sendmsg+0x4a/0x70 [ 887.457033][T23122] do_syscall_64+0x9f/0x140 [ 887.457033][T23122] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 887.457033][T23122] RIP: 0033:0x466459 [ 887.457033][T23122] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 887.457033][T23122] RSP: 002b:00007fc1da347188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 887.457033][T23122] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 887.457033][T23122] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000004 [ 887.457033][T23122] RBP: 00000000004bf9fb R08: 0000000000000000 R09: 0000000000000000 [ 887.457033][T23122] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60 [ 887.457033][T23122] R13: 0000000000a9fb1f R14: 00007fc1da347300 R15: 0000000000022000 [ 887.457033][T23122] [ 887.457033][T23122] Uninit was created at: [ 887.457033][T23122] kmsan_internal_poison_shadow+0x5c/0xf0 [ 887.457033][T23122] kmsan_slab_alloc+0x8d/0xe0 [ 887.457033][T23122] __kmalloc_node_track_caller+0xa37/0x1430 [ 887.457033][T23122] __alloc_skb+0x2f8/0xb30 [ 887.457033][T23122] netlink_sendmsg+0xdbc/0x1840 [ 887.457033][T23122] ____sys_sendmsg+0xcfc/0x12f0 [ 887.457033][T23122] __sys_sendmsg+0x714/0x830 [ 887.457033][T23122] __se_sys_sendmsg+0x97/0xb0 [ 887.457033][T23122] __x64_sys_sendmsg+0x4a/0x70 [ 887.457033][T23122] do_syscall_64+0x9f/0x140 [ 887.457033][T23122] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 887.457033][T23122] ===================================================== [ 887.725319][T23122] ===================================================== [ 887.732250][T23122] BUG: KMSAN: uninit-value in tipc_nl_compat_name_table_dump+0x5d7/0xd10 [ 887.734395][T23122] CPU: 0 PID: 23122 Comm: syz-executor.4 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 887.748177][T23122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 887.753259][T23122] Call Trace: [ 887.753259][T23122] dump_stack+0x21c/0x280 [ 887.753259][T23122] kmsan_report+0xfb/0x1e0 [ 887.753259][T23122] __msan_warning+0x5f/0xa0 [ 887.753259][T23122] tipc_nl_compat_name_table_dump+0x5d7/0xd10 [ 887.753259][T23122] ? kmsan_get_metadata+0x116/0x180 [ 887.753259][T23122] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 887.753259][T23122] ? tipc_nl_compat_name_table_dump_header+0x2e0/0x2e0 [ 887.753259][T23122] __tipc_nl_compat_dumpit+0xe98/0x1490 [ 887.753259][T23122] tipc_nl_compat_dumpit+0xb89/0xd50 [ 887.753259][T23122] tipc_nl_compat_recv+0x1182/0x2bb0 [ 887.753259][T23122] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 887.753259][T23122] ? kmsan_internal_set_origin+0x85/0xc0 [ 887.753259][T23122] ? tipc_nl_compat_link_reset_stats+0x550/0x550 [ 887.753259][T23122] ? tipc_nametbl_stop+0x2a00/0x2a00 [ 887.753259][T23122] ? tipc_nl_compat_name_table_dump_header+0x2e0/0x2e0 [ 887.753259][T23122] ? tipc_netlink_compat_stop+0x40/0x40 [ 887.753259][T23122] genl_rcv_msg+0x1319/0x1610 [ 887.753259][T23122] ? tipc_netlink_compat_stop+0x40/0x40 [ 887.753259][T23122] ? kmsan_internal_set_origin+0x85/0xc0 [ 887.753259][T23122] netlink_rcv_skb+0x6fa/0x810 [ 887.753259][T23122] ? genl_rcv+0x80/0x80 [ 887.753259][T23122] genl_rcv+0x63/0x80 [ 887.753259][T23122] netlink_unicast+0x11d6/0x14a0 [ 887.753259][T23122] ? genl_pernet_exit+0x90/0x90 [ 887.753259][T23122] netlink_sendmsg+0x1740/0x1840 [ 887.753259][T23122] ____sys_sendmsg+0xcfc/0x12f0 [ 887.753259][T23122] ? netlink_getsockopt+0x1830/0x1830 [ 887.753259][T23122] __sys_sendmsg+0x714/0x830 [ 887.753259][T23122] ? kmsan_copy_to_user+0x9c/0xb0 [ 887.753259][T23122] ? _copy_to_user+0x1d2/0x270 [ 887.753259][T23122] ? kmsan_get_metadata+0x116/0x180 [ 887.753259][T23122] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 887.753259][T23122] ? kmsan_get_metadata+0x116/0x180 [ 887.753259][T23122] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 887.753259][T23122] __se_sys_sendmsg+0x97/0xb0 [ 887.753259][T23122] __x64_sys_sendmsg+0x4a/0x70 [ 887.753259][T23122] do_syscall_64+0x9f/0x140 [ 887.753259][T23122] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 887.753259][T23122] RIP: 0033:0x466459 [ 887.753259][T23122] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 887.753259][T23122] RSP: 002b:00007fc1da347188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 887.753259][T23122] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 887.753259][T23122] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000004 [ 887.753259][T23122] RBP: 00000000004bf9fb R08: 0000000000000000 R09: 0000000000000000 [ 887.753259][T23122] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60 [ 887.753259][T23122] R13: 0000000000a9fb1f R14: 00007fc1da347300 R15: 0000000000022000 [ 887.753259][T23122] [ 887.753259][T23122] Uninit was created at: [ 