97, signal 344529/406458 (executing program) 2023/08/24 16:40:05 fetching corpus: 24747, signal 344706/406458 (executing program) 2023/08/24 16:40:06 fetching corpus: 24797, signal 344855/406458 (executing program) 2023/08/24 16:40:06 fetching corpus: 24847, signal 345049/406458 (executing program) 2023/08/24 16:40:06 fetching corpus: 24897, signal 345216/406458 (executing program) 2023/08/24 16:40:06 fetching corpus: 24947, signal 345350/406458 (executing program) 2023/08/24 16:40:06 fetching corpus: 24997, signal 345521/406458 (executing program) 2023/08/24 16:40:06 fetching corpus: 25047, signal 345647/406458 (executing program) 2023/08/24 16:40:06 fetching corpus: 25097, signal 345803/406458 (executing program) 2023/08/24 16:40:06 fetching corpus: 25147, signal 346003/406458 (executing program) 2023/08/24 16:40:06 fetching corpus: 25197, signal 346203/406458 (executing program) 2023/08/24 16:40:07 fetching corpus: 25247, signal 346397/406458 (executing program) 2023/08/24 16:40:07 fetching corpus: 25297, signal 346561/406458 (executing program) 2023/08/24 16:40:07 fetching corpus: 25347, signal 346698/406458 (executing program) 2023/08/24 16:40:07 fetching corpus: 25397, signal 346836/406458 (executing program) 2023/08/24 16:40:07 fetching corpus: 25447, signal 347304/406458 (executing program) 2023/08/24 16:40:07 fetching corpus: 25497, signal 347509/406458 (executing program) 2023/08/24 16:40:07 fetching corpus: 25547, signal 347678/406458 (executing program) 2023/08/24 16:40:07 fetching corpus: 25597, signal 347810/406458 (executing program) 2023/08/24 16:40:07 fetching corpus: 25647, signal 347957/406458 (executing program) 2023/08/24 16:40:08 fetching corpus: 25697, signal 348153/406458 (executing program) 2023/08/24 16:40:08 fetching corpus: 25747, signal 348275/406458 (executing program) 2023/08/24 16:40:08 fetching corpus: 25797, signal 348489/406458 (executing program) 2023/08/24 16:40:08 fetching corpus: 25847, signal 348649/406458 (executing program) 2023/08/24 16:40:08 fetching corpus: 25897, signal 348769/406458 (executing program) 2023/08/24 16:40:08 fetching corpus: 25947, signal 348912/406458 (executing program) 2023/08/24 16:40:08 fetching corpus: 25997, signal 349022/406458 (executing program) 2023/08/24 16:40:08 fetching corpus: 26047, signal 349229/406458 (executing program) 2023/08/24 16:40:09 fetching corpus: 26097, signal 349393/406458 (executing program) 2023/08/24 16:40:09 fetching corpus: 26147, signal 349582/406458 (executing program) 2023/08/24 16:40:09 fetching corpus: 26197, signal 349773/406458 (executing program) 2023/08/24 16:40:09 fetching corpus: 26247, signal 349992/406458 (executing program) 2023/08/24 16:40:09 fetching corpus: 26297, signal 350106/406458 (executing program) 2023/08/24 16:40:09 fetching corpus: 26347, signal 350261/406458 (executing program) 2023/08/24 16:40:09 fetching corpus: 26397, signal 350406/406458 (executing program) 2023/08/24 16:40:09 fetching corpus: 26447, signal 350548/406458 (executing program) 2023/08/24 16:40:10 fetching corpus: 26497, signal 350668/406458 (executing program) 2023/08/24 16:40:10 fetching corpus: 26547, signal 350823/406459 (executing program) 2023/08/24 16:40:10 fetching corpus: 26597, signal 351020/406459 (executing program) 2023/08/24 16:40:10 fetching corpus: 26647, signal 351156/406459 (executing program) 2023/08/24 16:40:10 fetching corpus: 26697, signal 351326/406459 (executing program) 2023/08/24 16:40:10 fetching corpus: 26747, signal 351585/406459 (executing program) 2023/08/24 16:40:10 fetching corpus: 26797, signal 351732/406459 (executing program) 2023/08/24 16:40:11 fetching corpus: 26847, signal 351905/406459 (executing program) 2023/08/24 16:40:11 fetching corpus: 26897, signal 352041/406459 (executing program) 2023/08/24 16:40:11 fetching corpus: 26947, signal 352195/406459 (executing program) 2023/08/24 16:40:11 fetching corpus: 26997, signal 352348/406459 (executing program) 2023/08/24 16:40:11 fetching corpus: 27047, signal 352457/406459 (executing program) 2023/08/24 16:40:11 fetching corpus: 27097, signal 352607/406459 (executing program) 2023/08/24 16:40:11 fetching corpus: 27147, signal 352796/406460 (executing program) [ 138.065390][ T1234] ieee802154 phy0 wpan0: encryption failed: -22 [ 138.071806][ T1234] ieee802154 phy1 wpan1: encryption failed: -22 2023/08/24 16:40:11 fetching corpus: 27196, signal 352924/406461 (executing program) 2023/08/24 16:40:11 fetching corpus: 27246, signal 353042/406461 (executing program) 2023/08/24 16:40:11 fetching corpus: 27296, signal 353219/406461 (executing program) 2023/08/24 16:40:12 fetching corpus: 27346, signal 353383/406461 (executing program) 2023/08/24 16:40:12 fetching corpus: 27396, signal 353558/406461 (executing program) 2023/08/24 16:40:12 fetching corpus: 27446, signal 353723/406461 (executing program) 2023/08/24 16:40:12 fetching corpus: 27496, signal 353848/406462 (executing program) 2023/08/24 16:40:12 fetching corpus: 27546, signal 354049/406462 (executing program) 2023/08/24 16:40:12 fetching corpus: 27596, signal 354190/406462 (executing program) 2023/08/24 16:40:12 fetching corpus: 27646, signal 354409/406475 (executing program) 2023/08/24 16:40:13 fetching corpus: 27696, signal 354570/406477 (executing program) 2023/08/24 16:40:13 fetching corpus: 27746, signal 354732/406477 (executing program) 2023/08/24 16:40:13 fetching corpus: 27796, signal 354991/406477 (executing program) 2023/08/24 16:40:13 fetching corpus: 27846, signal 355191/406477 (executing program) 2023/08/24 16:40:13 fetching corpus: 27896, signal 355314/406477 (executing program) 2023/08/24 16:40:13 fetching corpus: 27946, signal 355497/406477 (executing program) 2023/08/24 16:40:13 fetching corpus: 27996, signal 355625/406477 (executing program) 2023/08/24 16:40:13 fetching corpus: 28046, signal 355801/406477 (executing program) 2023/08/24 16:40:13 fetching corpus: 28096, signal 355976/406477 (executing program) 2023/08/24 16:40:13 fetching corpus: 28146, signal 356141/406477 (executing program) 2023/08/24 16:40:14 fetching corpus: 28196, signal 356294/406477 (executing program) 2023/08/24 16:40:14 fetching corpus: 28246, signal 356484/406477 (executing program) 2023/08/24 16:40:14 fetching corpus: 28296, signal 356688/406477 (executing program) 2023/08/24 16:40:14 fetching corpus: 28346, signal 356803/406477 (executing program) 2023/08/24 16:40:14 fetching corpus: 28396, signal 356989/406477 (executing program) 2023/08/24 16:40:14 fetching corpus: 28440, signal 357174/406477 (executing program) 2023/08/24 16:40:14 fetching corpus: 28440, signal 357174/406477 (executing program) 2023/08/24 16:40:17 starting 6 fuzzer processes 16:40:17 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0x0, r2}, 0x10) 16:40:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(r0, &(0x7f0000007540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2000, 0x0) 16:40:17 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000240)={'wlan1\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000640)={@private, @dev}, &(0x7f0000000680)=0xc) r1 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r7, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="2800000010000104fd0000008000ed1175000000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r7], 0x28}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r7}}, 0x20}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000900)={&(0x7f00000006c0)={0xb0, 0x0, 0x0, 0x70bd28, 0x25dfdbff, {}, [@HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}]}, @HEADER={0x4}, @HEADER={0x4}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0xf767135ca9a96b95}, 0x20000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r8, 0x0) preadv(r8, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_JOIN_IBSS(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r9, 0x0, 0x3af4701e) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) 16:40:17 executing program 2: getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000640)={@private, @dev}, &(0x7f0000000680)=0xc) r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r6, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="2800000010000104fd0000008000ed1175000000", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r6}}, 0x20}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) 16:40:17 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000007540)=[{{&(0x7f0000000000)=@tipc, 0x80, 0x0}}], 0x1, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f0000000080)) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000007700)={0x0, 0x0, &(0x7f00000076c0)={&(0x7f0000002980)={0x14, 0x0, 0x9, 0x801}, 0x14}}, 0x0) 16:40:17 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x8}}]}, 0x1a0}}, 0x0) [ 144.223795][ T5031] memfd_create() without MFD_EXEC nor MFD_NOEXEC_SEAL, pid=5031 'syz-fuzzer' [ 144.802479][ T49] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 144.811484][ T49] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 144.820066][ T49] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 144.829379][ T49] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 144.838744][ T5064] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 144.846271][ T5064] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 144.855639][ T5064] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 144.869627][ T4433] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 144.882496][ T5064] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 144.893421][ T5064] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 144.901163][ T5064] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 144.911255][ T5064] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 144.919556][ T5064] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 144.927416][ T5064] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 144.936290][ T5064] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 144.949110][ T5064] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 144.957215][ T5064] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 144.964665][ T5064] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 144.993978][ T5064] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 145.002025][ T5064] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 145.010425][ T5064] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 145.018740][ T5064] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 145.027045][ T5064] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 145.071678][ T5064] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 145.079925][ T5064] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 145.088510][ T5064] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 145.096511][ T5064] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 145.104230][ T5064] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 145.139277][ T5061] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 145.147647][ T5061] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 145.156108][ T5061] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 145.164352][ T5061] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 145.171710][ T5061] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 145.452607][ T5059] chnl_net:caif_netlink_parms(): no params data found [ 145.683962][ T5066] chnl_net:caif_netlink_parms(): no params data found [ 145.721518][ T5063] chnl_net:caif_netlink_parms(): no params data found [ 145.816087][ T5059] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.824487][ T5059] bridge0: port 1(bridge_slave_0) entered disabled state [ 145.831970][ T5059] bridge_slave_0: entered allmulticast mode [ 145.839833][ T5059] bridge_slave_0: entered promiscuous mode [ 145.874533][ T5059] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.881699][ T5059] bridge0: port 2(bridge_slave_1) entered disabled state [ 145.890008][ T5059] bridge_slave_1: entered allmulticast mode [ 145.897743][ T5059] bridge_slave_1: entered promiscuous mode [ 145.911420][ T5073] chnl_net:caif_netlink_parms(): no params data found [ 145.955497][ T5069] chnl_net:caif_netlink_parms(): no params data found [ 146.005567][ T5071] chnl_net:caif_netlink_parms(): no params data found [ 146.035526][ T5059] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 146.078863][ T5059] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 146.088325][ T5066] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.095887][ T5066] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.103311][ T5066] bridge_slave_0: entered allmulticast mode [ 146.110650][ T5066] bridge_slave_0: entered promiscuous mode [ 146.145547][ T5063] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.152721][ T5063] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.163493][ T5063] bridge_slave_0: entered allmulticast mode [ 146.170304][ T5063] bridge_slave_0: entered promiscuous mode [ 146.196170][ T5066] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.203426][ T5066] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.210579][ T5066] bridge_slave_1: entered allmulticast mode [ 146.217874][ T5066] bridge_slave_1: entered promiscuous mode [ 146.231715][ T5063] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.240553][ T5063] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.248066][ T5063] bridge_slave_1: entered allmulticast mode [ 146.255169][ T5063] bridge_slave_1: entered promiscuous mode [ 146.279990][ T5059] team0: Port device team_slave_0 added [ 146.326125][ T5059] team0: Port device team_slave_1 added [ 146.386933][ T5066] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 146.404829][ T5073] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.411949][ T5073] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.419354][ T5073] bridge_slave_0: entered allmulticast mode [ 146.426371][ T5073] bridge_slave_0: entered promiscuous mode [ 146.436350][ T5063] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 146.455522][ T5071] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.462728][ T5071] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.470276][ T5071] bridge_slave_0: entered allmulticast mode [ 146.477603][ T5071] bridge_slave_0: entered promiscuous mode [ 146.499291][ T5066] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 146.518452][ T5073] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.525918][ T5073] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.533349][ T5073] bridge_slave_1: entered allmulticast mode [ 146.540125][ T5073] bridge_slave_1: entered promiscuous mode [ 146.549889][ T5063] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 146.559249][ T5071] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.566474][ T5071] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.574224][ T5071] bridge_slave_1: entered allmulticast mode [ 146.581106][ T5071] bridge_slave_1: entered promiscuous mode [ 146.588585][ T5059] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 146.595895][ T5059] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 146.622111][ T5059] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 146.640910][ T5069] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.648259][ T5069] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.655887][ T5069] bridge_slave_0: entered allmulticast mode [ 146.662629][ T5069] bridge_slave_0: entered promiscuous mode [ 146.711321][ T5059] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 146.718634][ T5059] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 146.744977][ T5059] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 146.756716][ T5069] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.764146][ T5069] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.771408][ T5069] bridge_slave_1: entered allmulticast mode [ 146.779085][ T5069] bridge_slave_1: entered promiscuous mode [ 146.819203][ T5063] team0: Port device team_slave_0 added [ 146.854090][ T5066] team0: Port device team_slave_0 added [ 146.862428][ T5073] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 146.873574][ T5063] team0: Port device team_slave_1 added [ 146.881551][ T5071] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 146.917277][ T5066] team0: Port device team_slave_1 added [ 146.925366][ T5073] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 146.943932][ T5061] Bluetooth: hci0: command 0x0409 tx timeout [ 146.944241][ T5071] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 146.973945][ T5069] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 147.022584][ T5059] hsr_slave_0: entered promiscuous mode [ 147.023186][ T5061] Bluetooth: hci2: command 0x0409 tx timeout [ 147.034367][ T5064] Bluetooth: hci1: command 0x0409 tx timeout [ 147.041717][ T5059] hsr_slave_1: entered promiscuous mode [ 147.054114][ T5069] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 147.082472][ T5063] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 147.089858][ T5063] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 147.115974][ T5068] Bluetooth: hci3: command 0x0409 tx timeout [ 147.122196][ T5063] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 147.162510][ T5066] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 147.169602][ T5066] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 147.183163][ T5061] Bluetooth: hci5: command 0x0409 tx timeout [ 147.196506][ T5066] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 147.201935][ T5068] Bluetooth: hci4: command 0x0409 tx timeout [ 147.220106][ T5073] team0: Port device team_slave_0 added [ 147.228550][ T5063] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 147.235840][ T5063] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 147.263303][ T5063] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 147.280573][ T5071] team0: Port device team_slave_0 added [ 147.304685][ T5066] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 147.311689][ T5066] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 147.338447][ T5066] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 147.352020][ T5073] team0: Port device team_slave_1 added [ 147.363913][ T5071] team0: Port device team_slave_1 added [ 147.381391][ T5069] team0: Port device team_slave_0 added [ 147.439664][ T5071] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 147.446935][ T5071] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 147.473058][ T5071] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 147.486049][ T5069] team0: Port device team_slave_1 added [ 147.525933][ T5071] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 147.533116][ T5071] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 147.559220][ T5071] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 147.590693][ T5073] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 147.598225][ T5073] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 147.624745][ T5073] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 147.640423][ T5063] hsr_slave_0: entered promiscuous mode [ 147.646987][ T5063] hsr_slave_1: entered promiscuous mode [ 147.653229][ T5063] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 147.661208][ T5063] Cannot create hsr debugfs directory [ 147.707259][ T5073] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 147.714395][ T5073] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 147.740664][ T5073] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 147.768993][ T5066] hsr_slave_0: entered promiscuous mode [ 147.775504][ T5066] hsr_slave_1: entered promiscuous mode [ 147.781548][ T5066] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 147.789766][ T5066] Cannot create hsr debugfs directory [ 147.798159][ T5069] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 147.805510][ T5069] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 147.832419][ T5069] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 147.881713][ T5069] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 147.888754][ T5069] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 147.914742][ T5069] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 147.990771][ T5073] hsr_slave_0: entered promiscuous mode [ 147.997600][ T5073] hsr_slave_1: entered promiscuous mode [ 148.004340][ T5073] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 148.011963][ T5073] Cannot create hsr debugfs directory [ 148.037471][ T5071] hsr_slave_0: entered promiscuous mode [ 148.044591][ T5071] hsr_slave_1: entered promiscuous mode [ 148.050621][ T5071] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 148.058267][ T5071] Cannot create hsr debugfs directory [ 148.084767][ T5069] hsr_slave_0: entered promiscuous mode [ 148.091149][ T5069] hsr_slave_1: entered promiscuous mode [ 148.097339][ T5069] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 148.105098][ T5069] Cannot create hsr debugfs directory [ 148.468377][ T5059] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 148.519603][ T5059] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 148.593576][ T5059] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 148.651530][ T5059] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 148.923705][ T5066] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 148.939863][ T5066] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 148.996543][ T5066] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 149.023629][ T5068] Bluetooth: hci0: command 0x041b tx timeout [ 149.034265][ T5066] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 149.103037][ T5068] Bluetooth: hci1: command 0x041b tx timeout [ 149.109299][ T5068] Bluetooth: hci2: command 0x041b tx timeout [ 149.165248][ T5063] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 149.183258][ T5068] Bluetooth: hci3: command 0x041b tx timeout [ 149.223042][ T5063] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 149.233380][ T5063] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 149.263188][ T5068] Bluetooth: hci4: command 0x041b tx timeout [ 149.269352][ T5068] Bluetooth: hci5: command 0x041b tx timeout [ 149.275802][ T5059] 8021q: adding VLAN 0 to HW filter on device bond0 [ 149.283069][ T5063] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 149.378682][ T5059] 8021q: adding VLAN 0 to HW filter on device team0 [ 149.395378][ T5073] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 149.405717][ T5073] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 149.417623][ T5073] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 149.428038][ T5073] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 149.475380][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 149.482788][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 149.495338][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 149.502451][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 149.655024][ T5069] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 149.708491][ T5066] 8021q: adding VLAN 0 to HW filter on device bond0 [ 149.716456][ T5069] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 149.735549][ T5069] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 149.806846][ T5069] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 149.836811][ T5066] 8021q: adding VLAN 0 to HW filter on device team0 [ 149.860955][ T5063] 8021q: adding VLAN 0 to HW filter on device bond0 [ 149.901896][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 149.909131][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 149.932483][ T5063] 8021q: adding VLAN 0 to HW filter on device team0 [ 149.976411][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 149.983577][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 150.000974][ T5071] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 150.014327][ T5071] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 150.066897][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 150.074087][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 150.096121][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 150.103304][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 150.124624][ T5071] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 150.142719][ T5071] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 150.157419][ T5073] 8021q: adding VLAN 0 to HW filter on device bond0 [ 150.240306][ T5073] 8021q: adding VLAN 0 to HW filter on device team0 [ 150.299269][ T5063] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 150.351933][ T5069] 8021q: adding VLAN 0 to HW filter on device bond0 [ 150.387822][ T5059] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 150.428880][ T5114] bridge0: port 1(bridge_slave_0) entered blocking state [ 150.436138][ T5114] bridge0: port 1(bridge_slave_0) entered forwarding state [ 150.508285][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 150.515492][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 150.540397][ T5069] 8021q: adding VLAN 0 to HW filter on device team0 [ 150.614958][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 150.622112][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 150.681045][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 150.688230][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 150.778193][ T5059] veth0_vlan: entered promiscuous mode [ 150.831240][ T5069] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 150.857863][ T5069] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 150.910253][ T5059] veth1_vlan: entered promiscuous mode [ 150.929535][ T5071] 8021q: adding VLAN 0 to HW filter on device bond0 [ 150.980006][ T5063] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 151.022457][ T5071] 8021q: adding VLAN 0 to HW filter on device team0 [ 151.087479][ T5066] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 151.104699][ T5068] Bluetooth: hci0: command 0x040f tx timeout [ 151.148593][ T5059] veth0_macvtap: entered promiscuous mode [ 151.160053][ T3713] bridge0: port 1(bridge_slave_0) entered blocking state [ 151.167275][ T3713] bridge0: port 1(bridge_slave_0) entered forwarding state [ 151.183336][ T5068] Bluetooth: hci2: command 0x040f tx timeout [ 151.189851][ T5068] Bluetooth: hci1: command 0x040f tx timeout [ 151.232785][ T3713] bridge0: port 2(bridge_slave_1) entered blocking state [ 151.240001][ T3713] bridge0: port 2(bridge_slave_1) entered forwarding state [ 151.263165][ T5068] Bluetooth: hci3: command 0x040f tx timeout [ 151.299435][ T5059] veth1_macvtap: entered promiscuous mode [ 151.343179][ T5068] Bluetooth: hci5: command 0x040f tx timeout [ 151.349257][ T5068] Bluetooth: hci4: command 0x040f tx timeout [ 151.401327][ T5063] veth0_vlan: entered promiscuous mode [ 151.459847][ T5073] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 151.490141][ T5059] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 151.518401][ T5063] veth1_vlan: entered promiscuous mode [ 151.580073][ T5069] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 151.612000][ T5059] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 151.668618][ T5059] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 151.696834][ T5059] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 151.706875][ T5059] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 151.717668][ T5059] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 151.775678][ T5063] veth0_macvtap: entered promiscuous mode [ 151.853811][ T5063] veth1_macvtap: entered promiscuous mode [ 151.873846][ T5073] veth0_vlan: entered promiscuous mode [ 151.941513][ T5069] veth0_vlan: entered promiscuous mode [ 151.989185][ T5073] veth1_vlan: entered promiscuous mode [ 152.028931][ T5063] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 152.042086][ T5063] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 152.060381][ T5063] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 152.077394][ T5063] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 152.088864][ T5063] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 152.100895][ T5063] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 152.154325][ T5069] veth1_vlan: entered promiscuous mode [ 152.182596][ T918] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 152.198171][ T5071] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 152.199503][ T918] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 152.208891][ T5063] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 152.223202][ T5063] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 152.232466][ T5063] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 152.241670][ T5063] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 152.342441][ T5073] veth0_macvtap: entered promiscuous mode [ 152.360009][ T5066] veth0_vlan: entered promiscuous mode [ 152.368960][ T26] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 152.378600][ T26] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 152.418971][ T5073] veth1_macvtap: entered promiscuous mode [ 152.439698][ T5069] veth0_macvtap: entered promiscuous mode [ 152.531981][ T5069] veth1_macvtap: entered promiscuous mode [ 152.569191][ T5066] veth1_vlan: entered promiscuous mode [ 152.618567][ T5073] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 152.643051][ T5073] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 152.663193][ T5073] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 152.682944][ T5073] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 152.701803][ T5073] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 152.759098][ T5069] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 152.770561][ T3713] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 152.780056][ T3713] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 152.796005][ T5069] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 152.807519][ T5069] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 152.818358][ T5069] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 152.836144][ T5069] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 152.858378][ T5069] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 152.874914][ T5069] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 152.906260][ T5073] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 152.923531][ T5073] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 152.940411][ T5073] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 152.967769][ T5073] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 152.979638][ T5073] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 153.056880][ T5069] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 153.068729][ T5069] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 153.079174][ T5069] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 153.090100][ T5069] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 153.100423][ T5069] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 153.112630][ T5069] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 153.125110][ T5069] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 153.137462][ T5069] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 153.146630][ T5069] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 153.155586][ T5069] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 153.164587][ T5069] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 153.183424][ T5068] Bluetooth: hci0: command 0x0419 tx timeout [ 153.186014][ T3713] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 153.205882][ T3713] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 153.217135][ T5066] veth0_macvtap: entered promiscuous mode [ 153.227012][ T5073] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 153.236171][ T5073] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 153.245013][ T5073] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 153.253922][ T5073] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 153.263532][ T5068] Bluetooth: hci1: command 0x0419 tx timeout [ 153.269596][ T5068] Bluetooth: hci2: command 0x0419 tx timeout [ 153.337119][ T5066] veth1_macvtap: entered promiscuous mode [ 153.343753][ T5068] Bluetooth: hci3: command 0x0419 tx timeout [ 153.381701][ T5071] veth0_vlan: entered promiscuous mode [ 153.424533][ T5068] Bluetooth: hci4: command 0x0419 tx timeout [ 153.430631][ T5068] Bluetooth: hci5: command 0x0419 tx timeout [ 153.442549][ T5163] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 153.457422][ T5066] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 16:40:26 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000745c0)={0x0, [], 0x0, "7464fbe08eb369"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000004cd80)={0x0, 0x0, "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", "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"}) [ 153.468523][ T5066] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 153.480597][ T5066] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 153.503114][ T5066] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 16:40:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000002940)={0x0, 0x0, &(0x7f0000002900)={&(0x7f00000028c0)={0x14, 0x0, 0x1, 0x3}, 0x14}}, 0x0) [ 153.530994][ T5066] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 153.541593][ T5066] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 153.557567][ T5066] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 153.576684][ T5066] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 16:40:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$inet(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="81", 0x1}], 0x1, &(0x7f0000000180)=ANY=[], 0x1c8}, 0x0) [ 153.611735][ T5066] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 153.695914][ T5071] veth1_vlan: entered promiscuous mode [ 153.715642][ T5066] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 153.716989][ T7] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 153.751439][ T7] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 153.772977][ T5066] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 16:40:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r6, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="2800000010000104fd0000008000ed1175000000", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r6}}, 0x20}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) [ 153.791940][ T5066] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 153.805379][ T5066] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 153.830123][ T5066] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 153.867466][ T5066] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 153.880773][ T5066] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 153.900989][ T5066] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 153.933324][ T5066] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 153.980797][ T5173] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 153.993901][ T5173] syz_tun: entered promiscuous mode [ 153.999633][ T5173] syz_tun: entered allmulticast mode [ 154.016817][ T5066] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 154.030351][ T5066] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 154.039960][ T5066] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 154.048903][ T5066] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 154.137951][ T5117] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 154.152478][ T5117] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 154.189715][ T5071] veth0_macvtap: entered promiscuous mode [ 154.215028][ T22] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 154.229199][ T22] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 154.249315][ T5071] veth1_macvtap: entered promiscuous mode 16:40:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r6, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="2800000010000104fd0000008000ed1175000000", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r6}}, 0x20}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) [ 154.394884][ T3713] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 154.402301][ T5071] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 154.414782][ T3713] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 154.424330][ T5179] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list 16:40:27 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0x17, 0xa, 0x201}, 0x14}}, 0x0) [ 154.472987][ T5071] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 154.504587][ T5071] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 16:40:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000007700)={0x0, 0x0, &(0x7f00000076c0)={0x0}, 0x1, 0x0, 0x5a8f}, 0x0) [ 154.544048][ T5071] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 154.578157][ T5071] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 154.591918][ T5071] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 154.657427][ T5071] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 154.669848][ T5071] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 154.688874][ T5071] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 154.702688][ T5071] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 16:40:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_REMOVE(r0, &(0x7f0000001440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001400)={&(0x7f0000000140)={0x1060, 0x1, 0x5, 0x0, 0x0, 0x0, {}, [{{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "261bad01d44dee70655613c560a084e710b388d58137b51729c9d122216f75c6", "1725361c264e86c8d63cf3374cc3dda8fe11d5ec02205b3f026feea2743f9c7b"}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "c3be2325057eb2ea8ef3ae5aefb6bbdd6f8ce27c574cc8c340cfb97548b395aa", "72f489e07fed31143308ff96f38507598c29a1ba56174ca21b62ada9df4529fc"}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "4b5fee666a0bed3919f6b826678049b47f46ca8bce809a96995c78d5ea6eec0a", "2ef6222f73aee678613e410552c87d89ec5ba74f1607f15f4e0e945352eb73ca"}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "4e5adb958aaddf32a238fdb512ac6870cf4178b3b5ccdaf33d797db3f24d3aed", "1acb0a592af782582cf3560b68c0d216cfd6c4b535d767d6913fa8b6c51c8e81"}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "48f2ed3ef8a55a42b3512c6e7bfb7a03950790966150968da24734d4af2daaa2", "c2639515e79ddc6e9503fd3adf7cdfe9e612940b217aa349f8542408b40c4967"}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "d4f4128d2a6568e313f2c357b0ab1e451144f4f6afa608afa0c02d9ba5cc4bbc", "d50eb420ca08ae5d92a3e1237c9d075d4e9fe1c0b83363c1533eaae603b21dcd"}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "2c8e224cacfb33da68d6b78751d72f53424c7bc7208f205fde2589bba70b1c7e", "dfea354a94545d2ac396e7af7cc8db1981690de7c1039af193712ff95b7a6f1d"}}}]}, 0x1060}}, 0x0) [ 154.736232][ T5071] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 154.784628][ T5179] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 154.808209][ T5179] gre0: entered promiscuous mode [ 154.815437][ T5179] gre0: entered allmulticast mode [ 154.828790][ T5186] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 154.839580][ T5186] bond0: entered promiscuous mode [ 154.846284][ T5186] bond_slave_0: entered promiscuous mode [ 154.856941][ T5186] bond_slave_1: entered promiscuous mode [ 154.864837][ T5186] bond0: entered allmulticast mode [ 154.870120][ T5186] bond_slave_0: entered allmulticast mode [ 154.879044][ T5186] bond_slave_1: entered allmulticast mode 16:40:28 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) [ 154.993948][ T5191] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 155.010710][ T5191] bond_slave_0: left promiscuous mode [ 155.017296][ T5191] bond_slave_0: left allmulticast mode [ 155.053534][ T5191] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 155.064414][ T5191] bond_slave_1: left promiscuous mode [ 155.070115][ T5191] bond_slave_1: left allmulticast mode [ 155.084610][ T5191] bond0 (unregistering): Released all slaves [ 155.109222][ T5071] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 155.120283][ T5071] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 155.131156][ T5071] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 155.142762][ T5071] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 155.152727][ T5071] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 155.163344][ T5071] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 155.173605][ T5071] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 155.184550][ T5071] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 155.196735][ T5071] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 155.207419][ T5071] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 155.219239][ T5071] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 155.265244][ T9] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 155.284186][ T9] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 155.297515][ T5071] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 155.316192][ T5071] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 155.352993][ T5071] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 155.361961][ T5071] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 155.381350][ T5201] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 155.391663][ T5201] gre0: entered promiscuous mode [ 155.397066][ T5201] gre0: entered allmulticast mode 16:40:28 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000007700)={0x0, 0x0, &(0x7f00000076c0)={0x0}, 0x1, 0x0, 0x2800}, 0x0) [ 155.448774][ T5112] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 155.457815][ T5112] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 155.700692][ T5112] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 155.719937][ T5112] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 155.772715][ T5123] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 155.781428][ T5123] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 16:40:29 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000007700)={0x0, 0x0, &(0x7f00000076c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="14000000000d01"], 0x14}}, 0x0) 16:40:29 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x8}}]}, 0x1a0}}, 0x0) 16:40:29 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x38, 0x1, 0x9, 0x5, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x24, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x38}}, 0x0) 16:40:29 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000007540)=[{{&(0x7f0000000000)=@tipc, 0x80, 0x0, 0x0, &(0x7f0000000100)=""/4096, 0x1000}}, {{0x0, 0x0, 0x0, 0x10}}], 0x2, 0x0, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000007700)={0x0, 0x0, &(0x7f00000076c0)={&(0x7f0000002980)={0x14, 0x0, 0x9, 0x801}, 0x14}}, 0x0) 16:40:29 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, 0x0, &(0x7f0000000080)) 16:40:29 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) bpf$ENABLE_STATS(0x20, 0x0, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f0000000180)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x6}]}, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000003c0)=0x14) socket$packet(0x11, 0x2, 0x300) socket(0x10, 0x3, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) sendto$packet(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000000)={0x11, 0x8100, r2, 0x1, 0x0, 0x6, @remote}, 0x14) bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@bloom_filter={0x1e, 0x8c, 0x0, 0xffff, 0x0, 0xffffffffffffffff, 0x1be, '\x00', r2, 0xffffffffffffffff, 0x0, 0x0, 0x9, 0xc}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801}, 0x38) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x89a0, &(0x7f0000000040)={'syzkaller0\x00'}) socket$packet(0x11, 0x3, 0x300) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000340)={'syztnl2\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="67726530000000000000000010bb0000", @ANYRES32, @ANYBLOB="7847000100000079000000004aa100280066000003049078e00000010a0101014414552300000000000000040000000000000400"]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x0, 0x1f5}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) 16:40:29 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYNAME(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, 0xe, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) 16:40:29 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000004cd80)={0x0, 0x0, "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", "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"}) [ 156.318184][ T5231] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 156.342424][ T5231] netlink: 'syz-executor.3': attribute type 2 has an invalid length. 