887.753259][T23122] kmsan_internal_poison_shadow+0x5c/0xf0 15:08:35 executing program 0: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f00000017c0)="94c506c8fca475771338d78939d711b412a72c7fe918eb1381ef6568004bca9ad21a7dd4a29d115b151d0b844d0fa552ced8513058488981b8b0b3f17986ef7db9859a8c5c30128a1b03c438ad1533691170f0d02a61d7f6cf5aff6d57858df8509d3c1ea3c1a4599d970e3c96747260874a6e30b8e719485daf1d74b441e514a9a0acc78f59995ccab3ec0477d7339e041d5890bb693efa4fdf7c97765d77a2fc4af3c173023721b7b3d493de27d46eafc56a48bde0afd97379c695ff96d1a996e8bcc9756c17a058bb0a71c5367d324eac00866d05aea0", 0xd8, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000340)={r0, r0, r0}, &(0x7f0000000380)=""/221, 0xdd, 0x0) 15:08:35 executing program 3: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc050565d, &(0x7f0000000100)={0x0, 0xa, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a1ce2fda"}, 0x400000, 0x0, @fd=r1}) [ 887.753259][T23122] kmsan_slab_alloc+0x8d/0xe0 [ 887.753259][T23122] __kmalloc_node_track_caller+0xa37/0x1430 [ 887.753259][T23122] __alloc_skb+0x2f8/0xb30 [ 887.753259][T23122] netlink_sendmsg+0xdbc/0x1840 [ 887.753259][T23122] ____sys_sendmsg+0xcfc/0x12f0 [ 887.753259][T23122] __sys_sendmsg+0x714/0x830 [ 887.753259][T23122] __se_sys_sendmsg+0x97/0xb0 [ 887.753259][T23122] __x64_sys_sendmsg+0x4a/0x70 [ 887.753259][T23122] do_syscall_64+0x9f/0x140 [ 887.753259][T23122] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 887.753259][T23122] ===================================================== 15:08:36 executing program 5: r0 = syz_io_uring_setup(0x83, &(0x7f0000000080), &(0x7f0000ee7000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000002c0)=0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, 0x0, &(0x7f0000000200)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./file0\x00'}, 0x0) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) 15:08:36 executing program 2: r0 = openat$vcsa(0xffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x383, &(0x7f0000000080)={[0xfffffe00]}, 0x8) 15:08:36 executing program 1: setuid(0xee00) openat$bsg(0xffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x57f081, 0x0) 15:08:37 executing program 1: perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='totmaps\x00') 15:08:37 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffdfffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000000)=""/2, 0x2}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x3) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0, 0x0) r1 = open(&(0x7f00000009c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000280)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) ftruncate(r2, 0x8200) lseek(r2, 0xfffffffffffffffd, 0x4) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 15:08:38 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f00000003c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x28, 0x0, 0x1, 0x0, 0x0, {{}, {0x0, 0x5}, {0x3, 0x19, 'syz0\x00'}}}, 0x28}}, 0x0) 15:08:38 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000001380)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=""/26, 0x1a}, 0x421}], 0x1, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) setrlimit(0x0, &(0x7f00000000c0)={0x1}) fgetxattr(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="6f73322e2939623395415429a9921a0671110af42d00"], &(0x7f0000000300)=""/14, 0x18) write(r3, &(0x7f0000000340), 0xfffffd82) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x1, 0x0, 0x8, 0x101}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x800000}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x3000008, 0x11, r1, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f00000001c0)='./bus\x00', 0x42) fcntl$setstatus(r4, 0x4, 0x6100) ptrace$setopts(0xffffffffffffffff, 0x0, 0x60000000000004, 0x0) write$cgroup_type(r4, &(0x7f0000000200)='threaded\x00', 0x175d900f) 15:08:38 executing program 5: r0 = syz_io_uring_setup(0x83, &(0x7f0000000080), &(0x7f0000ee7000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000002c0)=0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, 0x0, &(0x7f0000000200)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./file0\x00'}, 0x0) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) 15:08:38 executing program 1: perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) flistxattr(r0, 0x0, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(0xffffffffffffffff, 0x0, 0x0) 15:08:38 executing program 3: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$fscrypt_v1(&(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000180)={0x0, "7b11ef09eb96af87ebbf6792c4400bdf16a66a8741231be528f9c58128ad75ad5c1acaa493fc3f215055bee42f1cd363ea374aeace62e25a0c442ff5112c4ff3"}, 0x48, 0xfffffffffffffffd) keyctl$revoke(0x3, r1) keyctl$revoke(0x3, r2)