16:40:29 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000007700)={0x0, 0x0, &(0x7f00000076c0)={&(0x7f0000002980)={0x14}, 0x14}, 0x300}, 0x0) 16:40:29 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x14, 0x1, 0x1, 0x201}, 0x14}}, 0x0) 16:40:29 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x8}}]}, 0x1a0}}, 0x0) 16:40:29 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) recvmmsg(r0, &(0x7f0000000080)=[{{0x0, 0x0, 0x0}}], 0x1, 0x400100c1, 0x0) 16:40:30 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000007540), 0x1, 0x0, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000007700)={0x0, 0x0, &(0x7f00000076c0)={&(0x7f0000002980)={0x14, 0x0, 0x9, 0x801}, 0x14}}, 0x0) 16:40:30 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x18, 0x3, 0x1, 0x5, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x4}]}, 0x18}}, 0x0) 16:40:30 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x8}}]}, 0x1a0}}, 0x0) 16:40:30 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000007540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x7, 0x0) 16:40:30 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x3, 0x1, 0x301, 0x0, 0x0, {}, [@CTA_LABELS={0x18, 0x16, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}]}, 0x2c}}, 0x0) 16:40:30 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000007700)={0x0, 0x0, &(0x7f00000076c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="980000000009010800000000000000000300000008000540000000140800064000000000080006400000000108000640000000000c00048008000140000000073c0002002c00018014000300fc00000000000000000000000000000014000400fe8000000000000000000000000000bb0c000280050001003a000000090001"], 0x98}}, 0x0) 16:40:30 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYNAME(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, 0xe, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) [ 157.153775][ T5264] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 157.183241][ T5264] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 157.196157][ T5264] netlink: 'syz-executor.3': attribute type 2 has an invalid length. 16:40:30 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000004cd80)={0x0, 0x0, "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", "3da8a7fd5d9534f7910e59b7fa87f0c112b317c9fac1e288c1dbac0c0404707fc117ba287c5a45b68e4a0cdfa21d765b40ec5819c3006688f6b5febd32eec5b2eb4c5b1239e5381da459f733f444c0f7f335778501e9aed0c45e5c20b4b4e2a4e84ce74aefc8110aac7be4b6fc3bd0873127365b90ae3d0d7f8164c00eb487e059b3e3b2d67d672f771514ae0b34abe18cd04907e300cabae34eadb6ba0a0a59677b3823a16832dc766b23ea4e7f56390550caf886211f247976ba62b654d1b7643b1ff4f62de8c4eeb2a7e8d9e4d68d3f6d63c35dde7d86a0581188fb6d706da788c5b1aafda82e90893e0e495bf405405bfa9aa687ce83c1edba40477b69299e8e2dadb04b2d140471d3d09448b4d2ced86f1e00eef78b0c542ef01447571ca5dab8344d59207ddac40c48c53ec1892483cc111c58f53830e4bb8bbaffb7009c14dad8bc938c32ecb24eea09b90648f3a7f708c64ca3e9c55de6950af564849dee1b5821bacd79dd80cfcf992dcfb4fed1f6fca29d89d964c27a1582e4ea4d1ef67ca35a4e73021ef0d71abd6e79db12f4216566b251e56af8535d2d28e796b215f62cda90ef0a2fb79f49df0753996fc8995a3c36f324ceef345806164ded079d7f004ca12721f852d39b76b14f480edbd046999e2ac50f14cb1d65add271840abb375a2f5d49f30e1e22db731e195985546feb2d7b1ae54bbe276a395a1530013f2e410a1fce80d9269effa5757c487a32ea70cf3c7c4cd7f7087c5bb580c5d3eb0bdd4bdd9e0ef9150a96dab6717f6fafb3eb2b040e067220b54e77bd17777993fd4fd294c736330e02886a209ec4b0a80d7b1163c6b7905fff09190143f09aa4559efb4335f81f14e11cfab77638b4b7151904428e54898dd4d40aad91cbb8f97256e753182471a11c32f9402b3a761040a3c1d66ab71dae0909822164276d075a4b9ed0f63e622b48a1ee20dacc299bf7158860b3688bd854fdc1ab3be6571388234e419fa0b2a63193d69d7f153ef80fae8aafa7a25d13e250fd91a9fcf18ea6c301cea1db23c3d751108f5f42ce119e3724e94097a0c4d82ce5cc869591a9f6d81e0af18508360da7c1736065fbf9c550602f99453b3bdcf3d15dd9b7676f281858932b2ef4bfd1ec53e9f5ed289648e95ad17ef62082107706485ef9452059b09459959745816911437cfd73711339841e5555b4f073567ef294be2cf25e5858a92568388b60f347bdebcf1c5fb9a5439686508a2610292874165c51f1e9056e3a821d5360d152139593d11598c915cb4c1f84fce0fd5c1ceaf9dc3f144ecdd330f3c31c0508b7c30fca140c1f76cea7ef88955325f7353d0573bdc8e782bcb2e3013e34385b7282cc76aa0ddc54b526ac28a6611bc828157e24bb7592e1535e218ccd977a77d051c9d8a49e1e57f45914e639992f81f0ff38a7417538fbeb2f272e18f836e9a4df7f7e3c4e2eece52ccb43d8e1ba603c23f5af7afde4fb4667788228ec19d6b18e421a6bb588ad08c7421ea23ffa11257ebfc46e00a960f07846a3c48c14425d839620a2e34eb40b872baf3ee0566ceca26b58adfeb2a05544a3ecd62eda8e73fbf36edc395edcce279526723f2f93dd4ffd3eb1a3076a97f0213495499f30a604dfe696cb00a4d5307348888f731520c9d0ad0b4ba89619e85f1356b80ae285c63d88bd8de721cade37f6ab537b0511d1c553baafb07514c9eb2480b468071430f47cab7280fc9bc0f47255c8c10d2f7c2f5e4163064faa9c7ac44c170338fa2256a95e3186d28514348b44ea46848052722d0011a678a2932a0a259bc57822df1f13736b102f117490db97a4d18be7668bbb659461b70f346e6ae38a87ecf413c074c4b9f6f4a9d1161f2585fffc27af20ec165c432e710a96e4fac602d162360e1f063d1148971561873b6550ed6f42501cb6348c448c2a911d3447166314ad16cbbea9f877f1b5743d32126ab6814559cc2644a887f527bbc15566ff00803038f32cda394f54f2c29f2ab5ccafa8ad4d3de0dbec5a546a8a08dfcd11dc266446ce207d5fe21a373db4c8472b6160785afcb5afeb407a7404a02f36b36f4dcfbc946f1a6955b8aa503bafa6c49130894651ce9d5c856ad54212c5b69a1421c5100173da2d1c1af7bcffc02c145f55e51c32e8738053a6b508f7a74af3fe47901d873920887420911bc05e4b93fbb62852dddc5aedcce2f576ce0fd000430db4dc35c842e816debc5c14cbff53b00272387cea579a4a52ca5ee4b79ffccf4df087c48a34b3378886f1cf7d2947f3d19add4f943e38fd77bf447a80714ff5cdeec18d6ae5207271586d69ffefa85386095c90c9a2a43fdf6a389c294be91c44c45fc481aef2b14f38455e004f77257f40f5a7f3d53a2ac79b96872c3ff829333ecdef202e90f7e18019c9e8353afd7f92bcf3cdd21eb426be2413e3a2d59f5d54e73735148cba67109a76df5fc990be4a0e6d3776850046dadfe5844ed66b950f6fdd1dce4131b6dd1ecba238ccbbddf1721b4c1c7046047a0b13b7cb0f9a25926ed9bfd0954b31deacb34b234f04cf0ce3d737ea959d3d0bb69b74c653a82baaa5fe4f5c56888dd767cc97d1dd30c03d121d98cf9192b35881a92bce374dd3581b96ae702a1f5f8756a2cefd237d22c01e88d630ad56cbb290176b43a16ad3f1ae51baa46e4a72079adb1f51fd375b58aa2621cc9d30a6dfc250f487db9c66477d2149c0974e10f5895d21284710cb64b17521c4dd63bce51c40240321d95c8d5ffce4051ed2402922d1ed7d2c676c835b8423ad731d22729e4d10ff994eab955d7a9dc64a0f6a9bfb57254e5957e4b6200d7cde9c82e123d1efdcdf5f4ac1f63e3a4771c5d9f3097a099b51fd7e18e24d4fb90928969b40e6fe98b315f31f24c09299acfe8b7e422fd35ae32d7012808e2389aa100fc0357edceafe929cd38ba153f2a0404e488e4765413957833272fc739bace2c15ed0e92d8231e5fef5d03e85f8c5ebac8a705842d5402e8d33ef8a040a2ec3d0d5677ffeecc2fb6b0d3f4758a85ea4cee7e672ef62ff3e579326ce8aaba771503fe8d6aaac1f950aeb378e726809e37bed03f48d504737dd0e9ec36879e40aea196ed941fc1df8950053283baad5fc65e9adb59a696cf7f2743addf43b1d03959184a4a3433d72f9562d10c6694420e5758fdb9d3db85320570826261d4105297aa23725a30e6a9e1c437aa2bc6e90ebba2781d13f5304df8ab79d3110819c8d748991a649937a31bde6d26e7e49010a17b409cf34d2b19485dc188e65b760254aa355137630828ac4f9b8c438166578205aac5e3bb48f50e7e2f9d9c977a186282773ccb318a5ed93a14f1a42dddd989f7d9b8b664fecc3f068ec8ba2680cf02695830f0de5da5420a1c94ad5a07af5af821bca213cc6ca77f1177f423efbe2da9d82e7b5b6a8690238241ee70230ff27a7b46d7b89505547fd552741fa9c97d46eac1f5c88940b362a3572d8a30469716f10a83e209a1b551edbff6c582bc8187ac421dd0bd6cbe4238b9799a967759c2c60c3f54074cd52005431920675c6c537e0cf241954b968d52a70e7b590161f03ff584deb1f3602cdb99c6799d24cd1d767a6d5602d616ceab382362e53dcb7975a7e2375fbe6b4186bf51bf167237cb5021acecd205c2ae356b554b0c7cac046fb7b61cf876641e50734a3d499469bf14a883d9afe5147251c404b8f509490a3310f1db196bdd0e0f109236b7379d9857b343e7b420ce7b0fb8537a0f38b325669def33b55edd4afc453f5e6b03a2b2d5e05c9b4d89a5619440a1f838c43712103c4210c3adadbffacc0cac9c38fd010d5379f6188452586834ded2da626072cb0825f8b15c8fac12f40a09c74dad1f16efd6a3a8ba85b9d76845d112613ae8a6927211b6369f1b2ad373f0afaa75e72d60ce38a4a5f05e172bc3b768262c9b9c530175cf763582c3da354f19faa84f945fc7646801f892b09637164ffbcf98772d112cd53a29b49deeea039c3e5615b3b9dbb966f5114c5ded43a3bd6dcb2585340d221ee7765500a74f759d9426cf76b9e8acc6ea4aabc87c4a233c0536d1dc38adb42798808e5572cc2e81dc51d21497aa297e254a4a24f6f5325758a2ee254af06f010c8e8ff3e603d98c63d2e8869df0e75c61ae78d73fd695a5ed094d78b99b95805c07c4ff20d81c009b56be4edb6dcc6face7c2b19ef9da862620c6b9b3b868c2578ae111226b5f91dcdbc8b3cbe673adf3569c30b04e01a91235cedbb903a31050299721cb9c258f400b031721fddc98566a215d195396f0a224e12e0529633df925d5a08b4b6d70d56d076d922b8ac672d8d8e9e1547595b111a95a1831c1161d53e652a76bb9d2c1836bea84fdce99837c526e1779808af6011c11e30de2f63c25168f771dbaf029c149328775927db564c8fc0f12a8770f9456c50b889a90270726358ee5e757f912bd5c498eb09a3e672bc688d5b16c4d45d78a06df09d7e976c0f986a61ba48f24031fc237d264d3aab3fb49310056286832903caaf96dc07ffeec116d102a0fac1df5fc834b8aa4ce599903e9dd2559a589cf40a687384caaf6e353d5b10223be8889fdab7c9980c29a9974ac6a9844f2325692ff9bd27b4e42e1600ea9054bd51baf2854412cc5c1cdd7d3b3c4f9c6521b4f5932b18a461664fd59c5ffcffda32234a7fb31e790518e1a7f5e15dfe148380f838adce7462eebdce3eb1bc332d0288930cbea7b9bc73b4ea8887e1b0dba3a0e5ca6b405389ea735d208292af0dd3e7cd01ba288f68a3c32532e75e11cc55dac33fd4518a34828a3315e3ca32f4f28a68c6ff09c98c9c7bc7ca525e3179189da6d7663fab3e3051ab08c71efb262f98165c0360ee935c4be4d2a63897fb4b9371cf456b9eb28ab5b4acedea47cf7eeec88e961d3a86c387b3644991560e1884693b0bae41b3323dc55226ba9872bca21697a24ac7286cfede8862d19b501e3c38a6cbc791800c6809d4e28ce6b3d78d0477a5bfd80e41582b805b4960e994dc54acdd49d348ab0eebfefc4605074a0e6bd15a26e6218d7f3f7344c15f0b46ce5fd10bd89727162b075deffe2bbaa0c03e60738c03dd26fac1ae5943e0901abe18cd3dc4aa532f8f6eade17be1610c15bfc394f0a6f69fbc0896908cb4fe20b33a64359abbecc3ac77dc0af5b4e1422efd7ceb3c7e18c2209f7a6e3edb4c8a940e84d760df07f2c7f182677f766738c1ed83c0ff76706511c84310777f0ce74dc8f48c672240fc54bdbf82a9d4ac8e740acbf620c1eb414ba7de335de48d3ccea75138998eade91c7511d9c92381e4dc1d5544ae94b46f9acb2068eb8ef5ea5c10073521e2343804684042aac4db811a5fb5cd18023dbfc1fc1ada"}) 16:40:30 executing program 4: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x8}}]}, 0x1a0}}, 0x0) 16:40:30 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000007540)=[{{&(0x7f0000000000)=@tipc, 0x80, 0x0, 0x0, &(0x7f0000000100)=""/4096, 0x1000}}, {{0x0, 0x0, 0x0, 0x1000000000000000}}], 0x2, 0x0, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000007700)={0x0, 0x0, &(0x7f00000076c0)={&(0x7f0000002980)={0x14, 0x0, 0x9, 0x801}, 0x14}}, 0x0) 16:40:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0x26, 0x0, &(0x7f0000000080)) 16:40:30 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x24, 0x1, 0x9, 0x3, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x4}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x24}}, 0x0) 16:40:30 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000007700)={0x0, 0x0, &(0x7f00000076c0)={&(0x7f0000005f40)=ANY=[@ANYBLOB="14000000000901"], 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000005d80)=[{{0x0, 0x0, &(0x7f0000000940)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}, {{0x0, 0x0, &(0x7f0000000f80)=[{0x0}, {&(0x7f0000000dc0)=""/82, 0x52}], 0x2}}, {{0x0, 0x0, &(0x7f0000002400)=[{&(0x7f0000001040)=""/82, 0x52}], 0x1}}], 0x3, 0x2, 0x0) 16:40:30 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x2c, 0x1, 0x9, 0x5, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x18, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @broadcast}}}]}]}, 0x2c}}, 0x0) 16:40:30 executing program 4: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x8}}]}, 0x1a0}}, 0x0) 16:40:30 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000007700)={0x0, 0x0, &(0x7f00000076c0)={&(0x7f0000002980)={0x14}, 0x33fe0}}, 0x0) 16:40:30 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000007700)={0x0, 0x0, &(0x7f00000076c0)={&(0x7f0000002980)={0x14, 0x3, 0x9, 0x801}, 0x14}}, 0x0) 16:40:31 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000007540)=[{{&(0x7f0000000000)=@tipc, 0x80, 0x0, 0x0, &(0x7f0000000100)=""/4096, 0x1000}}, {{0x0, 0x0, 0x0, 0x4}}], 0x2, 0x0, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000007700)={0x0, 0x0, &(0x7f00000076c0)={&(0x7f0000002980)={0x14, 0x0, 0x9, 0x801}, 0x14}}, 0x0) [ 157.580217][ T5284] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 16:40:31 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$inet(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="81", 0x1}], 0x1, &(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], 0x1c8}, 0x0) 16:40:31 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, 0x1, 0x1, 0x201, 0x0, 0x0, {}, [@CTA_STATUS_MASK={0x8}, @CTA_STATUS={0x8}]}, 0x24}}, 0x0) 16:40:31 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x30, 0x0, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L4PROTO={0x5}, @CTA_TIMEOUT_L3PROTO={0x6}]}, 0x30}}, 0x0) 16:40:31 executing program 4: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x8}}]}, 0x1a0}}, 0x0) 16:40:31 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000004cd80)={0x0, 0x0, "d6001fc4a5fae5e19cb8e4ca0cbc717379781bd25ae8a91457aec1c85a16fe30cbe8af7d96c5546cffbec5c5107156b5fc5fc453329b6e81b3dcd47e3a813e487f1cb3ebd08925e2d3acef4075d4519b294c488f16601d2219948af2f179c9341bc7ce96cd982e35541b0502d3d85ce013fbfb7756779427a4a8fcdd4a2518757dd3ed9af7ca4ed496d27fcc6d6dc6105278b0a9ebdecca93a837e72b6ba35e85bf0fe202bc0e334a66498fffd1839e4bf5df9121edca3bcc21ff14e37d28534acc76dccf305129bbe4befa683edc0dba5c66f1963c9d4fab7ddabed88985ca806b27e56ee540f313eb63bd1fd022a46fcb020e6c4149332a354d03985a3acb1", "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"}) 16:40:31 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:40:31 executing program 3: ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, 0x0) 16:40:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000702cf087f0000005dee00", @ANYRES32=r6, @ANYBLOB="f7ff00e4ffffff001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="2800000010000104fd0000008000ed1175000000", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x4c4c, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r6}}, 0x20}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) 16:40:32 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x8}}]}, 0x1a0}}, 0x0) 16:40:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x14, 0x1, 0x9, 0x3}, 0x14}}, 0x0) 16:40:32 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000007700)={0x0, 0x0, &(0x7f00000076c0)={&(0x7f0000002980)={0x14, 0x2, 0x9, 0x801}, 0x14}}, 0x0) [ 158.628682][ T5312] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 158.663176][ T5312] wg2: entered promiscuous mode [ 158.671544][ T5312] wg2: entered allmulticast mode 16:40:32 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x8}}]}, 0x1a0}}, 0x0) 16:40:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x20, 0x1, 0x1, 0x5, 0x0, 0x0, {}, [@CTA_ZONE={0x6}, @CTA_TUPLE_REPLY={0x4}]}, 0x20}}, 0x0) 16:40:32 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001600)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000000340)="99769f1e1c108cebcf0b1c5c3abcd3e2f2c798f1f9b343deee217387264d9b1a9885187ae1a537d341ad7a6bf7225e50591f18", 0x33}, {&(0x7f00000003c0)="db1a7250d555c7c9442fd72488875f33525e183cb0dcebf9d56abd0f010196273396db015a008b5b132bc384ff8e5601226babba880b2a207d2929f424c413c5bc0a2ca74aeeb48f55ef4ea29f4a654677611ca2cb29204aad54690ad704066dfd0ebaec9769610f63ff071cf207479b483f549ea4c4c2bdd31666011f296fb1143da0eaba42fccf2dfdf4b305b6996ecb702d081a57a19c27b3ab99b8eb3285db2613c1fc6860e0b5ca11c1e55a0964d779d2d93457d7949abcc2d1e78e439374ee96c950", 0xc5}, {&(0x7f00000004c0)="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", 0xe8c}], 0x3}, 0x0) 16:40:32 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:40:32 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x8}}]}, 0x1a0}}, 0x0) 16:40:32 executing program 1: r0 = socket$inet(0x2, 0x3, 0x0) getpeername(r0, 0x0, 0x0) 16:40:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000c00)={&(0x7f0000000540)=@abs={0x0, 0x0, 0x3}, 0x8, 0x0}, 0x0) 16:40:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f00000005c0), 0x10, 0x0, 0x0) 16:40:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000000100)="58a205a89f512ce1f2147d13822c5f8540bb66778538764cc89786420ddba5f4cd467540d744086a6281195241f6b9fe44e13f880a5cbb38866195e89c7fa493d1bdd0ff7319319bf9dfa62fc4628baca7e8278e556160d603f2edbc54c15f604f0246d36cc8c834a93ae416ca7985b43d55e547080f015d0fa8c42b8f4c773736df5e6b4e0131b768649e55232f55f0d18ed56c4bb82680786c15c10d131d8ed410f96a3be200c8638a3af9831285d8c8356bc02524966a48ed84b6d3ac3bf0ef57cdf58088c5f0969a8eda1b86a3f1a3232d582a3b", 0xd6}, {&(0x7f0000000200)="e41aca9c3b66e8a818d203269f6c59607444f0a09d7b88d9def8b497689012542b7a97bca11d38a6995c633dba90d0bdc59dfa1c52b7a9807c127cfab918a5ce18cac25d82db260539bdcb812503699470414359a36553aa36326b249dd49a6a94c5b890930214dff053d03686f391034af40826b58c84890fda60a91547c823087b4c4a50f0b7efa164794dd51e8ff0154098e831a9cd8626e189", 0x9b}], 0x2}, 0x0) 16:40:32 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) 16:40:32 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:40:32 executing program 2: pselect6(0x0, 0x0, &(0x7f0000003000), &(0x7f0000003040), &(0x7f0000003080), 0x0) 16:40:33 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) 16:40:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000a00)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 16:40:33 executing program 2: r0 = socket(0x2, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f0000000a80)='q', 0x1) 16:40:33 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:40:33 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) 16:40:33 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_int(r0, 0xffff, 0x8, &(0x7f0000000280), &(0x7f0000000780)=0x4) 16:40:33 executing program 2: socket(0x18, 0x1, 0x6) 16:40:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f00000005c0), 0x10, 0x0, &(0x7f0000000600)) 16:40:33 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_int(r0, 0xffff, 0x8, 0x0, 0x0) 16:40:34 executing program 2: r0 = socket$caif_stream(0x25, 0x1, 0x0) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, &(0x7f0000000340), 0x4) 16:40:34 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000480)={&(0x7f0000000040)=@name={0x1e, 0x2, 0x0, {{}, 0x1}}, 0x10, &(0x7f0000002740)=[{&(0x7f0000002a00)="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", 0x165}, {&(0x7f0000000240)="475fae420449a434a4bb6d6f094137be8dbe2c5fdc8b6c4b3065228d04280cc26db2a08cdccd98f5e3ca98d3eecc1010570e100605f8be6cae3c248bab5862e5ba14d2ef724a8349693359fa12ef2e923cef55f2af765732cad8231aa8563e6a6e53d018a4aefa1c844223c7f6749f5364877ccf258cec4535d0a36b6b51feccbdf73cb0d529f3319e72fe4016e6321307302dc680717ada9b91c341d834e5b34a11cc4dd378e196ead695884293bd28e4dbf7f399086cf9e83b4aaec3d9d2768277b290022506c6d1815da18e0c7dc3f10b4bf229d81cf70ebeb72a3b4d3317ee7fc3cc5f28ab16ffd65d695d9fd6dd00"/254, 0xfe}, {&(0x7f0000000340)="6df741ea0f38d35c6c93a15b8babfbe2783430a9b98fdf9f0839798a82fe00cef60751c1e25398b9a40094fecd4454b58ea665c34d8fad64816c3d87829cebfe7e79b11ce78bcfce4f94a9fad44025f719fe2118891325649b75ee3df0125d91c55d6b573f513e7263ce902aeaeefdee0e7d34ccdf595cda422db5797f4bd16316fff26441e3f027dd7b5eb5dc15ce4fe1a69742e852e8a2e6904a9668b0b25ca57ac83a010ec1", 0xa7}, {&(0x7f0000000500)="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", 0x1000}, {&(0x7f0000001540)="13bdaf01e73ec54e9bf7512acad8b7014c861f7ede8b029d83af0c925540a786c8dfc3ab7a94f6a83b507f394be8d0346b70688ffc18a1a69771d47426b11c5c0c88ebffd33dad4a8821ce72d43e6b7f0f5b0ff8fcb4b0eff2dc79c98be33b6d9a0e4d97104af5c3eca5d23ca7a42bf6b423bc0020593aa07b415d82a962d219a83db0828332f9de32067c6b27a8ca37729cff242ce2be985819aca091720cdce899f8d1f5f4ad043aa2674b3fa0d3b3f76634009bc2feefd4f1ebb17500"/202, 0xca}, {&(0x7f0000001640)="2328aea02aef31c842145bc05b7952bed81fadb827eeacfcdf8b0934f090cd228ac937a5b975c903b9fa98a0b3443970190433801d74c70f5e044e8714e2207ffee004fe16ec6c8367f1c9f4ee6614c5eba2650638db4cf02b7031118d75c372ced8d8f3282830a33c8271c4c7814806ed667008849e28ab42b6135dbeba2d307627e401a889de3fd061708137da02e78272825ef14548f899a14862beef97550548bd6706cf5ae4f31735635d3c3472c794834e894f60818a901f659f96b235d7f07493fdd9fa0000afe9c78070e31b177ea537996f8b794c39bc2c37cb00"/232, 0xe8}, {&(0x7f0000000080)="1618cb6041061a7b6f38bd0000000b3bda3c8989d9a6", 0x16}, {&(0x7f0000000400)="8d6bc1568936b1113712607bc0f4d2bd02be24a0e60707875bafe68bb463c21a9d1f7bd17ac9ee7adb248e18f5d89b7c1efed8b055f8385b1b58135f76f766348377456d1ec75aef000faeee3bfc122ab98990270702c89528f0423d1c2dd99329b873f67ec1d3495026de7e6e89344245fe874137f429", 0x77}, {&(0x7f0000001740)="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", 0x880}], 0x9}, 0x0) 16:40:34 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 16:40:34 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f00000000c0), &(0x7f0000000000)=0x98) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x19, &(0x7f0000000200), &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xe, &(0x7f0000000300), &(0x7f0000000340)=0x8) 16:40:34 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000100)="db8c072b1f029c29ddef94e95d9c27479082bcf46bc03116619a8258fd101dd6f2bf2fecfc48da6c10348715b1a104b3f232095fcda4583568777811bbc0655dd2947708b7c8274ead6f4a07d47b32b30caaeb2db4c1ee7bdc99ce1c4ecf6da6e771854afe85e20a93a86b74dbcff428f050534d7d9753eea30c3b7550f5ad55672e533648ae8148ea08e0e580a32e9dcf", 0x91, 0x9, 0x0, 0x0) 16:40:34 executing program 1: r0 = socket$inet(0x2, 0x3, 0x0) getsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f0000000040)=""/92, &(0x7f00000000c0)=0x5c) 16:40:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000c00)={&(0x7f0000000540)=@abs={0x0, 0x0, 0x3}, 0x8, &(0x7f0000000a00)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 16:40:34 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x10000, 0x0, 0x0) 16:40:34 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:40:34 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001a00)={&(0x7f00000019c0)='xen_mc_flush\x00', r0}, 0x10) 16:40:34 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x3, &(0x7f0000000140)=@raw=[@exit, @call, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000180)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:40:34 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 16:40:34 executing program 3: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_DEL_MFC(r0, 0x0, 0xcd, &(0x7f0000000200)={@empty, @private, 0x0, "a0ea0ffd18d527643a5541d4a4465ba491ab74f46dbc4631ccf56f3740070558", 0x0, 0x0, 0x0, 0x81}, 0x3c) 16:40:34 executing program 1: unshare(0x42000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="600000006c0005070000000000ffffffe4000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000140003006c6f00000000000000000000000000002c0034801400350076657468305f766972745f7769666900140035007665746830"], 0x60}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) 16:40:34 executing program 2: r0 = socket$pptp(0x18, 0x1, 0x2) ioctl$BTRFS_IOC_DEFRAG(r0, 0x50009402, 0x0) 16:40:34 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 16:40:35 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) recvmmsg(r0, &(0x7f0000007140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x42, 0x0) 16:40:35 executing program 3: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) 16:40:35 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000001980)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) 16:40:35 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:40:35 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 16:40:35 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f00000005c0), 0x4) 16:40:35 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000001980)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) 16:40:35 executing program 1: unshare(0x42000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="600000006c0005070000000000ffffffe4000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000140003006c6f00000000000000000000000000002c0034801400350076657468305f766972745f7769666900140035007665746830"], 0x60}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) 16:40:35 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000001980)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) [ 162.407832][ T5425] Zero length message leads to an empty skb 16:40:35 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 16:40:35 executing program 5: unshare(0x42000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="600000006c0005070000000000ffffffe4000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000140003006c6f00000000000000000000000000002c0034801400350076657468305f766972745f7769666900140035007665746830"], 0x60}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) 16:40:36 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000001980)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) 16:40:36 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 16:40:36 executing program 3: unshare(0x42000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="600000006c0005070000000000ffffffe4000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000140003006c6f00000000000000000000000000002c0034801400350076657468305f766972745f7769666900140035007665746830"], 0x60}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) 16:40:36 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 16:40:37 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:40:37 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x0, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x8}}]}, 0x1a0}}, 0x0) 16:40:37 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x7d, &(0x7f0000000840), &(0x7f00000008c0)=0x14) 16:40:37 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 16:40:37 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x50, 0x0, 0x9, 0x3, 0x0, 0x0, {}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_IP={0x4, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @empty}}}]}]}, 0x50}}, 0x0) 16:40:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x18, 0x0, 0x2, 0x3, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x4}]}, 0x18}}, 0x0) 16:40:37 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x5c, 0x0, 0x9, 0x3, 0x0, 0x0, {}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x3, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x12, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @empty}}}]}]}, 0x5c}}, 0x0) 16:40:37 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x14, 0x0, 0x4, 0x3}, 0x14}}, 0x0) 16:40:37 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x0, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x8}}]}, 0x1a0}}, 0x0) 16:40:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x5c, 0x2, 0x9, 0x3, 0x0, 0x0, {}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x12, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @empty}}}]}]}, 0x5c}}, 0x0) [ 163.640670][ T5459] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 16:40:37 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) 16:40:37 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) write$cgroup_type(r0, 0x0, 0x0) [ 163.814913][ T5468] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 163.849295][ T5468] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 163.878704][ T5468] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 163.913098][ T5469] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 163.923237][ T5469] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 16:40:37 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:40:37 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x0, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x8}}]}, 0x1a0}}, 0x0) 16:40:37 executing program 5: bpf$BPF_PROG_TEST_RUN(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, &(0x7f0000000300)}, 0x48) 16:40:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x5c, 0x2, 0x9, 0x3, 0x0, 0x0, {}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x12, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @empty}}}]}]}, 0x5c}}, 0x0) 16:40:37 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000100)="b9ff03086844268cb89e0ef086dd", 0x0, 0x0, 0x60000000, 0xc1, 0x7, &(0x7f00000003c0)="3dc0438f07c40230ee3ed3ec7a9e8281de7dc04849cdfad7476560a5a6148a9b2cdfa6b697467a77a8fc33b5a380b6262d03c2aa1a1b4afe2b1602f0e49c0a79d2a9ca8e498fe955f1c5df1fa0a534c1b6f5777286a208541f8347498b27518ad0ed21283216ce3c38cc476cda6cdff321fc13929a164c2d0096c3c54b214d9280d7332d7129eb083df7e2d763b9fcdeaf921d7613b8ed43b3a23265487630ccef0e92b6b4822cb570f81eae92aa05d1b4e0075e62b0444ca881a269c2a6ce740a", 0x0}, 0x48) 16:40:37 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'team0\x00', 0x4901}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'syzkaller1\x00', 0x400}) 16:40:38 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'team0\x00', 0x4901}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'syzkaller1\x00', 0x400}) close(r0) 16:40:38 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000100)="b9ff03086844268cb89e0ef086dd", 0x0, 0x0, 0x60000000, 0xc1, 0x0, &(0x7f00000003c0)="3dc0438f07c40230ee3ed3ec7a9e8281de7dc04849cdfad7476560a5a6148a9b2cdfa6b697467a77a8fc33b5a380b6262d03c2aa1a1b4afe2b1602f0e49c0a79d2a9ca8e498fe955f1c5df1fa0a534c1b6f5777286a208541f8347498b27518ad0ed21283216ce3c38cc476cda6cdff321fc13929a164c2d0096c3c54b214d9280d7332d7129eb083df7e2d763b9fcdeaf921d7613b8ed43b3a23265487630ccef0e92b6b4822cb570f81eae92aa05d1b4e0075e62b0444ca881a269c2a6ce740a", 0x0}, 0x48) 16:40:38 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x8}}]}, 0x1a0}}, 0x0) 16:40:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x40) [ 164.592445][ T5484] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 164.706030][ T5484] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 16:40:38 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"/2748], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x3}, 0x48) 16:40:38 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x5, 0x10001, 0x808, 0x1}, 0x48) [ 164.781062][ T5484] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 16:40:39 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:40:39 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x8}}]}, 0x1a0}}, 0x0) 16:40:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x5c, 0x2, 0x9, 0x3, 0x0, 0x0, {}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x12, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @empty}}}]}]}, 0x5c}}, 0x0) 16:40:39 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x3, &(0x7f0000000240)=@raw=[@map_fd, @exit], &(0x7f00000000c0)='GPL\x00', 0x61, 0x0, 0x0, 0x41000, 0x7, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x2, 0x8000b, 0x0, 0x1}, 0x10}, 0x80) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000180)={'gretap0\x00', 0x1000}) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) 16:40:39 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000004180)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1076, &(0x7f0000000300)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001380)={r0, 0xfe, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff3c, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r1}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={r2, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000001340)={r0, r3}, 0x10) 16:40:39 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000004180)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1076, &(0x7f0000000300)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001380)={r0, 0xfe, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff3c, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) 16:40:39 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000100)={@cgroup, 0xffffffffffffffff, 0x1e}, 0x10) 16:40:39 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x0, 0x3f, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0xb94, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) [ 165.612794][ T5508] netlink: 'syz-executor.3': attribute type 2 has an invalid length. 16:40:39 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x8}}]}, 0x1a0}}, 0x0) [ 165.665600][ T5508] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 165.697322][ T5508] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 16:40:39 executing program 2: bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) 16:40:39 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000004180)=ANY=[@ANYBLOB="18020000e2ffffff00000000000000c685000000360000009500001800000000922ae83713ab960001000032ad558c46fff4208d4990ec11ce9413ac30e00bd0081f8504e19a5183d769676520e98a263345e44d5ad12bca35510100c4d86abeb12303ff1c9fe0d0020000d60400000007d3670000008aff66d6b3181ffc1d62a3954c1198bbc4fa13aee48ca9e8969faebf3183fe803ab3f5024b52dc265b36fc9dae00a09404f01f9504d0976d252bd8d24538556e5e57bee3b8cf464ef3c6a7def8bad3ca6e3abdb21696e340bb8e2a093add57196b40def3858ef569147fa4108328392d322ab5df10a2f69a6bdf72ee7944e810d0223917c3d042410f57466f59544047d6d8ac44060000000000ee16c729300d2301800000000000002b5a8b05fcc154ad5290a8cdb97c343f454ff69dd6cbde49b28a6cb5f4fc0001745cff6e00e7ffffff0000acf3209a08439f1ff01779b6f6df7e02aa6d7760525b595fe1f697bc114ed1778e97a3f0395f946974cfb458be2a34cf924dc37b5592bf17956f3547497aba814382ff67b345b677a9d6523d87008000000400000000003fe8613ca29ff92be0d8deffff7b68136b0046d535dd39c0f35408869e9b342b953f91447e6b9eab304f134306320600a44095254b45a6c1312a13696c7202df5f764713504facc532c5a6d44d99ec7530ed7b0311000000000000e54e9072a22d911f4a2c2e2fa806e63c5cd98a8569a6d6bcfb000064885117e2ad910eae67e0ebe380d0f648713e68153579e02d71c58d147b00821ab9a6475b31e1ebf1369a04000000fbf3983f283f2f00000000992774814d63c933912d000006000000a66acb0a38856929e7d8b1b06c9bd5d7e5490f3b8596b694ea9483bd4bd287c83dd998a74694d18bdd8ad0983bc90770bbd26a82b9d99d5fc04563b523c47ef8c33400e90d02000000000000000edf1147a7afe772cd45af8aeffe2753088e02ca6bb2feec446ce7dbce66f0a93a03371320980865c7c62ea4d8f8a864dce9fa85aeb0454349100296ee2dba39c3f6fd6cf96714e11fe03b5062809a7418b165dd0336d226bac1e1223be1c97b15175d0e664beb126000e96549e1a1228c686edb475b705eaa9515c96f4fc6b3c925ea404e0f1de61026dc6c6618580fd6ce9eac602c1756f6d1056712412131ed9925989e01eae489ec7052e0ed72c326c7a8aa63999e2297c54ce1822d14b7c7699a9d0600f11f2e7f474cffbc35bc8623cd5eb68af82275a940be0400000000000000bcc3fbe7d90de96d6a8e9f32f18d1f606b381e4903b500000000000000000000004a2357ba5f6000de1cfa88b7165dcf4f2aaee86d4802000000000000008fdb686d5da2a42e4b5024b6535811f362201d4f82012e6af704973d04ea923c19e6cb723c1923b3eea2d73e176dff383c9fbbac53dfdcb1a68c98e96fe39eec23963faf3ebed3409144c7c53d6318ced678a621450a9b01e9f2772e5f2999d3435da02556e36c3215d2bd4e96c93bff3ad04a82ff3cfadcf65eb92adc6c68d66b11cb2d7556414a86dfa94bb7aa52c7febb1e9b2efcbbc5bccf9d39bed802f4f056976a9a362ee9cc624ec454b90200fd9603f96908bddc14d00000000000000000000000000044d917c62b27679913075731e8fddb07c10c82002d60181588ae63a440454287de9e340f611267f37bdd0f2d21cb06fcaf45a0a297e396f428d43371424b307eef82c5d6d19f3ef0d3b8f7fa51957e3099caab31133b34a1d3eebc0f0c9056df2e9667ba0b55695c7894010079b07e7aef7785e2486472b5cba1f3346c1e8e23deb8c82bb6eb2c72c484241dc3b66da78260f800fffd39368b952f6f4a10295c50c887a31d8b543c5d10f2dbd4d0b84eaad43feb6e169a9f2fcff7000000000000000000e011bc6366f56fa787f212c1f8c0f47f50b1e9b5d841ea55fe569bb7bf1e78191c8a02ad436725771738a2a98891971e3b932352896e1ea10f62e8ef7a87e16151b39d6c27575714540d8c293a3fa4b5a825360423c1cbc8b5d19167152823ed853140edda002c16c842b168bb55f6bb713deb57d0aa78d6d4e5fc5be2c402bd246128f41bcb02000000892b135a92e8c844938aa98ba4839a1408a696454d40e5eed4d4dce481ca86bfac54c330331b7f2cde17cbaeb0377696faf546ecbe742d73d47d726a50f6e752f3324806f2232988229c99845151c048e07c5255bd7e8b5923aa3cfb6f7e06494f21ca450139c558000000000000000000000800000000000000000075aa0000000000000000000000005560bd9eb81e839e4992e64b074a66cccccf00334fa94da8477be7d99b558ec6a5b1596ac1e7617c6b32eed0cc70286caf2c5189a103f4b0b04aff171c4d388ccf67fea37e782f025c94c853cde330a193a967d907a8c88fcb033e680f559a72150cb900bafcd536f48797915a2fe9922ce27300009e1b36aa4730117d9b00000000003c630000000000008fbbd11b015c415ca04192fbfb1a8b0e3460af35771dbac10062835c9bab3ad09f7a022c52d8000000000000000000004000000000000000000000000000000000000000000400000000000000000000000000006ec473c54399b7b8aa1ee46132fc45da8292631178cecf19550108b8b8423de42957ffe9bb6d752e68d2bc2ce777a17bf4dfdfee5de0f3e4dadf51ab9562827b762fa611ba5f32861c19dffe1dc9fd5c41cd46cf131fd6b0c2ddad90ac33f768f9ecc70327c59918fa5a249befe98262f53c8182d95f6da3698a6a88c2c31d801a8f1f5e0ce05138d5422da0a6a62b9dfe1f39775d1d0c9186096415f544aaf76b0a1c877a6c826a5adcfb22c4a0e5a46271caa3eaf4f389dd5f3c20dbddc0377a4266d7b9fd61b9287e9b4be0a413ee31be0ddecab0ef7b25cba1fb3654ddf291ecb7768ac1e177042cb4c452fa6b3966950000000000000000c187da23d6855500fe8510b51e13a890e394b84a6ea2cc8d42b97c697c29122298d55e2e1cca8e07abda2606a3f381c64b9fec0000000a7965e4854e8e3572ad5149b3872342dea9252132860c9af1bd5fe263c0313dea5d6e0c11a466d6892ed65f34667dd79b07b5cbdd8aa7dd561a26b5562d4861a7e1b0f48930e0b696ea3bee7eb72794e163d7aeac9a0fa5403ac9cb421eae283b0550f1d0d339cd7b96e71d3ab48ad9d7975e0c9b117f71d3ab80a0c9b0284ecc469fa6181c9c71fce07a6ffb23296a107763138e8d9876291af2076890c47925ac773d95d2ca42acb3e5f3a1550665b898462c139ffd0106bc8a61b6117d252efcab7106b4c3a3c13a70ff452e9d2096142c517b0e91b5cf88332faca5b3ee96363065c3ce32d3d39ec36e20d597e05664f2526bd918090649da11f7299789d00f5024df1e99d3efecb9b457642fe810370ba4fbe00fa60a28af966a05000000448bbe43a1dcd2ea760018b57a36ac41ef2051a7b703d55c0602540663016e20d50385766df4dac47802a55bd38dd767ee9960c6daa704fc5d01a1459134d1b9edfde3be9e25a110228c64253588ff420644dbc0854e69a7bdda72f93ceaccf92cfe7dd6296c950db10f6dd8a5ef9b73cf6a12a1ba16fdc7e35b805f4fd2fcff0a623722149c1465e4de2d53f0f10b14c21865027abc71a12cb1e9f8029c7a20000000eeb0d53a83e518c8d2052c08b515d9d0bde24ac4e798040c7db0bb03c019507d6377f3d5dd94a27abc6d6b120d61f772407e0d2cb50d29168b68aef9f176b4c3aa8b21279d4ea9c1f669aa8c2c17d5b3a8d1dda58d26f1019af04b7774c85d5bce8be010f27c5211938031c3404680b01279c778bd1fe1b48c4b5b8e0fe756e54a8d76b7cec5e3407d93b4eadc446440607de844acf5524a4657e33af2115547b735b57b5092d0bc8fa6acb832509abe0882d570ce400aaebd7baff88526608d6991aac95751671174129457e4a03aca69d82b64b89e6ad6ed1e275ec5002e48170e4c7b4f3971481098dedb88fba90770e44bf404d5a97fefe2fe8e459fe45933b78c7ab5fe985a480193a20fb07da1455fb283df68af569ac82aa6dc703e29bf158931fb79f2abfa6ff7eb8c4f381c9da58bea460e2ead969933e5391970ca4fddd64da2e5df9c4d82044068caaaab771b37bb06bbe673056d849825525f1120b2250f6b8520381f7a74b1c687781cb6b23e67b918844b83dbaeeb559ec8520d710dd6d6b4e64838bd434a36ed03fc0c488b24571032ffbc9f8ce97041e1bc4729d539358dc9599c1266b9ce2cb6dd0ad57a6e9d3d4a11a27f70b2934c96237e2ba09c58eeda678d4d08b6da99b7a86e946215afb1b48792fde54492e306cb5342e2589874b603a1de972b1f09cc350096f5c3e814118af9ba0793cfdf20c77b34eacfdf63ce59ec4d2f867bf884e941559b068d908325667672b5e1cf71f4829c0493e8b141489ed926b822becead7a0a2b4a4c008ab16b616d60f347e4da54f06443507efe57ea62399ef4eb11b2f559e1b056456a53998bf1c6d13c92e75136147f91ae3a75ca15eb1b51bf700b3c0bf54bc3745ff313c5e75dc66386897f6ee45429371b8d0878c442ad2fe9baf85c1390da13efc353ccbef950c29f39ddf436f0d9bf1be1515ed251d8b6f11ecb16b1e8d1ed04196e9b6c2f9e068b7749bb6c1f533e493f22c901662c65cb761dc2eeff2f698bd4dbae83e2dfdc4f1c7f918a00515c1bc189d10ec22b35c92725cbf0ba244fd029c4f026f68e000000060000ab0476c3fd7f7c1e5c000000000000000000000011e43e39d3f4394fbfa13c416b1c443c5e52eea726491ad75100ebad7c6d5a665c59a3fb158e43da904f19e7e8daa4e90390b8da945f6cd78536c0d2be07221f85ad46b180f256d4d84592691d15d65896b66b63a46705338b67b72dc1c3075fcdc5cbffb0366151632ba5be8ae815dfea9fadfd31c473a24a73d3e5116c3023b3563c72d26fbd59877132bde5ca4ef8d92fd3613c768b35223f6fd0b5e9a8b98cccf1e2b4612e620e3a159d6365c9045aaa826aa0ee6d26cf0397ce674c20824584b464ebdc2f3ea26a7aec4570b242a6000000000000000000"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1076, &(0x7f0000000300)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001380)={r0, 0xfe, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff3c, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r1}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={r2, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) 16:40:39 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) 16:40:39 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x8}}]}, 0x1a0}}, 0x0) 16:40:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x5c, 0x2, 0x9, 0x3, 0x0, 0x0, {}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x12, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @empty}}}]}]}, 0x5c}}, 0x0) 16:40:39 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) 16:40:39 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:40:39 executing program 1: bpf$MAP_CREATE(0x500, 0x0, 0x0) 16:40:39 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x8}}]}, 0x1a0}}, 0x0) [ 166.363965][ T5529] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 166.389799][ T5529] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 16:40:39 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000d40)=@base={0xe, 0x0, 0x0, 0x2}, 0x48) [ 166.443908][ T5529] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 16:40:40 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f00000013c0)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="8dd71a5e1c094da4d019afb30800", 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 16:40:40 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000100)) 16:40:40 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x8}}]}, 0x1a0}}, 0x0) 16:40:40 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'team0\x00', 0x4901}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'syzkaller1\x00', 0x400}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000040)=0x1) 16:40:40 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x8}}]}, 0x1a0}}, 0x0) 16:40:40 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8923, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @empty}}) 16:40:40 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={0x0, @null, @netrom={'nr', 0x0, 0x3}, 0x0, 'syz0\x00', @bcast, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) [ 167.161584][ T5554] À: renamed from ip6gre0 (while UP) 16:40:40 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$inet(r0, &(0x7f00000005c0)={&(0x7f0000000000)={0x2, 0x0, @private}, 0x10, &(0x7f0000000440)=[{&(0x7f0000000040)="0aec11f132b7", 0x6}, {&(0x7f00000000c0)="fd", 0x1}, {&(0x7f00000001c0)="ef", 0x1}], 0x3}, 0x0) 16:40:41 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:40:41 executing program 1: r0 = socket(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000180)=@newtfilter={0x58, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xd, 0xd}}, [@filter_kind_options=@f_flower={{0xb}, {0x28, 0x2, [@TCA_FLOWER_KEY_ENC_OPTS={0x24, 0x54, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_VXLAN={0xc, 0x2, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8}]}, @TCA_FLOWER_KEY_ENC_OPTS_GENEVE={0x14, 0x1, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_GENEVE_TYPE={0x5, 0x2, 0x9}, @TCA_FLOWER_KEY_ENC_OPT_GENEVE_CLASS={0x6, 0x1, 0x89}]}]}]}}]}, 0x58}}, 0x0) 16:40:41 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8923, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @empty}}) 16:40:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=@newtfilter={0x6c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x3c, 0x2, [@TCA_BASIC_EMATCHES={0x38, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8}, @TCA_EMATCH_TREE_LIST={0x2c, 0x2, 0x0, 0x1, [@TCF_EM_NBYTE={0x10, 0x1}, @TCF_EM_META={0x18, 0x0, 0x0, 0x0, {{}, [@TCA_EM_META_HDR={0xc}]}}]}]}]}}]}, 0x6c}}, 0x0) 16:40:41 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000000200)="92", 0x1) 16:40:41 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x8}}]}, 0x1a0}}, 0x0) 16:40:41 executing program 3: r0 = socket$can_j1939(0x1d, 0x2, 0x7) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 16:40:41 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x8}}]}, 0x1a0}}, 0x0) [ 167.904470][ T5573] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 16:40:41 executing program 1: r0 = socket(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000180)=@newtfilter={0x58, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xd, 0xd}}, [@filter_kind_options=@f_flower={{0xb}, {0x28, 0x2, [@TCA_FLOWER_KEY_ENC_OPTS={0x24, 0x54, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_VXLAN={0xc, 0x2, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8}]}, @TCA_FLOWER_KEY_ENC_OPTS_GENEVE={0x14, 0x1, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_GENEVE_TYPE={0x5, 0x2, 0x9}, @TCA_FLOWER_KEY_ENC_OPT_GENEVE_CLASS={0x6, 0x1, 0x89}]}]}]}}]}, 0x58}}, 0x0) [ 168.000516][ T5577] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 16:40:41 executing program 3: r0 = socket(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000180)=@newtfilter={0x58, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xd, 0xd}}, [@filter_kind_options=@f_flower={{0xb}, {0x28, 0x2, [@TCA_FLOWER_KEY_ENC_OPTS={0x24, 0x54, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_VXLAN={0xc, 0x2, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8}]}, @TCA_FLOWER_KEY_ENC_OPTS_GENEVE={0x14, 0x1, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_GENEVE_TYPE={0x5, 0x2, 0x9}, @TCA_FLOWER_KEY_ENC_OPT_GENEVE_CLASS={0x6, 0x1, 0x89}]}]}]}}]}, 0x58}}, 0x0) 16:40:41 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) 16:40:41 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x5}, 0x48) 16:40:42 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:40:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r0, 0x0, 0x2, &(0x7f00000000c0)=0x88, 0x3) 16:40:42 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000001c0)={'ip6_vti0\x00', &(0x7f0000000140)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @local, @ipv4={'\x00', '\xff\xff', @empty}}}) 16:40:42 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 16:40:42 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8923, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @empty}}) 16:40:42 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) 16:40:42 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8946, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @empty}}) 16:40:42 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="01bda205ca666bd1bbd705784b560b771b", 0x11}}, 0x0) 16:40:42 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) 16:40:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r0, 0x88, 0x0, &(0x7f00000000c0), 0x4) 16:40:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r0, 0x0, 0x22, &(0x7f00000000c0), 0x3) 16:40:42 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000000), 0x4) 16:40:43 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:40:43 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:40:43 executing program 1: r0 = socket$inet(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @multicast2}, {0x2, 0x0, @broadcast}, {0x2, 0x0, @multicast1}, 0x6}) 16:40:43 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 16:40:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f00000000c0), 0x3) 16:40:43 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8923, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @empty}}) 16:40:43 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000000)={0x24, @short}, 0xffffffffffffff9c) 16:40:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r0, 0x0, 0x4, &(0x7f00000000c0)=0x5, 0x4) 16:40:43 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:40:43 executing program 3: r0 = socket$inet(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x6, @remote, 0x0, 0x0, 'sed\x00'}, 0x2c) 16:40:43 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x2}, 0x0) 16:40:43 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:40:44 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f00000000c0)={0x2, 0x4001, @local}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x20004808) close(r0) 16:40:44 executing program 2: r0 = socket$inet(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @multicast2}, {0x2, 0x0, @remote}, {0x2, 0x0, @multicast1}, 0x4}) 16:40:44 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r1, 0x1}, 0x14}}, 0x0) pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x1d}, &(0x7f00000000c0), 0x0) 16:40:44 executing program 5: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)='7', 0x1}, 0x9}, 0x0) 16:40:44 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:40:44 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:40:44 executing program 2: socketpair(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f00000002c0)={0x0}}, 0x0) 16:40:44 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x158, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x158}}, 0x0) [ 170.907229][ T5661] ieee802154 phy0 wpan0: encryption failed: -22 16:40:44 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f00000000c0)={0x2, 0x4001, @local}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x20004808) close(r0) 16:40:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r0, 0x0, 0x4, &(0x7f00000000c0)=0x80000000, 0x4) 16:40:44 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000600000005"], 0x38}}, 0x0) 16:40:44 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x158, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x158}}, 0x0) 16:40:44 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x10, 0x0) 16:40:44 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2403}, 0x0) 16:40:44 executing program 3: r0 = socket$inet(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @multicast2}, {0x2, 0x0, @broadcast=0x5}, {0x2, 0x0, @multicast1}, 0x4}) [ 171.179746][ T5675] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 171.208837][ T5678] syz-executor.2 uses obsolete (PF_INET,SOCK_PACKET) 16:40:44 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x158, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x158}}, 0x0) 16:40:45 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:40:45 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x7, 0xf9efff7f00000000}, 0x0) 16:40:45 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f00000000c0)={0x2, 0x4001, @local}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x20004808) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000005840)={0x0, 0x0, 0x0}, 0x0) socket(0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeff7fef00102e80e423c7", @ANYBLOB="01000000010000001c0012000c00010062"], 0x3c}}, 0x0) socket(0x0, 0x0, 0x0) sendmsg$AUDIT_USER_AVC(0xffffffffffffffff, 0x0, 0x0) close(r0) 16:40:45 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000300)={&(0x7f0000000080), 0xc, &(0x7f00000000c0)={&(0x7f0000000280)={0x38, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP6_SADDR={0x8, 0x1f, @rand_addr=' \x01\x00'}]}, 0x38}}, 0x0) 16:40:45 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vxcan0\x00'}) 16:40:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x8e, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd600a843500580600fe8000000000000000000000000000bbfe8000000000000000000000000000aa00004e227f6a91316f64e1e8a0053f209d2c2e024cec"], 0x0) 16:40:45 executing program 4: r0 = socket$inet(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @multicast2}, {0x2, 0x0, @loopback}, {0x2, 0x0, @multicast1}, 0x4}) [ 171.758177][ T5699] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 171.758375][ T5696] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 16:40:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f00000000c0)=0x5, 0x4) 16:40:45 executing program 1: pselect6(0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) 16:40:45 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x16, &(0x7f00000000c0), 0x4) 16:40:45 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x7}, 0x0) 16:40:45 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)='7', 0x1}, 0x7}, 0x0) [ 172.112721][ T5713] ieee802154 phy0 wpan0: encryption failed: -22 16:40:45 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:40:45 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x324}, 0x0) 16:40:45 executing program 5: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x7}, 0x0) 16:40:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r0, 0x0, 0x10, &(0x7f00000000c0), 0x4) 16:40:45 executing program 1: socket$inet(0x2, 0x2, 0xffffffef) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x5411, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x11, 0xa, 0x1, &(0x7f0000000480)) 16:40:45 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) 16:40:45 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f00000000c0)={0x2, 0x4001, @local}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x20004808) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeff7fef00102e80e423c7", @ANYBLOB="01000000010000001c0012000c00010062"], 0x3c}}, 0x0) close(r0) 16:40:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r0, 0x0, 0x33, &(0x7f00000000c0)=0x5, 0x4) 16:40:46 executing program 5: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x4675}, 0x0) 16:40:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f00000000c0), 0x3) 16:40:46 executing program 4: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) [ 172.617939][ T5729] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 16:40:46 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)="ae9996", 0x3}}, 0x0) [ 172.793024][ T5738] ieee802154 phy0 wpan0: encryption failed: -22 16:40:46 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:40:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r0, 0x0, 0x4, &(0x7f00000000c0), 0x4) 16:40:46 executing program 5: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x48}, 0x0) 16:40:46 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8910, &(0x7f0000000140)={'ip6gre0\x00', 0x0}) 16:40:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000080)={0x84, @loopback, 0x0, 0x2, 'none\x00'}, 0x2c) 16:40:46 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@local, @random="75739ec9c27a", @val, {@ipv4}}, 0x0) 16:40:46 executing program 5: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000100)={0x0, 0x7ffff000, &(0x7f00000000c0)={0x0}, 0x9}, 0x0) 16:40:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r0, 0x0, 0x15, &(0x7f00000000c0), 0x3) 16:40:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r0, 0x0, 0x2, &(0x7f00000000c0), 0x3) 16:40:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@ipv4_getaddr={0x18, 0x16, 0x401}, 0x18}}, 0x0) 16:40:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r0, 0x0, 0x4, &(0x7f00000000c0), 0x2) 16:40:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r0, 0x0, 0x19, &(0x7f00000000c0)=0x5, 0x4) 16:40:47 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:40:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f00000000c0), 0x3) 16:40:47 executing program 3: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x324}, 0x0) 16:40:47 executing program 1: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x5411, 0x0) 16:40:47 executing program 2: pselect6(0x40, &(0x7f0000000040), &(0x7f00000001c0)={0x6}, 0x0, &(0x7f0000000240)={0x0, 0x989680}, 0x0) 16:40:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r0, 0x0, 0x13, &(0x7f00000000c0), 0x3) 16:40:47 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_int(r0, 0x1000000, 0x0, 0x0, 0x0) 16:40:47 executing program 2: syz_emit_ethernet(0x56, &(0x7f0000000080)={@broadcast, @local, @val, {@ipv6}}, 0x0) 16:40:47 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r0, &(0x7f00000001c0)={0x0, 0x0, 0xfffffffffffffffc}, 0x0) 16:40:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x8e, &(0x7f0000000000)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x58, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x16, 0x10, 0x0, 0x0, 0x0, {[@exp_smc={0x3, 0x3}, @md5sig={0x13, 0x12, "649021c3fad70b72bb4ebfaa1eed96be"}, @exp_smc={0xfe, 0x6}, @md5sig={0x13, 0x12, "2b85fb42257457be6611fa8ea18bb6e4"}, @md5sig={0x13, 0x12, "5237007d4d8e20504ccf2d82df3938f7"}]}}}}}}}}, 0x0) 16:40:47 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f00000000c0)={0x2, 0x4001, @local}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x20004808) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeff7fef00102e80e423c7", @ANYBLOB="01000000010000001c0012000c00010062"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) close(r0) 16:40:47 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local, @broadcast, @val, {@ipv4}}, 0x0) [ 174.108090][ T5790] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 16:40:47 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:40:47 executing program 4: socketpair(0x11, 0xa, 0x1, &(0x7f0000000480)) 16:40:47 executing program 1: r0 = socket$inet6(0x18, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080)={0x18, 0x1}, 0xc) 16:40:47 executing program 2: r0 = socket$inet(0x2, 0x3, 0x0) getsockopt$sock_int(r0, 0xffff, 0x800, &(0x7f0000000080), &(0x7f0000000040)=0x27) 16:40:47 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000240)={@random="0dfbe8b89fbe", @remote, @val, {@ipv4}}, 0x0) 16:40:47 executing program 5: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x25}, 0x0) 16:40:48 executing program 4: r0 = socket$inet(0x2, 0x3, 0x0) getsockopt$sock_int(r0, 0xffff, 0x1004, &(0x7f0000000080), &(0x7f0000000000)=0xfffffffffffffff5) 16:40:48 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)=[@cred], 0x20}, 0x1) 16:40:48 executing program 5: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt(r0, 0x0, 0x6, 0x0, 0x0) 16:40:48 executing program 1: mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x1810, 0xffffffffffffffff, 0x0) 16:40:48 executing program 3: r0 = socket$inet(0x2, 0x3, 0x0) getsockopt$sock_int(r0, 0xffff, 0x1006, 0x0, 0x0) 16:40:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, &(0x7f0000000340)=""/275, 0x113, 0x842, 0x0, 0x0) sendto$unix(r1, &(0x7f0000000140)="ec", 0x1, 0x0, 0x0, 0x0) 16:40:48 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:40:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getpeername$unix(r0, &(0x7f0000001540), &(0x7f0000000000)=0x1005) 16:40:48 executing program 2: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt(r0, 0x0, 0x2, &(0x7f0000000000)="2e7dc050", 0x4) 16:40:48 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, 0x0}, 0x2) sendmsg$inet(r0, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000002ac0)=[{&(0x7f00000005c0)="84", 0x1}], 0x1}, 0x0) 16:40:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000002ac0)=[{&(0x7f0000000300)="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", 0xfc}, {&(0x7f0000000100)="0096acbbc904a4c7f6a98ba43b04cd5f08118696aae557a25588ce8a", 0x1c}, {&(0x7f0000000400)="89080c93da52e673b35f8be9e812e806a8fba43210a85b9015721766e0cf36b36fc0ac40d1bb7ee06407673e3bd422ec6ebd0513687c670c8f184e96d2a8cac3802cafd81c82459d85d5c544d4817a898b97af0aa71551a856c7a5b6354f11416c406bd23c6c37699517f363176a4a914303fb83d435ef8525927b4eaf654969d10e36d3bf2265fea364e3f2d3754ccb87852973", 0x94}, {&(0x7f0000000140)="92573de0926763fdfd37b010d22398f3d24b79ce70646ed6bcad9fb52f96dd758a70d9d6b60bc94642a01f2361a7cc39bc80881e9a490b3c7609a601bc53d3e2", 0x40}, {&(0x7f00000004c0)="79412ce9a3c6bf5fad9f3e5cd48ae0457f142714261ca28636697074500adf9f97bb833074fe7955ce5d0519a31122a1aeee30d48cd11d28998d5abd7c8fb2d6549de3ac85550c9cdc4843ee6273d8479b973a4efbe9d181e9cacbdf4e3526409720782f9cace94ef1bc3b553e492b39aec2df1cf9b20fc8f3e8aa5d27bfb8d8ee29f64a2ab895ccd336f2de7697acb1fde9cff1b61b911224344019475bdf1d74720429e7ac8b13febb74ee2cc47130d71306141542ce57856233630a4f63f01163d09125598cbc1861d3776e20ec74b309d46eea35b58d90652e7bbffa8af4", 0xe0}, {&(0x7f00000005c0)="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", 0x1000}, {&(0x7f00000015c0)="36c5bb3c7c159902f64b", 0xa}, {&(0x7f0000001600)="ce426f1aa30d6d01f1b5fbf48c2356b48380c1f8d24060fa6d7ff2c9e7aaf5ae9a9b533c07fe774ed8d747b851c64186a2126c46b7a9f6a982b9876a65e58ee4c922cddebd676c8c0115b9321d148ca2fcef45ed213839b5f8760df2cf71cb765d59615c8a354960e0964c426de14b7b6d398b72669d3e098f0a44d6cbbcf18d380e6be2f1a714ed3ca275b107047f7784acd6fa0d5bd1016c7e43136abbd4a1361bdbc3dba4e3529ff56d8ca242818237c9e8acfa1661755bc31ce77e9315f21fbf770a3b550ff788b27d205bca7a2179d45da5034387e64f20f3b1894cb7ed79fc8b3ace3d83957f396ca016356dfbb0a8de5eb4826dc2cb71a3e671bfd14334c8ad42c4664976b7c3bcd8bdfdeef872754254c4fdea755cbcae40343659077a8ddf6d7a1d8d9d9ecb80041fa9254c3b4ffa0e551e05d9b2c3fd652be83d10ab07ad3c8f49ecf5a0fb5d1b84c731f48708f7a0ad56e5559be04a0eefc2d796ab85f26797c1805a31dad80f45edede30deb09fc9463b851b13d5eb6a2bc738a849b6e1d0022b0d4111b3129c769e6f9e5e6327e430cdfc49030d279a870433f65a39447a3c98cd8474cda3bc1888e187e3814b9ca5b21bd5f95c3a8ae4a614a96b5d0413f8e842d490904757f9f1d5855dc3b5425f727032d084acfabd997d4b0beed85dcd8694c433f8176712297c7054d416243fbe16988688991e1464f3a5216dca2aaf57327f9e6cf3aa72750cd1f4f3ac09265cf717138b707b22b2f3901e72bd4424b785b22e648b29a9c060407a1ceb4cc50f80c1c39a9fe25ff12cc4352647be8f33008339bb49d8373d4f82ab63e73f8cbc6018fa2f1a98d90ee0036f7229bae1b58d60a96d4d63145775a166d7ec5a8f7bceeda24a3c0ba3a9c877e602711fb0cb19128f9f5b07de342159df1e226c6f7cc338d9885960f564eb01cb3c4efe6b099e1d94a62ef8e34133f2eab90b680dd7e854e553eaaad8dfeec71df949eee14bc0153acd8308afac6cf84212737df7d9714378de0d031712d5666c0be2cfb3ae563a5a2ba52d32a511b8087b9fae1add9d6ca8652eb3146c4cde2e1111c07264d815ff5f52bd462c987043bc2d6b80b6aceeb16cd4dcebc19708c965a7616a25d5723ef5912d12c4ca90e5f8d2e18ca31c87c1698d1fe528a7f0193dc9df150e5784589d9c03393fac37421b018fe56b6fc79d781255c54b609c0d7f803d941417dc54b7bafa67c896075794be7989991b592b8d7090d8a4cf1e7f6daf9e235945ab95a28c369df87d7d6796f7d2f00e66355265e2098baf4ed1d4a2e716fb2ec6d2eebb40a5e414ad5b814547245cb0534c1235851b165cabec5211228780138b05f266584989a700cd87bdc2901a7656e3eb2637becfd854a6af33e285a8f52a82f69b7a73a186b123c993f0239dbff7693771c62c3176ab6bf15ce5cc46d852122a5c21474c05f4205f79adb7828e3ad16229da47635ad5f3cd47c02643d38b3d8f08b4dedeb146f4cc8eb806e3ea58a606ebe04ec6800fd67fbe5690781177408fe8c0af4951a8fcd42f51f98d3b96de0cf1aba0782cd4dd951c35a0d717eb0e24911294dad22d659fb988b68a8b2b3b67c522edad6b58a48a14d8e3211f5b39bdb6a71a5138f5493b6aaa749db42b19363594ec27cacca293af4587160091aff09c3e2946cb31ea45cbd263d35b47b0f2094419a4c4181cddbb0028d9ea210cb95fa8a9729c0e12b43e6ba2034ef12d503e61fbe3421ef6c008cd736b3388d673362e05e2f13223c4c19051f26c2e041b500c6fd88c888c6018826b3d3bcd8c0f666aa96d656986150cb4e3a42f3d37661506fa172add0219a9689ef34293759ef52289e3c053180640c5b80fc517041b8c0bdbe1a427b300bf4e7bb53a24b2d1ac1922f3d84818420f6c617e058e1fb5aeabe51b862fc70df5ffc45e5541963d5fbee1cd00ad2889b277c6678406ac6af97dfe6661dae6db371af2ec600d6a20f8e235b277fc4e9d6d0665963d971c933ad69c42f9290e86f539bf72f54883a6d238ce1bd3f21ecda53f3ae275c83f1812e20374a7673f69d5f96687eb379c78bcf3bbe24adb7fa18c2489c1e5335c9a29e0715e41aa8d7063cc9f0b58ea86dfdc750ff460cf869db7dbbd81c178db4c654fa9b521d316d6abe88b80c93f1cbf5bf5e07485e809c1a73cef2b9087dfc1948181061941bba7479434f72f252fadbe5e80a127e854cfdc4973155a267e9bd6a3f2523876f24bf8c66ebd2a581d9f85ffbd6292d7e156f0e2ec2bac936c3497c84a999f44396537dba339c017b87bd6e5e7fb0fb68f40bbad72529936b3b01797124ca2f46a6049e8cba9f2b185a52fd84cbfbd66a765834dfedd450604460147b8b5c24e7bfce40d7e770d8e26f563ea1fedebe60d3de8eeb6fb19c345754272a0faf0a1972b03461642dd73ecd02aa7bcd5921cf6e8f28c83f1a3269f619baaa1274aff55848a6f45a91d2ef103414431ba439ae5e81ad86a53266210bc64c8acdab1135335d34ef1ce236169777a8e8674e71c18d2a90fbbe6c88a31160375aab49c92b5b4c1d006d94c9d313f7a4df41d142c05fa02f99783f85c756e1fba41c2c01eb85d8d5fb4b6ae20a9b4c9dc96e3946c3bc3dc4ac8cadb2e636dabf5d839eb2f37f9d95c1017f938a2c2af3135a0032569462a1b7fc277078dcd72d10d02d811d038a94aa0b4e60ed5a8e2918ae29fbb0aab2601e890b0f6dd01b10bb9e0d7606756b40ef33901f7d7a05f243b90fdda808b69557b74051d43d59158f5a61db2f3f33dbd4d1c3caff0a524344fa198192b49a2c9bd9a5979eee64e290e2ea088f83e03e568e3ff1d479843d15d1923899cb28aeff5834029c23bd9dd873ae35211db21da5b5f9baa08f2f532d470ccdfd108651e21678662897c697df33ddc1685eedc1f87a71e64f2fe19bf57e5800c3431e95b91fc0ca9275b2ffb9c45c791ac69b6a204e06e7f2c51e31faea28246ac70394ae1762f897d0ef46391b8c6ab32e7bc67cb81f9e7edcf638c6a5e21f4e0df26c877a09fd90a475430474ef1ceccb0da6f12aef7a6b54c1bf37224fb2cd1bc722c6ffaeb54aaac5ce4f3b36991f6f37194bf02e8de9653016e6e5cb8c8b75839a02aafdc6e3c6f7899cddad5373fb8570c9f4b9bbd991acb7953f56cacf3afa0a00fd642f060083c4680e2a6028975327e73a05bef1f1ebe8ae8bb9557ee8b8c02c2adf9f36358d00c871f579f7670b00966f311672f2615f9cb6310e0900ac9d8c56512d12f5b75963dd522540ad45e7b510eeb7332b4142653855ad30f787b50013acdbdc69e98bae692d4e590cea12f04af1afdac689f61a5efd0bd89b74210f52b428f3b911a8fea6fb5e57c8fbf2b0904e788f0e78d8ad878d4df8debf7784e940c2b0de1350e4106e0d7b9b2af3d91c43dd1187485585d5b7b07b8dfba71e30b0b7d04c4f65dc63243a38a6f0c26d30e2b95096488e3d8881fa565d33e3a5f8a315c3c4258e9a8497bf0c290b459b823d88f30dba0ae49c0f04e8d69d3d6df0653297b0bfbc88c2c073cd5acfa5164e5e528a942a9b73920ada0bdbf771b0f24a728f0c01a787bc02bfcaea28a7f4bd4a5d1a3c28d1b9d84e9d82aefc63b7d6c10553cb08f0bafd92614e3cdb806e502151386539fb547d5fe5dadadae0c15ba78da5970dd2255040e4301136dd443f05815461a6fe5c40a2c61a82baea6b244d8dd298646169c8941f288ab919d7080d55b7220d3ff00b73f96ede19de0929f7770f55a6580c8b49f5abe59fb7f1f6d090f2917909cf3d1032519931e3129ae6d652c3870119e14ed17717f71bf52418a27cee7e4a5004888f023c3a9edacf28798940dd81aac9f33528d223b09bc49721f1b9fdeb337ca4e6ccff9693bfa580ce2c6850be7fd4b8fbd0f57c8e685d6ad0865970f7ded7748d8e947c95a4c504a9fc4f6379d7a92c294942f44262df8034d8bf23e78d52488e354e842b52f1832d2412c6c4af672bc299081ec55871919b96ff839d2f10c8629b4946db7ed37f2752bc29a10a7fde887c2d02c11ac719997e917fbc5ddea5bfcce8d2630823df3bb6e2616e7051ba992e258250599c3abf8033f800189bd79d1fd528456f28361f4a6e7c701d4231b4a6b3c6cfeef8e02aa251980c9161387aed329ba0cb9dd1acf9db1c2772fd8b6a3e3bac212e0449c19ddcb9a16017ed276ceb39066eaa4d0c5c8e977cf14b63e057fd2eeb2f2948b78802198b083716eb13e749a899dc8747ff040ae1fba28a2082f6f270b00383915674bed5", 0xbeb}, {0x0}], 0x9}, 0x0) 16:40:48 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x200800, 0x0) close(r0) 16:40:49 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000dc0)=ANY=[@ANYBLOB="61154c00000000006113500000000000bfa00000000000001503000008004e002d3501000000000095000000000000006916000000000000bf67000000000000350605000fff07206706000005000000160302000ee60060bf500000000000000f650000000000006507f9ff0100000007070000cddfffff1e75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd3997f9c9c4f6f3be4b369289aa6812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05000000c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5ab2af27546e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc8da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc2300000008ac86d8a297dff0445a15f21dce4de9f29eff65aadc841848c9b562a31e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076eb685d55c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20cecac4ad2e99e0e67ab93716d20000009f0f53acbb40b4f8e2738270b31562ed834f2af97787f696649a462e7ee4bcf8b07a10d6735154beb4000000000000000000000000004000bc00f679629709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253880800000000000000690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc47287cd31cc43010000207b40407d000000210000000000000000005f37d83f84e98a523d80bd970d703f37ca364a601ae899a56715a0a62a34c6c94cce6994521629ab028acfc1d926a0f6a5489af8dc2f17923f3c40dfd1970a55c22fe3a5ac000000000000000000000000000000c1eb2d91fb79ea00000000000000bb0d00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e190deae46e26c596f84eba9000000000000003cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13631d22a11dc3c693962895496d4f6e9cc54db6c7205a6b068fff496d2da7d632bd1f61b007e1ff5f1be1969a1ba791ad46d800000000c7f26a0337302f3b41eae59809fd05d12f6186f117b062df67d3a63f3265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b3042065acaa10856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089dad7a8710e0254f1b11cced7bc3c8da0c44d2ebf9f6f3ff3be4d1458077c2253b0c7c7a0a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631dbaa74f22bad050e9856b48ae3a03a497c37758537650fe6db88aa3c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0afa1e1c758a0079b747067312e9815a21cb3f1f8150d999d788535a4d3114dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fb9fb38f84d9d87b27f8a5d91217b728f13e3ee20e69e0ffb2780b1a7af137ff7b4ff139604faf0a4da65396174b4563d54b52f06c870edf0c5d744b5272b44c23488b2bdbff947c4dfa108cbb88202eeb81f428a5b3c299848649e1a6bff52f657a67463d7dbf85ae9321fc2b517dc4a29b9cba8ded5de8206c812439ab129ae818837ee1562078fc524b3baf49a0be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2a3bc87b0da23c00d9ef418cf19e7a8c4c328be0ce95798adc2dca871073f6bd61dc18402cde8bf777b2eaa45c940aabc86b94f8cbde4d470667bee722a6a2af483ad0d3415ed0f9db059acaba9eaea93f811d434e00000000000000000000d154ba10a8e51489a614e69722bac30000000000000000000000000000c5dfd188ff555285b9743d3aac000583f42d168613151d681a2f71373f20d92c9048407c91fabecfe8b3f2d5454d127edab14ba61ba1cfc4336324c86f3dcb43e9a58208077e90f6ec1c7ac756f61dcc372cdd30b82507489f0bbfbd3c3f21752e81319c0161e154ceb16e00bc7f5a6962dff317f4d014786e432817064874d69a39cb0da31bcc5f81894d8a80756447322207b4007dff12eb95066cc6bc256f0a12282224bb031bbee6d23cef7074f6d718b06ca80b57aa183dd0c3eee45891441f2b89b4c67aa9882281393954972046974f18df232cd7fca610e33f51c2d062020f403d85ff36c26e2f6bd1d82f4d3ceb3472d9a77e0057a3bfe697d9ab7585f4a1b381343d2cf855689232f4fc5135790662dc1419a374be9d7b3e5be2886d23add90d862f1a682ff11c798e338af3e5bb0f9d3952b15bf3e0c618c89d20ca1e18a031397693bf3cfbd8417e5b55e641c898c280356f2da222d5d68919d98158578dcf18efa404e508bcbbb8cfcf70086821ebdf34c9a1dff45af873df904c2bdbef81f246d26f4b40df949e12bdac18532f4e11c608cc31d60cb591c40a7b386fa1c753336d7220a35118d4919b45eff32aab684e62c6691de14e97aa7e9dc8ecf0cd50540246d2b746e41e5b4e2c095039dfe0f71db6265f7580d098be40ef36faee5d1695830d4242a23e541e6ce9fa1998d8961cf4fe3c8e8fbb566f148c8befc229614a4b7f80d237b8abc6fd0407de31d6e5532f360d379f20f054692b47207922fe6c14eba96c9a"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) 16:40:49 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) close(r0) socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="5c00000012006b009e3fe3d86e17aa31076b876c1d0000007ea60864160af36504001a0038001d008fb32c5381e517d34460bc24eab556a705251e6182949a3651f60a84c9f4d6938037e786a6d0bdd7fc020f4509c5bb5b64f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 16:40:49 executing program 5: tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3) 16:40:49 executing program 4: socketpair(0x3, 0x0, 0x0, &(0x7f0000000140)) 16:40:49 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, 0x0}, 0x0) sendmsg$inet(r0, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000002ac0)=[{&(0x7f00000005c0)="84", 0x1}], 0x1}, 0x0) [ 175.734795][ T5851] netlink: 'syz-executor.1': attribute type 29 has an invalid length. 16:40:49 executing program 4: socketpair(0x25, 0x0, 0x0, &(0x7f0000000080)) 16:40:49 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:40:49 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) 16:40:49 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000dc0)=ANY=[@ANYBLOB="61154c00000000006113500000000000bfa00000000000001503000008004e002d3501000000000095000000000000006916000000000000bf67000000000000350605000fff07206706000005000000160302000ee60060bf500000000000000f650000000000006507f9ff0100000007070000cddfffff1e75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd3997f9c9c4f6f3be4b369289aa6812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05000000c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5ab2af27546e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc8da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc2300000008ac86d8a297dff0445a15f21dce4de9f29eff65aadc841848c9b562a31e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076eb685d55c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20cecac4ad2e99e0e67ab93716d20000009f0f53acbb40b4f8e2738270b31562ed834f2af97787f696649a462e7ee4bcf8b07a10d6735154beb4000000000000000000000000004000bc00f679629709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253880800000000000000690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc47287cd31cc43010000207b40407d000000210000000000000000005f37d83f84e98a523d80bd970d703f37ca364a601ae899a56715a0a62a34c6c94cce6994521629ab028acfc1d926a0f6a5489af8dc2f17923f3c40dfd1970a55c22fe3a5ac000000000000000000000000000000c1eb2d91fb79ea00000000000000bb0d00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e190deae46e26c596f84eba9000000000000003cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13631d22a11dc3c693962895496d4f6e9cc54db6c7205a6b068fff496d2da7d632bd1f61b007e1ff5f1be1969a1ba791ad46d800000000c7f26a0337302f3b41eae59809fd05d12f6186f117b062df67d3a63f3265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b3042065acaa10856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089dad7a8710e0254f1b11cced7bc3c8da0c44d2ebf9f6f3ff3be4d1458077c2253b0c7c7a0a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631dbaa74f22bad050e9856b48ae3a03a497c37758537650fe6db88aa3c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0afa1e1c758a0079b747067312e9815a21cb3f1f8150d999d788535a4d3114dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fb9fb38f84d9d87b27f8a5d91217b728f13e3ee20e69e0ffb2780b1a7af137ff7b4ff139604faf0a4da65396174b4563d54b52f06c870edf0c5d744b5272b44c23488b2bdbff947c4dfa108cbb88202eeb81f428a5b3c299848649e1a6bff52f657a67463d7dbf85ae9321fc2b517dc4a29b9cba8ded5de8206c812439ab129ae818837ee1562078fc524b3baf49a0be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2a3bc87b0da23c00d9ef418cf19e7a8c4c328be0ce95798adc2dca871073f6bd61dc18402cde8bf777b2eaa45c940aabc86b94f8cbde4d470667bee722a6a2af483ad0d3415ed0f9db059acaba9eaea93f811d434e00000000000000000000d154ba10a8e51489a614e69722bac30000000000000000000000000000c5dfd188ff555285b9743d3aac000583f42d168613151d681a2f71373f20d92c9048407c91fabecfe8b3f2d5454d127edab14ba61ba1cfc4336324c86f3dcb43e9a58208077e90f6ec1c7ac756f61dcc372cdd30b82507489f0bbfbd3c3f21752e81319c0161e154ceb16e00bc7f5a6962dff317f4d014786e432817064874d69a39cb0da31bcc5f81894d8a80756447322207b4007dff12eb95066cc6bc256f0a12282224bb031bbee6d23cef7074f6d718b06ca80b57aa183dd0c3eee45891441f2b89b4c67aa9882281393954972046974f18df232cd7fca610e33f51c2d062020f403d85ff36c26e2f6bd1d82f4d3ceb3472d9a77e0057a3bfe697d9ab7585f4a1b381343d2cf855689232f4fc5135790662dc1419a374be9d7b3e5be2886d23add90d862f1a682ff11c798e338af3e5bb0f9d3952b15bf3e0c618c89d20ca1e18a031397693bf3cfbd8417e5b55e641c898c280356f2da222d5d68919d98158578dcf18efa404e508bcbbb8cfcf70086821ebdf34c9a1dff45af873df904c2bdbef81f246d26f4b40df949e12bdac18532f4e11c608cc31d60cb591c40a7b386fa1c753336d7220a35118d4919b45eff32aab684e62c6691de14e97aa7e9dc8ecf0cd50540246d2b746e41e5b4e2c095039dfe0f71db6265f7580d098be40ef36faee5d1695830d4242a23e541e6ce9fa1998d8961cf4fe3c8e8fbb566f148c8befc229614a4b7f80d237b8abc6fd0407de31d6e5532f360d379f20f054692b47207922fe6c14eba96c9a"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) 16:40:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000006240)={0x0, 0x0, 0x0}, 0x0) 16:40:49 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, 0x0, 0x40000}, 0x0) 16:40:49 executing program 2: r0 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) 16:40:49 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001740)={0x6, 0x3, &(0x7f0000001340)=@framed, &(0x7f00000013c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:40:49 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0x1, 0xe8, 0xcfae, 0x7}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000840), 0x200000, 0x0) 16:40:49 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 16:40:49 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000840), 0x200000, 0x0) 16:40:50 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0x1, 0x0, 0x0, 0x7}, 0x48) 16:40:50 executing program 4: bpf$OBJ_GET_MAP(0x7, &(0x7f0000001180)={&(0x7f0000001140)='./file0\x00', 0x0, 0x8}, 0x10) 16:40:50 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:40:50 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000080)=@framed, &(0x7f00000000c0)='GPL\x00', 0x2, 0xf, &(0x7f0000000100)=""/15, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000001c0), 0x10}, 0x80) 16:40:50 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/time_for_children\x00') ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000100)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000140)={'nicvf0\x00', 0x400}) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000200)='ns/cgroup\x00') ioctl$TUNSETDEBUG(0xffffffffffffffff, 0x400454c9, &(0x7f0000000240)=0x1) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x207) socket$kcm(0x29, 0x2, 0x0) 16:40:50 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000017c0)={0xffffffffffffffff}, 0x4) 16:40:50 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0x19, 0x0, 0x0) 16:40:50 executing program 4: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000740)='./cgroup/syz1\x00', 0x200002, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 16:40:50 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000002dc0)={r0}) 16:40:50 executing program 3: openat$tun(0xffffffffffffff9c, 0x0, 0x408200, 0x0) 16:40:50 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0x12, 0x0, 0x0) 16:40:50 executing program 4: socketpair(0x1a, 0x0, 0x0, &(0x7f00000029c0)) 16:40:50 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f0000000980)=@raw=[@cb_func], &(0x7f00000009c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:40:50 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:40:51 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:40:51 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003300)=@bpf_lsm={0x1d, 0x4, &(0x7f0000003200)=@framed={{}, [@ldst={0x0, 0x0, 0x2}]}, &(0x7f0000003240)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000003280), 0x8, 0x10, 0x0}, 0x80) 16:40:51 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x2f89388b397c1d6d, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:40:51 executing program 4: recvmsg$kcm(0xffffffffffffffff, &(0x7f0000002980)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1a, 0x0, 0x0, &(0x7f00000029c0)) 16:40:51 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000007700)={0x0, 0x0, &(0x7f00000076c0)={0x0}, 0x1, 0x0, 0x28}, 0x0) 16:40:51 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000007540)=[{{&(0x7f0000000000)=@tipc, 0x80, 0x0, 0x10}}], 0x1, 0x0, 0x0) 16:40:51 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040), 0x4) bpf$ENABLE_STATS(0x20, 0x0, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f0000000180)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x6}]}, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000003c0)=0x14) socket$packet(0x11, 0x2, 0x300) r1 = socket(0x10, 0x3, 0x0) write(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000200)={0x3, &(0x7f0000000140)=[{0x0, 0x0, 0x1, 0x5}, {0x0, 0x0, 0x2}, {}]}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) sendto$packet(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000000)={0x11, 0x8100, r3, 0x1, 0x0, 0x6, @remote}, 0x14) bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@bloom_filter={0x1e, 0x8c, 0x0, 0xffff, 0x0, 0xffffffffffffffff, 0x1be, '\x00', r3, 0xffffffffffffffff, 0x0, 0x0, 0x9, 0xc}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801}, 0x38) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x89a0, &(0x7f0000000040)={'syzkaller0\x00'}) socket$packet(0x11, 0x3, 0x300) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000340)={'syztnl2\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040006, 0x0, 0x500}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r6, 0x6612) 16:40:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000007700)={0x0, 0x0, 0x0, 0x300}, 0x0) 16:40:51 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f00000005c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x12000, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000007700)={0x0, 0x0, &(0x7f00000076c0)={&(0x7f0000002980)={0x14, 0x0, 0x9, 0x801}, 0x14}}, 0x0) 16:40:51 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:40:51 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:40:51 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x8}}]}, 0x1a0}}, 0x0) 16:40:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:40:52 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:40:52 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) (fail_nth: 1) 16:40:52 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x8}}]}, 0x1a0}}, 0x0) 16:40:52 executing program 4: unshare(0x44000480) unshare(0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='dctcp-reno\x00', 0xb) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$mptcp(&(0x7f0000000d80), r0) unshare(0x2010000) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f00000001c0)={'pim6reg0\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000240)=@can_delroute={0x14c, 0x19, 0x20, 0x70bd2b, 0x25dfdbfb, {0x1d, 0x1, 0x2}, [@CGW_SRC_IF={0x8}, @CGW_CS_CRC8={0x11e, 0x6, {0x1, 0x33, 0x65, 0x1, 0xa7, "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", 0x3, "417e4c407ac249a18d0c3eda54145ae62158061c"}}, @CGW_SRC_IF={0x8}, @CGW_LIM_HOPS={0x5, 0xd, 0x1}]}, 0x14c}, 0x1, 0x0, 0x0, 0x80}, 0x60004001) sendmsg$RDMA_NLDEV_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="2000000005141b0026bd7040fedbdf250800012186073cde4b0d6d598ab10000"], 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x20040061) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000200), 0x4) 16:40:52 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 178.640854][ T5942] FAULT_INJECTION: forcing a failure. [ 178.640854][ T5942] name fail_usercopy, interval 1, probability 0, space 0, times 1 16:40:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) [ 178.704133][ T5942] CPU: 0 PID: 5942 Comm: syz-executor.5 Not tainted 6.5.0-rc6-syzkaller-01712-g23c167af2404 #0 [ 178.714551][ T5942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 178.724665][ T5942] Call Trace: [ 178.728003][ T5942] [ 178.730982][ T5942] dump_stack_lvl+0x125/0x1b0 [ 178.735766][ T5942] should_fail_ex+0x496/0x5b0 [ 178.740525][ T5942] _copy_from_user+0x30/0xf0 [ 178.745181][ T5942] copy_msghdr_from_user+0x99/0x160 [ 178.750451][ T5942] ? __copy_msghdr+0x460/0x460 [ 178.755288][ T5942] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 178.761364][ T5942] ? find_held_lock+0x2d/0x110 [ 178.766218][ T5942] ___sys_sendmsg+0xff/0x1d0 [ 178.770911][ T5942] ? do_recvmmsg+0x740/0x740 [ 178.775587][ T5942] ? ksys_write+0x214/0x250 [ 178.780196][ T5942] ? __fget_light+0xe6/0x260 [ 178.784871][ T5942] __sys_sendmsg+0x117/0x1e0 [ 178.789528][ T5942] ? __sys_sendmsg_sock+0x30/0x30 [ 178.794649][ T5942] ? syscall_enter_from_user_mode+0x26/0x80 [ 178.800624][ T5942] do_syscall_64+0x38/0xb0 [ 178.805138][ T5942] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 178.811122][ T5942] RIP: 0033:0x7f224f87cae9 [ 178.815600][ T5942] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 178.835289][ T5942] RSP: 002b:00007f22505fd0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 178.843867][ T5942] RAX: ffffffffffffffda RBX: 00007f224f99bf80 RCX: 00007f224f87cae9 16:40:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:40:52 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x8}}]}, 0x1a0}}, 0x0) [ 178.851899][ T5942] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 178.860095][ T5942] RBP: 00007f22505fd120 R08: 0000000000000000 R09: 0000000000000000 [ 178.868118][ T5942] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 178.876153][ T5942] R13: 000000000000000b R14: 00007f224f99bf80 R15: 00007ffdede7f488 [ 178.884251][ T5942] 16:40:52 executing program 4: unshare(0x44000480) unshare(0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) (async) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='dctcp-reno\x00', 0xb) (async) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$mptcp(&(0x7f0000000d80), r0) (async) unshare(0x2010000) (async) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f00000001c0)={'pim6reg0\x00'}) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000240)=@can_delroute={0x14c, 0x19, 0x20, 0x70bd2b, 0x25dfdbfb, {0x1d, 0x1, 0x2}, [@CGW_SRC_IF={0x8}, @CGW_CS_CRC8={0x11e, 0x6, {0x1, 0x33, 0x65, 0x1, 0xa7, "30bcb355753f359894e3018a8518a7ab379fdd25ef6e471bf6b2b3145e7d9a197c42e717f6d4810bdb5ad392af021e2e5122cb5f1907316b1d15b6a548ca31cb0687914a4b31df3ad83e35d054a4e4f75f7636476a00e80e5945905169946872fc8aa58d07363ca9af7a748ec280dd4398943a27fa34bc5c04f116287ed6eca10f1c77b58705295766c50c7e314eaa008efaba05933841ee8d946f0dc6e727affa7805d95d84436de49f53f6e4f7bfafe68ecbe85b3d73798257eef6041aeb0288a0b83b3bf0f572e6d32f004fba8678b64edc718e9818e9df7fbfbaa94f0967c74d7d26606a4037815d2f8a2cea8865a2193dcf5efc767b8488c88c5fd55445", 0x3, "417e4c407ac249a18d0c3eda54145ae62158061c"}}, @CGW_SRC_IF={0x8}, @CGW_LIM_HOPS={0x5, 0xd, 0x1}]}, 0x14c}, 0x1, 0x0, 0x0, 0x80}, 0x60004001) (async) sendmsg$RDMA_NLDEV_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="2000000005141b0026bd7040fedbdf250800012186073cde4b0d6d598ab10000"], 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x20040061) (async) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000200), 0x4) 16:40:52 executing program 1: unshare(0x44000480) unshare(0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='dctcp-reno\x00', 0xb) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$mptcp(&(0x7f0000000d80), r0) unshare(0x2010000) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f00000001c0)={'pim6reg0\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000240)=@can_delroute={0x14c, 0x19, 0x20, 0x70bd2b, 0x25dfdbfb, {0x1d, 0x1, 0x2}, [@CGW_SRC_IF={0x8}, @CGW_CS_CRC8={0x11e, 0x6, {0x1, 0x33, 0x65, 0x1, 0xa7, "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", 0x3, "417e4c407ac249a18d0c3eda54145ae62158061c"}}, @CGW_SRC_IF={0x8}, @CGW_LIM_HOPS={0x5, 0xd, 0x1}]}, 0x14c}, 0x1, 0x0, 0x0, 0x80}, 0x60004001) sendmsg$RDMA_NLDEV_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="2000000005141b0026bd7040fedbdf250800012186073cde4b0d6d598ab10000"], 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x20040061) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000200), 0x4) 16:40:52 executing program 2: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x8}}]}, 0x1a0}}, 0x0) 16:40:52 executing program 3: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:40:52 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:40:52 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) (fail_nth: 2) 16:40:52 executing program 2: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x8}}]}, 0x1a0}}, 0x0) 16:40:52 executing program 3: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 179.240303][ T5973] FAULT_INJECTION: forcing a failure. [ 179.240303][ T5973] name failslab, interval 1, probability 0, space 0, times 1 [ 179.294166][ T5973] CPU: 1 PID: 5973 Comm: syz-executor.5 Not tainted 6.5.0-rc6-syzkaller-01712-g23c167af2404 #0 [ 179.304597][ T5973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 179.314716][ T5973] Call Trace: [ 179.318043][ T5973] [ 179.321055][ T5973] dump_stack_lvl+0x125/0x1b0 [ 179.325821][ T5973] should_fail_ex+0x496/0x5b0 [ 179.330551][ T5973] should_failslab+0x9/0x20 [ 179.335103][ T5973] kmem_cache_alloc_node+0x389/0x3f0 [ 179.340432][ T5973] ? __alloc_skb+0x287/0x330 [ 179.345075][ T5973] __alloc_skb+0x287/0x330 [ 179.349537][ T5973] ? __napi_build_skb+0x50/0x50 [ 179.354434][ T5973] ? __netlink_dump_start+0x9a0/0x9c0 [ 179.359839][ T5973] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 179.365776][ T5973] ? apparmor_socket_getpeersec_dgram+0x9/0x10 [ 179.371962][ T5973] netlink_sendmsg+0x9c6/0xe40 [ 179.376765][ T5973] ? netlink_unicast+0x810/0x810 [ 179.381743][ T5973] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 179.387068][ T5973] ? netlink_unicast+0x810/0x810 [ 179.392039][ T5973] sock_sendmsg+0xd9/0x180 [ 179.396590][ T5973] ____sys_sendmsg+0x6ac/0x940 [ 179.401589][ T5973] ? copy_msghdr_from_user+0x10b/0x160 [ 179.407123][ T5973] ? kernel_sendmsg+0x50/0x50 [ 179.411870][ T5973] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 179.417911][ T5973] ? find_held_lock+0x2d/0x110 [ 179.422727][ T5973] ___sys_sendmsg+0x135/0x1d0 [ 179.427442][ T5973] ? do_recvmmsg+0x740/0x740 [ 179.432077][ T5973] ? ksys_write+0x214/0x250 [ 179.436644][ T5973] ? __fget_light+0xe6/0x260 [ 179.441291][ T5973] __sys_sendmsg+0x117/0x1e0 [ 179.445916][ T5973] ? __sys_sendmsg_sock+0x30/0x30 [ 179.451005][ T5973] ? syscall_enter_from_user_mode+0x26/0x80 [ 179.456989][ T5973] do_syscall_64+0x38/0xb0 [ 179.461462][ T5973] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 179.467425][ T5973] RIP: 0033:0x7f224f87cae9 [ 179.471868][ T5973] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 179.491512][ T5973] RSP: 002b:00007f22505fd0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 179.499957][ T5973] RAX: ffffffffffffffda RBX: 00007f224f99bf80 RCX: 00007f224f87cae9 [ 179.507955][ T5973] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 179.515953][ T5973] RBP: 00007f22505fd120 R08: 0000000000000000 R09: 0000000000000000 [ 179.523946][ T5973] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 179.531936][ T5973] R13: 000000000000000b R14: 00007f224f99bf80 R15: 00007ffdede7f488 [ 179.539947][ T5973] 16:40:53 executing program 2: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x8}}]}, 0x1a0}}, 0x0) 16:40:53 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:40:53 executing program 3: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:40:53 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x8}}]}, 0x1a0}}, 0x0) 16:40:54 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:40:54 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000808000240000000032c000000030a01030000e6ff00000000020000000900010073797a300000000009000300737978320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x144, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x14, 0x6, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, @log={{0x8}, @val={0x4}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_EXPRESSIONS={0x110, 0x4, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, @range={{0xa}, @void}}, {0x38, 0x1, 0x0, 0x1, @osf={{0x8}, @val={0x2c, 0x2, 0x0, 0x1, [@NFTA_OSF_FLAGS={0x8}, @NFTA_OSF_FLAGS={0x8}, @NFTA_OSF_DREG={0x8, 0x1, 0x1, 0x0, 0x14}, @NFTA_OSF_TTL={0x5, 0x2, 0x6}, @NFTA_OSF_FLAGS={0x8}]}}}, {0x4c, 0x1, 0x0, 0x1, @log={{0x8}, @val={0x40, 0x2, 0x0, 0x1, [@NFTA_LOG_QTHRESHOLD={0x6, 0x4, 0x1, 0x0, 0x4}, @NFTA_LOG_LEVEL={0x8}, @NFTA_LOG_GROUP={0x6, 0x1, 0x1, 0x0, 0x20}, @NFTA_LOG_PREFIX={0x9, 0x2, 0x1, 0x0, 'syz2\x00'}, @NFTA_LOG_PREFIX={0x7, 0x2, 0x1, 0x0, ')$\x00'}, @NFTA_LOG_PREFIX={0x10, 0x2, 0x1, 0x0, '!##\\(!)*]+%\x00'}]}}}, {0x24, 0x1, 0x0, 0x1, @masq={{0x9}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_MASQ_REG_PROTO_MIN={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_MASQ_REG_PROTO_MAX={0x8, 0x3, 0x1, 0x0, 0x12}]}}}, {0x24, 0x1, 0x0, 0x1, @numgen={{0xb}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_NG_OFFSET={0x8, 0x4, 0x1, 0x0, 0x7fffffff}, @NFTA_NG_TYPE={0x8}]}}}, {0x30, 0x1, 0x0, 0x1, @dup_ipv6={{0x8}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0xf}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0x11}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0x14}, @NFTA_DUP_SREG_ADDR={0x8, 0x1, 0x1, 0x0, 0xd}]}}}]}]}], {0x14}}, 0x16c}}, 0x0) 16:40:54 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:40:54 executing program 4: unshare(0x44000480) unshare(0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) (async) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='dctcp-reno\x00', 0xb) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$mptcp(&(0x7f0000000d80), r0) unshare(0x2010000) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f00000001c0)={'pim6reg0\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000240)=@can_delroute={0x14c, 0x19, 0x20, 0x70bd2b, 0x25dfdbfb, {0x1d, 0x1, 0x2}, [@CGW_SRC_IF={0x8}, @CGW_CS_CRC8={0x11e, 0x6, {0x1, 0x33, 0x65, 0x1, 0xa7, "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", 0x3, "417e4c407ac249a18d0c3eda54145ae62158061c"}}, @CGW_SRC_IF={0x8}, @CGW_LIM_HOPS={0x5, 0xd, 0x1}]}, 0x14c}, 0x1, 0x0, 0x0, 0x80}, 0x60004001) (async) sendmsg$RDMA_NLDEV_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="2000000005141b0026bd7040fedbdf250800012186073cde4b0d6d598ab10000"], 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x20040061) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000200), 0x4) 16:40:54 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) (fail_nth: 3) 16:40:54 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x8}}]}, 0x1a0}}, 0x0) 16:40:54 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:40:54 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:40:54 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) (fail_nth: 4) 16:40:54 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x8}}]}, 0x1a0}}, 0x0) [ 181.271742][ T5997] netlink: 'syz-executor.1': attribute type 6 has an invalid length. 16:40:54 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) (async) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000808000240000000032c000000030a01030000e6ff00000000020000000900010073797a300000000009000300737978320000000014000000110001"], 0x7c}}, 0x0) (async) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x144, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x14, 0x6, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, @log={{0x8}, @val={0x4}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_EXPRESSIONS={0x110, 0x4, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, @range={{0xa}, @void}}, {0x38, 0x1, 0x0, 0x1, @osf={{0x8}, @val={0x2c, 0x2, 0x0, 0x1, [@NFTA_OSF_FLAGS={0x8}, @NFTA_OSF_FLAGS={0x8}, @NFTA_OSF_DREG={0x8, 0x1, 0x1, 0x0, 0x14}, @NFTA_OSF_TTL={0x5, 0x2, 0x6}, @NFTA_OSF_FLAGS={0x8}]}}}, {0x4c, 0x1, 0x0, 0x1, @log={{0x8}, @val={0x40, 0x2, 0x0, 0x1, [@NFTA_LOG_QTHRESHOLD={0x6, 0x4, 0x1, 0x0, 0x4}, @NFTA_LOG_LEVEL={0x8}, @NFTA_LOG_GROUP={0x6, 0x1, 0x1, 0x0, 0x20}, @NFTA_LOG_PREFIX={0x9, 0x2, 0x1, 0x0, 'syz2\x00'}, @NFTA_LOG_PREFIX={0x7, 0x2, 0x1, 0x0, ')$\x00'}, @NFTA_LOG_PREFIX={0x10, 0x2, 0x1, 0x0, '!##\\(!)*]+%\x00'}]}}}, {0x24, 0x1, 0x0, 0x1, @masq={{0x9}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_MASQ_REG_PROTO_MIN={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_MASQ_REG_PROTO_MAX={0x8, 0x3, 0x1, 0x0, 0x12}]}}}, {0x24, 0x1, 0x0, 0x1, @numgen={{0xb}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_NG_OFFSET={0x8, 0x4, 0x1, 0x0, 0x7fffffff}, @NFTA_NG_TYPE={0x8}]}}}, {0x30, 0x1, 0x0, 0x1, @dup_ipv6={{0x8}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0xf}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0x11}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0x14}, @NFTA_DUP_SREG_ADDR={0x8, 0x1, 0x1, 0x0, 0xd}]}}}]}]}], {0x14}}, 0x16c}}, 0x0) 16:40:54 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 181.424601][ T6005] FAULT_INJECTION: forcing a failure. [ 181.424601][ T6005] name fail_usercopy, interval 1, probability 0, space 0, times 0 16:40:54 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) [ 181.507857][ T6005] CPU: 0 PID: 6005 Comm: syz-executor.5 Not tainted 6.5.0-rc6-syzkaller-01712-g23c167af2404 #0 [ 181.518366][ T6005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 181.528537][ T6005] Call Trace: [ 181.531861][ T6005] [ 181.534925][ T6005] dump_stack_lvl+0x125/0x1b0 [ 181.539689][ T6005] should_fail_ex+0x496/0x5b0 [ 181.544457][ T6005] copyin+0x1b/0xa0 [ 181.548325][ T6005] _copy_from_iter+0x1e5/0x11f0 [ 181.553326][ T6005] ? __build_skb_around+0x278/0x3b0 [ 181.558604][ T6005] ? hash_and_copy_to_iter+0x230/0x230 [ 181.564126][ T6005] ? __napi_build_skb+0x50/0x50 [ 181.568703][ T6013] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 181.569050][ T6005] ? __netlink_dump_start+0x9a0/0x9c0 [ 181.582554][ T6005] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 181.588702][ T6005] ? __virt_addr_valid+0x5e/0x2d0 [ 181.593882][ T6005] ? __phys_addr_symbol+0x30/0x70 [ 181.598975][ T6005] ? __check_object_size+0x323/0x740 [ 181.604332][ T6005] netlink_sendmsg+0x897/0xe40 [ 181.609173][ T6005] ? netlink_unicast+0x810/0x810 [ 181.614185][ T6005] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 181.619551][ T6005] ? netlink_unicast+0x810/0x810 [ 181.624640][ T6005] sock_sendmsg+0xd9/0x180 [ 181.629145][ T6005] ____sys_sendmsg+0x6ac/0x940 [ 181.633992][ T6005] ? copy_msghdr_from_user+0x10b/0x160 [ 181.639519][ T6005] ? kernel_sendmsg+0x50/0x50 [ 181.644298][ T6005] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 181.650363][ T6005] ? find_held_lock+0x2d/0x110 [ 181.655204][ T6005] ___sys_sendmsg+0x135/0x1d0 [ 181.659948][ T6005] ? do_recvmmsg+0x740/0x740 [ 181.664618][ T6005] ? ksys_write+0x214/0x250 [ 181.669223][ T6005] ? __fget_light+0xe6/0x260 [ 181.673901][ T6005] __sys_sendmsg+0x117/0x1e0 [ 181.678550][ T6005] ? __sys_sendmsg_sock+0x30/0x30 [ 181.683656][ T6005] ? syscall_enter_from_user_mode+0x26/0x80 [ 181.689623][ T6005] do_syscall_64+0x38/0xb0 [ 181.694123][ T6005] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 181.700093][ T6005] RIP: 0033:0x7f224f87cae9 [ 181.704556][ T6005] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 181.724224][ T6005] RSP: 002b:00007f22505fd0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 181.732708][ T6005] RAX: ffffffffffffffda RBX: 00007f224f99bf80 RCX: 00007f224f87cae9 [ 181.740754][ T6005] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 181.748793][ T6005] RBP: 00007f22505fd120 R08: 0000000000000000 R09: 0000000000000000 [ 181.756829][ T6005] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 181.764860][ T6005] R13: 000000000000000b R14: 00007f224f99bf80 R15: 00007ffdede7f488 [ 181.772918][ T6005] 16:40:55 executing program 4: unshare(0x40000400) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) unshare(0x60000) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:40:55 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) 16:40:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) (async) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000808000240000000032c000000030a01030000e6ff00000000020000000900010073797a300000000009000300737978320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x144, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x14, 0x6, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, @log={{0x8}, @val={0x4}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_EXPRESSIONS={0x110, 0x4, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, @range={{0xa}, @void}}, {0x38, 0x1, 0x0, 0x1, @osf={{0x8}, @val={0x2c, 0x2, 0x0, 0x1, [@NFTA_OSF_FLAGS={0x8}, @NFTA_OSF_FLAGS={0x8}, @NFTA_OSF_DREG={0x8, 0x1, 0x1, 0x0, 0x14}, @NFTA_OSF_TTL={0x5, 0x2, 0x6}, @NFTA_OSF_FLAGS={0x8}]}}}, {0x4c, 0x1, 0x0, 0x1, @log={{0x8}, @val={0x40, 0x2, 0x0, 0x1, [@NFTA_LOG_QTHRESHOLD={0x6, 0x4, 0x1, 0x0, 0x4}, @NFTA_LOG_LEVEL={0x8}, @NFTA_LOG_GROUP={0x6, 0x1, 0x1, 0x0, 0x20}, @NFTA_LOG_PREFIX={0x9, 0x2, 0x1, 0x0, 'syz2\x00'}, @NFTA_LOG_PREFIX={0x7, 0x2, 0x1, 0x0, ')$\x00'}, @NFTA_LOG_PREFIX={0x10, 0x2, 0x1, 0x0, '!##\\(!)*]+%\x00'}]}}}, {0x24, 0x1, 0x0, 0x1, @masq={{0x9}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_MASQ_REG_PROTO_MIN={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_MASQ_REG_PROTO_MAX={0x8, 0x3, 0x1, 0x0, 0x12}]}}}, {0x24, 0x1, 0x0, 0x1, @numgen={{0xb}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_NG_OFFSET={0x8, 0x4, 0x1, 0x0, 0x7fffffff}, @NFTA_NG_TYPE={0x8}]}}}, {0x30, 0x1, 0x0, 0x1, @dup_ipv6={{0x8}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0xf}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0x11}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0x14}, @NFTA_DUP_SREG_ADDR={0x8, 0x1, 0x1, 0x0, 0xd}]}}}]}]}], {0x14}}, 0x16c}}, 0x0) 16:40:55 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) (fail_nth: 5) 16:40:55 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) 16:40:55 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) [ 181.951642][ T6019] netlink: 'syz-executor.1': attribute type 6 has an invalid length. 16:40:55 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) 16:40:55 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000080eff95"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f00000002c0)='contention_end\x00', r1}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000004fc0)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x0, 0x0) 16:40:55 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) [ 182.092293][ T6031] netlink: 21 bytes leftover after parsing attributes in process `syz-executor.4'. 16:40:55 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:40:55 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:40:55 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) [ 182.201822][ T6031] gretap0: entered promiscuous mode [ 182.262810][ T6031] gretap0: entered allmulticast mode 16:40:56 executing program 4: unshare(0x40000400) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) unshare(0x60000) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) unshare(0x40000400) (async) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) (async) unshare(0x60000) (async) socket$netlink(0x10, 0x3, 0x0) (async) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) (async) 16:40:56 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000080eff95"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f00000002c0)='contention_end\x00', r1}, 0x10) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000004fc0)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) (async) openat$cgroup_ro(r0, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x0, 0x0) 16:40:56 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) 16:40:56 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 16:40:56 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:40:56 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 16:40:56 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 16:40:56 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000080eff95"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000080eff95"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f00000002c0)='contention_end\x00', r1}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f00000002c0)='contention_end\x00', r1}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000004fc0)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x0, 0x0) 16:40:56 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x3, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:40:56 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) [ 182.918213][ T6063] netlink: 21 bytes leftover after parsing attributes in process `syz-executor.4'. 16:40:56 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:40:56 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 16:40:59 executing program 4: unshare(0x40000400) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) unshare(0x60000) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) unshare(0x40000400) (async) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) (async) unshare(0x60000) (async) socket$netlink(0x10, 0x3, 0x0) (async) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) (async) 16:40:59 executing program 1: unshare(0x40000400) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) unshare(0x60000) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:40:59 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x300, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:40:59 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 16:40:59 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 16:40:59 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:40:59 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x3000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:40:59 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 16:40:59 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) [ 186.278953][ T6094] netlink: 21 bytes leftover after parsing attributes in process `syz-executor.1'. 16:40:59 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 186.363166][ T6094] gretap0: entered promiscuous mode [ 186.396629][ T6094] gretap0: entered allmulticast mode 16:40:59 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 16:40:59 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) [ 186.431566][ T6098] netlink: 21 bytes leftover after parsing attributes in process `syz-executor.4'. 16:41:03 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 16:41:03 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x3, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:03 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x0, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x8}}]}, 0x1a0}}, 0x0) 16:41:03 executing program 1: unshare(0x40000400) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) unshare(0x60000) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:03 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm_base(ctr(cast6),sha1-ce))\x00'}, 0x58) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000500)=@raw=[@alu={0x4, 0x0, 0xc, 0x2, 0xb, 0x50}, @ldst={0x1, 0x2, 0x6, 0x1, 0x0, 0xd9a65da3e8597fc2, 0x4}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) sendto$inet6(r2, &(0x7f0000000100)="3b9263ad104f52742b76f151189487c310fff50a80000000", 0x18, 0x14000000, &(0x7f0000000300)={0xa, 0x4e21, 0x200, @dev={0xfe, 0x80, '\x00', 0x1c}, 0x1}, 0x1c) write$binfmt_script(r3, &(0x7f00000003c0)=ANY=[], 0x208e24b) socket$netlink(0x10, 0x3, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000440)="5277670b18cce50820e143c6f3a4ed35f8d7ed709fce950b4f9600b53212b8ba273c0065bbfa5ef1cd943ff60de51d5b287cc1b1776da5247ebdc89d7f0627bf361642b174153122bbdeff733836dce7dba2e779085bc2ca1f2cf8e1aa98d84dfb6f1052d4f58a155448b13e66b2aca5276f296b0f93a6732cec2ec1ebad29cd3816e6f0457abc42cbda7f87a7a0d5d9fff109780180d14ef4b2013b60a9f26f24c01bde25d269b5a60f172e99ae1b8f9e973bdb12", 0xb5) socket$nl_generic(0x10, 0x3, 0x10) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0)={r2}, 0x8) accept$alg(r5, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r8, 0x0, 0x482, &(0x7f0000000340)={0x84, @local, 0x4e22, 0x0, 'rr\x00', 0x0, 0x800, 0x78}, 0x2c) syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r9, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.io_serviced_recursive\x00', 0x275a, 0x0) write$binfmt_script(r11, &(0x7f00000002c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r11, 0x0) preadv(r11, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) openat$cgroup_ro(r11, &(0x7f0000000040)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="0100f872a5f09490c9000000000000050000", @ANYRES8=r10], 0x24}}, 0x90) sendfile(r7, r6, 0x0, 0x100000002) 16:41:03 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x300, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:03 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x0, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:03 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x0, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x8}}]}, 0x1a0}}, 0x0) [ 189.872432][ T6128] netlink: 21 bytes leftover after parsing attributes in process `syz-executor.1'. 16:41:03 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x0, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:03 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x0, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x8}}]}, 0x1a0}}, 0x0) 16:41:03 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x3000000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 189.964318][ T27] audit: type=1804 audit(1692895263.444:2): pid=6129 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir2451567299/syzkaller.MuQyxr/68/cgroup.controllers" dev="sda1" ino=1947 res=1 errno=0 [ 190.053886][ T5152] IPVS: starting estimator thread 0... 16:41:03 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x8}}]}, 0x1a0}}, 0x0) 16:41:03 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:03 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x0, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 190.173498][ T6137] IPVS: using max 15 ests per chain, 36000 per kthread 16:41:04 executing program 1: unshare(0x40000400) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) unshare(0x60000) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) [ 190.685612][ T6159] netlink: 21 bytes leftover after parsing attributes in process `syz-executor.1'. 16:41:04 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:04 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x8}}]}, 0x1a0}}, 0x0) 16:41:04 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x3, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:04 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm_base(ctr(cast6),sha1-ce))\x00'}, 0x58) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000500)=@raw=[@alu={0x4, 0x0, 0xc, 0x2, 0xb, 0x50}, @ldst={0x1, 0x2, 0x6, 0x1, 0x0, 0xd9a65da3e8597fc2, 0x4}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) (async) sendto$inet6(r2, &(0x7f0000000100)="3b9263ad104f52742b76f151189487c310fff50a80000000", 0x18, 0x14000000, &(0x7f0000000300)={0xa, 0x4e21, 0x200, @dev={0xfe, 0x80, '\x00', 0x1c}, 0x1}, 0x1c) write$binfmt_script(r3, &(0x7f00000003c0)=ANY=[], 0x208e24b) (async) socket$netlink(0x10, 0x3, 0x0) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) (async) r4 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000440)="5277670b18cce50820e143c6f3a4ed35f8d7ed709fce950b4f9600b53212b8ba273c0065bbfa5ef1cd943ff60de51d5b287cc1b1776da5247ebdc89d7f0627bf361642b174153122bbdeff733836dce7dba2e779085bc2ca1f2cf8e1aa98d84dfb6f1052d4f58a155448b13e66b2aca5276f296b0f93a6732cec2ec1ebad29cd3816e6f0457abc42cbda7f87a7a0d5d9fff109780180d14ef4b2013b60a9f26f24c01bde25d269b5a60f172e99ae1b8f9e973bdb12", 0xb5) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0)={r2}, 0x8) accept$alg(r5, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) (async) r7 = socket$nl_generic(0x10, 0x3, 0x10) (async) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r8, 0x0, 0x482, &(0x7f0000000340)={0x84, @local, 0x4e22, 0x0, 'rr\x00', 0x0, 0x800, 0x78}, 0x2c) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) (async) socket$netlink(0x10, 0x3, 0x0) (async) r9 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r9, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) (async) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.io_serviced_recursive\x00', 0x275a, 0x0) write$binfmt_script(r11, &(0x7f00000002c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r11, 0x0) (async) preadv(r11, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) (async) openat$cgroup_ro(r11, &(0x7f0000000040)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) (async) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="0100f872a5f09490c9000000000000050000", @ANYRES8=r10], 0x24}}, 0x90) (async) sendfile(r7, r6, 0x0, 0x100000002) 16:41:04 executing program 1: unshare(0x40000400) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) unshare(0x60000) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:04 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x300, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:04 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x8}}]}, 0x1a0}}, 0x0) 16:41:04 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm_base(ctr(cast6),sha1-ce))\x00'}, 0x58) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000500)=@raw=[@alu={0x4, 0x0, 0xc, 0x2, 0xb, 0x50}, @ldst={0x1, 0x2, 0x6, 0x1, 0x0, 0xd9a65da3e8597fc2, 0x4}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) sendto$inet6(r2, &(0x7f0000000100)="3b9263ad104f52742b76f151189487c310fff50a80000000", 0x18, 0x14000000, &(0x7f0000000300)={0xa, 0x4e21, 0x200, @dev={0xfe, 0x80, '\x00', 0x1c}, 0x1}, 0x1c) (async) write$binfmt_script(r3, &(0x7f00000003c0)=ANY=[], 0x208e24b) socket$netlink(0x10, 0x3, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) (async) r4 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000440)="5277670b18cce50820e143c6f3a4ed35f8d7ed709fce950b4f9600b53212b8ba273c0065bbfa5ef1cd943ff60de51d5b287cc1b1776da5247ebdc89d7f0627bf361642b174153122bbdeff733836dce7dba2e779085bc2ca1f2cf8e1aa98d84dfb6f1052d4f58a155448b13e66b2aca5276f296b0f93a6732cec2ec1ebad29cd3816e6f0457abc42cbda7f87a7a0d5d9fff109780180d14ef4b2013b60a9f26f24c01bde25d269b5a60f172e99ae1b8f9e973bdb12", 0xb5) socket$nl_generic(0x10, 0x3, 0x10) (async) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0)={r2}, 0x8) accept$alg(r5, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) (async) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r8, 0x0, 0x482, &(0x7f0000000340)={0x84, @local, 0x4e22, 0x0, 'rr\x00', 0x0, 0x800, 0x78}, 0x2c) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) (async) socket$netlink(0x10, 0x3, 0x0) (async) r9 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r9, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) (async) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.io_serviced_recursive\x00', 0x275a, 0x0) write$binfmt_script(r11, &(0x7f00000002c0)=ANY=[], 0x208e24b) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r11, 0x0) (async) preadv(r11, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) openat$cgroup_ro(r11, &(0x7f0000000040)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) (async) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="0100f872a5f09490c9000000000000050000", @ANYRES8=r10], 0x24}}, 0x90) sendfile(r7, r6, 0x0, 0x100000002) 16:41:04 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x3000000, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:04 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x8}}]}, 0x1a0}}, 0x0) 16:41:05 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:05 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:05 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:05 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x8}}]}, 0x1a0}}, 0x0) 16:41:05 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x66, &(0x7f00000003c0)=0x9, 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r2, r1, 0x0, 0x100000002) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x2, &(0x7f0000000400)=ANY=[@ANYBLOB], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) r4 = socket$alg(0x26, 0x5, 0x0) recvmmsg(r4, &(0x7f0000000500)=[{{&(0x7f00000002c0)=@caif=@dgm, 0x80, &(0x7f0000000380), 0x0, &(0x7f0000000900)=""/169, 0xa9}, 0x1fc}], 0x1, 0x10020, &(0x7f0000000540)) accept$alg(r3, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000950000000000000082531acba60eb6888b58c98dd6a63044d2c24ff27b90ed75acef750ef7348d4a116a5341f4559543c72325553c35ab5f040100009e837f288aa73929055bea5d3e36ff90baca6222ed3b3acc954a838732d552e4875d1ea00fa970fb8f55fb689df19c3d498047e6a80656fffffffffffffffc1047d88d2f00009d998b49b0404c"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000400)='cachefiles_prep_read\x00'}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000140)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r6, 0x0) r7 = socket$rxrpc(0x21, 0x2, 0xa) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000340)=ANY=[@ANYBLOB="46912b18dfbf93f1d950", @ANYRES16, @ANYBLOB="ff347ae908437583", @ANYRES32=r7], 0x4}}, 0x0) sendfile(r9, r8, 0x0, 0x100000002) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000140)={0x0, 0xf104}, 0x8) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x20004, @rand_addr=' \x01\x00', 0x1}, 0xffffffffffffff49) sendmmsg$inet(r0, &(0x7f0000002fc0)=[{{&(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10, 0x0}}], 0x1, 0x200088a4) r10 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_ADD(r10, 0x0, 0x482, &(0x7f0000000040)={0x84, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x6000000, 'dh\x00'}, 0x2c) 16:41:05 executing program 1: unshare(0x40000400) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) unshare(0x60000) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:05 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote, 0x3}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:05 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:05 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x8}}]}, 0x1a0}}, 0x0) 16:41:05 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote, 0x300}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 192.300873][ T27] audit: type=1804 audit(1692895265.774:3): pid=6221 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir2451567299/syzkaller.MuQyxr/71/cgroup.controllers" dev="sda1" ino=1970 res=1 errno=0 16:41:05 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) 16:41:05 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:06 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:06 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:06 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:06 executing program 1: unshare(0x40000400) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) unshare(0x60000) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:06 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) (async) setsockopt$inet6_udp_int(r0, 0x11, 0x66, &(0x7f00000003c0)=0x9, 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r2, r1, 0x0, 0x100000002) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x2, &(0x7f0000000400)=ANY=[@ANYBLOB], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) (async) r4 = socket$alg(0x26, 0x5, 0x0) recvmmsg(r4, &(0x7f0000000500)=[{{&(0x7f00000002c0)=@caif=@dgm, 0x80, &(0x7f0000000380), 0x0, &(0x7f0000000900)=""/169, 0xa9}, 0x1fc}], 0x1, 0x10020, &(0x7f0000000540)) accept$alg(r3, 0x0, 0x0) (async) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000950000000000000082531acba60eb6888b58c98dd6a63044d2c24ff27b90ed75acef750ef7348d4a116a5341f4559543c72325553c35ab5f040100009e837f288aa73929055bea5d3e36ff90baca6222ed3b3acc954a838732d552e4875d1ea00fa970fb8f55fb689df19c3d498047e6a80656fffffffffffffffc1047d88d2f00009d998b49b0404c"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000400)='cachefiles_prep_read\x00'}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000140)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r6, 0x0) r7 = socket$rxrpc(0x21, 0x2, 0xa) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) (async) r9 = socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000340)=ANY=[@ANYBLOB="46912b18dfbf93f1d950", @ANYRES16, @ANYBLOB="ff347ae908437583", @ANYRES32=r7], 0x4}}, 0x0) sendfile(r9, r8, 0x0, 0x100000002) (async) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000140)={0x0, 0xf104}, 0x8) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x20004, @rand_addr=' \x01\x00', 0x1}, 0xffffffffffffff49) (async) sendmmsg$inet(r0, &(0x7f0000002fc0)=[{{&(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10, 0x0}}], 0x1, 0x200088a4) r10 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_ADD(r10, 0x0, 0x482, &(0x7f0000000040)={0x84, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x6000000, 'dh\x00'}, 0x2c) 16:41:06 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) 16:41:06 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:06 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote, 0x0, 0x3}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:06 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) 16:41:07 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 193.552088][ T27] audit: type=1804 audit(1692895267.024:4): pid=6251 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir2451567299/syzkaller.MuQyxr/72/cgroup.controllers" dev="sda1" ino=1947 res=1 errno=0 16:41:07 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) (async) setsockopt$inet6_udp_int(r0, 0x11, 0x66, &(0x7f00000003c0)=0x9, 0x4) (async, rerun: 32) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) (async, rerun: 32) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r2, r1, 0x0, 0x100000002) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x2, &(0x7f0000000400)=ANY=[@ANYBLOB], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async, rerun: 64) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (rerun: 64) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) r4 = socket$alg(0x26, 0x5, 0x0) recvmmsg(r4, &(0x7f0000000500)=[{{&(0x7f00000002c0)=@caif=@dgm, 0x80, &(0x7f0000000380), 0x0, &(0x7f0000000900)=""/169, 0xa9}, 0x1fc}], 0x1, 0x10020, &(0x7f0000000540)) accept$alg(r3, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000950000000000000082531acba60eb6888b58c98dd6a63044d2c24ff27b90ed75acef750ef7348d4a116a5341f4559543c72325553c35ab5f040100009e837f288aa73929055bea5d3e36ff90baca6222ed3b3acc954a838732d552e4875d1ea00fa970fb8f55fb689df19c3d498047e6a80656fffffffffffffffc1047d88d2f00009d998b49b0404c"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) (async, rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000400)='cachefiles_prep_read\x00'}, 0x10) (rerun: 32) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000140)=ANY=[], 0x208e24b) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r6, 0x0) (async) r7 = socket$rxrpc(0x21, 0x2, 0xa) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) (async) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000340)=ANY=[@ANYBLOB="46912b18dfbf93f1d950", @ANYRES16, @ANYBLOB="ff347ae908437583", @ANYRES32=r7], 0x4}}, 0x0) (async) sendfile(r9, r8, 0x0, 0x100000002) (async) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000140)={0x0, 0xf104}, 0x8) (async) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x20004, @rand_addr=' \x01\x00', 0x1}, 0xffffffffffffff49) sendmmsg$inet(r0, &(0x7f0000002fc0)=[{{&(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10, 0x0}}], 0x1, 0x200088a4) r10 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_ADD(r10, 0x0, 0x482, &(0x7f0000000040)={0x84, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x6000000, 'dh\x00'}, 0x2c) 16:41:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote, 0x0, 0x300}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:07 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:07 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:07 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:07 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x66, &(0x7f00000003c0)=0x9, 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r2, r1, 0x0, 0x100000002) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x2, &(0x7f0000000400)=ANY=[@ANYBLOB], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) r4 = socket$alg(0x26, 0x5, 0x0) recvmmsg(r4, &(0x7f0000000500)=[{{&(0x7f00000002c0)=@caif=@dgm, 0x80, &(0x7f0000000380), 0x0, &(0x7f0000000900)=""/169, 0xa9}, 0x1fc}], 0x1, 0x10020, &(0x7f0000000540)) accept$alg(r3, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000950000000000000082531acba60eb6888b58c98dd6a63044d2c24ff27b90ed75acef750ef7348d4a116a5341f4559543c72325553c35ab5f040100009e837f288aa73929055bea5d3e36ff90baca6222ed3b3acc954a838732d552e4875d1ea00fa970fb8f55fb689df19c3d498047e6a80656fffffffffffffffc1047d88d2f00009d998b49b0404c"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000400)='cachefiles_prep_read\x00'}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000140)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r6, 0x0) r7 = socket$rxrpc(0x21, 0x2, 0xa) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000340)=ANY=[@ANYBLOB="46912b18dfbf93f1d950", @ANYRES16, @ANYBLOB="ff347ae908437583", @ANYRES32=r7], 0x4}}, 0x0) sendfile(r9, r8, 0x0, 0x100000002) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000140)={0x0, 0xf104}, 0x8) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x20004, @rand_addr=' \x01\x00', 0x1}, 0xffffffffffffff49) sendmmsg$inet(r0, &(0x7f0000002fc0)=[{{&(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10, 0x0}}], 0x1, 0x200088a4) r10 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_ADD(r10, 0x0, 0x482, &(0x7f0000000040)={0x84, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x6000000, 'dh\x00'}, 0x2c) 16:41:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:07 executing program 1: unshare(0x40000400) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:07 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) 16:41:07 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) [ 194.382426][ T6285] netlink: 21 bytes leftover after parsing attributes in process `syz-executor.1'. 16:41:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote, 0x0, 0x0, 0x3}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:08 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) 16:41:08 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x13c}}, 0x0) 16:41:08 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote, 0x0, 0x0, 0x300}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 194.638058][ T27] audit: type=1804 audit(1692895268.114:5): pid=6281 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir2451567299/syzkaller.MuQyxr/74/cgroup.controllers" dev="sda1" ino=1947 res=1 errno=0 16:41:08 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:08 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) 16:41:08 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x13c}}, 0x0) 16:41:08 executing program 1: unshare(0x40000400) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:08 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:08 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x66, &(0x7f00000003c0)=0x9, 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r2, r1, 0x0, 0x100000002) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x2, &(0x7f0000000400)=ANY=[@ANYBLOB], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) r4 = socket$alg(0x26, 0x5, 0x0) recvmmsg(r4, &(0x7f0000000500)=[{{&(0x7f00000002c0)=@caif=@dgm, 0x80, &(0x7f0000000380), 0x0, &(0x7f0000000900)=""/169, 0xa9}, 0x1fc}], 0x1, 0x10020, &(0x7f0000000540)) accept$alg(r3, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000950000000000000082531acba60eb6888b58c98dd6a63044d2c24ff27b90ed75acef750ef7348d4a116a5341f4559543c72325553c35ab5f040100009e837f288aa73929055bea5d3e36ff90baca6222ed3b3acc954a838732d552e4875d1ea00fa970fb8f55fb689df19c3d498047e6a80656fffffffffffffffc1047d88d2f00009d998b49b0404c"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000400)='cachefiles_prep_read\x00'}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000140)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r6, 0x0) r7 = socket$rxrpc(0x21, 0x2, 0xa) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000340)=ANY=[@ANYBLOB="46912b18dfbf93f1d950", @ANYRES16, @ANYBLOB="ff347ae908437583", @ANYRES32=r7], 0x4}}, 0x0) sendfile(r9, r8, 0x0, 0x100000002) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000140)={0x0, 0xf104}, 0x8) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x20004, @rand_addr=' \x01\x00', 0x1}, 0xffffffffffffff49) sendmmsg$inet(r0, &(0x7f0000002fc0)=[{{&(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10, 0x0}}], 0x1, 0x200088a4) r10 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_ADD(r10, 0x0, 0x482, &(0x7f0000000040)={0x84, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x6000000, 'dh\x00'}, 0x2c) 16:41:08 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:08 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote, 0x0, 0x0, 0x0, 0x3}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:08 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x13c}}, 0x0) [ 195.530191][ T6315] netlink: 21 bytes leftover after parsing attributes in process `syz-executor.1'. 16:41:09 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) [ 195.555156][ T27] audit: type=1804 audit(1692895269.034:6): pid=6316 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir2451567299/syzkaller.MuQyxr/75/cgroup.controllers" dev="sda1" ino=1971 res=1 errno=0 16:41:09 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote, 0x0, 0x0, 0x0, 0x300}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:09 executing program 2: unshare(0x40000400) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) unshare(0x60000) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:09 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:09 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:09 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) [ 196.326566][ T6336] netlink: 21 bytes leftover after parsing attributes in process `syz-executor.1'. 16:41:09 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x158, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x158}}, 0x0) 16:41:09 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x66, &(0x7f00000003c0)=0x9, 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r2, r1, 0x0, 0x100000002) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x2, &(0x7f0000000400)=ANY=[@ANYBLOB], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) r4 = socket$alg(0x26, 0x5, 0x0) recvmmsg(r4, &(0x7f0000000500)=[{{&(0x7f00000002c0)=@caif=@dgm, 0x80, &(0x7f0000000380), 0x0, &(0x7f0000000900)=""/169, 0xa9}, 0x1fc}], 0x1, 0x10020, &(0x7f0000000540)) accept$alg(r3, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000950000000000000082531acba60eb6888b58c98dd6a63044d2c24ff27b90ed75acef750ef7348d4a116a5341f4559543c72325553c35ab5f040100009e837f288aa73929055bea5d3e36ff90baca6222ed3b3acc954a838732d552e4875d1ea00fa970fb8f55fb689df19c3d498047e6a80656fffffffffffffffc1047d88d2f00009d998b49b0404c"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000400)='cachefiles_prep_read\x00'}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000140)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r6, 0x0) r7 = socket$rxrpc(0x21, 0x2, 0xa) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000340)=ANY=[@ANYBLOB="46912b18dfbf93f1d950", @ANYRES16, @ANYBLOB="ff347ae908437583", @ANYRES32=r7], 0x4}}, 0x0) sendfile(r9, r8, 0x0, 0x100000002) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000140)={0x0, 0xf104}, 0x8) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x20004, @rand_addr=' \x01\x00', 0x1}, 0xffffffffffffff49) sendmmsg$inet(r0, &(0x7f0000002fc0)=[{{&(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10, 0x0}}], 0x1, 0x200088a4) r10 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_ADD(r10, 0x0, 0x482, &(0x7f0000000040)={0x84, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x6000000, 'dh\x00'}, 0x2c) 16:41:09 executing program 2: unshare(0x40000400) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:09 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x3}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:09 executing program 1: socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:10 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x158, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x158}}, 0x0) 16:41:10 executing program 1: socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:10 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x300}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 196.741851][ T6352] netlink: 21 bytes leftover after parsing attributes in process `syz-executor.2'. [ 196.773226][ T6352] gretap0: entered promiscuous mode [ 196.793837][ T6352] gretap0: entered allmulticast mode [ 196.817432][ T27] audit: type=1804 audit(1692895270.294:7): pid=6350 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir2451567299/syzkaller.MuQyxr/76/cgroup.controllers" dev="sda1" ino=1951 res=1 errno=0 16:41:10 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:10 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x158, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x158}}, 0x0) 16:41:10 executing program 1: socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:10 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:10 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote, 0x3}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:10 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) (fail_nth: 1) 16:41:10 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote, 0x3}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:10 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) (fail_nth: 1) 16:41:10 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, 0x0, 0x0) 16:41:11 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote, 0x3}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 197.505404][ T6374] FAULT_INJECTION: forcing a failure. [ 197.505404][ T6374] name fail_usercopy, interval 1, probability 0, space 0, times 0 16:41:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, 0x0, 0x0) [ 197.559688][ T6381] FAULT_INJECTION: forcing a failure. [ 197.559688][ T6381] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 197.614209][ T6374] CPU: 0 PID: 6374 Comm: syz-executor.3 Not tainted 6.5.0-rc6-syzkaller-01712-g23c167af2404 #0 [ 197.624625][ T6374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 197.634732][ T6374] Call Trace: [ 197.638060][ T6374] [ 197.641059][ T6374] dump_stack_lvl+0x125/0x1b0 [ 197.645830][ T6374] should_fail_ex+0x496/0x5b0 [ 197.650592][ T6374] _copy_from_user+0x30/0xf0 [ 197.655259][ T6374] copy_msghdr_from_user+0x99/0x160 [ 197.660525][ T6374] ? __copy_msghdr+0x460/0x460 [ 197.665357][ T6374] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 197.671405][ T6374] ? find_held_lock+0x2d/0x110 [ 197.676238][ T6374] ___sys_sendmsg+0xff/0x1d0 [ 197.680917][ T6374] ? do_recvmmsg+0x740/0x740 [ 197.685590][ T6374] ? ksys_write+0x214/0x250 [ 197.690238][ T6374] ? __fget_light+0xe6/0x260 [ 197.694927][ T6374] __sys_sendmsg+0x117/0x1e0 [ 197.699584][ T6374] ? __sys_sendmsg_sock+0x30/0x30 [ 197.704702][ T6374] ? syscall_enter_from_user_mode+0x26/0x80 [ 197.710696][ T6374] do_syscall_64+0x38/0xb0 [ 197.715289][ T6374] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 197.721269][ T6374] RIP: 0033:0x7f925d27cae9 [ 197.725738][ T6374] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 197.745417][ T6374] RSP: 002b:00007f925e09c0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 197.753988][ T6374] RAX: ffffffffffffffda RBX: 00007f925d39bf80 RCX: 00007f925d27cae9 [ 197.761996][ T6374] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 197.770105][ T6374] RBP: 00007f925e09c120 R08: 0000000000000000 R09: 0000000000000000 [ 197.778129][ T6374] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 197.786150][ T6374] R13: 000000000000000b R14: 00007f925d39bf80 R15: 00007ffc15930878 [ 197.794296][ T6374] [ 197.845385][ T6381] CPU: 0 PID: 6381 Comm: syz-executor.4 Not tainted 6.5.0-rc6-syzkaller-01712-g23c167af2404 #0 [ 197.855805][ T6381] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 197.865925][ T6381] Call Trace: [ 197.869248][ T6381] [ 197.872220][ T6381] dump_stack_lvl+0x125/0x1b0 [ 197.877003][ T6381] should_fail_ex+0x496/0x5b0 [ 197.881773][ T6381] _copy_from_user+0x30/0xf0 [ 197.886452][ T6381] copy_msghdr_from_user+0x99/0x160 [ 197.891722][ T6381] ? __copy_msghdr+0x460/0x460 [ 197.896549][ T6381] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 197.902625][ T6381] ? find_held_lock+0x2d/0x110 [ 197.907471][ T6381] ___sys_sendmsg+0xff/0x1d0 [ 197.912123][ T6381] ? do_recvmmsg+0x740/0x740 [ 197.916800][ T6381] ? ksys_write+0x214/0x250 [ 197.921415][ T6381] ? __fget_light+0xe6/0x260 [ 197.926087][ T6381] __sys_sendmsg+0x117/0x1e0 [ 197.930738][ T6381] ? __sys_sendmsg_sock+0x30/0x30 [ 197.935839][ T6381] ? syscall_enter_from_user_mode+0x26/0x80 [ 197.941800][ T6381] do_syscall_64+0x38/0xb0 [ 197.946294][ T6381] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 197.952298][ T6381] RIP: 0033:0x7fd46bc7cae9 [ 197.956781][ T6381] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 197.976450][ T6381] RSP: 002b:00007fd46ca6f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 197.984926][ T6381] RAX: ffffffffffffffda RBX: 00007fd46bd9bf80 RCX: 00007fd46bc7cae9 [ 197.992943][ T6381] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 198.000957][ T6381] RBP: 00007fd46ca6f120 R08: 0000000000000000 R09: 0000000000000000 [ 198.008973][ T6381] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 198.016986][ T6381] R13: 000000000000000b R14: 00007fd46bd9bf80 R15: 00007ffc4a62b278 [ 198.025030][ T6381] 16:41:11 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:11 executing program 2: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote, 0x3}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:11 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, 0x0, 0x0) 16:41:11 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) (fail_nth: 2) 16:41:11 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) (fail_nth: 2) 16:41:11 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:11 executing program 2: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote, 0x3}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0), 0x0) [ 198.470089][ T6393] FAULT_INJECTION: forcing a failure. [ 198.470089][ T6393] name failslab, interval 1, probability 0, space 0, times 0 [ 198.489261][ T6396] FAULT_INJECTION: forcing a failure. [ 198.489261][ T6396] name failslab, interval 1, probability 0, space 0, times 0 [ 198.543672][ T6393] CPU: 0 PID: 6393 Comm: syz-executor.3 Not tainted 6.5.0-rc6-syzkaller-01712-g23c167af2404 #0 [ 198.554098][ T6393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 198.564225][ T6393] Call Trace: [ 198.567551][ T6393] [ 198.570518][ T6393] dump_stack_lvl+0x125/0x1b0 [ 198.575276][ T6393] should_fail_ex+0x496/0x5b0 [ 198.580037][ T6393] should_failslab+0x9/0x20 [ 198.584611][ T6393] kmem_cache_alloc_node+0x389/0x3f0 [ 198.589957][ T6393] ? __alloc_skb+0x287/0x330 [ 198.594717][ T6393] __alloc_skb+0x287/0x330 [ 198.599215][ T6393] ? __napi_build_skb+0x50/0x50 [ 198.604141][ T6393] ? __netlink_dump_start+0x9a0/0x9c0 [ 198.609577][ T6393] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 198.615542][ T6393] ? apparmor_socket_getpeersec_dgram+0x9/0x10 [ 198.621750][ T6393] netlink_sendmsg+0x9c6/0xe40 [ 198.626592][ T6393] ? netlink_unicast+0x810/0x810 [ 198.631604][ T6393] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 198.636959][ T6393] ? netlink_unicast+0x810/0x810 [ 198.641955][ T6393] sock_sendmsg+0xd9/0x180 [ 198.646539][ T6393] ____sys_sendmsg+0x6ac/0x940 [ 198.651385][ T6393] ? copy_msghdr_from_user+0x10b/0x160 [ 198.656907][ T6393] ? kernel_sendmsg+0x50/0x50 [ 198.661749][ T6393] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 198.667826][ T6393] ? find_held_lock+0x2d/0x110 [ 198.672678][ T6393] ___sys_sendmsg+0x135/0x1d0 [ 198.677414][ T6393] ? do_recvmmsg+0x740/0x740 [ 198.682065][ T6393] ? ksys_write+0x214/0x250 [ 198.686654][ T6393] ? __fget_light+0xe6/0x260 [ 198.691324][ T6393] __sys_sendmsg+0x117/0x1e0 [ 198.695970][ T6393] ? __sys_sendmsg_sock+0x30/0x30 [ 198.701070][ T6393] ? syscall_enter_from_user_mode+0x26/0x80 [ 198.707029][ T6393] do_syscall_64+0x38/0xb0 [ 198.711518][ T6393] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 198.717506][ T6393] RIP: 0033:0x7f925d27cae9 [ 198.721955][ T6393] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 16:41:12 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 198.741610][ T6393] RSP: 002b:00007f925e09c0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 198.750084][ T6393] RAX: ffffffffffffffda RBX: 00007f925d39bf80 RCX: 00007f925d27cae9 [ 198.758102][ T6393] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 198.766116][ T6393] RBP: 00007f925e09c120 R08: 0000000000000000 R09: 0000000000000000 [ 198.774137][ T6393] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 198.782154][ T6393] R13: 000000000000000b R14: 00007f925d39bf80 R15: 00007ffc15930878 [ 198.790199][ T6393] 16:41:12 executing program 2: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote, 0x3}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 198.845467][ T6396] CPU: 1 PID: 6396 Comm: syz-executor.4 Not tainted 6.5.0-rc6-syzkaller-01712-g23c167af2404 #0 [ 198.855955][ T6396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 198.866058][ T6396] Call Trace: [ 198.869378][ T6396] [ 198.872350][ T6396] dump_stack_lvl+0x125/0x1b0 [ 198.877105][ T6396] should_fail_ex+0x496/0x5b0 [ 198.881857][ T6396] should_failslab+0x9/0x20 [ 198.886431][ T6396] kmem_cache_alloc_node+0x389/0x3f0 16:41:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0), 0x0) [ 198.891782][ T6396] ? __alloc_skb+0x287/0x330 [ 198.896449][ T6396] __alloc_skb+0x287/0x330 [ 198.900946][ T6396] ? __napi_build_skb+0x50/0x50 [ 198.905878][ T6396] ? __netlink_dump_start+0x9a0/0x9c0 [ 198.911316][ T6396] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 198.917322][ T6396] ? apparmor_socket_getpeersec_dgram+0x9/0x10 [ 198.923535][ T6396] netlink_sendmsg+0x9c6/0xe40 [ 198.928448][ T6396] ? netlink_unicast+0x810/0x810 [ 198.933449][ T6396] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 198.938809][ T6396] ? netlink_unicast+0x810/0x810 [ 198.943806][ T6396] sock_sendmsg+0xd9/0x180 [ 198.948318][ T6396] ____sys_sendmsg+0x6ac/0x940 [ 198.953157][ T6396] ? copy_msghdr_from_user+0x10b/0x160 [ 198.958676][ T6396] ? kernel_sendmsg+0x50/0x50 [ 198.963437][ T6396] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 198.969491][ T6396] ? find_held_lock+0x2d/0x110 [ 198.974326][ T6396] ___sys_sendmsg+0x135/0x1d0 [ 198.979068][ T6396] ? do_recvmmsg+0x740/0x740 [ 198.983735][ T6396] ? ksys_write+0x214/0x250 [ 198.988338][ T6396] ? __fget_light+0xe6/0x260 [ 198.993016][ T6396] __sys_sendmsg+0x117/0x1e0 [ 198.997667][ T6396] ? __sys_sendmsg_sock+0x30/0x30 [ 199.002780][ T6396] ? syscall_enter_from_user_mode+0x26/0x80 [ 199.008760][ T6396] do_syscall_64+0x38/0xb0 [ 199.013258][ T6396] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 199.019232][ T6396] RIP: 0033:0x7fd46bc7cae9 [ 199.023697][ T6396] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 199.043363][ T6396] RSP: 002b:00007fd46ca6f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 199.051840][ T6396] RAX: ffffffffffffffda RBX: 00007fd46bd9bf80 RCX: 00007fd46bc7cae9 [ 199.059878][ T6396] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 199.067900][ T6396] RBP: 00007fd46ca6f120 R08: 0000000000000000 R09: 0000000000000000 [ 199.075991][ T6396] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 199.084023][ T6396] R13: 000000000000000b R14: 00007fd46bd9bf80 R15: 00007ffc4a62b278 [ 199.092084][ T6396] [ 199.506405][ T1234] ieee802154 phy0 wpan0: encryption failed: -22 [ 199.512751][ T1234] ieee802154 phy1 wpan1: encryption failed: -22 16:41:13 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:13 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote, 0x3}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:13 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) (fail_nth: 3) 16:41:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0), 0x0) 16:41:13 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:13 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:13 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote, 0x3}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{0x0}], 0x1) 16:41:13 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:13 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) (fail_nth: 4) 16:41:13 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:13 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote, 0x3}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 199.955513][ T6431] FAULT_INJECTION: forcing a failure. [ 199.955513][ T6431] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 200.039313][ T6431] CPU: 1 PID: 6431 Comm: syz-executor.3 Not tainted 6.5.0-rc6-syzkaller-01712-g23c167af2404 #0 [ 200.049766][ T6431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 200.059878][ T6431] Call Trace: [ 200.063206][ T6431] [ 200.066188][ T6431] dump_stack_lvl+0x125/0x1b0 [ 200.070960][ T6431] should_fail_ex+0x496/0x5b0 [ 200.075737][ T6431] copyin+0x1b/0xa0 [ 200.079628][ T6431] _copy_from_iter+0x1e5/0x11f0 [ 200.084558][ T6431] ? __build_skb_around+0x278/0x3b0 [ 200.089885][ T6431] ? hash_and_copy_to_iter+0x230/0x230 [ 200.095417][ T6431] ? __napi_build_skb+0x50/0x50 [ 200.100328][ T6431] ? __netlink_dump_start+0x9a0/0x9c0 [ 200.105737][ T6431] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 200.111680][ T6431] ? __virt_addr_valid+0x5e/0x2d0 [ 200.116757][ T6431] ? __phys_addr_symbol+0x30/0x70 [ 200.121814][ T6431] ? __check_object_size+0x323/0x740 [ 200.127132][ T6431] netlink_sendmsg+0x897/0xe40 [ 200.131930][ T6431] ? netlink_unicast+0x810/0x810 [ 200.136901][ T6431] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 200.142222][ T6431] ? netlink_unicast+0x810/0x810 [ 200.147195][ T6431] sock_sendmsg+0xd9/0x180 [ 200.152028][ T6431] ____sys_sendmsg+0x6ac/0x940 [ 200.156830][ T6431] ? copy_msghdr_from_user+0x10b/0x160 [ 200.162310][ T6431] ? kernel_sendmsg+0x50/0x50 [ 200.167031][ T6431] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 200.173050][ T6431] ? find_held_lock+0x2d/0x110 [ 200.177847][ T6431] ___sys_sendmsg+0x135/0x1d0 [ 200.182627][ T6431] ? do_recvmmsg+0x740/0x740 [ 200.187343][ T6431] ? ksys_write+0x214/0x250 [ 200.191924][ T6431] ? __fget_light+0xe6/0x260 [ 200.196566][ T6431] __sys_sendmsg+0x117/0x1e0 [ 200.201227][ T6431] ? __sys_sendmsg_sock+0x30/0x30 [ 200.206328][ T6431] ? syscall_enter_from_user_mode+0x26/0x80 [ 200.212272][ T6431] do_syscall_64+0x38/0xb0 [ 200.216746][ T6431] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 200.222680][ T6431] RIP: 0033:0x7f925d27cae9 [ 200.227114][ T6431] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 200.246833][ T6431] RSP: 002b:00007f925e09c0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 200.255273][ T6431] RAX: ffffffffffffffda RBX: 00007f925d39bf80 RCX: 00007f925d27cae9 [ 200.263876][ T6431] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 200.271964][ T6431] RBP: 00007f925e09c120 R08: 0000000000000000 R09: 0000000000000000 [ 200.279955][ T6431] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 200.287943][ T6431] R13: 000000000000000b R14: 00007f925d39bf80 R15: 00007ffc15930878 [ 200.295955][ T6431] 16:41:14 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x3, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:14 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x2, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{0x0}], 0x1) 16:41:14 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) (fail_nth: 5) 16:41:14 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:14 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) [ 200.825380][ T6445] FAULT_INJECTION: forcing a failure. [ 200.825380][ T6445] name failslab, interval 1, probability 0, space 0, times 0 [ 200.863967][ T6445] CPU: 0 PID: 6445 Comm: syz-executor.3 Not tainted 6.5.0-rc6-syzkaller-01712-g23c167af2404 #0 [ 200.874398][ T6445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 200.884514][ T6445] Call Trace: [ 200.887852][ T6445] [ 200.890833][ T6445] dump_stack_lvl+0x125/0x1b0 [ 200.895606][ T6445] should_fail_ex+0x496/0x5b0 [ 200.900386][ T6445] should_failslab+0x9/0x20 [ 200.904975][ T6445] kmem_cache_alloc+0x69/0x3b0 [ 200.909833][ T6445] skb_clone+0x171/0x3c0 [ 200.914146][ T6445] netlink_deliver_tap+0xb3c/0xd10 [ 200.919332][ T6445] netlink_unicast+0x5f0/0x810 16:41:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{0x0}], 0x1) 16:41:14 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x300, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 200.924276][ T6445] ? netlink_attachskb+0x870/0x870 [ 200.929464][ T6445] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 200.935444][ T6445] ? __phys_addr_symbol+0x30/0x70 [ 200.940538][ T6445] ? __check_object_size+0x323/0x740 [ 200.945908][ T6445] netlink_sendmsg+0x93c/0xe40 [ 200.950750][ T6445] ? netlink_unicast+0x810/0x810 [ 200.955768][ T6445] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 200.961134][ T6445] ? netlink_unicast+0x810/0x810 [ 200.966145][ T6445] sock_sendmsg+0xd9/0x180 [ 200.970659][ T6445] ____sys_sendmsg+0x6ac/0x940 16:41:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)}], 0x1) [ 200.975514][ T6445] ? copy_msghdr_from_user+0x10b/0x160 [ 200.981051][ T6445] ? kernel_sendmsg+0x50/0x50 [ 200.985824][ T6445] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 200.991883][ T6445] ? find_held_lock+0x2d/0x110 [ 200.996731][ T6445] ___sys_sendmsg+0x135/0x1d0 [ 201.001484][ T6445] ? do_recvmmsg+0x740/0x740 [ 201.006162][ T6445] ? ksys_write+0x214/0x250 [ 201.010772][ T6445] ? __fget_light+0xe6/0x260 [ 201.015461][ T6445] __sys_sendmsg+0x117/0x1e0 [ 201.020121][ T6445] ? __sys_sendmsg_sock+0x30/0x30 16:41:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)}], 0x1) [ 201.025243][ T6445] ? syscall_enter_from_user_mode+0x26/0x80 [ 201.031216][ T6445] do_syscall_64+0x38/0xb0 [ 201.035735][ T6445] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 201.041717][ T6445] RIP: 0033:0x7f925d27cae9 [ 201.046182][ T6445] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 201.065852][ T6445] RSP: 002b:00007f925e09c0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 201.074335][ T6445] RAX: ffffffffffffffda RBX: 00007f925d39bf80 RCX: 00007f925d27cae9 [ 201.082386][ T6445] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 201.090421][ T6445] RBP: 00007f925e09c120 R08: 0000000000000000 R09: 0000000000000000 [ 201.098456][ T6445] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 201.106492][ T6445] R13: 000000000000000b R14: 00007f925d39bf80 R15: 00007ffc15930878 [ 201.114546][ T6445] 16:41:14 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) 16:41:14 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x3, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)}], 0x1) 16:41:14 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x3000000, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:14 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) 16:41:14 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) (fail_nth: 6) [ 201.601757][ T6469] FAULT_INJECTION: forcing a failure. [ 201.601757][ T6469] name failslab, interval 1, probability 0, space 0, times 0 [ 201.615097][ T6469] CPU: 1 PID: 6469 Comm: syz-executor.3 Not tainted 6.5.0-rc6-syzkaller-01712-g23c167af2404 #0 [ 201.625501][ T6469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 201.635620][ T6469] Call Trace: [ 201.638945][ T6469] [ 201.641917][ T6469] dump_stack_lvl+0x125/0x1b0 [ 201.646692][ T6469] should_fail_ex+0x496/0x5b0 [ 201.651443][ T6469] ? netlink_unicast+0x5f0/0x810 [ 201.656442][ T6469] ? netlink_sendmsg+0x93c/0xe40 [ 201.661443][ T6469] should_failslab+0x9/0x20 [ 201.666023][ T6469] kmem_cache_alloc+0x69/0x3b0 [ 201.670852][ T6469] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 201.676833][ T6469] xfrm_state_alloc+0x23/0x510 [ 201.681672][ T6469] xfrm_add_sa+0xcaf/0x42f0 [ 201.686263][ T6469] ? xfrm_state_netlink+0x150/0x150 [ 201.691629][ T6469] ? __nla_parse+0x40/0x50 [ 201.696125][ T6469] ? xfrm_state_netlink+0x150/0x150 [ 201.701412][ T6469] xfrm_user_rcv_msg+0x55c/0xa60 [ 201.706433][ T6469] ? xfrm_user_net_init+0x160/0x160 [ 201.711765][ T6469] ? preempt_count_sub+0x150/0x150 [ 201.716967][ T6469] netlink_rcv_skb+0x16b/0x440 [ 201.721790][ T6469] ? xfrm_user_net_init+0x160/0x160 [ 201.727062][ T6469] ? netlink_ack+0x1370/0x1370 [ 201.731881][ T6469] ? reacquire_held_locks+0x4b0/0x4b0 [ 201.737340][ T6469] xfrm_netlink_rcv+0x6c/0x90 [ 201.742060][ T6469] netlink_unicast+0x536/0x810 [ 201.746865][ T6469] ? netlink_attachskb+0x870/0x870 [ 201.752351][ T6469] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 201.758288][ T6469] ? __phys_addr_symbol+0x30/0x70 [ 201.763357][ T6469] ? __check_object_size+0x323/0x740 [ 201.768689][ T6469] netlink_sendmsg+0x93c/0xe40 [ 201.773499][ T6469] ? netlink_unicast+0x810/0x810 [ 201.778496][ T6469] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 201.784097][ T6469] ? netlink_unicast+0x810/0x810 [ 201.789067][ T6469] sock_sendmsg+0xd9/0x180 [ 201.793528][ T6469] ____sys_sendmsg+0x6ac/0x940 [ 201.798336][ T6469] ? copy_msghdr_from_user+0x10b/0x160 [ 201.803823][ T6469] ? kernel_sendmsg+0x50/0x50 [ 201.808573][ T6469] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 201.814693][ T6469] ? find_held_lock+0x2d/0x110 [ 201.819495][ T6469] ___sys_sendmsg+0x135/0x1d0 [ 201.824232][ T6469] ? do_recvmmsg+0x740/0x740 [ 201.828869][ T6469] ? ksys_write+0x214/0x250 [ 201.833440][ T6469] ? __fget_light+0xe6/0x260 [ 201.838169][ T6469] __sys_sendmsg+0x117/0x1e0 [ 201.842791][ T6469] ? __sys_sendmsg_sock+0x30/0x30 [ 201.847867][ T6469] ? syscall_enter_from_user_mode+0x26/0x80 [ 201.853807][ T6469] do_syscall_64+0x38/0xb0 [ 201.858268][ T6469] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 201.864212][ T6469] RIP: 0033:0x7f925d27cae9 [ 201.868656][ T6469] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 201.888297][ T6469] RSP: 002b:00007f925e09c0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 201.896743][ T6469] RAX: ffffffffffffffda RBX: 00007f925d39bf80 RCX: 00007f925d27cae9 [ 201.904738][ T6469] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 201.912733][ T6469] RBP: 00007f925e09c120 R08: 0000000000000000 R09: 0000000000000000 [ 201.920728][ T6469] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 201.928739][ T6469] R13: 000000000000000b R14: 00007f925d39bf80 R15: 00007ffc15930878 [ 201.936770][ T6469] 16:41:15 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:15 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0018ff3f0400000017b76c1700", 0x1d}], 0x1) 16:41:15 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:15 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 16:41:15 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) (fail_nth: 7) [ 202.101644][ T6478] FAULT_INJECTION: forcing a failure. [ 202.101644][ T6478] name failslab, interval 1, probability 0, space 0, times 0 16:41:15 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 16:41:15 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) [ 202.173957][ T6478] CPU: 1 PID: 6478 Comm: syz-executor.3 Not tainted 6.5.0-rc6-syzkaller-01712-g23c167af2404 #0 [ 202.184386][ T6478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 202.194587][ T6478] Call Trace: [ 202.197914][ T6478] [ 202.200894][ T6478] dump_stack_lvl+0x125/0x1b0 [ 202.205663][ T6478] should_fail_ex+0x496/0x5b0 [ 202.210423][ T6478] should_failslab+0x9/0x20 [ 202.215101][ T6478] __kmem_cache_alloc_node+0x2fd/0x350 16:41:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0018ff3f0400000017b76c1700", 0x1d}], 0x1) 16:41:15 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev={0xac, 0x14, 0x14, 0x3}, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 202.220651][ T6478] ? xfrm_add_sa+0x14e3/0x42f0 [ 202.225496][ T6478] ? lockdep_init_map_type+0x16d/0x7c0 [ 202.231039][ T6478] ? xfrm_add_sa+0x14e3/0x42f0 [ 202.235899][ T6478] __kmalloc_node_track_caller+0x4d/0x100 [ 202.241718][ T6478] kmemdup+0x29/0x60 [ 202.245699][ T6478] xfrm_add_sa+0x14e3/0x42f0 [ 202.250395][ T6478] ? xfrm_state_netlink+0x150/0x150 [ 202.255697][ T6478] ? __nla_parse+0x40/0x50 [ 202.260379][ T6478] ? xfrm_state_netlink+0x150/0x150 [ 202.265678][ T6478] xfrm_user_rcv_msg+0x55c/0xa60 [ 202.270707][ T6478] ? xfrm_user_net_init+0x160/0x160 [ 202.276059][ T6478] ? preempt_count_sub+0x150/0x150 [ 202.281272][ T6478] netlink_rcv_skb+0x16b/0x440 [ 202.286116][ T6478] ? xfrm_user_net_init+0x160/0x160 [ 202.291390][ T6478] ? netlink_ack+0x1370/0x1370 [ 202.296253][ T6478] ? reacquire_held_locks+0x4b0/0x4b0 [ 202.301729][ T6478] xfrm_netlink_rcv+0x6c/0x90 [ 202.306500][ T6478] netlink_unicast+0x536/0x810 [ 202.311344][ T6478] ? netlink_attachskb+0x870/0x870 [ 202.316523][ T6478] ? __sanitizer_cov_trace_switch+0x54/0x90 16:41:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0018ff3f0400000017b76c1700", 0x1d}], 0x1) [ 202.322513][ T6478] ? __phys_addr_symbol+0x30/0x70 [ 202.327625][ T6478] ? __check_object_size+0x323/0x740 [ 202.332995][ T6478] netlink_sendmsg+0x93c/0xe40 [ 202.337825][ T6478] ? netlink_unicast+0x810/0x810 [ 202.342838][ T6478] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 202.348200][ T6478] ? netlink_unicast+0x810/0x810 [ 202.353208][ T6478] sock_sendmsg+0xd9/0x180 [ 202.357711][ T6478] ____sys_sendmsg+0x6ac/0x940 [ 202.362561][ T6478] ? copy_msghdr_from_user+0x10b/0x160 [ 202.368094][ T6478] ? kernel_sendmsg+0x50/0x50 16:41:15 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {0x3}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 202.372860][ T6478] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 202.378941][ T6478] ___sys_sendmsg+0x135/0x1d0 [ 202.383691][ T6478] ? do_recvmmsg+0x740/0x740 [ 202.388404][ T6478] ? __fget_light+0xe6/0x260 [ 202.393085][ T6478] __sys_sendmsg+0x117/0x1e0 [ 202.397745][ T6478] ? __sys_sendmsg_sock+0x30/0x30 [ 202.402838][ T6478] ? xfd_validate_state+0x5d/0x180 [ 202.408057][ T6478] ? syscall_enter_from_user_mode+0x26/0x80 [ 202.414032][ T6478] do_syscall_64+0x38/0xb0 [ 202.418547][ T6478] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 202.424538][ T6478] RIP: 0033:0x7f925d27cae9 [ 202.429013][ T6478] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 202.448691][ T6478] RSP: 002b:00007f925e09c0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 202.457308][ T6478] RAX: ffffffffffffffda RBX: 00007f925d39bf80 RCX: 00007f925d27cae9 [ 202.465342][ T6478] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 202.473376][ T6478] RBP: 00007f925e09c120 R08: 0000000000000000 R09: 0000000000000000 [ 202.481416][ T6478] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 202.489443][ T6478] R13: 000000000000000b R14: 00007f925d39bf80 R15: 00007ffc15930878 [ 202.497500][ T6478] 16:41:16 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:16 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x6, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:16 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 16:41:16 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {0x300}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a110300013425", 0x2b}], 0x1) 16:41:16 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) (fail_nth: 8) 16:41:16 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x7, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:16 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 16:41:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a110300013425", 0x2b}], 0x1) 16:41:16 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {0x3000000}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:16 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x8, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:16 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) [ 203.440884][ T6519] FAULT_INJECTION: forcing a failure. [ 203.440884][ T6519] name failslab, interval 1, probability 0, space 0, times 0 [ 203.503223][ T6519] CPU: 0 PID: 6519 Comm: syz-executor.3 Not tainted 6.5.0-rc6-syzkaller-01712-g23c167af2404 #0 [ 203.513643][ T6519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 203.523845][ T6519] Call Trace: [ 203.527257][ T6519] [ 203.530239][ T6519] dump_stack_lvl+0x125/0x1b0 [ 203.535010][ T6519] should_fail_ex+0x496/0x5b0 [ 203.539757][ T6519] should_failslab+0x9/0x20 [ 203.544331][ T6519] __kmem_cache_alloc_node+0x2fd/0x350 [ 203.549859][ T6519] ? xfrm_add_sa+0x19f0/0x42f0 [ 203.554699][ T6519] ? xfrm_add_sa+0x19f0/0x42f0 [ 203.559526][ T6519] __kmalloc_node_track_caller+0x4d/0x100 [ 203.565329][ T6519] kmemdup+0x29/0x60 [ 203.569295][ T6519] xfrm_add_sa+0x19f0/0x42f0 [ 203.573975][ T6519] ? xfrm_state_netlink+0x150/0x150 [ 203.579247][ T6519] ? __nla_parse+0x40/0x50 [ 203.583736][ T6519] ? xfrm_state_netlink+0x150/0x150 [ 203.589005][ T6519] xfrm_user_rcv_msg+0x55c/0xa60 [ 203.594000][ T6519] ? xfrm_user_net_init+0x160/0x160 [ 203.599294][ T6519] ? preempt_count_sub+0x150/0x150 [ 203.604461][ T6519] netlink_rcv_skb+0x16b/0x440 [ 203.609255][ T6519] ? xfrm_user_net_init+0x160/0x160 [ 203.614498][ T6519] ? netlink_ack+0x1370/0x1370 [ 203.619308][ T6519] ? reacquire_held_locks+0x4b0/0x4b0 [ 203.624732][ T6519] xfrm_netlink_rcv+0x6c/0x90 [ 203.629450][ T6519] netlink_unicast+0x536/0x810 [ 203.634277][ T6519] ? netlink_attachskb+0x870/0x870 [ 203.639421][ T6519] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 203.645374][ T6519] ? __phys_addr_symbol+0x30/0x70 [ 203.650444][ T6519] ? __check_object_size+0x323/0x740 [ 203.655770][ T6519] netlink_sendmsg+0x93c/0xe40 [ 203.660573][ T6519] ? netlink_unicast+0x810/0x810 [ 203.665548][ T6519] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 203.670878][ T6519] ? netlink_unicast+0x810/0x810 [ 203.675852][ T6519] sock_sendmsg+0xd9/0x180 [ 203.680314][ T6519] ____sys_sendmsg+0x6ac/0x940 [ 203.685121][ T6519] ? copy_msghdr_from_user+0x10b/0x160 [ 203.690626][ T6519] ? kernel_sendmsg+0x50/0x50 [ 203.695350][ T6519] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 203.701370][ T6519] ? find_held_lock+0x2d/0x110 [ 203.706173][ T6519] ___sys_sendmsg+0x135/0x1d0 [ 203.710879][ T6519] ? do_recvmmsg+0x740/0x740 [ 203.715511][ T6519] ? ksys_write+0x214/0x250 [ 203.720158][ T6519] ? __fget_light+0xe6/0x260 [ 203.724806][ T6519] __sys_sendmsg+0x117/0x1e0 [ 203.729513][ T6519] ? __sys_sendmsg_sock+0x30/0x30 [ 203.734584][ T6519] ? syscall_enter_from_user_mode+0x26/0x80 [ 203.740516][ T6519] do_syscall_64+0x38/0xb0 [ 203.744977][ T6519] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 203.750914][ T6519] RIP: 0033:0x7f925d27cae9 [ 203.755356][ T6519] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 203.774992][ T6519] RSP: 002b:00007f925e09c0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 203.783455][ T6519] RAX: ffffffffffffffda RBX: 00007f925d39bf80 RCX: 00007f925d27cae9 [ 203.791473][ T6519] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 203.799472][ T6519] RBP: 00007f925e09c120 R08: 0000000000000000 R09: 0000000000000000 [ 203.807464][ T6519] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 203.815454][ T6519] R13: 000000000000000b R14: 00007f925d39bf80 R15: 00007ffc15930878 [ 203.823467][ T6519] 16:41:17 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:17 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {0x300000000000000}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a110300013425", 0x2b}], 0x1) 16:41:17 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x9, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:17 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 16:41:17 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) (fail_nth: 9) [ 204.256161][ T6527] FAULT_INJECTION: forcing a failure. [ 204.256161][ T6527] name failslab, interval 1, probability 0, space 0, times 0 16:41:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411", 0x32}], 0x1) 16:41:17 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x0, 0x0, 0x0, {{@in=@broadcast, @in6=@remote, 0x3}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:17 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xa, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:17 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {0x0, 0x3}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 204.356939][ T6527] CPU: 1 PID: 6527 Comm: syz-executor.3 Not tainted 6.5.0-rc6-syzkaller-01712-g23c167af2404 #0 [ 204.367529][ T6527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 204.377643][ T6527] Call Trace: [ 204.380964][ T6527] [ 204.383939][ T6527] dump_stack_lvl+0x125/0x1b0 [ 204.388801][ T6527] should_fail_ex+0x496/0x5b0 [ 204.393563][ T6527] should_failslab+0x9/0x20 [ 204.398142][ T6527] __kmem_cache_alloc_node+0x2fd/0x350 [ 204.403686][ T6527] ? crypto_alloc_tfmmem.isra.0+0x35/0x100 [ 204.409569][ T6527] ? crypto_init_queue+0x100/0x100 [ 204.414921][ T6527] ? crypto_alloc_tfmmem.isra.0+0x35/0x100 [ 204.420782][ T6527] __kmalloc_node+0x4f/0x100 [ 204.425423][ T6527] ? crypto_init_queue+0x100/0x100 [ 204.430565][ T6527] crypto_alloc_tfmmem.isra.0+0x35/0x100 [ 204.436228][ T6527] crypto_create_tfm_node+0x83/0x310 [ 204.441545][ T6527] crypto_alloc_tfm_node+0x102/0x260 [ 204.448531][ T6527] esp_init_authenc.constprop.0+0x1de/0xb50 [ 204.454491][ T6527] ? esp6_destroy+0x60/0x60 [ 204.459058][ T6527] ? reacquire_held_locks+0x4b0/0x4b0 [ 204.464512][ T6527] esp6_init_state+0x3fb/0x520 [ 204.469376][ T6527] __xfrm_init_state+0xb87/0x1910 [ 204.474471][ T6527] xfrm_add_sa+0x1f64/0x42f0 [ 204.479156][ T6527] ? xfrm_state_netlink+0x150/0x150 [ 204.484442][ T6527] ? __nla_parse+0x40/0x50 [ 204.488918][ T6527] ? xfrm_state_netlink+0x150/0x150 [ 204.494170][ T6527] xfrm_user_rcv_msg+0x55c/0xa60 [ 204.499163][ T6527] ? xfrm_user_net_init+0x160/0x160 [ 204.504449][ T6527] ? preempt_count_sub+0x150/0x150 [ 204.509616][ T6527] netlink_rcv_skb+0x16b/0x440 [ 204.514417][ T6527] ? xfrm_user_net_init+0x160/0x160 [ 204.519668][ T6527] ? netlink_ack+0x1370/0x1370 [ 204.524477][ T6527] ? reacquire_held_locks+0x4b0/0x4b0 [ 204.529901][ T6527] xfrm_netlink_rcv+0x6c/0x90 [ 204.534615][ T6527] netlink_unicast+0x536/0x810 [ 204.539418][ T6527] ? netlink_attachskb+0x870/0x870 [ 204.544558][ T6527] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 204.550500][ T6527] ? __phys_addr_symbol+0x30/0x70 [ 204.555560][ T6527] ? __check_object_size+0x323/0x740 [ 204.560883][ T6527] netlink_sendmsg+0x93c/0xe40 [ 204.565688][ T6527] ? netlink_unicast+0x810/0x810 [ 204.570664][ T6527] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 204.575988][ T6527] ? netlink_unicast+0x810/0x810 [ 204.580957][ T6527] sock_sendmsg+0xd9/0x180 [ 204.585417][ T6527] ____sys_sendmsg+0x6ac/0x940 [ 204.590241][ T6527] ? copy_msghdr_from_user+0x10b/0x160 [ 204.595734][ T6527] ? kernel_sendmsg+0x50/0x50 [ 204.600464][ T6527] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 204.606680][ T6527] ? find_held_lock+0x2d/0x110 [ 204.611483][ T6527] ___sys_sendmsg+0x135/0x1d0 [ 204.616200][ T6527] ? do_recvmmsg+0x740/0x740 [ 204.620834][ T6527] ? ksys_write+0x214/0x250 [ 204.625404][ T6527] ? __fget_light+0xe6/0x260 [ 204.630042][ T6527] __sys_sendmsg+0x117/0x1e0 [ 204.634664][ T6527] ? __sys_sendmsg_sock+0x30/0x30 [ 204.639738][ T6527] ? syscall_enter_from_user_mode+0x26/0x80 [ 204.645693][ T6527] do_syscall_64+0x38/0xb0 [ 204.650157][ T6527] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 204.656096][ T6527] RIP: 0033:0x7f925d27cae9 [ 204.660545][ T6527] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 204.680187][ T6527] RSP: 002b:00007f925e09c0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 204.688631][ T6527] RAX: ffffffffffffffda RBX: 00007f925d39bf80 RCX: 00007f925d27cae9 [ 204.696630][ T6527] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 204.704646][ T6527] RBP: 00007f925e09c120 R08: 0000000000000000 R09: 0000000000000000 [ 204.712643][ T6527] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 204.720723][ T6527] R13: 000000000000000b R14: 00007f925d39bf80 R15: 00007ffc15930878 [ 204.728743][ T6527] 16:41:18 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xb, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:18 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {0x0, 0x300}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:18 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411", 0x32}], 0x1) 16:41:18 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x0, 0x0, 0x0, {{@in=@broadcast, @in6=@remote, 0x3}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:18 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {0x0, 0x3000000}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:18 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xe, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:18 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) (fail_nth: 10) 16:41:19 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {0x0, 0x300000000000000}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 205.521379][ T6555] FAULT_INJECTION: forcing a failure. [ 205.521379][ T6555] name failslab, interval 1, probability 0, space 0, times 0 [ 205.561261][ T6555] CPU: 0 PID: 6555 Comm: syz-executor.3 Not tainted 6.5.0-rc6-syzkaller-01712-g23c167af2404 #0 [ 205.571693][ T6555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 205.581808][ T6555] Call Trace: [ 205.585125][ T6555] [ 205.588098][ T6555] dump_stack_lvl+0x125/0x1b0 [ 205.592867][ T6555] should_fail_ex+0x496/0x5b0 [ 205.597613][ T6555] should_failslab+0x9/0x20 [ 205.602180][ T6555] __kmem_cache_alloc_node+0x2fd/0x350 [ 205.607806][ T6555] ? crypto_alloc_tfmmem.isra.0+0x35/0x100 [ 205.613686][ T6555] ? crypto_init_queue+0x100/0x100 [ 205.618874][ T6555] ? crypto_alloc_tfmmem.isra.0+0x35/0x100 [ 205.624750][ T6555] __kmalloc_node+0x4f/0x100 [ 205.629421][ T6555] ? crypto_init_queue+0x100/0x100 [ 205.634679][ T6555] crypto_alloc_tfmmem.isra.0+0x35/0x100 [ 205.640373][ T6555] crypto_create_tfm_node+0x83/0x310 [ 205.645720][ T6555] crypto_spawn_tfm2+0x62/0xb0 [ 205.650544][ T6555] aead_init_geniv+0x1b5/0x330 [ 205.655373][ T6555] ? aead_geniv_free+0x30/0x30 [ 205.660199][ T6555] crypto_aead_init_tfm+0x149/0x1a0 [ 205.665460][ T6555] crypto_create_tfm_node+0xfd/0x310 [ 205.670816][ T6555] crypto_alloc_tfm_node+0x102/0x260 [ 205.676163][ T6555] esp_init_authenc.constprop.0+0x1de/0xb50 [ 205.682132][ T6555] ? esp6_destroy+0x60/0x60 [ 205.686718][ T6555] ? reacquire_held_locks+0x4b0/0x4b0 [ 205.692188][ T6555] esp6_init_state+0x3fb/0x520 [ 205.697035][ T6555] __xfrm_init_state+0xb87/0x1910 [ 205.702151][ T6555] xfrm_add_sa+0x1f64/0x42f0 [ 205.706914][ T6555] ? xfrm_state_netlink+0x150/0x150 [ 205.712214][ T6555] ? __nla_parse+0x40/0x50 [ 205.716708][ T6555] ? xfrm_state_netlink+0x150/0x150 [ 205.721991][ T6555] xfrm_user_rcv_msg+0x55c/0xa60 [ 205.727013][ T6555] ? xfrm_user_net_init+0x160/0x160 [ 205.732353][ T6555] ? preempt_count_sub+0x150/0x150 [ 205.737557][ T6555] netlink_rcv_skb+0x16b/0x440 [ 205.742475][ T6555] ? xfrm_user_net_init+0x160/0x160 [ 205.747749][ T6555] ? netlink_ack+0x1370/0x1370 [ 205.752600][ T6555] ? reacquire_held_locks+0x4b0/0x4b0 [ 205.758060][ T6555] xfrm_netlink_rcv+0x6c/0x90 [ 205.762808][ T6555] netlink_unicast+0x536/0x810 [ 205.767638][ T6555] ? netlink_attachskb+0x870/0x870 [ 205.772809][ T6555] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 205.778775][ T6555] ? __phys_addr_symbol+0x30/0x70 [ 205.783867][ T6555] ? __check_object_size+0x323/0x740 [ 205.789222][ T6555] netlink_sendmsg+0x93c/0xe40 [ 205.794050][ T6555] ? netlink_unicast+0x810/0x810 [ 205.799047][ T6555] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 205.804399][ T6555] ? netlink_unicast+0x810/0x810 [ 205.809394][ T6555] sock_sendmsg+0xd9/0x180 [ 205.813882][ T6555] ____sys_sendmsg+0x6ac/0x940 [ 205.818711][ T6555] ? copy_msghdr_from_user+0x10b/0x160 [ 205.824249][ T6555] ? kernel_sendmsg+0x50/0x50 [ 205.829004][ T6555] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 205.835058][ T6555] ? find_held_lock+0x2d/0x110 [ 205.839895][ T6555] ___sys_sendmsg+0x135/0x1d0 [ 205.844652][ T6555] ? do_recvmmsg+0x740/0x740 [ 205.849320][ T6555] ? ksys_write+0x214/0x250 [ 205.853919][ T6555] ? __fget_light+0xe6/0x260 [ 205.858595][ T6555] __sys_sendmsg+0x117/0x1e0 [ 205.863238][ T6555] ? __sys_sendmsg_sock+0x30/0x30 [ 205.868342][ T6555] ? syscall_enter_from_user_mode+0x26/0x80 [ 205.874305][ T6555] do_syscall_64+0x38/0xb0 [ 205.878801][ T6555] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 205.884765][ T6555] RIP: 0033:0x7f925d27cae9 [ 205.889231][ T6555] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 205.908900][ T6555] RSP: 002b:00007f925e09c0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 16:41:19 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x0, 0x0, 0x0, {{@in=@broadcast, @in6=@remote, 0x3}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:19 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xf, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411", 0x32}], 0x1) [ 205.917387][ T6555] RAX: ffffffffffffffda RBX: 00007f925d39bf80 RCX: 00007f925d27cae9 [ 205.925409][ T6555] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 205.933430][ T6555] RBP: 00007f925e09c120 R08: 0000000000000000 R09: 0000000000000000 [ 205.941458][ T6555] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 205.949491][ T6555] R13: 000000000000000b R14: 00007f925d39bf80 R15: 00007ffc15930878 [ 205.957533][ T6555] 16:41:19 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) (fail_nth: 11) 16:41:19 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {0x0, 0x0, 0x3}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 206.328172][ T6570] FAULT_INJECTION: forcing a failure. [ 206.328172][ T6570] name failslab, interval 1, probability 0, space 0, times 0 [ 206.375270][ T6570] CPU: 1 PID: 6570 Comm: syz-executor.3 Not tainted 6.5.0-rc6-syzkaller-01712-g23c167af2404 #0 [ 206.386228][ T6570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 206.396361][ T6570] Call Trace: [ 206.399681][ T6570] [ 206.402656][ T6570] dump_stack_lvl+0x125/0x1b0 [ 206.407664][ T6570] should_fail_ex+0x496/0x5b0 [ 206.412445][ T6570] should_failslab+0x9/0x20 [ 206.417026][ T6570] __kmem_cache_alloc_node+0x2fd/0x350 [ 206.422564][ T6570] ? crypto_alloc_tfmmem.isra.0+0x35/0x100 [ 206.428434][ T6570] ? crypto_init_queue+0x100/0x100 [ 206.433615][ T6570] ? crypto_alloc_tfmmem.isra.0+0x35/0x100 [ 206.439493][ T6570] __kmalloc_node+0x4f/0x100 [ 206.444175][ T6570] ? crypto_init_queue+0x100/0x100 [ 206.449351][ T6570] crypto_alloc_tfmmem.isra.0+0x35/0x100 [ 206.455052][ T6570] crypto_create_tfm_node+0x83/0x310 [ 206.460396][ T6570] crypto_spawn_tfm2+0x62/0xb0 [ 206.465221][ T6570] aead_init_geniv+0x1b5/0x330 [ 206.470050][ T6570] ? aead_geniv_free+0x30/0x30 [ 206.474878][ T6570] crypto_aead_init_tfm+0x149/0x1a0 [ 206.480150][ T6570] crypto_create_tfm_node+0xfd/0x310 [ 206.485493][ T6570] crypto_alloc_tfm_node+0x102/0x260 [ 206.490840][ T6570] esp_init_authenc.constprop.0+0x1de/0xb50 [ 206.496810][ T6570] ? esp6_destroy+0x60/0x60 [ 206.501394][ T6570] ? reacquire_held_locks+0x4b0/0x4b0 [ 206.506844][ T6570] esp6_init_state+0x3fb/0x520 [ 206.511682][ T6570] __xfrm_init_state+0xb87/0x1910 [ 206.516791][ T6570] xfrm_add_sa+0x1f64/0x42f0 [ 206.521476][ T6570] ? xfrm_state_netlink+0x150/0x150 [ 206.526757][ T6570] ? __nla_parse+0x40/0x50 [ 206.531272][ T6570] ? xfrm_state_netlink+0x150/0x150 [ 206.536558][ T6570] xfrm_user_rcv_msg+0x55c/0xa60 [ 206.541605][ T6570] ? xfrm_user_net_init+0x160/0x160 [ 206.546957][ T6570] ? preempt_count_sub+0x150/0x150 [ 206.552176][ T6570] netlink_rcv_skb+0x16b/0x440 [ 206.557027][ T6570] ? xfrm_user_net_init+0x160/0x160 [ 206.562315][ T6570] ? netlink_ack+0x1370/0x1370 [ 206.567179][ T6570] ? reacquire_held_locks+0x4b0/0x4b0 [ 206.572646][ T6570] xfrm_netlink_rcv+0x6c/0x90 [ 206.577387][ T6570] netlink_unicast+0x536/0x810 [ 206.582224][ T6570] ? netlink_attachskb+0x870/0x870 [ 206.587398][ T6570] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 206.593379][ T6570] ? __phys_addr_symbol+0x30/0x70 [ 206.598468][ T6570] ? __check_object_size+0x323/0x740 [ 206.603819][ T6570] netlink_sendmsg+0x93c/0xe40 [ 206.608648][ T6570] ? netlink_unicast+0x810/0x810 [ 206.613651][ T6570] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 206.620227][ T6570] ? netlink_unicast+0x810/0x810 [ 206.625232][ T6570] sock_sendmsg+0xd9/0x180 [ 206.629897][ T6570] ____sys_sendmsg+0x6ac/0x940 [ 206.634753][ T6570] ? copy_msghdr_from_user+0x10b/0x160 [ 206.640254][ T6570] ? kernel_sendmsg+0x50/0x50 [ 206.645084][ T6570] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 206.651210][ T6570] ___sys_sendmsg+0x135/0x1d0 [ 206.655925][ T6570] ? do_recvmmsg+0x740/0x740 [ 206.660580][ T6570] ? __fget_light+0xe6/0x260 [ 206.665223][ T6570] __sys_sendmsg+0x117/0x1e0 [ 206.669846][ T6570] ? __sys_sendmsg_sock+0x30/0x30 [ 206.674899][ T6570] ? xfd_validate_state+0x5d/0x180 [ 206.680072][ T6570] ? syscall_enter_from_user_mode+0x26/0x80 [ 206.686010][ T6570] do_syscall_64+0x38/0xb0 [ 206.690469][ T6570] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 206.696407][ T6570] RIP: 0033:0x7f925d27cae9 [ 206.700848][ T6570] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 16:41:20 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44d", 0x36}], 0x1) 16:41:20 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:20 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x10, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:20 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {0x0, 0x0, 0x300}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 206.720493][ T6570] RSP: 002b:00007f925e09c0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 206.728935][ T6570] RAX: ffffffffffffffda RBX: 00007f925d39bf80 RCX: 00007f925d27cae9 [ 206.736931][ T6570] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 206.744953][ T6570] RBP: 00007f925e09c120 R08: 0000000000000000 R09: 0000000000000000 [ 206.752952][ T6570] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 206.760944][ T6570] R13: 000000000000000b R14: 00007f925d39bf80 R15: 00007ffc15930878 [ 206.768957][ T6570] 16:41:20 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) (fail_nth: 12) 16:41:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44d", 0x36}], 0x1) 16:41:20 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:20 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x11, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:20 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {0x0, 0x0, 0x3000000}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 206.957991][ T6583] FAULT_INJECTION: forcing a failure. [ 206.957991][ T6583] name failslab, interval 1, probability 0, space 0, times 0 [ 207.044340][ T6583] CPU: 1 PID: 6583 Comm: syz-executor.3 Not tainted 6.5.0-rc6-syzkaller-01712-g23c167af2404 #0 [ 207.054855][ T6583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 207.064966][ T6583] Call Trace: [ 207.068292][ T6583] [ 207.071276][ T6583] dump_stack_lvl+0x125/0x1b0 [ 207.076042][ T6583] should_fail_ex+0x496/0x5b0 [ 207.080818][ T6583] should_failslab+0x9/0x20 [ 207.085403][ T6583] __kmem_cache_alloc_node+0x2fd/0x350 [ 207.090937][ T6583] ? crypto_alloc_tfmmem.isra.0+0x35/0x100 [ 207.096825][ T6583] ? crypto_ahash_show+0x120/0x120 [ 207.102013][ T6583] ? crypto_alloc_tfmmem.isra.0+0x35/0x100 [ 207.107888][ T6583] __kmalloc_node+0x4f/0x100 [ 207.112567][ T6583] ? crypto_ahash_show+0x120/0x120 [ 207.117753][ T6583] crypto_alloc_tfmmem.isra.0+0x35/0x100 [ 207.123454][ T6583] crypto_create_tfm_node+0x83/0x310 [ 207.128814][ T6583] crypto_spawn_tfm2+0x62/0xb0 [ 207.133682][ T6583] ? crypto_authenc_esn_exit_tfm+0x80/0x80 [ 207.139575][ T6583] crypto_authenc_esn_init_tfm+0x44/0x330 [ 207.145377][ T6583] ? crypto_authenc_esn_exit_tfm+0x80/0x80 [ 207.151283][ T6583] crypto_aead_init_tfm+0x149/0x1a0 [ 207.156555][ T6583] crypto_create_tfm_node+0xfd/0x310 [ 207.161902][ T6583] crypto_spawn_tfm2+0x62/0xb0 [ 207.166722][ T6583] aead_init_geniv+0x1b5/0x330 [ 207.171526][ T6583] ? aead_geniv_free+0x30/0x30 [ 207.176342][ T6583] crypto_aead_init_tfm+0x149/0x1a0 [ 207.181589][ T6583] crypto_create_tfm_node+0xfd/0x310 [ 207.186911][ T6583] crypto_alloc_tfm_node+0x102/0x260 [ 207.192235][ T6583] esp_init_authenc.constprop.0+0x1de/0xb50 [ 207.198192][ T6583] ? esp6_destroy+0x60/0x60 [ 207.202744][ T6583] ? reacquire_held_locks+0x4b0/0x4b0 [ 207.208176][ T6583] esp6_init_state+0x3fb/0x520 [ 207.212994][ T6583] __xfrm_init_state+0xb87/0x1910 [ 207.218072][ T6583] xfrm_add_sa+0x1f64/0x42f0 [ 207.222710][ T6583] ? xfrm_state_netlink+0x150/0x150 [ 207.227951][ T6583] ? __nla_parse+0x40/0x50 [ 207.232412][ T6583] ? xfrm_state_netlink+0x150/0x150 [ 207.237651][ T6583] xfrm_user_rcv_msg+0x55c/0xa60 [ 207.242644][ T6583] ? xfrm_user_net_init+0x160/0x160 [ 207.247930][ T6583] ? preempt_count_sub+0x150/0x150 [ 207.253092][ T6583] netlink_rcv_skb+0x16b/0x440 [ 207.257894][ T6583] ? xfrm_user_net_init+0x160/0x160 [ 207.263142][ T6583] ? netlink_ack+0x1370/0x1370 [ 207.267964][ T6583] ? reacquire_held_locks+0x4b0/0x4b0 [ 207.273389][ T6583] xfrm_netlink_rcv+0x6c/0x90 [ 207.278103][ T6583] netlink_unicast+0x536/0x810 [ 207.283257][ T6583] ? netlink_attachskb+0x870/0x870 [ 207.288394][ T6583] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 207.294334][ T6583] ? __phys_addr_symbol+0x30/0x70 [ 207.299390][ T6583] ? __check_object_size+0x323/0x740 [ 207.304712][ T6583] netlink_sendmsg+0x93c/0xe40 [ 207.309524][ T6583] ? netlink_unicast+0x810/0x810 [ 207.314600][ T6583] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 207.319924][ T6583] ? netlink_unicast+0x810/0x810 [ 207.324892][ T6583] sock_sendmsg+0xd9/0x180 [ 207.329357][ T6583] ____sys_sendmsg+0x6ac/0x940 [ 207.334172][ T6583] ? copy_msghdr_from_user+0x10b/0x160 [ 207.339689][ T6583] ? kernel_sendmsg+0x50/0x50 [ 207.344435][ T6583] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 207.350458][ T6583] ? find_held_lock+0x2d/0x110 [ 207.355268][ T6583] ___sys_sendmsg+0x135/0x1d0 [ 207.359982][ T6583] ? do_recvmmsg+0x740/0x740 [ 207.364620][ T6583] ? ksys_write+0x214/0x250 [ 207.369205][ T6583] ? __fget_light+0xe6/0x260 [ 207.373856][ T6583] __sys_sendmsg+0x117/0x1e0 [ 207.378502][ T6583] ? __sys_sendmsg_sock+0x30/0x30 [ 207.383582][ T6583] ? syscall_enter_from_user_mode+0x26/0x80 [ 207.389527][ T6583] do_syscall_64+0x38/0xb0 [ 207.394015][ T6583] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 207.399951][ T6583] RIP: 0033:0x7f925d27cae9 [ 207.404389][ T6583] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 207.424107][ T6583] RSP: 002b:00007f925e09c0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 207.432551][ T6583] RAX: ffffffffffffffda RBX: 00007f925d39bf80 RCX: 00007f925d27cae9 16:41:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44d", 0x36}], 0x1) 16:41:20 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 207.440544][ T6583] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 207.448535][ T6583] RBP: 00007f925e09c120 R08: 0000000000000000 R09: 0000000000000000 [ 207.456549][ T6583] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 207.464548][ T6583] R13: 000000000000000b R14: 00007f925d39bf80 R15: 00007ffc15930878 [ 207.472560][ T6583] 16:41:21 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:21 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x13, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f", 0x38}], 0x1) 16:41:21 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {0x0, 0x0, 0x300000000000000}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:21 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:21 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) (fail_nth: 13) 16:41:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f", 0x38}], 0x1) 16:41:21 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:21 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x60, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:21 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {0x0, 0x0, 0x0, 0x3}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f", 0x38}], 0x1) 16:41:21 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:21 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xc9, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:21 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {0x0, 0x0, 0x300}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:21 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {0x0, 0x0, 0x0, 0x300}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:21 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x10, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) [ 208.601040][ T6628] FAULT_INJECTION: forcing a failure. [ 208.601040][ T6628] name failslab, interval 1, probability 0, space 0, times 0 [ 208.631404][ T6628] CPU: 0 PID: 6628 Comm: syz-executor.3 Not tainted 6.5.0-rc6-syzkaller-01712-g23c167af2404 #0 [ 208.641829][ T6628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 208.651944][ T6628] Call Trace: [ 208.655274][ T6628] [ 208.658309][ T6628] dump_stack_lvl+0x125/0x1b0 [ 208.663115][ T6628] should_fail_ex+0x496/0x5b0 [ 208.667887][ T6628] should_failslab+0x9/0x20 [ 208.672469][ T6628] __kmem_cache_alloc_node+0x2fd/0x350 [ 208.678001][ T6628] ? crypto_alloc_tfmmem.isra.0+0x35/0x100 [ 208.683968][ T6628] ? crypto_init_queue+0x100/0x100 [ 208.689140][ T6628] ? crypto_alloc_tfmmem.isra.0+0x35/0x100 [ 208.695013][ T6628] __kmalloc_node+0x4f/0x100 [ 208.699686][ T6628] ? crypto_init_queue+0x100/0x100 [ 208.704861][ T6628] crypto_alloc_tfmmem.isra.0+0x35/0x100 [ 208.710556][ T6628] crypto_create_tfm_node+0x83/0x310 [ 208.715902][ T6628] crypto_init_shash_ops_async+0x5d/0x3c0 [ 208.721711][ T6628] crypto_ahash_init_tfm+0x452/0x560 [ 208.727093][ T6628] crypto_create_tfm_node+0xfd/0x310 [ 208.732448][ T6628] crypto_spawn_tfm2+0x62/0xb0 [ 208.737276][ T6628] ? crypto_authenc_esn_exit_tfm+0x80/0x80 [ 208.743159][ T6628] crypto_authenc_esn_init_tfm+0x44/0x330 [ 208.748947][ T6628] ? crypto_authenc_esn_exit_tfm+0x80/0x80 [ 208.754829][ T6628] crypto_aead_init_tfm+0x149/0x1a0 [ 208.760106][ T6628] crypto_create_tfm_node+0xfd/0x310 [ 208.765457][ T6628] crypto_spawn_tfm2+0x62/0xb0 [ 208.770278][ T6628] aead_init_geniv+0x1b5/0x330 [ 208.775111][ T6628] ? aead_geniv_free+0x30/0x30 [ 208.779937][ T6628] crypto_aead_init_tfm+0x149/0x1a0 [ 208.785212][ T6628] crypto_create_tfm_node+0xfd/0x310 [ 208.790559][ T6628] crypto_alloc_tfm_node+0x102/0x260 [ 208.795905][ T6628] esp_init_authenc.constprop.0+0x1de/0xb50 [ 208.801878][ T6628] ? esp6_destroy+0x60/0x60 [ 208.806467][ T6628] ? reacquire_held_locks+0x4b0/0x4b0 [ 208.811915][ T6628] esp6_init_state+0x3fb/0x520 [ 208.816744][ T6628] __xfrm_init_state+0xb87/0x1910 [ 208.821840][ T6628] xfrm_add_sa+0x1f64/0x42f0 [ 208.826516][ T6628] ? xfrm_state_netlink+0x150/0x150 [ 208.832091][ T6628] ? __nla_parse+0x40/0x50 [ 208.836595][ T6628] ? xfrm_state_netlink+0x150/0x150 [ 208.841864][ T6628] xfrm_user_rcv_msg+0x55c/0xa60 [ 208.846889][ T6628] ? xfrm_user_net_init+0x160/0x160 [ 208.852226][ T6628] ? preempt_count_sub+0x150/0x150 [ 208.857423][ T6628] netlink_rcv_skb+0x16b/0x440 [ 208.862250][ T6628] ? xfrm_user_net_init+0x160/0x160 [ 208.867550][ T6628] ? netlink_ack+0x1370/0x1370 [ 208.872393][ T6628] ? reacquire_held_locks+0x4b0/0x4b0 [ 208.877851][ T6628] xfrm_netlink_rcv+0x6c/0x90 [ 208.882598][ T6628] netlink_unicast+0x536/0x810 [ 208.887430][ T6628] ? netlink_attachskb+0x870/0x870 [ 208.892594][ T6628] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 208.898560][ T6628] ? __phys_addr_symbol+0x30/0x70 [ 208.903655][ T6628] ? __check_object_size+0x323/0x740 [ 208.909004][ T6628] netlink_sendmsg+0x93c/0xe40 [ 208.913842][ T6628] ? netlink_unicast+0x810/0x810 [ 208.918849][ T6628] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 208.924210][ T6628] ? netlink_unicast+0x810/0x810 [ 208.929223][ T6628] sock_sendmsg+0xd9/0x180 [ 208.933728][ T6628] ____sys_sendmsg+0x6ac/0x940 [ 208.938574][ T6628] ? copy_msghdr_from_user+0x10b/0x160 [ 208.944100][ T6628] ? kernel_sendmsg+0x50/0x50 [ 208.948857][ T6628] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 208.954922][ T6628] ? find_held_lock+0x2d/0x110 [ 208.959769][ T6628] ___sys_sendmsg+0x135/0x1d0 [ 208.964523][ T6628] ? do_recvmmsg+0x740/0x740 [ 208.969194][ T6628] ? ksys_write+0x214/0x250 [ 208.973793][ T6628] ? __fget_light+0xe6/0x260 [ 208.978465][ T6628] __sys_sendmsg+0x117/0x1e0 [ 208.983123][ T6628] ? __sys_sendmsg_sock+0x30/0x30 [ 208.988230][ T6628] ? syscall_enter_from_user_mode+0x26/0x80 [ 208.994194][ T6628] do_syscall_64+0x38/0xb0 [ 208.998691][ T6628] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 209.004664][ T6628] RIP: 0033:0x7f925d27cae9 [ 209.009128][ T6628] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 209.028794][ T6628] RSP: 002b:00007f925e09c0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 209.037280][ T6628] RAX: ffffffffffffffda RBX: 00007f925d39bf80 RCX: 00007f925d27cae9 [ 209.045308][ T6628] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 16:41:22 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:22 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) (fail_nth: 14) 16:41:22 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:22 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {0x0, 0x0, 0x0, 0x3000000}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:22 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xf0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:22 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {0x0, 0x0, 0x0, 0x300}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 209.053340][ T6628] RBP: 00007f925e09c120 R08: 0000000000000000 R09: 0000000000000000 [ 209.061368][ T6628] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 209.069397][ T6628] R13: 000000000000000b R14: 00007f925d39bf80 R15: 00007ffc15930878 [ 209.077454][ T6628] 16:41:22 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x180, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:22 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {0x0, 0x0, 0x0, 0x300000000000000}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:22 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:22 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xe, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) [ 209.205727][ T6641] FAULT_INJECTION: forcing a failure. [ 209.205727][ T6641] name failslab, interval 1, probability 0, space 0, times 0 [ 209.254126][ T6641] CPU: 0 PID: 6641 Comm: syz-executor.3 Not tainted 6.5.0-rc6-syzkaller-01712-g23c167af2404 #0 [ 209.264546][ T6641] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 209.274660][ T6641] Call Trace: [ 209.277975][ T6641] [ 209.280936][ T6641] dump_stack_lvl+0x125/0x1b0 [ 209.285702][ T6641] should_fail_ex+0x496/0x5b0 [ 209.290495][ T6641] should_failslab+0x9/0x20 [ 209.295084][ T6641] __kmem_cache_alloc_node+0x2fd/0x350 [ 209.300628][ T6641] ? crypto_alloc_tfmmem.isra.0+0x35/0x100 [ 209.306500][ T6641] ? crypto_init_queue+0x100/0x100 [ 209.311685][ T6641] ? crypto_alloc_tfmmem.isra.0+0x35/0x100 [ 209.317555][ T6641] __kmalloc_node+0x4f/0x100 [ 209.322240][ T6641] ? crypto_init_queue+0x100/0x100 [ 209.327425][ T6641] crypto_alloc_tfmmem.isra.0+0x35/0x100 [ 209.333131][ T6641] crypto_create_tfm_node+0x83/0x310 [ 209.338494][ T6641] crypto_init_shash_ops_async+0x5d/0x3c0 [ 209.344313][ T6641] crypto_ahash_init_tfm+0x452/0x560 [ 209.349689][ T6641] crypto_create_tfm_node+0xfd/0x310 [ 209.355058][ T6641] crypto_spawn_tfm2+0x62/0xb0 [ 209.359905][ T6641] ? crypto_authenc_esn_exit_tfm+0x80/0x80 [ 209.365797][ T6641] crypto_authenc_esn_init_tfm+0x44/0x330 [ 209.371696][ T6641] ? crypto_authenc_esn_exit_tfm+0x80/0x80 [ 209.377601][ T6641] crypto_aead_init_tfm+0x149/0x1a0 [ 209.382876][ T6641] crypto_create_tfm_node+0xfd/0x310 [ 209.388235][ T6641] crypto_spawn_tfm2+0x62/0xb0 [ 209.393073][ T6641] aead_init_geniv+0x1b5/0x330 [ 209.397908][ T6641] ? aead_geniv_free+0x30/0x30 [ 209.402748][ T6641] crypto_aead_init_tfm+0x149/0x1a0 [ 209.408025][ T6641] crypto_create_tfm_node+0xfd/0x310 [ 209.413387][ T6641] crypto_alloc_tfm_node+0x102/0x260 [ 209.418748][ T6641] esp_init_authenc.constprop.0+0x1de/0xb50 [ 209.424733][ T6641] ? esp6_destroy+0x60/0x60 [ 209.429339][ T6641] ? reacquire_held_locks+0x4b0/0x4b0 [ 209.434806][ T6641] esp6_init_state+0x3fb/0x520 [ 209.439656][ T6641] __xfrm_init_state+0xb87/0x1910 [ 209.444765][ T6641] xfrm_add_sa+0x1f64/0x42f0 [ 209.449454][ T6641] ? xfrm_state_netlink+0x150/0x150 16:41:22 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {0x0, 0x3000000}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 209.454750][ T6641] ? __nla_parse+0x40/0x50 [ 209.459249][ T6641] ? xfrm_state_netlink+0x150/0x150 [ 209.464528][ T6641] xfrm_user_rcv_msg+0x55c/0xa60 [ 209.469552][ T6641] ? xfrm_user_net_init+0x160/0x160 [ 209.474882][ T6641] ? preempt_count_sub+0x150/0x150 [ 209.480079][ T6641] netlink_rcv_skb+0x16b/0x440 [ 209.484927][ T6641] ? xfrm_user_net_init+0x160/0x160 [ 209.490305][ T6641] ? netlink_ack+0x1370/0x1370 [ 209.495167][ T6641] ? reacquire_held_locks+0x4b0/0x4b0 [ 209.500643][ T6641] xfrm_netlink_rcv+0x6c/0x90 [ 209.505391][ T6641] netlink_unicast+0x536/0x810 [ 209.510228][ T6641] ? netlink_attachskb+0x870/0x870 [ 209.515398][ T6641] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 209.521369][ T6641] ? __phys_addr_symbol+0x30/0x70 [ 209.526458][ T6641] ? __check_object_size+0x323/0x740 [ 209.531824][ T6641] netlink_sendmsg+0x93c/0xe40 [ 209.536661][ T6641] ? netlink_unicast+0x810/0x810 [ 209.541759][ T6641] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 209.547120][ T6641] ? netlink_unicast+0x810/0x810 [ 209.552122][ T6641] sock_sendmsg+0xd9/0x180 [ 209.556645][ T6641] ____sys_sendmsg+0x6ac/0x940 [ 209.561531][ T6641] ? copy_msghdr_from_user+0x10b/0x160 [ 209.567051][ T6641] ? kernel_sendmsg+0x50/0x50 [ 209.571808][ T6641] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 209.577866][ T6641] ? find_held_lock+0x2d/0x110 [ 209.582712][ T6641] ___sys_sendmsg+0x135/0x1d0 [ 209.587459][ T6641] ? do_recvmmsg+0x740/0x740 [ 209.592229][ T6641] ? ksys_write+0x214/0x250 [ 209.596824][ T6641] ? __fget_light+0xe6/0x260 16:41:23 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 209.601503][ T6641] __sys_sendmsg+0x117/0x1e0 [ 209.606163][ T6641] ? __sys_sendmsg_sock+0x30/0x30 [ 209.611280][ T6641] ? syscall_enter_from_user_mode+0x26/0x80 [ 209.617257][ T6641] do_syscall_64+0x38/0xb0 [ 209.621788][ T6641] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 209.627904][ T6641] RIP: 0033:0x7f925d27cae9 [ 209.632471][ T6641] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 209.652230][ T6641] RSP: 002b:00007f925e09c0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 209.660715][ T6641] RAX: ffffffffffffffda RBX: 00007f925d39bf80 RCX: 00007f925d27cae9 [ 209.668759][ T6641] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 209.676789][ T6641] RBP: 00007f925e09c120 R08: 0000000000000000 R09: 0000000000000000 [ 209.684817][ T6641] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 209.692846][ T6641] R13: 000000000000000b R14: 00007f925d39bf80 R15: 00007ffc15930878 [ 209.700896][ T6641] 16:41:23 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:23 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x2, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:23 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {0x0, 0x0, 0x0, 0x0, 0x3}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:23 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x184, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:23 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:23 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) (fail_nth: 15) 16:41:23 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x198, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:23 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) 16:41:23 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x2, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:23 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {0x0, 0x0, 0x0, 0x0, 0x300}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:24 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {0x0, 0x0, 0x0, 0x0, 0x3000000}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) (fail_nth: 1) [ 210.684575][ T6678] FAULT_INJECTION: forcing a failure. [ 210.684575][ T6678] name failslab, interval 1, probability 0, space 0, times 0 [ 210.780726][ T6678] CPU: 1 PID: 6678 Comm: syz-executor.1 Not tainted 6.5.0-rc6-syzkaller-01712-g23c167af2404 #0 [ 210.791232][ T6678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 210.801342][ T6678] Call Trace: [ 210.804683][ T6678] [ 210.807667][ T6678] dump_stack_lvl+0x125/0x1b0 [ 210.812447][ T6678] should_fail_ex+0x496/0x5b0 [ 210.817211][ T6678] should_failslab+0x9/0x20 [ 210.821791][ T6678] kmem_cache_alloc_node+0x389/0x3f0 [ 210.827152][ T6678] ? __alloc_skb+0x287/0x330 [ 210.831922][ T6678] __alloc_skb+0x287/0x330 [ 210.836432][ T6678] ? __napi_build_skb+0x50/0x50 [ 210.841365][ T6678] ? __netlink_dump_start+0x9a0/0x9c0 [ 210.846811][ T6678] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 210.852895][ T6678] ? apparmor_socket_getpeersec_dgram+0x9/0x10 [ 210.859117][ T6678] netlink_sendmsg+0x9c6/0xe40 [ 210.863953][ T6678] ? netlink_unicast+0x810/0x810 [ 210.868976][ T6678] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 210.874331][ T6678] ? netlink_unicast+0x810/0x810 [ 210.879332][ T6678] sock_sendmsg+0xd9/0x180 [ 210.883919][ T6678] sock_write_iter+0x29b/0x3d0 [ 210.888759][ T6678] ? sock_sendmsg+0x180/0x180 [ 210.893521][ T6678] ? _parse_integer+0x30/0x30 [ 210.898268][ T6678] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 210.904320][ T6678] ? reacquire_held_locks+0x4b0/0x4b0 [ 210.909764][ T6678] do_iter_readv_writev+0x21e/0x3c0 [ 210.915050][ T6678] ? generic_copy_file_range+0x1d0/0x1d0 [ 210.920764][ T6678] ? bpf_lsm_file_permission+0x9/0x10 [ 210.926192][ T6678] ? security_file_permission+0x94/0x100 [ 210.931924][ T6678] do_iter_write+0x17f/0x830 [ 210.936607][ T6678] vfs_writev+0x221/0x700 [ 210.941034][ T6678] ? vfs_iter_write+0xb0/0xb0 [ 210.945802][ T6678] ? __fget_files+0x257/0x410 [ 210.950595][ T6678] ? do_writev+0x285/0x370 [ 210.955106][ T6678] do_writev+0x285/0x370 [ 210.959419][ T6678] ? vfs_writev+0x700/0x700 [ 210.964010][ T6678] ? syscall_enter_from_user_mode+0x26/0x80 [ 210.969990][ T6678] do_syscall_64+0x38/0xb0 [ 210.974482][ T6678] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 210.980453][ T6678] RIP: 0033:0x7f89f067cae9 [ 210.984915][ T6678] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 211.004576][ T6678] RSP: 002b:00007f89f13970c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 211.013053][ T6678] RAX: ffffffffffffffda RBX: 00007f89f079bf80 RCX: 00007f89f067cae9 [ 211.021078][ T6678] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000003 [ 211.029099][ T6678] RBP: 00007f89f1397120 R08: 0000000000000000 R09: 0000000000000000 [ 211.037130][ T6678] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 211.045152][ T6678] R13: 000000000000000b R14: 00007f89f079bf80 R15: 00007ffda4fe99e8 [ 211.053194][ T6678] 16:41:24 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x300, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:24 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:24 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:24 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) 16:41:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) (fail_nth: 2) 16:41:24 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {0x0, 0x0, 0x0, 0x0, 0x300000000000000}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:24 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x500, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) (fail_nth: 3) 16:41:24 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:24 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:24 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) 16:41:24 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x600, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:25 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 211.480117][ T6700] FAULT_INJECTION: forcing a failure. [ 211.480117][ T6700] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 211.548013][ T6700] CPU: 0 PID: 6700 Comm: syz-executor.1 Not tainted 6.5.0-rc6-syzkaller-01712-g23c167af2404 #0 [ 211.558447][ T6700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 211.568579][ T6700] Call Trace: [ 211.571897][ T6700] [ 211.574866][ T6700] dump_stack_lvl+0x125/0x1b0 [ 211.579628][ T6700] should_fail_ex+0x496/0x5b0 [ 211.584390][ T6700] copyin+0x1b/0xa0 [ 211.588261][ T6700] _copy_from_iter+0x1e5/0x11f0 [ 211.593177][ T6700] ? __build_skb_around+0x278/0x3b0 [ 211.598461][ T6700] ? hash_and_copy_to_iter+0x230/0x230 [ 211.604000][ T6700] ? __napi_build_skb+0x50/0x50 [ 211.608928][ T6700] ? __netlink_dump_start+0x9a0/0x9c0 [ 211.614525][ T6700] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 211.620507][ T6700] ? __virt_addr_valid+0x5e/0x2d0 [ 211.625576][ T6700] ? __phys_addr_symbol+0x30/0x70 [ 211.630647][ T6700] ? __check_object_size+0x323/0x740 [ 211.635972][ T6700] netlink_sendmsg+0x897/0xe40 [ 211.640783][ T6700] ? netlink_unicast+0x810/0x810 [ 211.645769][ T6700] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 211.651125][ T6700] ? netlink_unicast+0x810/0x810 [ 211.656119][ T6700] sock_sendmsg+0xd9/0x180 [ 211.660599][ T6700] sock_write_iter+0x29b/0x3d0 [ 211.665523][ T6700] ? sock_sendmsg+0x180/0x180 [ 211.670285][ T6700] ? _parse_integer+0x30/0x30 [ 211.675015][ T6700] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 211.681222][ T6700] ? reacquire_held_locks+0x4b0/0x4b0 [ 211.686648][ T6700] do_iter_readv_writev+0x21e/0x3c0 [ 211.691902][ T6700] ? generic_copy_file_range+0x1d0/0x1d0 [ 211.697608][ T6700] ? bpf_lsm_file_permission+0x9/0x10 [ 211.703127][ T6700] ? security_file_permission+0x94/0x100 [ 211.708832][ T6700] do_iter_write+0x17f/0x830 [ 211.713517][ T6700] vfs_writev+0x221/0x700 [ 211.717916][ T6700] ? vfs_iter_write+0xb0/0xb0 [ 211.722643][ T6700] ? __fget_files+0x257/0x410 [ 211.727484][ T6700] ? do_writev+0x285/0x370 [ 211.731971][ T6700] do_writev+0x285/0x370 [ 211.736258][ T6700] ? vfs_writev+0x700/0x700 [ 211.740894][ T6700] ? syscall_enter_from_user_mode+0x26/0x80 [ 211.746834][ T6700] do_syscall_64+0x38/0xb0 [ 211.751296][ T6700] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 211.757256][ T6700] RIP: 0033:0x7f89f067cae9 [ 211.761696][ T6700] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 211.781333][ T6700] RSP: 002b:00007f89f13970c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 211.789782][ T6700] RAX: ffffffffffffffda RBX: 00007f89f079bf80 RCX: 00007f89f067cae9 [ 211.797792][ T6700] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000003 [ 211.805790][ T6700] RBP: 00007f89f1397120 R08: 0000000000000000 R09: 0000000000000000 [ 211.813795][ T6700] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 211.821786][ T6700] R13: 000000000000000b R14: 00007f89f079bf80 R15: 00007ffda4fe99e8 [ 211.829811][ T6700] 16:41:25 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:25 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x2, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:25 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:25 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:25 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) (fail_nth: 4) 16:41:25 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:25 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 212.322577][ T6716] FAULT_INJECTION: forcing a failure. [ 212.322577][ T6716] name failslab, interval 1, probability 0, space 0, times 0 16:41:25 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x900, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:25 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x3, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:26 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:26 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) [ 212.698729][ T6716] CPU: 0 PID: 6716 Comm: syz-executor.1 Not tainted 6.5.0-rc6-syzkaller-01712-g23c167af2404 #0 [ 212.709153][ T6716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 212.719262][ T6716] Call Trace: [ 212.722591][ T6716] [ 212.725562][ T6716] dump_stack_lvl+0x125/0x1b0 [ 212.730331][ T6716] should_fail_ex+0x496/0x5b0 [ 212.735087][ T6716] should_failslab+0x9/0x20 [ 212.739666][ T6716] kmem_cache_alloc+0x69/0x3b0 [ 212.744511][ T6716] skb_clone+0x171/0x3c0 [ 212.748815][ T6716] netlink_deliver_tap+0xb3c/0xd10 [ 212.753997][ T6716] netlink_unicast+0x5f0/0x810 [ 212.758827][ T6716] ? netlink_attachskb+0x870/0x870 [ 212.763999][ T6716] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 212.769965][ T6716] ? __phys_addr_symbol+0x30/0x70 [ 212.775055][ T6716] ? __check_object_size+0x323/0x740 [ 212.780410][ T6716] netlink_sendmsg+0x93c/0xe40 [ 212.785247][ T6716] ? netlink_unicast+0x810/0x810 [ 212.790261][ T6716] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 212.795641][ T6716] ? netlink_unicast+0x810/0x810 [ 212.800644][ T6716] sock_sendmsg+0xd9/0x180 [ 212.805137][ T6716] sock_write_iter+0x29b/0x3d0 [ 212.809973][ T6716] ? sock_sendmsg+0x180/0x180 [ 212.814747][ T6716] ? _parse_integer+0x30/0x30 [ 212.819500][ T6716] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 212.825559][ T6716] ? reacquire_held_locks+0x4b0/0x4b0 [ 212.831011][ T6716] do_iter_readv_writev+0x21e/0x3c0 [ 212.836322][ T6716] ? generic_copy_file_range+0x1d0/0x1d0 [ 212.842030][ T6716] ? bpf_lsm_file_permission+0x9/0x10 [ 212.847470][ T6716] ? security_file_permission+0x94/0x100 [ 212.853210][ T6716] do_iter_write+0x17f/0x830 [ 212.857902][ T6716] vfs_writev+0x221/0x700 [ 212.862320][ T6716] ? vfs_iter_write+0xb0/0xb0 [ 212.867074][ T6716] ? __fget_files+0x257/0x410 [ 212.871860][ T6716] ? do_writev+0x285/0x370 [ 212.876349][ T6716] do_writev+0x285/0x370 [ 212.880658][ T6716] ? vfs_writev+0x700/0x700 [ 212.885240][ T6716] ? syscall_enter_from_user_mode+0x26/0x80 [ 212.891222][ T6716] do_syscall_64+0x38/0xb0 [ 212.895723][ T6716] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 212.901696][ T6716] RIP: 0033:0x7f89f067cae9 [ 212.906155][ T6716] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 212.925821][ T6716] RSP: 002b:00007f89f13970c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 212.934300][ T6716] RAX: ffffffffffffffda RBX: 00007f89f079bf80 RCX: 00007f89f067cae9 [ 212.942323][ T6716] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000003 [ 212.950345][ T6716] RBP: 00007f89f1397120 R08: 0000000000000000 R09: 0000000000000000 [ 212.958365][ T6716] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 212.966386][ T6716] R13: 000000000000000b R14: 00007f89f079bf80 R15: 00007ffda4fe99e8 [ 212.974432][ T6716] [ 213.019902][ T6716] netlink: 21 bytes leftover after parsing attributes in process `syz-executor.1'. 16:41:26 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080), 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:26 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:26 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xa00, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:26 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:26 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x158, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x158}}, 0x0) 16:41:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) (fail_nth: 5) 16:41:26 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xb00, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:26 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x158, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x158}}, 0x0) [ 213.230294][ T6736] netlink: 21 bytes leftover after parsing attributes in process `syz-executor.1'. 16:41:26 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:26 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x6, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 213.273107][ T6736] FAULT_INJECTION: forcing a failure. [ 213.273107][ T6736] name failslab, interval 1, probability 0, space 0, times 0 [ 213.323677][ T6736] CPU: 1 PID: 6736 Comm: syz-executor.1 Not tainted 6.5.0-rc6-syzkaller-01712-g23c167af2404 #0 [ 213.334098][ T6736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 213.344207][ T6736] Call Trace: [ 213.347536][ T6736] [ 213.350596][ T6736] dump_stack_lvl+0x125/0x1b0 [ 213.355371][ T6736] should_fail_ex+0x496/0x5b0 [ 213.360132][ T6736] should_failslab+0x9/0x20 [ 213.364723][ T6736] kmem_cache_alloc_node+0x389/0x3f0 [ 213.370092][ T6736] ? __alloc_skb+0x287/0x330 [ 213.374777][ T6736] __alloc_skb+0x287/0x330 [ 213.379281][ T6736] ? __napi_build_skb+0x50/0x50 [ 213.384238][ T6736] netlink_ack+0x3bb/0x1370 [ 213.388814][ T6736] ? rtnl_getlink+0xb40/0xb40 [ 213.393576][ T6736] ? netlink_sendmsg+0xe40/0xe40 [ 213.398595][ T6736] netlink_rcv_skb+0x345/0x440 [ 213.403429][ T6736] ? rtnl_getlink+0xb40/0xb40 [ 213.408188][ T6736] ? netlink_ack+0x1370/0x1370 [ 213.413123][ T6736] ? netlink_deliver_tap+0x1b1/0xd10 [ 213.418473][ T6736] netlink_unicast+0x536/0x810 16:41:26 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x7, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 213.423323][ T6736] ? netlink_attachskb+0x870/0x870 [ 213.428498][ T6736] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 213.434478][ T6736] ? __phys_addr_symbol+0x30/0x70 [ 213.439568][ T6736] ? __check_object_size+0x323/0x740 [ 213.444923][ T6736] netlink_sendmsg+0x93c/0xe40 [ 213.449764][ T6736] ? netlink_unicast+0x810/0x810 [ 213.454791][ T6736] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 213.460150][ T6736] ? netlink_unicast+0x810/0x810 [ 213.465163][ T6736] sock_sendmsg+0xd9/0x180 [ 213.469679][ T6736] sock_write_iter+0x29b/0x3d0 [ 213.474520][ T6736] ? sock_sendmsg+0x180/0x180 [ 213.479284][ T6736] ? _parse_integer+0x30/0x30 [ 213.484046][ T6736] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 213.490106][ T6736] ? reacquire_held_locks+0x4b0/0x4b0 [ 213.495571][ T6736] do_iter_readv_writev+0x21e/0x3c0 [ 213.500854][ T6736] ? generic_copy_file_range+0x1d0/0x1d0 [ 213.506572][ T6736] ? bpf_lsm_file_permission+0x9/0x10 [ 213.512023][ T6736] ? security_file_permission+0x94/0x100 [ 213.517760][ T6736] do_iter_write+0x17f/0x830 [ 213.522549][ T6736] vfs_writev+0x221/0x700 [ 213.526968][ T6736] ? vfs_iter_write+0xb0/0xb0 [ 213.531746][ T6736] ? __fget_files+0x257/0x410 [ 213.536535][ T6736] ? do_writev+0x285/0x370 [ 213.541118][ T6736] do_writev+0x285/0x370 [ 213.545450][ T6736] ? vfs_writev+0x700/0x700 [ 213.550037][ T6736] ? syscall_enter_from_user_mode+0x26/0x80 [ 213.556010][ T6736] do_syscall_64+0x38/0xb0 [ 213.560511][ T6736] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 213.566504][ T6736] RIP: 0033:0x7f89f067cae9 16:41:27 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x8, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 213.570982][ T6736] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 213.591012][ T6736] RSP: 002b:00007f89f13970c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 213.599495][ T6736] RAX: ffffffffffffffda RBX: 00007f89f079bf80 RCX: 00007f89f067cae9 [ 213.607527][ T6736] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000003 [ 213.615570][ T6736] RBP: 00007f89f1397120 R08: 0000000000000000 R09: 0000000000000000 [ 213.623678][ T6736] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 213.631730][ T6736] R13: 000000000000000b R14: 00007f89f079bf80 R15: 00007ffda4fe99e8 [ 213.639800][ T6736] 16:41:27 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080), 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:27 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xe00, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:27 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x158, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x158}}, 0x0) 16:41:27 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x9, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:27 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) (fail_nth: 6) 16:41:27 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:27 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xf00, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:27 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) (fail_nth: 1) 16:41:27 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xa, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 214.236775][ T6772] FAULT_INJECTION: forcing a failure. [ 214.236775][ T6772] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 214.261559][ T6772] CPU: 0 PID: 6772 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-01712-g23c167af2404 #0 [ 214.271982][ T6772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 214.282089][ T6772] Call Trace: [ 214.285413][ T6772] [ 214.288390][ T6772] dump_stack_lvl+0x125/0x1b0 [ 214.293167][ T6772] should_fail_ex+0x496/0x5b0 [ 214.297914][ T6772] _copy_from_user+0x30/0xf0 [ 214.302570][ T6772] copy_msghdr_from_user+0x99/0x160 [ 214.307833][ T6772] ? __copy_msghdr+0x460/0x460 [ 214.312670][ T6772] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 214.318741][ T6772] ? find_held_lock+0x2d/0x110 [ 214.323598][ T6772] ___sys_sendmsg+0xff/0x1d0 [ 214.328254][ T6772] ? do_recvmmsg+0x740/0x740 [ 214.332924][ T6772] ? ksys_write+0x214/0x250 [ 214.337517][ T6772] ? __fget_light+0xe6/0x260 [ 214.342181][ T6772] __sys_sendmsg+0x117/0x1e0 [ 214.346828][ T6772] ? __sys_sendmsg_sock+0x30/0x30 [ 214.351944][ T6772] ? syscall_enter_from_user_mode+0x26/0x80 [ 214.357924][ T6772] do_syscall_64+0x38/0xb0 [ 214.362427][ T6772] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 214.368406][ T6772] RIP: 0033:0x7f549ee7cae9 [ 214.372870][ T6772] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 214.392536][ T6772] RSP: 002b:00007f549fbe10c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 214.401014][ T6772] RAX: ffffffffffffffda RBX: 00007f549ef9bf80 RCX: 00007f549ee7cae9 [ 214.409042][ T6772] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 214.417072][ T6772] RBP: 00007f549fbe1120 R08: 0000000000000000 R09: 0000000000000000 [ 214.425097][ T6772] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 16:41:27 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x1100, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) [ 214.433123][ T6772] R13: 000000000000000b R14: 00007f549ef9bf80 R15: 00007fff61062058 [ 214.441169][ T6772] 16:41:27 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xb, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:28 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080), 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:28 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:28 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) (fail_nth: 2) 16:41:28 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xe, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:28 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x1300, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) [ 214.940360][ T6789] netlink: 21 bytes leftover after parsing attributes in process `syz-executor.1'. [ 214.965359][ T6792] FAULT_INJECTION: forcing a failure. [ 214.965359][ T6792] name failslab, interval 1, probability 0, space 0, times 0 [ 215.012099][ T6792] CPU: 0 PID: 6792 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-01712-g23c167af2404 #0 [ 215.022517][ T6792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 215.032628][ T6792] Call Trace: [ 215.035949][ T6792] [ 215.038933][ T6792] dump_stack_lvl+0x125/0x1b0 [ 215.043700][ T6792] should_fail_ex+0x496/0x5b0 [ 215.048462][ T6792] should_failslab+0x9/0x20 [ 215.053033][ T6792] kmem_cache_alloc_node+0x389/0x3f0 [ 215.058383][ T6792] ? __alloc_skb+0x287/0x330 [ 215.063043][ T6792] __alloc_skb+0x287/0x330 [ 215.067505][ T6792] ? __napi_build_skb+0x50/0x50 [ 215.072400][ T6792] ? __netlink_dump_start+0x9a0/0x9c0 [ 215.077821][ T6792] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 215.084541][ T6792] ? apparmor_socket_getpeersec_dgram+0x9/0x10 [ 215.090734][ T6792] netlink_sendmsg+0x9c6/0xe40 [ 215.095536][ T6792] ? netlink_unicast+0x810/0x810 [ 215.100506][ T6792] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 215.105830][ T6792] ? netlink_unicast+0x810/0x810 [ 215.110802][ T6792] sock_sendmsg+0xd9/0x180 [ 215.115261][ T6792] ____sys_sendmsg+0x6ac/0x940 [ 215.120222][ T6792] ? copy_msghdr_from_user+0x10b/0x160 [ 215.125728][ T6792] ? kernel_sendmsg+0x50/0x50 [ 215.130456][ T6792] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 215.136485][ T6792] ? find_held_lock+0x2d/0x110 [ 215.141294][ T6792] ___sys_sendmsg+0x135/0x1d0 [ 215.146007][ T6792] ? do_recvmmsg+0x740/0x740 [ 215.150650][ T6792] ? ksys_write+0x214/0x250 [ 215.155221][ T6792] ? __fget_light+0xe6/0x260 [ 215.159858][ T6792] __sys_sendmsg+0x117/0x1e0 [ 215.164476][ T6792] ? __sys_sendmsg_sock+0x30/0x30 [ 215.169546][ T6792] ? syscall_enter_from_user_mode+0x26/0x80 [ 215.175483][ T6792] do_syscall_64+0x38/0xb0 [ 215.179943][ T6792] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 215.185882][ T6792] RIP: 0033:0x7f549ee7cae9 [ 215.190320][ T6792] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 16:41:28 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x3f00, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:28 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 215.209954][ T6792] RSP: 002b:00007f549fbe10c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 215.218398][ T6792] RAX: ffffffffffffffda RBX: 00007f549ef9bf80 RCX: 00007f549ee7cae9 [ 215.226396][ T6792] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 215.234400][ T6792] RBP: 00007f549fbe1120 R08: 0000000000000000 R09: 0000000000000000 [ 215.242396][ T6792] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 215.250392][ T6792] R13: 000000000000000b R14: 00007f549ef9bf80 R15: 00007fff61062058 [ 215.258507][ T6792] 16:41:28 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xf, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="0a00000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:28 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x6000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:28 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) (fail_nth: 3) 16:41:29 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:29 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:29 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x10, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="0f00000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:29 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x8401, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:29 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) (fail_nth: 4) [ 215.900584][ T6815] FAULT_INJECTION: forcing a failure. [ 215.900584][ T6815] name fail_usercopy, interval 1, probability 0, space 0, times 0 16:41:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1000000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:29 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x11, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:29 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x9801, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) [ 215.948182][ T6815] CPU: 1 PID: 6815 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-01712-g23c167af2404 #0 [ 215.958609][ T6815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 215.968727][ T6815] Call Trace: [ 215.972059][ T6815] [ 215.975033][ T6815] dump_stack_lvl+0x125/0x1b0 [ 215.979815][ T6815] should_fail_ex+0x496/0x5b0 [ 215.984567][ T6815] copyin+0x1b/0xa0 [ 215.988431][ T6815] _copy_from_iter+0x1e5/0x11f0 [ 215.993355][ T6815] ? __build_skb_around+0x278/0x3b0 16:41:29 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 215.998725][ T6815] ? hash_and_copy_to_iter+0x230/0x230 [ 216.004251][ T6815] ? __napi_build_skb+0x50/0x50 [ 216.009182][ T6815] ? __netlink_dump_start+0x9a0/0x9c0 [ 216.014616][ T6815] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 216.020593][ T6815] ? __virt_addr_valid+0x5e/0x2d0 [ 216.025694][ T6815] ? __phys_addr_symbol+0x30/0x70 [ 216.030788][ T6815] ? __check_object_size+0x323/0x740 [ 216.036153][ T6815] netlink_sendmsg+0x897/0xe40 [ 216.040987][ T6815] ? netlink_unicast+0x810/0x810 [ 216.046005][ T6815] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 216.051375][ T6815] ? netlink_unicast+0x810/0x810 [ 216.056372][ T6815] sock_sendmsg+0xd9/0x180 [ 216.060867][ T6815] ____sys_sendmsg+0x6ac/0x940 [ 216.065895][ T6815] ? copy_msghdr_from_user+0x10b/0x160 [ 216.071420][ T6815] ? kernel_sendmsg+0x50/0x50 [ 216.076193][ T6815] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 216.082249][ T6815] ? find_held_lock+0x2d/0x110 [ 216.087087][ T6815] ___sys_sendmsg+0x135/0x1d0 [ 216.091828][ T6815] ? do_recvmmsg+0x740/0x740 [ 216.096506][ T6815] ? ksys_write+0x214/0x250 [ 216.101113][ T6815] ? __fget_light+0xe6/0x260 [ 216.105789][ T6815] __sys_sendmsg+0x117/0x1e0 [ 216.110445][ T6815] ? __sys_sendmsg_sock+0x30/0x30 [ 216.115576][ T6815] ? syscall_enter_from_user_mode+0x26/0x80 [ 216.121562][ T6815] do_syscall_64+0x38/0xb0 [ 216.126249][ T6815] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 216.132231][ T6815] RIP: 0033:0x7f549ee7cae9 16:41:29 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xc900, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:29 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x13, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 216.136701][ T6815] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 216.156379][ T6815] RSP: 002b:00007f549fbe10c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 216.164865][ T6815] RAX: ffffffffffffffda RBX: 00007f549ef9bf80 RCX: 00007f549ee7cae9 [ 216.172893][ T6815] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 216.181024][ T6815] RBP: 00007f549fbe1120 R08: 0000000000000000 R09: 0000000000000000 [ 216.189055][ T6815] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 216.197260][ T6815] R13: 000000000000000b R14: 00007f549ef9bf80 R15: 00007fff61062058 [ 216.205414][ T6815] 16:41:30 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:30 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {0x3}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="4001000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:30 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) (fail_nth: 5) 16:41:30 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x60, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:30 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="c00e000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:30 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {0x300}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 216.749382][ T6844] FAULT_INJECTION: forcing a failure. [ 216.749382][ T6844] name failslab, interval 1, probability 0, space 0, times 0 16:41:30 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xe9, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:30 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x34000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) [ 216.830623][ T6844] CPU: 1 PID: 6844 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-01712-g23c167af2404 #0 [ 216.841036][ T6844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 216.851143][ T6844] Call Trace: [ 216.854469][ T6844] [ 216.857450][ T6844] dump_stack_lvl+0x125/0x1b0 [ 216.862223][ T6844] should_fail_ex+0x496/0x5b0 [ 216.866997][ T6844] should_failslab+0x9/0x20 [ 216.871676][ T6844] kmem_cache_alloc+0x69/0x3b0 [ 216.876528][ T6844] skb_clone+0x171/0x3c0 [ 216.880836][ T6844] netlink_deliver_tap+0xb3c/0xd10 [ 216.886029][ T6844] netlink_unicast+0x5f0/0x810 [ 216.890859][ T6844] ? netlink_attachskb+0x870/0x870 [ 216.896037][ T6844] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 216.902022][ T6844] ? __phys_addr_symbol+0x30/0x70 [ 216.907122][ T6844] ? __check_object_size+0x323/0x740 [ 216.912486][ T6844] netlink_sendmsg+0x93c/0xe40 [ 216.917414][ T6844] ? netlink_unicast+0x810/0x810 [ 216.922433][ T6844] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 216.927975][ T6844] ? netlink_unicast+0x810/0x810 [ 216.932978][ T6844] sock_sendmsg+0xd9/0x180 [ 216.937461][ T6844] ____sys_sendmsg+0x6ac/0x940 [ 216.942273][ T6844] ? copy_msghdr_from_user+0x10b/0x160 [ 216.947778][ T6844] ? kernel_sendmsg+0x50/0x50 [ 216.952532][ T6844] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 216.958564][ T6844] ? find_held_lock+0x2d/0x110 [ 216.963377][ T6844] ___sys_sendmsg+0x135/0x1d0 [ 216.968101][ T6844] ? do_recvmmsg+0x740/0x740 [ 216.972739][ T6844] ? ksys_write+0x214/0x250 [ 216.977302][ T6844] ? __fget_light+0xe6/0x260 [ 216.981947][ T6844] __sys_sendmsg+0x117/0x1e0 [ 216.986666][ T6844] ? __sys_sendmsg_sock+0x30/0x30 [ 216.991762][ T6844] ? syscall_enter_from_user_mode+0x26/0x80 [ 216.997718][ T6844] do_syscall_64+0x38/0xb0 [ 217.002205][ T6844] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 217.008157][ T6844] RIP: 0033:0x7f549ee7cae9 [ 217.012606][ T6844] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 217.032341][ T6844] RSP: 002b:00007f549fbe10c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 217.040885][ T6844] RAX: ffffffffffffffda RBX: 00007f549ef9bf80 RCX: 00007f549ee7cae9 [ 217.048895][ T6844] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 217.056906][ T6844] RBP: 00007f549fbe1120 R08: 0000000000000000 R09: 0000000000000000 [ 217.064912][ T6844] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 217.072914][ T6844] R13: 000000000000000b R14: 00007f549ef9bf80 R15: 00007fff61062058 [ 217.081103][ T6844] 16:41:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="effd000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:30 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x400300, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:31 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:31 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {0x3000000}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:31 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xf0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="e03f030013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:31 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xf0ffff, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:31 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) (fail_nth: 6) 16:41:31 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x1000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:31 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {0x300000000000000}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="effdffff13001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) [ 217.668285][ T6869] FAULT_INJECTION: forcing a failure. [ 217.668285][ T6869] name failslab, interval 1, probability 0, space 0, times 0 16:41:31 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x180, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 217.752377][ T6869] CPU: 0 PID: 6869 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-01712-g23c167af2404 #0 [ 217.762811][ T6869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 217.773018][ T6869] Call Trace: [ 217.776341][ T6869] [ 217.779404][ T6869] dump_stack_lvl+0x125/0x1b0 [ 217.784177][ T6869] should_fail_ex+0x496/0x5b0 [ 217.788932][ T6869] ? netlink_unicast+0x5f0/0x810 [ 217.793934][ T6869] ? netlink_sendmsg+0x93c/0xe40 [ 217.798941][ T6869] should_failslab+0x9/0x20 [ 217.803529][ T6869] kmem_cache_alloc+0x69/0x3b0 [ 217.808407][ T6869] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 217.814402][ T6869] xfrm_state_alloc+0x23/0x510 [ 217.819251][ T6869] xfrm_add_sa+0xcaf/0x42f0 [ 217.823846][ T6869] ? xfrm_state_netlink+0x150/0x150 [ 217.829123][ T6869] ? __nla_parse+0x40/0x50 [ 217.833623][ T6869] ? xfrm_state_netlink+0x150/0x150 [ 217.838939][ T6869] xfrm_user_rcv_msg+0x55c/0xa60 [ 217.843960][ T6869] ? xfrm_user_net_init+0x160/0x160 [ 217.849291][ T6869] ? preempt_count_sub+0x150/0x150 [ 217.854508][ T6869] netlink_rcv_skb+0x16b/0x440 [ 217.859334][ T6869] ? xfrm_user_net_init+0x160/0x160 [ 217.864615][ T6869] ? netlink_ack+0x1370/0x1370 [ 217.869474][ T6869] ? reacquire_held_locks+0x4b0/0x4b0 [ 217.874925][ T6869] xfrm_netlink_rcv+0x6c/0x90 [ 217.879643][ T6869] netlink_unicast+0x536/0x810 [ 217.884451][ T6869] ? netlink_attachskb+0x870/0x870 [ 217.889593][ T6869] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 217.895541][ T6869] ? __phys_addr_symbol+0x30/0x70 [ 217.900601][ T6869] ? __check_object_size+0x323/0x740 [ 217.905929][ T6869] netlink_sendmsg+0x93c/0xe40 [ 217.910737][ T6869] ? netlink_unicast+0x810/0x810 [ 217.915714][ T6869] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 217.921056][ T6869] ? netlink_unicast+0x810/0x810 [ 217.926023][ T6869] sock_sendmsg+0xd9/0x180 [ 217.930494][ T6869] ____sys_sendmsg+0x6ac/0x940 [ 217.935317][ T6869] ? copy_msghdr_from_user+0x10b/0x160 [ 217.940807][ T6869] ? kernel_sendmsg+0x50/0x50 [ 217.945530][ T6869] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 217.951555][ T6869] ? find_held_lock+0x2d/0x110 [ 217.956365][ T6869] ___sys_sendmsg+0x135/0x1d0 [ 217.961074][ T6869] ? do_recvmmsg+0x740/0x740 [ 217.965707][ T6869] ? ksys_write+0x214/0x250 [ 217.970272][ T6869] ? __fget_light+0xe6/0x260 [ 217.974921][ T6869] __sys_sendmsg+0x117/0x1e0 [ 217.979539][ T6869] ? __sys_sendmsg_sock+0x30/0x30 [ 217.984609][ T6869] ? syscall_enter_from_user_mode+0x26/0x80 [ 217.990545][ T6869] do_syscall_64+0x38/0xb0 [ 217.995004][ T6869] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 218.000944][ T6869] RIP: 0033:0x7f549ee7cae9 [ 218.005385][ T6869] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 218.025022][ T6869] RSP: 002b:00007f549fbe10c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 218.033467][ T6869] RAX: ffffffffffffffda RBX: 00007f549ef9bf80 RCX: 00007f549ee7cae9 [ 218.041462][ T6869] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 16:41:31 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {0x0, 0x3}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:31 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x1a0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 218.049455][ T6869] RBP: 00007f549fbe1120 R08: 0000000000000000 R09: 0000000000000000 [ 218.057451][ T6869] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 218.065454][ T6869] R13: 000000000000000b R14: 00007f549ef9bf80 R15: 00007fff61062058 [ 218.073487][ T6869] 16:41:31 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="390000000f001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:31 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x2000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:31 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {0x0, 0x300}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:31 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x1b4, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:32 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) (fail_nth: 7) 16:41:32 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {0x0, 0x3000000}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:32 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x300, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:32 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x3000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3902000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) [ 218.589495][ T6894] FAULT_INJECTION: forcing a failure. [ 218.589495][ T6894] name failslab, interval 1, probability 0, space 0, times 0 [ 218.609778][ T6894] CPU: 0 PID: 6894 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-01712-g23c167af2404 #0 [ 218.620192][ T6894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 218.630304][ T6894] Call Trace: [ 218.633735][ T6894] [ 218.636714][ T6894] dump_stack_lvl+0x125/0x1b0 [ 218.641475][ T6894] should_fail_ex+0x496/0x5b0 [ 218.646247][ T6894] should_failslab+0x9/0x20 [ 218.650857][ T6894] __kmem_cache_alloc_node+0x2fd/0x350 [ 218.656394][ T6894] ? xfrm_add_sa+0x14e3/0x42f0 [ 218.661229][ T6894] ? lockdep_init_map_type+0x16d/0x7c0 [ 218.666772][ T6894] ? xfrm_add_sa+0x14e3/0x42f0 [ 218.671607][ T6894] __kmalloc_node_track_caller+0x4d/0x100 [ 218.677415][ T6894] kmemdup+0x29/0x60 [ 218.681384][ T6894] xfrm_add_sa+0x14e3/0x42f0 [ 218.686067][ T6894] ? xfrm_state_netlink+0x150/0x150 [ 218.691350][ T6894] ? __nla_parse+0x40/0x50 [ 218.695844][ T6894] ? xfrm_state_netlink+0x150/0x150 [ 218.701121][ T6894] xfrm_user_rcv_msg+0x55c/0xa60 [ 218.706133][ T6894] ? xfrm_user_net_init+0x160/0x160 [ 218.711463][ T6894] ? preempt_count_sub+0x150/0x150 [ 218.716664][ T6894] netlink_rcv_skb+0x16b/0x440 [ 218.721489][ T6894] ? xfrm_user_net_init+0x160/0x160 [ 218.726768][ T6894] ? netlink_ack+0x1370/0x1370 [ 218.731624][ T6894] ? reacquire_held_locks+0x4b0/0x4b0 16:41:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3903000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) [ 218.737092][ T6894] xfrm_netlink_rcv+0x6c/0x90 [ 218.741843][ T6894] netlink_unicast+0x536/0x810 [ 218.746687][ T6894] ? netlink_attachskb+0x870/0x870 [ 218.751859][ T6894] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 218.757834][ T6894] ? __phys_addr_symbol+0x30/0x70 [ 218.762928][ T6894] ? __check_object_size+0x323/0x740 [ 218.768282][ T6894] netlink_sendmsg+0x93c/0xe40 [ 218.773124][ T6894] ? netlink_unicast+0x810/0x810 [ 218.778130][ T6894] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 218.783482][ T6894] ? netlink_unicast+0x810/0x810 16:41:32 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x4000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) [ 218.788483][ T6894] sock_sendmsg+0xd9/0x180 [ 218.792976][ T6894] ____sys_sendmsg+0x6ac/0x940 [ 218.797818][ T6894] ? copy_msghdr_from_user+0x10b/0x160 [ 218.803348][ T6894] ? kernel_sendmsg+0x50/0x50 [ 218.808107][ T6894] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 218.814165][ T6894] ? find_held_lock+0x2d/0x110 [ 218.819002][ T6894] ___sys_sendmsg+0x135/0x1d0 [ 218.823737][ T6894] ? do_recvmmsg+0x740/0x740 [ 218.828413][ T6894] ? ksys_write+0x214/0x250 [ 218.833050][ T6894] ? __fget_light+0xe6/0x260 [ 218.837725][ T6894] __sys_sendmsg+0x117/0x1e0 [ 218.842371][ T6894] ? __sys_sendmsg_sock+0x30/0x30 [ 218.847475][ T6894] ? syscall_enter_from_user_mode+0x26/0x80 [ 218.853441][ T6894] do_syscall_64+0x38/0xb0 [ 218.857939][ T6894] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 218.863923][ T6894] RIP: 0033:0x7f549ee7cae9 [ 218.868389][ T6894] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 218.888058][ T6894] RSP: 002b:00007f549fbe10c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 218.896536][ T6894] RAX: ffffffffffffffda RBX: 00007f549ef9bf80 RCX: 00007f549ee7cae9 [ 218.904562][ T6894] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 218.912589][ T6894] RBP: 00007f549fbe1120 R08: 0000000000000000 R09: 0000000000000000 [ 218.920612][ T6894] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 218.928635][ T6894] R13: 000000000000000b R14: 00007f549ef9bf80 R15: 00007fff61062058 [ 218.936688][ T6894] 16:41:32 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:32 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {0x0, 0x300000000000000}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:32 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x500, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3904000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:32 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x5000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:32 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) (fail_nth: 8) 16:41:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3905000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:32 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x600, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:32 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x6000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:32 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {0x0, 0x0, 0x3}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 219.480067][ T6921] FAULT_INJECTION: forcing a failure. [ 219.480067][ T6921] name failslab, interval 1, probability 0, space 0, times 0 [ 219.561834][ T6921] CPU: 1 PID: 6921 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-01712-g23c167af2404 #0 [ 219.572260][ T6921] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 219.582378][ T6921] Call Trace: [ 219.585700][ T6921] [ 219.588676][ T6921] dump_stack_lvl+0x125/0x1b0 [ 219.593454][ T6921] should_fail_ex+0x496/0x5b0 [ 219.598280][ T6921] should_failslab+0x9/0x20 [ 219.602864][ T6921] __kmem_cache_alloc_node+0x2fd/0x350 [ 219.608410][ T6921] ? xfrm_add_sa+0x19f0/0x42f0 [ 219.613255][ T6921] ? xfrm_add_sa+0x19f0/0x42f0 [ 219.618172][ T6921] __kmalloc_node_track_caller+0x4d/0x100 [ 219.623976][ T6921] kmemdup+0x29/0x60 [ 219.627938][ T6921] xfrm_add_sa+0x19f0/0x42f0 [ 219.632614][ T6921] ? xfrm_state_netlink+0x150/0x150 [ 219.637894][ T6921] ? __nla_parse+0x40/0x50 [ 219.642385][ T6921] ? xfrm_state_netlink+0x150/0x150 [ 219.647738][ T6921] xfrm_user_rcv_msg+0x55c/0xa60 [ 219.652765][ T6921] ? xfrm_user_net_init+0x160/0x160 [ 219.658100][ T6921] ? preempt_count_sub+0x150/0x150 [ 219.663305][ T6921] netlink_rcv_skb+0x16b/0x440 [ 219.668130][ T6921] ? xfrm_user_net_init+0x160/0x160 [ 219.673398][ T6921] ? netlink_ack+0x1370/0x1370 [ 219.678217][ T6921] ? reacquire_held_locks+0x4b0/0x4b0 [ 219.683643][ T6921] xfrm_netlink_rcv+0x6c/0x90 [ 219.688357][ T6921] netlink_unicast+0x536/0x810 [ 219.693162][ T6921] ? netlink_attachskb+0x870/0x870 [ 219.698308][ T6921] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 219.704272][ T6921] ? __phys_addr_symbol+0x30/0x70 [ 219.709329][ T6921] ? __check_object_size+0x323/0x740 [ 219.714652][ T6921] netlink_sendmsg+0x93c/0xe40 [ 219.719469][ T6921] ? netlink_unicast+0x810/0x810 [ 219.724442][ T6921] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 219.729760][ T6921] ? netlink_unicast+0x810/0x810 [ 219.734725][ T6921] sock_sendmsg+0xd9/0x180 [ 219.739186][ T6921] ____sys_sendmsg+0x6ac/0x940 [ 219.743996][ T6921] ? copy_msghdr_from_user+0x10b/0x160 [ 219.749489][ T6921] ? kernel_sendmsg+0x50/0x50 [ 219.754248][ T6921] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 219.760322][ T6921] ? find_held_lock+0x2d/0x110 [ 219.765124][ T6921] ___sys_sendmsg+0x135/0x1d0 [ 219.769831][ T6921] ? do_recvmmsg+0x740/0x740 [ 219.774462][ T6921] ? ksys_write+0x214/0x250 [ 219.779022][ T6921] ? __fget_light+0xe6/0x260 [ 219.783662][ T6921] __sys_sendmsg+0x117/0x1e0 [ 219.788279][ T6921] ? __sys_sendmsg_sock+0x30/0x30 [ 219.793348][ T6921] ? syscall_enter_from_user_mode+0x26/0x80 [ 219.799282][ T6921] do_syscall_64+0x38/0xb0 [ 219.803752][ T6921] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 219.809688][ T6921] RIP: 0033:0x7f549ee7cae9 [ 219.814127][ T6921] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 219.833778][ T6921] RSP: 002b:00007f549fbe10c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 219.842221][ T6921] RAX: ffffffffffffffda RBX: 00007f549ef9bf80 RCX: 00007f549ee7cae9 [ 219.850225][ T6921] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 16:41:33 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3906000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) [ 219.858225][ T6921] RBP: 00007f549fbe1120 R08: 0000000000000000 R09: 0000000000000000 [ 219.866223][ T6921] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 219.874215][ T6921] R13: 000000000000000b R14: 00007f549ef9bf80 R15: 00007fff61062058 [ 219.882229][ T6921] 16:41:33 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:33 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {0x0, 0x0, 0x300}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:33 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x7000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:33 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) (fail_nth: 9) 16:41:33 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x900, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3907000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) [ 220.409087][ T6944] FAULT_INJECTION: forcing a failure. [ 220.409087][ T6944] name failslab, interval 1, probability 0, space 0, times 0 [ 220.437582][ T6944] CPU: 0 PID: 6944 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-01712-g23c167af2404 #0 [ 220.448014][ T6944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 220.458130][ T6944] Call Trace: [ 220.461454][ T6944] [ 220.464442][ T6944] dump_stack_lvl+0x125/0x1b0 [ 220.469217][ T6944] should_fail_ex+0x496/0x5b0 [ 220.473984][ T6944] should_failslab+0x9/0x20 [ 220.478563][ T6944] __kmem_cache_alloc_node+0x2fd/0x350 [ 220.484103][ T6944] ? crypto_alloc_tfmmem.isra.0+0x35/0x100 [ 220.489977][ T6944] ? crypto_init_queue+0x100/0x100 [ 220.495150][ T6944] ? crypto_alloc_tfmmem.isra.0+0x35/0x100 [ 220.501108][ T6944] __kmalloc_node+0x4f/0x100 [ 220.506044][ T6944] ? crypto_init_queue+0x100/0x100 [ 220.511244][ T6944] crypto_alloc_tfmmem.isra.0+0x35/0x100 [ 220.516956][ T6944] crypto_create_tfm_node+0x83/0x310 [ 220.522318][ T6944] crypto_alloc_tfm_node+0x102/0x260 [ 220.527689][ T6944] esp_init_authenc.constprop.0+0x1de/0xb50 [ 220.533676][ T6944] ? esp6_destroy+0x60/0x60 [ 220.538276][ T6944] ? reacquire_held_locks+0x4b0/0x4b0 [ 220.543741][ T6944] esp6_init_state+0x3fb/0x520 [ 220.548585][ T6944] __xfrm_init_state+0xb87/0x1910 [ 220.553701][ T6944] xfrm_add_sa+0x1f64/0x42f0 16:41:33 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {0x0, 0x0, 0x3000000}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3908000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:33 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x8000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) [ 220.558386][ T6944] ? xfrm_state_netlink+0x150/0x150 [ 220.563674][ T6944] ? __nla_parse+0x40/0x50 [ 220.568180][ T6944] ? xfrm_state_netlink+0x150/0x150 [ 220.573485][ T6944] xfrm_user_rcv_msg+0x55c/0xa60 [ 220.578525][ T6944] ? xfrm_user_net_init+0x160/0x160 [ 220.583874][ T6944] ? preempt_count_sub+0x150/0x150 [ 220.589099][ T6944] netlink_rcv_skb+0x16b/0x440 [ 220.593934][ T6944] ? xfrm_user_net_init+0x160/0x160 [ 220.599221][ T6944] ? netlink_ack+0x1370/0x1370 [ 220.604085][ T6944] ? reacquire_held_locks+0x4b0/0x4b0 16:41:34 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {0x0, 0x0, 0x300000000000000}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 220.609548][ T6944] xfrm_netlink_rcv+0x6c/0x90 [ 220.614387][ T6944] netlink_unicast+0x536/0x810 [ 220.619234][ T6944] ? netlink_attachskb+0x870/0x870 [ 220.624417][ T6944] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 220.630386][ T6944] ? __phys_addr_symbol+0x30/0x70 [ 220.635484][ T6944] ? __check_object_size+0x323/0x740 [ 220.640846][ T6944] netlink_sendmsg+0x93c/0xe40 [ 220.645696][ T6944] ? netlink_unicast+0x810/0x810 [ 220.650717][ T6944] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 220.656101][ T6944] ? netlink_unicast+0x810/0x810 [ 220.661112][ T6944] sock_sendmsg+0xd9/0x180 [ 220.665709][ T6944] ____sys_sendmsg+0x6ac/0x940 [ 220.670555][ T6944] ? copy_msghdr_from_user+0x10b/0x160 [ 220.676083][ T6944] ? kernel_sendmsg+0x50/0x50 [ 220.680858][ T6944] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 220.686916][ T6944] ? find_held_lock+0x2d/0x110 [ 220.691755][ T6944] ___sys_sendmsg+0x135/0x1d0 [ 220.696493][ T6944] ? do_recvmmsg+0x740/0x740 [ 220.701169][ T6944] ? ksys_write+0x214/0x250 [ 220.705782][ T6944] ? __fget_light+0xe6/0x260 [ 220.710451][ T6944] __sys_sendmsg+0x117/0x1e0 [ 220.715102][ T6944] ? __sys_sendmsg_sock+0x30/0x30 [ 220.720219][ T6944] ? syscall_enter_from_user_mode+0x26/0x80 [ 220.726184][ T6944] do_syscall_64+0x38/0xb0 [ 220.730677][ T6944] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 220.736664][ T6944] RIP: 0033:0x7f549ee7cae9 [ 220.741125][ T6944] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 16:41:34 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x9000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) [ 220.760784][ T6944] RSP: 002b:00007f549fbe10c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 220.769267][ T6944] RAX: ffffffffffffffda RBX: 00007f549ef9bf80 RCX: 00007f549ee7cae9 [ 220.777296][ T6944] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 220.785584][ T6944] RBP: 00007f549fbe1120 R08: 0000000000000000 R09: 0000000000000000 [ 220.793714][ T6944] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 220.801748][ T6944] R13: 000000000000000b R14: 00007f549ef9bf80 R15: 00007fff61062058 16:41:34 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xa00, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 220.809891][ T6944] 16:41:34 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3909000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:34 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {0x0, 0x0, 0x0, 0x3}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:34 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xb00, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:34 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xa000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:34 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) (fail_nth: 10) [ 221.301176][ T6971] FAULT_INJECTION: forcing a failure. [ 221.301176][ T6971] name failslab, interval 1, probability 0, space 0, times 0 [ 221.325213][ T6971] CPU: 0 PID: 6971 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-01712-g23c167af2404 #0 [ 221.335641][ T6971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 221.345746][ T6971] Call Trace: [ 221.349113][ T6971] [ 221.352099][ T6971] dump_stack_lvl+0x125/0x1b0 [ 221.356858][ T6971] should_fail_ex+0x496/0x5b0 [ 221.361610][ T6971] should_failslab+0x9/0x20 [ 221.366187][ T6971] __kmem_cache_alloc_node+0x2fd/0x350 [ 221.371722][ T6971] ? crypto_alloc_tfmmem.isra.0+0x35/0x100 [ 221.377598][ T6971] ? crypto_init_queue+0x100/0x100 [ 221.382776][ T6971] ? crypto_alloc_tfmmem.isra.0+0x35/0x100 [ 221.388664][ T6971] __kmalloc_node+0x4f/0x100 [ 221.393335][ T6971] ? crypto_init_queue+0x100/0x100 [ 221.398499][ T6971] crypto_alloc_tfmmem.isra.0+0x35/0x100 [ 221.404185][ T6971] crypto_create_tfm_node+0x83/0x310 [ 221.409514][ T6971] crypto_spawn_tfm2+0x62/0xb0 [ 221.414313][ T6971] aead_init_geniv+0x1b5/0x330 [ 221.419113][ T6971] ? aead_geniv_free+0x30/0x30 [ 221.423919][ T6971] crypto_aead_init_tfm+0x149/0x1a0 [ 221.429246][ T6971] crypto_create_tfm_node+0xfd/0x310 [ 221.434563][ T6971] crypto_alloc_tfm_node+0x102/0x260 [ 221.439911][ T6971] esp_init_authenc.constprop.0+0x1de/0xb50 [ 221.445851][ T6971] ? esp6_destroy+0x60/0x60 [ 221.450401][ T6971] ? reacquire_held_locks+0x4b0/0x4b0 [ 221.455821][ T6971] esp6_init_state+0x3fb/0x520 [ 221.460630][ T6971] __xfrm_init_state+0xb87/0x1910 [ 221.465716][ T6971] xfrm_add_sa+0x1f64/0x42f0 [ 221.470362][ T6971] ? xfrm_state_netlink+0x150/0x150 [ 221.475607][ T6971] ? __nla_parse+0x40/0x50 [ 221.480066][ T6971] ? xfrm_state_netlink+0x150/0x150 [ 221.485302][ T6971] xfrm_user_rcv_msg+0x55c/0xa60 [ 221.490286][ T6971] ? xfrm_user_net_init+0x160/0x160 [ 221.495572][ T6971] ? preempt_count_sub+0x150/0x150 [ 221.500736][ T6971] netlink_rcv_skb+0x16b/0x440 [ 221.505528][ T6971] ? xfrm_user_net_init+0x160/0x160 [ 221.510769][ T6971] ? netlink_ack+0x1370/0x1370 [ 221.515576][ T6971] ? reacquire_held_locks+0x4b0/0x4b0 [ 221.520996][ T6971] xfrm_netlink_rcv+0x6c/0x90 [ 221.525797][ T6971] netlink_unicast+0x536/0x810 [ 221.530595][ T6971] ? netlink_attachskb+0x870/0x870 [ 221.535738][ T6971] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 221.542048][ T6971] ? __phys_addr_symbol+0x30/0x70 [ 221.547117][ T6971] ? __check_object_size+0x323/0x740 [ 221.552437][ T6971] netlink_sendmsg+0x93c/0xe40 [ 221.557248][ T6971] ? netlink_unicast+0x810/0x810 [ 221.562221][ T6971] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 221.567546][ T6971] ? netlink_unicast+0x810/0x810 [ 221.572516][ T6971] sock_sendmsg+0xd9/0x180 [ 221.576974][ T6971] ____sys_sendmsg+0x6ac/0x940 [ 221.581863][ T6971] ? copy_msghdr_from_user+0x10b/0x160 [ 221.587350][ T6971] ? kernel_sendmsg+0x50/0x50 [ 221.592094][ T6971] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 221.598127][ T6971] ? find_held_lock+0x2d/0x110 [ 221.602933][ T6971] ___sys_sendmsg+0x135/0x1d0 [ 221.607658][ T6971] ? do_recvmmsg+0x740/0x740 [ 221.612382][ T6971] ? ksys_write+0x214/0x250 [ 221.616947][ T6971] ? __fget_light+0xe6/0x260 [ 221.621586][ T6971] __sys_sendmsg+0x117/0x1e0 [ 221.626261][ T6971] ? __sys_sendmsg_sock+0x30/0x30 [ 221.631336][ T6971] ? syscall_enter_from_user_mode+0x26/0x80 [ 221.637281][ T6971] do_syscall_64+0x38/0xb0 [ 221.641745][ T6971] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 221.647685][ T6971] RIP: 0033:0x7f549ee7cae9 [ 221.652129][ T6971] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 221.671761][ T6971] RSP: 002b:00007f549fbe10c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 221.680198][ T6971] RAX: ffffffffffffffda RBX: 00007f549ef9bf80 RCX: 00007f549ee7cae9 [ 221.688194][ T6971] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 221.696190][ T6971] RBP: 00007f549fbe1120 R08: 0000000000000000 R09: 0000000000000000 [ 221.704274][ T6971] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 221.712269][ T6971] R13: 000000000000000b R14: 00007f549ef9bf80 R15: 00007fff61062058 [ 221.720278][ T6971] 16:41:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="390a000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:35 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {0x0, 0x0, 0x0, 0x300}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:35 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xb000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:35 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xe00, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:35 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) (fail_nth: 11) 16:41:35 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xe000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) [ 221.926523][ T6983] FAULT_INJECTION: forcing a failure. [ 221.926523][ T6983] name failslab, interval 1, probability 0, space 0, times 0 [ 221.983243][ T6983] CPU: 1 PID: 6983 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-01712-g23c167af2404 #0 [ 221.993661][ T6983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 222.003942][ T6983] Call Trace: [ 222.007276][ T6983] [ 222.010253][ T6983] dump_stack_lvl+0x125/0x1b0 [ 222.015042][ T6983] should_fail_ex+0x496/0x5b0 [ 222.019990][ T6983] should_failslab+0x9/0x20 [ 222.024578][ T6983] __kmem_cache_alloc_node+0x2fd/0x350 [ 222.030115][ T6983] ? crypto_alloc_tfmmem.isra.0+0x35/0x100 [ 222.035997][ T6983] ? crypto_init_queue+0x100/0x100 [ 222.041169][ T6983] ? crypto_alloc_tfmmem.isra.0+0x35/0x100 [ 222.047041][ T6983] __kmalloc_node+0x4f/0x100 [ 222.051703][ T6983] ? crypto_init_queue+0x100/0x100 [ 222.056876][ T6983] crypto_alloc_tfmmem.isra.0+0x35/0x100 [ 222.062569][ T6983] crypto_create_tfm_node+0x83/0x310 [ 222.067917][ T6983] crypto_spawn_tfm2+0x62/0xb0 [ 222.072741][ T6983] aead_init_geniv+0x1b5/0x330 [ 222.077573][ T6983] ? aead_geniv_free+0x30/0x30 [ 222.082401][ T6983] crypto_aead_init_tfm+0x149/0x1a0 [ 222.087665][ T6983] crypto_create_tfm_node+0xfd/0x310 [ 222.093046][ T6983] crypto_alloc_tfm_node+0x102/0x260 [ 222.098391][ T6983] esp_init_authenc.constprop.0+0x1de/0xb50 [ 222.104364][ T6983] ? esp6_destroy+0x60/0x60 [ 222.108965][ T6983] ? reacquire_held_locks+0x4b0/0x4b0 [ 222.114425][ T6983] esp6_init_state+0x3fb/0x520 [ 222.119260][ T6983] __xfrm_init_state+0xb87/0x1910 [ 222.124358][ T6983] xfrm_add_sa+0x1f64/0x42f0 [ 222.129028][ T6983] ? xfrm_state_netlink+0x150/0x150 [ 222.134300][ T6983] ? __nla_parse+0x40/0x50 [ 222.138790][ T6983] ? xfrm_state_netlink+0x150/0x150 [ 222.144056][ T6983] xfrm_user_rcv_msg+0x55c/0xa60 [ 222.149072][ T6983] ? xfrm_user_net_init+0x160/0x160 [ 222.154404][ T6983] ? preempt_count_sub+0x150/0x150 [ 222.159603][ T6983] netlink_rcv_skb+0x16b/0x440 [ 222.164430][ T6983] ? xfrm_user_net_init+0x160/0x160 [ 222.169705][ T6983] ? netlink_ack+0x1370/0x1370 [ 222.174545][ T6983] ? reacquire_held_locks+0x4b0/0x4b0 [ 222.179998][ T6983] xfrm_netlink_rcv+0x6c/0x90 [ 222.184740][ T6983] netlink_unicast+0x536/0x810 [ 222.189565][ T6983] ? netlink_attachskb+0x870/0x870 [ 222.194735][ T6983] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 222.200703][ T6983] ? __phys_addr_symbol+0x30/0x70 [ 222.205786][ T6983] ? __check_object_size+0x323/0x740 [ 222.211138][ T6983] netlink_sendmsg+0x93c/0xe40 [ 222.215971][ T6983] ? netlink_unicast+0x810/0x810 [ 222.220972][ T6983] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 222.226321][ T6983] ? netlink_unicast+0x810/0x810 [ 222.231421][ T6983] sock_sendmsg+0xd9/0x180 [ 222.235894][ T6983] ____sys_sendmsg+0x6ac/0x940 [ 222.240788][ T6983] ? copy_msghdr_from_user+0x10b/0x160 [ 222.246279][ T6983] ? kernel_sendmsg+0x50/0x50 [ 222.251006][ T6983] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 222.257031][ T6983] ? find_held_lock+0x2d/0x110 [ 222.261851][ T6983] ___sys_sendmsg+0x135/0x1d0 [ 222.266560][ T6983] ? do_recvmmsg+0x740/0x740 [ 222.271192][ T6983] ? ksys_write+0x214/0x250 [ 222.275760][ T6983] ? __fget_light+0xe6/0x260 [ 222.280423][ T6983] __sys_sendmsg+0x117/0x1e0 [ 222.285043][ T6983] ? __sys_sendmsg_sock+0x30/0x30 [ 222.290124][ T6983] ? syscall_enter_from_user_mode+0x26/0x80 [ 222.296073][ T6983] do_syscall_64+0x38/0xb0 [ 222.300541][ T6983] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 222.306496][ T6983] RIP: 0033:0x7f549ee7cae9 [ 222.310957][ T6983] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 222.330683][ T6983] RSP: 002b:00007f549fbe10c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 222.339300][ T6983] RAX: ffffffffffffffda RBX: 00007f549ef9bf80 RCX: 00007f549ee7cae9 [ 222.347322][ T6983] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 222.355328][ T6983] RBP: 00007f549fbe1120 R08: 0000000000000000 R09: 0000000000000000 [ 222.363331][ T6983] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 222.371328][ T6983] R13: 000000000000000b R14: 00007f549ef9bf80 R15: 00007fff61062058 [ 222.379371][ T6983] 16:41:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="390c000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:36 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {0x0, 0x0, 0x0, 0x3000000}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:36 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xf00, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:36 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xf000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:36 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:36 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) (fail_nth: 12) 16:41:36 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x1100, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:36 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {0x0, 0x0, 0x0, 0x300000000000000}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:36 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x10000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) [ 222.637073][ T6995] FAULT_INJECTION: forcing a failure. [ 222.637073][ T6995] name failslab, interval 1, probability 0, space 0, times 0 16:41:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="390e000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:36 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x1300, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 222.783613][ T6995] CPU: 0 PID: 6995 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-01712-g23c167af2404 #0 [ 222.794082][ T6995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 222.804188][ T6995] Call Trace: [ 222.807520][ T6995] [ 222.810499][ T6995] dump_stack_lvl+0x125/0x1b0 [ 222.815263][ T6995] should_fail_ex+0x496/0x5b0 [ 222.820044][ T6995] should_failslab+0x9/0x20 [ 222.824624][ T6995] __kmem_cache_alloc_node+0x2fd/0x350 16:41:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="390f000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) [ 222.830157][ T6995] ? crypto_alloc_tfmmem.isra.0+0x35/0x100 [ 222.836042][ T6995] ? crypto_init_queue+0x100/0x100 [ 222.841219][ T6995] ? crypto_alloc_tfmmem.isra.0+0x35/0x100 [ 222.847102][ T6995] __kmalloc_node+0x4f/0x100 [ 222.851780][ T6995] ? crypto_init_queue+0x100/0x100 [ 222.856959][ T6995] crypto_alloc_tfmmem.isra.0+0x35/0x100 [ 222.862661][ T6995] crypto_create_tfm_node+0x83/0x310 [ 222.868013][ T6995] crypto_init_shash_ops_async+0x5d/0x3c0 [ 222.873827][ T6995] crypto_ahash_init_tfm+0x452/0x560 [ 222.879203][ T6995] crypto_create_tfm_node+0xfd/0x310 [ 222.884563][ T6995] crypto_spawn_tfm2+0x62/0xb0 [ 222.889410][ T6995] ? crypto_authenc_esn_exit_tfm+0x80/0x80 [ 222.895293][ T6995] crypto_authenc_esn_init_tfm+0x44/0x330 [ 222.901093][ T6995] ? crypto_authenc_esn_exit_tfm+0x80/0x80 [ 222.907001][ T6995] crypto_aead_init_tfm+0x149/0x1a0 [ 222.912374][ T6995] crypto_create_tfm_node+0xfd/0x310 [ 222.917733][ T6995] crypto_spawn_tfm2+0x62/0xb0 [ 222.922576][ T6995] aead_init_geniv+0x1b5/0x330 [ 222.927412][ T6995] ? aead_geniv_free+0x30/0x30 [ 222.932247][ T6995] crypto_aead_init_tfm+0x149/0x1a0 [ 222.937524][ T6995] crypto_create_tfm_node+0xfd/0x310 [ 222.942879][ T6995] crypto_alloc_tfm_node+0x102/0x260 [ 222.948227][ T6995] esp_init_authenc.constprop.0+0x1de/0xb50 [ 222.954299][ T6995] ? esp6_destroy+0x60/0x60 [ 222.958889][ T6995] ? reacquire_held_locks+0x4b0/0x4b0 [ 222.964350][ T6995] esp6_init_state+0x3fb/0x520 [ 222.969188][ T6995] __xfrm_init_state+0xb87/0x1910 [ 222.974294][ T6995] xfrm_add_sa+0x1f64/0x42f0 [ 222.978979][ T6995] ? xfrm_state_netlink+0x150/0x150 [ 222.984263][ T6995] ? __nla_parse+0x40/0x50 [ 222.988762][ T6995] ? xfrm_state_netlink+0x150/0x150 [ 222.994047][ T6995] xfrm_user_rcv_msg+0x55c/0xa60 [ 222.999075][ T6995] ? xfrm_user_net_init+0x160/0x160 [ 223.004402][ T6995] ? preempt_count_sub+0x150/0x150 [ 223.009605][ T6995] netlink_rcv_skb+0x16b/0x440 [ 223.014431][ T6995] ? xfrm_user_net_init+0x160/0x160 [ 223.019717][ T6995] ? netlink_ack+0x1370/0x1370 [ 223.024569][ T6995] ? reacquire_held_locks+0x4b0/0x4b0 [ 223.030033][ T6995] xfrm_netlink_rcv+0x6c/0x90 16:41:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3910000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) [ 223.034787][ T6995] netlink_unicast+0x536/0x810 [ 223.039622][ T6995] ? netlink_attachskb+0x870/0x870 [ 223.044787][ T6995] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 223.050758][ T6995] ? __phys_addr_symbol+0x30/0x70 [ 223.055845][ T6995] ? __check_object_size+0x323/0x740 [ 223.061199][ T6995] netlink_sendmsg+0x93c/0xe40 [ 223.066032][ T6995] ? netlink_unicast+0x810/0x810 [ 223.071050][ T6995] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 223.076415][ T6995] ? netlink_unicast+0x810/0x810 [ 223.081415][ T6995] sock_sendmsg+0xd9/0x180 [ 223.085944][ T6995] ____sys_sendmsg+0x6ac/0x940 [ 223.090792][ T6995] ? copy_msghdr_from_user+0x10b/0x160 [ 223.096314][ T6995] ? kernel_sendmsg+0x50/0x50 [ 223.101071][ T6995] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 223.107127][ T6995] ? find_held_lock+0x2d/0x110 [ 223.111962][ T6995] ___sys_sendmsg+0x135/0x1d0 [ 223.116715][ T6995] ? do_recvmmsg+0x740/0x740 [ 223.121388][ T6995] ? ksys_write+0x214/0x250 [ 223.126012][ T6995] ? __fget_light+0xe6/0x260 [ 223.130687][ T6995] __sys_sendmsg+0x117/0x1e0 [ 223.135340][ T6995] ? __sys_sendmsg_sock+0x30/0x30 [ 223.140450][ T6995] ? syscall_enter_from_user_mode+0x26/0x80 [ 223.146419][ T6995] do_syscall_64+0x38/0xb0 [ 223.150925][ T6995] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 223.156904][ T6995] RIP: 0033:0x7f549ee7cae9 [ 223.161369][ T6995] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 16:41:36 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x11000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3948000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) [ 223.181045][ T6995] RSP: 002b:00007f549fbe10c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 223.189522][ T6995] RAX: ffffffffffffffda RBX: 00007f549ef9bf80 RCX: 00007f549ee7cae9 [ 223.197551][ T6995] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 223.205578][ T6995] RBP: 00007f549fbe1120 R08: 0000000000000000 R09: 0000000000000000 [ 223.213605][ T6995] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 223.221629][ T6995] R13: 000000000000000b R14: 00007f549ef9bf80 R15: 00007fff61062058 [ 223.230035][ T6995] 16:41:36 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:37 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:37 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x3f00, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:37 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x13000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:37 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {0x3}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="394c000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:37 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:37 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:37 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x3f000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:37 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x6000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3960000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:37 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {0x300}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:37 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x2, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:37 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee163", 0x55, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:37 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x60000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3968000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:37 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xa001, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:37 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {0x3000000}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:37 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x3, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:37 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:37 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xb401, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:37 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x80010000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="396c000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:37 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3974000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:38 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee163", 0x55, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:38 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {0x0, 0x3}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:38 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:38 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xe900, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:38 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x84010000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="397a000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:38 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {0x0, 0x300}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:38 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x98010000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="39f0000013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:38 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x6, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:38 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="390e010013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:39 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee163", 0x55, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:39 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {0x0, 0x3000000}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:39 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x34000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:39 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x7, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:39 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x9effffff, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900030013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:39 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x8, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900050013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:39 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x400300, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:39 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xc9000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:39 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:39 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xf0ffff, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:39 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d11867", 0x7f, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:39 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xf0ffffff, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:39 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x9, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900060013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:39 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {0x0, 0x0, 0x3}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:39 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x1000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:39 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xfffff000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:39 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {0x0, 0x0, 0x300}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:39 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xa, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900070013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:40 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x2000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:40 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xffffff7f, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:40 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d11867", 0x7f, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:40 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xb, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:40 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {0x0, 0x0, 0x3000000}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:40 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x3000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900090013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:40 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xffffff9e, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:40 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xfffffff0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="39000a0013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:40 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:40 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xe, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:40 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x4000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:40 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xf, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:41 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d11867", 0x7f, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:41 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x3, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:41 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xffffffff, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="39000c0013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:41 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x5000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:41 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x10, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:41 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0xf, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:41 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x11, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:41 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x6000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:41 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x300, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="39c20d0013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:41 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0xf0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:41 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb", 0x94, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="39000e0013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:41 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x7000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:41 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x3000000, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:41 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x13, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:41 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x2c0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:41 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x8000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="39010e0013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:42 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:42 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x60, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:42 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0xec0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="39000f0013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:42 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb", 0x94, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:42 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x9000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:42 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x3, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:42 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xf0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:42 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x33fe0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="39001f0013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:42 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x300, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:42 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x136, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:42 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xa000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900200013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:42 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0xfffffdef, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:42 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x3000000, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:43 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb", 0x94, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:43 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x180, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:43 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x2, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900480013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:43 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xb000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:43 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:43 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xe000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:43 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x1a0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="39004c0013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:43 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0xa, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:43 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x3, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:43 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:43 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x1b4, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3965580013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:43 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xf000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:43 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0xc, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:43 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be53", 0x9f, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:43 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x3, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:44 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x300, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:44 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0xf, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:44 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x10000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900600013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:44 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3958650013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:44 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x500, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:44 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}, 0x3}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:44 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x18, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:44 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x11000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 230.874167][ T7299] netlink: 140 bytes leftover after parsing attributes in process `syz-executor.4'. 16:41:44 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be53", 0x9f, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900680013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:44 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x600, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:44 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}, 0x300}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:44 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x28, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:44 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x13000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 231.316834][ T7306] netlink: 368 bytes leftover after parsing attributes in process `syz-executor.4'. 16:41:44 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x3f000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="39006c0013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:44 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x700, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:44 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:44 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}, 0x3000000}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:45 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x60000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:45 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be53", 0x9f, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:45 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:45 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x2, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:45 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x900, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900740013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:45 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x80010000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="39007a0013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:45 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x9effffff, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:45 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xa00, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:45 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c, 0x17, {0x3}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:45 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x3, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900810013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:46 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e986", 0xa4, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:46 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xa0010000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:46 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x4, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:46 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c, 0x17, {0x300}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:46 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xb00, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="390dc20013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900f00013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:46 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c, 0x17, {0x3000000}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:46 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xb4010000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:46 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xe00, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:46 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x5, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="390000007b001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:46 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e986", 0xa4, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:46 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:46 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xe9000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:46 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xf00, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:46 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x6, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900020013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:46 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x7, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:46 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c, 0x17, {0x0, 0x3}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900030013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:46 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x1100, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:46 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xf0ffffff, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:47 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x8, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:47 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e986", 0xa4, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:47 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c, 0x17, {0x0, 0x300}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:47 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x1300, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:47 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xfffff000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900040013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:47 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x9, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:47 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c, 0x17, {0x0, 0x3000000}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:47 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0xa, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:47 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x3601, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900050013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:47 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xffffff7f, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:47 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:48 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee05", 0xa7, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:48 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0xb, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:48 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x3f00, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:48 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xffffff9e, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900060013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:48 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c, 0x17, {0x0, 0x0, 0x3}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:48 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x6000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:48 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xfffffff0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:48 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c, 0x17, {0x0, 0x0, 0x300}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900070013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:48 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0xe, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:48 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xa001, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:48 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee05", 0xa7, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:48 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xffffffff, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:48 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0xf, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:48 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c, 0x17, {0x0, 0x0, 0x3000000}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900080013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:48 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xb401, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900090013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:48 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x10, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:48 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0xf, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:48 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:49 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:49 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0xf0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:49 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee05", 0xa7, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:49 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x11, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:49 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c, 0x17, {0x0, 0x0, 0x0, 0x3}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:49 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x34000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="39000a0013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:49 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x2c0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="39000c0013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:49 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x13, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:49 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c, 0x17, {0x0, 0x0, 0x0, 0x300}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:49 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0xec0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:49 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x400300, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:49 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x33fe0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:50 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee0598", 0xa8, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="39000e0013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:50 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c, 0x17, {0x0, 0x0, 0x0, 0x3000000}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:50 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x60, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:50 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xf0ffff, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:50 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0xfffffdef, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:50 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:50 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0xc9, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:50 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x2, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:50 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x1000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="39000f0013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:50 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0xf0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:50 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee0598", 0xa8, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:50 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c, 0x17, {0x0, 0x0, 0x0, 0x0, 0x3}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:50 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x7, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:50 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x2000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900100013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:50 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x180, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:50 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x3000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:50 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c, 0x17, {0x0, 0x0, 0x0, 0x0, 0x300}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:51 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x184, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:51 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0xa, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900480013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:51 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x4000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:51 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0xc, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:51 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c, 0x17, {0x0, 0x0, 0x0, 0x0, 0x3000000}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:51 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x198, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="39004c0013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:51 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee0598", 0xa8, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:51 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x5000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:51 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x300, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:51 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x6000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:51 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900600013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:51 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0xf, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:51 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x500, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:51 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c, 0x17, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:51 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x7000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900680013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:52 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xa9, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:52 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x28, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:52 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x600, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:52 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c, 0x17, {0x0, 0x0, 0x0, 0x0, 0x0, 0x300}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:52 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x8000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="39006c0013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:52 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x700, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:52 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c, 0x17, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900740013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:52 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x9000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 238.908046][ T7593] netlink: 396 bytes leftover after parsing attributes in process `syz-executor.3'. 16:41:52 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:52 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:53 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xa9, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="39007a0013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:53 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xa000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:53 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x900, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:53 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x3}}]}, 0x1a0}}, 0x0) 16:41:53 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x2, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:53 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x300}}]}, 0x1a0}}, 0x0) 16:41:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900f00013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:53 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xb000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:53 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0xa00, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:53 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x3, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:53 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xe000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:53 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xa9, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:53 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x3000000}}]}, 0x1a0}}, 0x0) 16:41:53 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0xb00, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:53 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x4, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="39000e0113001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:53 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xf000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:53 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0xe00, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:53 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:53 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x10000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000313001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:53 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x5, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:53 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0xf00, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:54 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:54 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x3}}]}, 0x1a0}}, 0x0) 16:41:54 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x6, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000513001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:54 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x11000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:54 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x1100, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:54 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x300}}]}, 0x1a0}}, 0x0) 16:41:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000613001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:54 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x1300, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:54 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x13000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:54 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x7, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:54 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x3f00, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:55 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:55 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x36010000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000713001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:55 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x3000000}}]}, 0x1a0}}, 0x0) 16:41:55 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x8, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:55 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x6000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000913001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:55 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x8401, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:55 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}, 0x1, 0x3}, 0x0) 16:41:55 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x3f000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:55 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x9, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000a13001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:55 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:55 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}, 0x1, 0x300}, 0x0) 16:41:55 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x60000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:55 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x9801, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:55 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0xa, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000c13001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:55 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0xb, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:55 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0xc900, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900c20d13001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:55 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}, 0x1, 0x3000000}, 0x0) 16:41:55 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x80010000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000e13001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:56 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:56 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0xf000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:56 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}, 0x1, 0x300000000000000}, 0x0) 16:41:56 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0xe, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:56 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x9effffff, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900010e13001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:56 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xa0010000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000f13001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:56 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}, 0x1, 0x0, 0x3}, 0x0) 16:41:56 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x34000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:56 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0xf, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:56 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x400300, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:57 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:57 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xb4010000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:57 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x10, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900001f13001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:57 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}, 0x1, 0x0, 0x300}, 0x0) 16:41:57 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0xf0ffff, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900002013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:57 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xf0ffffff, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:57 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x11, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:57 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x1000000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:57 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}, 0x1, 0x0, 0x3000000}, 0x0) 16:41:57 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x2000000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:57 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:57 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}, 0x1, 0x0, 0x300000000000000}, 0x0) 16:41:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900004813001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:57 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x13, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:57 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xfffff000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:57 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x3000000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:57 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xffffff7f, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:57 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x60, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:57 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x4000000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900004c13001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:57 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:58 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x5000000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:58 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:58 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0xe9, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:58 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xffffff9e, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900655813001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:58 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x3}, 0x0) 16:41:58 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x6000000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:58 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0xf0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:58 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xfffffff0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900006013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:58 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x7000000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:58 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x300}, 0x0) 16:41:58 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x180, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:59 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:59 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xffffffff, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:59 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x3000000}, 0x0) 16:41:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900586513001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:59 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x8000000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:59 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x1a0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:59 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x9000000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:59 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0xf, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:59 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x3) 16:41:59 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x1b4, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900006813001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:59 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0xa000000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:59 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:41:59 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x300) 16:41:59 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0xf0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:59 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x300, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900006c13001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:41:59 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0xb000000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:59 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0xe000000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:41:59 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x2c0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:59 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x3000000) 16:41:59 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x500, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:41:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900007413001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:42:00 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0xec0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:00 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f0000000380)) 16:42:00 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x300000000000000) 16:42:00 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0xf000000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:42:00 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x600, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900007a13001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:42:00 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x33fe0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900008113001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:42:00 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x10000000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:42:00 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0xfffffdef, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:00 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x700, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:00 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x2, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:00 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x900, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:01 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f0000000380)) 16:42:01 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x11000000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:42:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="39000dc213001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:42:01 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0xa, &(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) r2 = socket$unix(0x1, 0x8a02f18e7204c4a7, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000100)={'vcan0\x00'}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r3, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r4, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r5 = socket(0xa, 0x3, 0x2) ioctl$sock_inet6_SIOCSIFDSTADDR(r5, 0x541b, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r6, &(0x7f0000000180)={0x0, 0xfffffffffffffe6d, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, 0x2, 0x3, 0x101, 0x0, 0x0, {0x0, 0x0, 0x1000}, [@NFQA_CFG_QUEUE_MAXLEN={0x8}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x19}, @NFQA_CFG_CMD={0x8, 0x1, {0x1}}]}, 0x2c}}, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000240)=0x0) sendmsg$nl_netfilter(r5, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={&(0x7f00000005c0)=ANY=[@ANYRES32=r7, @ANYBLOB="00aa8171e5406e82cad3479b6588b148c2d38e2459daa57c2c3c34adc4ff4cef1b90fd5ed839cdc189988c296489c9c6930bb3dd3e52201688e1fba8e3a3c27bd30ff94ca4787ef436163301ba554b33a7ca6adf00cdc0fd8dd2ab8f15928a19e96423f2bb45bd957269c6e0311da2aea8d896a480d0259633376a8925d331118276fd73ba770b4873d3bd0d965ae236ec9c626e05ec926be457ee5f2ef1800c03addce71a8f2b62483c75db"], 0x1184}, 0x1, 0x0, 0x0, 0x11}, 0x80) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, 0x2, 0x3, 0x101, 0x0, 0x0, {}, [@NFQA_CFG_QUEUE_MAXLEN={0x8}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x10}, @NFQA_CFG_CMD={0x8, 0x1, {0x1, 0x0, 0x11}}]}, 0x2c}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003540)=[{{0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000001a80)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}], 0x40, 0x4000}}, {{0x0, 0x0, &(0x7f0000003000)=[{&(0x7f0000001ac0)="adb9c2cad7b453b7abaaa9117d4c077ccfc8de896c5f71da1f7798fd1338978eb7db791b268916b7467f4a643ffcfada6d04fdfc76b6523b4e", 0x39}, {&(0x7f0000001b00)}, {0x0}, {&(0x7f0000001bc0)="c5fd433c82510f209f7330ab1cc5adac336ade696a3faa7ad34ea9bcb3430e0aa666c197c0a35b4f50dd2c6523827ab626b253da74588e299679ea1f53854f7be2a1d52754a2b27e3699e6d1750c0c7e2bb5ed639642ac29fd6b42872854b178a868fb769d05c14917fb3fe060516983750bd1c7", 0x74}, {0x0}, {&(0x7f0000001d40)="d1a751eeef3a6df66eca5109ce14cc3a785febdc1b4b2a4a35632680e6e1a72400947a7c1fcbbe71809edf7360bf4727f269b810437de9d6f2ac1ee46f8d15f1005c3e1587e1b2b98b89e72c3730069c205360840c1b9416a9c8084d84032c5963daf65cbc", 0x65}, {&(0x7f0000001dc0)}, {&(0x7f0000001800)="88d63700001a81728fca3c3e0c5da5f94a4b4a6fb76b02e8d3b9f2eaa8fd9676f4ac12638ce8fe7a5395580f9c84224e3fa8aa1aebc94a8d7ac9fc9a47ea0251c1ab4b6be149aaabe390494ad94905d5f4ef9237556405f89cc080bf7ec3700dcce8912aac85f6eb0501c91a4a5e07f33701a1f0f41bfafcf4bcd43d42d55fe62c6cec55a2e460bd42466dafb2f462758a66c0", 0x93}, {&(0x7f0000002e80)="dfa2cb585b857f6168035e3d39e1f49c8931d8953ef69c6d81ab3bca6aae1aaa2c1ff05237f7666098f89564d227fa35815982205546ac9148c2bde47f5bbf31f67dd285824b9e95f661494ffaabf0922857c1924279edc1644dc67830b00ee4f72e731239563a825a6be9aebd04769c4a8e18b1eda3b5be91c2947972", 0x7d}, {&(0x7f0000002f00)="043ca17b7a28d6750e4f0bbe694995fb1b352120ea06abe108f18ea6b7044bf1ff3c5098196e51d612d78e8a175902d8842d27ded9b222be9f38d2edfbd7ec1b8bd229da6894bdf0cd807c9fc701763d72d8e6ac115a8f17a399260486a04f1a6853b3f53c1fdedc1774d5e27c66881e72e56b40c50bc01a45625c0b31858a6bdc5e1c9520d14e41639400dd4cda6cbf1c07ad8cc61f0441aeae3320071d8f6d1ccdebfa3bcb5632a3692fafdb4bf5fe39347411948566515acddb22b899cec03feef4d0351733dc1be700dd112f962b0a2687f7d6b5a3faf798672a0df0d4e48808f096b848aa51bdc116d1fbb05ddce170", 0xf2}], 0xa, &(0x7f0000003300)=ANY=[@ANYBLOB="28000000000000000100000001000000", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r6, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYRES32=r7, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=r7, @ANYRES32=0x0, @ANYBLOB="000000003000000000000000010000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYRES32=r6, @ANYBLOB="a8b9c336b8f90291afc36f7763e26c6e46367e3d69c50e3bccde95f0c1e4dd5f9bde7d73baa6a92b39ccd431c3a1a15a0000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT, @ANYRES32, @ANYRES32, @ANYRES32=r6, @ANYRES32=r4, @ANYRES32=r3, @ANYRES32=r6, @ANYRES32=r8], 0x140, 0x4000004}}], 0x2, 0x4000000) sendmsg$nl_xfrm(r0, &(0x7f00000008c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000880)={&(0x7f0000000580)=@updsa={0x2d0, 0x1a, 0x400, 0x70bd2a, 0x25dfdbfc, {{@in6=@loopback, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4e20, 0x101, 0x4e24, 0x5, 0xa, 0x0, 0x0, 0x3c, r1, r7}, {@in=@multicast1, 0x4d3, 0x6c}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, {0x9, 0xfffffffffffffffb, 0x80000000, 0x7, 0x20, 0x8, 0x7fff, 0x3}, {0xcf3, 0xbe, 0x9}, {0x90d3, 0x8, 0x3f}, 0x70bd2a, 0x3503, 0x2, 0x6, 0x3}, [@algo_comp={0xca, 0x3, {{'lzjh\x00'}, 0x410, "e5f4a9219c5fe110aa9b1255bc6d68cede0b806c3c1eb8db6fe3829fbe4fbf5d2487abe3e24a3673243f6183f3d8e03852f5229a57944c6917b2d9d9eea0aa1ce95161f0d5ae29f05c269a4b4747354dedd08d58f971e86e096faafe6803631ae4f44678012068b8582eefef07395b280d462cfcaaf0206189c36a69118bf8a568cf"}}, @XFRMA_SET_MARK_MASK={0x8, 0x1e, 0x101}, @sec_ctx={0xf7, 0x8, {0xf3, 0x8, 0x0, 0x8, 0xeb, "15cec4551e0255003fa510999ff5c1bf5cb6963776a70c0615a3298c86251b5c159ba854a3bd19c2c047a783e901c614a2e36814c165c2c5c1bfc8d29ab794d6d9efca38c820ac97ea85d0cc3594c2d25d6a69efeafbf3087585080e26f794fb5e7c3e9f8a617f6bbfcbe4c2b7cda97da60ca2e6abe1859e876c5af15a55975698e27ba3fce59d8a6def170604a7d8b47f3d1b159bd500008deeb3b5d98923489286cad6d2b24a50075db2380624badd88545c1dfed43d4ac72a616bfa9b285fb9b2dc6c09e5a90e43d473b58a19ed3878d009fc08f0bf262fde5f963d82359afb9b61e8d4e4c5c1697e39"}}, @srcaddr={0x14, 0xd, @in=@loopback}]}, 0x2d0}}, 0x40000) 16:42:01 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0xa00, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:01 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x7, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:01 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x13000000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:42:01 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0xb00, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:01 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) (async) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0xa, &(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) socket$unix(0x1, 0x8a02f18e7204c4a7, 0x0) (async) r2 = socket$unix(0x1, 0x8a02f18e7204c4a7, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000100)={'vcan0\x00'}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r3, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) (async) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r4, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r5 = socket(0xa, 0x3, 0x2) ioctl$sock_inet6_SIOCSIFDSTADDR(r5, 0x541b, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r6, &(0x7f0000000180)={0x0, 0xfffffffffffffe6d, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, 0x2, 0x3, 0x101, 0x0, 0x0, {0x0, 0x0, 0x1000}, [@NFQA_CFG_QUEUE_MAXLEN={0x8}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x19}, @NFQA_CFG_CMD={0x8, 0x1, {0x1}}]}, 0x2c}}, 0x0) (async) sendmsg$NFQNL_MSG_CONFIG(r6, &(0x7f0000000180)={0x0, 0xfffffffffffffe6d, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, 0x2, 0x3, 0x101, 0x0, 0x0, {0x0, 0x0, 0x1000}, [@NFQA_CFG_QUEUE_MAXLEN={0x8}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x19}, @NFQA_CFG_CMD={0x8, 0x1, {0x1}}]}, 0x2c}}, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000240)=0x0) sendmsg$nl_netfilter(r5, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={&(0x7f00000005c0)=ANY=[@ANYRES32=r7, @ANYBLOB="00aa8171e5406e82cad3479b6588b148c2d38e2459daa57c2c3c34adc4ff4cef1b90fd5ed839cdc189988c296489c9c6930bb3dd3e52201688e1fba8e3a3c27bd30ff94ca4787ef436163301ba554b33a7ca6adf00cdc0fd8dd2ab8f15928a19e96423f2bb45bd957269c6e0311da2aea8d896a480d0259633376a8925d331118276fd73ba770b4873d3bd0d965ae236ec9c626e05ec926be457ee5f2ef1800c03addce71a8f2b62483c75db"], 0x1184}, 0x1, 0x0, 0x0, 0x11}, 0x80) (async) sendmsg$nl_netfilter(r5, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={&(0x7f00000005c0)=ANY=[@ANYRES32=r7, @ANYBLOB="00aa8171e5406e82cad3479b6588b148c2d38e2459daa57c2c3c34adc4ff4cef1b90fd5ed839cdc189988c296489c9c6930bb3dd3e52201688e1fba8e3a3c27bd30ff94ca4787ef436163301ba554b33a7ca6adf00cdc0fd8dd2ab8f15928a19e96423f2bb45bd957269c6e0311da2aea8d896a480d0259633376a8925d331118276fd73ba770b4873d3bd0d965ae236ec9c626e05ec926be457ee5f2ef1800c03addce71a8f2b62483c75db"], 0x1184}, 0x1, 0x0, 0x0, 0x11}, 0x80) socket$nl_netfilter(0x10, 0x3, 0xc) (async) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, 0x2, 0x3, 0x101, 0x0, 0x0, {}, [@NFQA_CFG_QUEUE_MAXLEN={0x8}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x10}, @NFQA_CFG_CMD={0x8, 0x1, {0x1, 0x0, 0x11}}]}, 0x2c}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003540)=[{{0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000001a80)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}], 0x40, 0x4000}}, {{0x0, 0x0, &(0x7f0000003000)=[{&(0x7f0000001ac0)="adb9c2cad7b453b7abaaa9117d4c077ccfc8de896c5f71da1f7798fd1338978eb7db791b268916b7467f4a643ffcfada6d04fdfc76b6523b4e", 0x39}, {&(0x7f0000001b00)}, {0x0}, {&(0x7f0000001bc0)="c5fd433c82510f209f7330ab1cc5adac336ade696a3faa7ad34ea9bcb3430e0aa666c197c0a35b4f50dd2c6523827ab626b253da74588e299679ea1f53854f7be2a1d52754a2b27e3699e6d1750c0c7e2bb5ed639642ac29fd6b42872854b178a868fb769d05c14917fb3fe060516983750bd1c7", 0x74}, {0x0}, {&(0x7f0000001d40)="d1a751eeef3a6df66eca5109ce14cc3a785febdc1b4b2a4a35632680e6e1a72400947a7c1fcbbe71809edf7360bf4727f269b810437de9d6f2ac1ee46f8d15f1005c3e1587e1b2b98b89e72c3730069c205360840c1b9416a9c8084d84032c5963daf65cbc", 0x65}, {&(0x7f0000001dc0)}, {&(0x7f0000001800)="88d63700001a81728fca3c3e0c5da5f94a4b4a6fb76b02e8d3b9f2eaa8fd9676f4ac12638ce8fe7a5395580f9c84224e3fa8aa1aebc94a8d7ac9fc9a47ea0251c1ab4b6be149aaabe390494ad94905d5f4ef9237556405f89cc080bf7ec3700dcce8912aac85f6eb0501c91a4a5e07f33701a1f0f41bfafcf4bcd43d42d55fe62c6cec55a2e460bd42466dafb2f462758a66c0", 0x93}, {&(0x7f0000002e80)="dfa2cb585b857f6168035e3d39e1f49c8931d8953ef69c6d81ab3bca6aae1aaa2c1ff05237f7666098f89564d227fa35815982205546ac9148c2bde47f5bbf31f67dd285824b9e95f661494ffaabf0922857c1924279edc1644dc67830b00ee4f72e731239563a825a6be9aebd04769c4a8e18b1eda3b5be91c2947972", 0x7d}, {&(0x7f0000002f00)="043ca17b7a28d6750e4f0bbe694995fb1b352120ea06abe108f18ea6b7044bf1ff3c5098196e51d612d78e8a175902d8842d27ded9b222be9f38d2edfbd7ec1b8bd229da6894bdf0cd807c9fc701763d72d8e6ac115a8f17a399260486a04f1a6853b3f53c1fdedc1774d5e27c66881e72e56b40c50bc01a45625c0b31858a6bdc5e1c9520d14e41639400dd4cda6cbf1c07ad8cc61f0441aeae3320071d8f6d1ccdebfa3bcb5632a3692fafdb4bf5fe39347411948566515acddb22b899cec03feef4d0351733dc1be700dd112f962b0a2687f7d6b5a3faf798672a0df0d4e48808f096b848aa51bdc116d1fbb05ddce170", 0xf2}], 0xa, &(0x7f0000003300)=ANY=[@ANYBLOB="28000000000000000100000001000000", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r6, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYRES32=r7, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=r7, @ANYRES32=0x0, @ANYBLOB="000000003000000000000000010000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYRES32=r6, @ANYBLOB="a8b9c336b8f90291afc36f7763e26c6e46367e3d69c50e3bccde95f0c1e4dd5f9bde7d73baa6a92b39ccd431c3a1a15a0000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT, @ANYRES32, @ANYRES32, @ANYRES32=r6, @ANYRES32=r4, @ANYRES32=r3, @ANYRES32=r6, @ANYRES32=r8], 0x140, 0x4000004}}], 0x2, 0x4000000) sendmsg$nl_xfrm(r0, &(0x7f00000008c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000880)={&(0x7f0000000580)=@updsa={0x2d0, 0x1a, 0x400, 0x70bd2a, 0x25dfdbfc, {{@in6=@loopback, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4e20, 0x101, 0x4e24, 0x5, 0xa, 0x0, 0x0, 0x3c, r1, r7}, {@in=@multicast1, 0x4d3, 0x6c}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, {0x9, 0xfffffffffffffffb, 0x80000000, 0x7, 0x20, 0x8, 0x7fff, 0x3}, {0xcf3, 0xbe, 0x9}, {0x90d3, 0x8, 0x3f}, 0x70bd2a, 0x3503, 0x2, 0x6, 0x3}, [@algo_comp={0xca, 0x3, {{'lzjh\x00'}, 0x410, "e5f4a9219c5fe110aa9b1255bc6d68cede0b806c3c1eb8db6fe3829fbe4fbf5d2487abe3e24a3673243f6183f3d8e03852f5229a57944c6917b2d9d9eea0aa1ce95161f0d5ae29f05c269a4b4747354dedd08d58f971e86e096faafe6803631ae4f44678012068b8582eefef07395b280d462cfcaaf0206189c36a69118bf8a568cf"}}, @XFRMA_SET_MARK_MASK={0x8, 0x1e, 0x101}, @sec_ctx={0xf7, 0x8, {0xf3, 0x8, 0x0, 0x8, 0xeb, "15cec4551e0255003fa510999ff5c1bf5cb6963776a70c0615a3298c86251b5c159ba854a3bd19c2c047a783e901c614a2e36814c165c2c5c1bfc8d29ab794d6d9efca38c820ac97ea85d0cc3594c2d25d6a69efeafbf3087585080e26f794fb5e7c3e9f8a617f6bbfcbe4c2b7cda97da60ca2e6abe1859e876c5af15a55975698e27ba3fce59d8a6def170604a7d8b47f3d1b159bd500008deeb3b5d98923489286cad6d2b24a50075db2380624badd88545c1dfed43d4ac72a616bfa9b285fb9b2dc6c09e5a90e43d473b58a19ed3878d009fc08f0bf262fde5f963d82359afb9b61e8d4e4c5c1697e39"}}, @srcaddr={0x14, 0xd, @in=@loopback}]}, 0x2d0}}, 0x40000) 16:42:01 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0xa, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="390000f013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:42:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="390000000f001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:42:01 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f0000000380)) 16:42:01 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x3f000000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:42:01 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0xc, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:01 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0xa, &(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) r2 = socket$unix(0x1, 0x8a02f18e7204c4a7, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000100)={'vcan0\x00'}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r3, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r4, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r5 = socket(0xa, 0x3, 0x2) ioctl$sock_inet6_SIOCSIFDSTADDR(r5, 0x541b, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r6, &(0x7f0000000180)={0x0, 0xfffffffffffffe6d, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, 0x2, 0x3, 0x101, 0x0, 0x0, {0x0, 0x0, 0x1000}, [@NFQA_CFG_QUEUE_MAXLEN={0x8}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x19}, @NFQA_CFG_CMD={0x8, 0x1, {0x1}}]}, 0x2c}}, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000240)=0x0) sendmsg$nl_netfilter(r5, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={&(0x7f00000005c0)=ANY=[@ANYRES32=r7, @ANYBLOB="00aa8171e5406e82cad3479b6588b148c2d38e2459daa57c2c3c34adc4ff4cef1b90fd5ed839cdc189988c296489c9c6930bb3dd3e52201688e1fba8e3a3c27bd30ff94ca4787ef436163301ba554b33a7ca6adf00cdc0fd8dd2ab8f15928a19e96423f2bb45bd957269c6e0311da2aea8d896a480d0259633376a8925d331118276fd73ba770b4873d3bd0d965ae236ec9c626e05ec926be457ee5f2ef1800c03addce71a8f2b62483c75db"], 0x1184}, 0x1, 0x0, 0x0, 0x11}, 0x80) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, 0x2, 0x3, 0x101, 0x0, 0x0, {}, [@NFQA_CFG_QUEUE_MAXLEN={0x8}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x10}, @NFQA_CFG_CMD={0x8, 0x1, {0x1, 0x0, 0x11}}]}, 0x2c}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003540)=[{{0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000001a80)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}], 0x40, 0x4000}}, {{0x0, 0x0, &(0x7f0000003000)=[{&(0x7f0000001ac0)="adb9c2cad7b453b7abaaa9117d4c077ccfc8de896c5f71da1f7798fd1338978eb7db791b268916b7467f4a643ffcfada6d04fdfc76b6523b4e", 0x39}, {&(0x7f0000001b00)}, {0x0}, {&(0x7f0000001bc0)="c5fd433c82510f209f7330ab1cc5adac336ade696a3faa7ad34ea9bcb3430e0aa666c197c0a35b4f50dd2c6523827ab626b253da74588e299679ea1f53854f7be2a1d52754a2b27e3699e6d1750c0c7e2bb5ed639642ac29fd6b42872854b178a868fb769d05c14917fb3fe060516983750bd1c7", 0x74}, {0x0}, {&(0x7f0000001d40)="d1a751eeef3a6df66eca5109ce14cc3a785febdc1b4b2a4a35632680e6e1a72400947a7c1fcbbe71809edf7360bf4727f269b810437de9d6f2ac1ee46f8d15f1005c3e1587e1b2b98b89e72c3730069c205360840c1b9416a9c8084d84032c5963daf65cbc", 0x65}, {&(0x7f0000001dc0)}, {&(0x7f0000001800)="88d63700001a81728fca3c3e0c5da5f94a4b4a6fb76b02e8d3b9f2eaa8fd9676f4ac12638ce8fe7a5395580f9c84224e3fa8aa1aebc94a8d7ac9fc9a47ea0251c1ab4b6be149aaabe390494ad94905d5f4ef9237556405f89cc080bf7ec3700dcce8912aac85f6eb0501c91a4a5e07f33701a1f0f41bfafcf4bcd43d42d55fe62c6cec55a2e460bd42466dafb2f462758a66c0", 0x93}, {&(0x7f0000002e80)="dfa2cb585b857f6168035e3d39e1f49c8931d8953ef69c6d81ab3bca6aae1aaa2c1ff05237f7666098f89564d227fa35815982205546ac9148c2bde47f5bbf31f67dd285824b9e95f661494ffaabf0922857c1924279edc1644dc67830b00ee4f72e731239563a825a6be9aebd04769c4a8e18b1eda3b5be91c2947972", 0x7d}, {&(0x7f0000002f00)="043ca17b7a28d6750e4f0bbe694995fb1b352120ea06abe108f18ea6b7044bf1ff3c5098196e51d612d78e8a175902d8842d27ded9b222be9f38d2edfbd7ec1b8bd229da6894bdf0cd807c9fc701763d72d8e6ac115a8f17a399260486a04f1a6853b3f53c1fdedc1774d5e27c66881e72e56b40c50bc01a45625c0b31858a6bdc5e1c9520d14e41639400dd4cda6cbf1c07ad8cc61f0441aeae3320071d8f6d1ccdebfa3bcb5632a3692fafdb4bf5fe39347411948566515acddb22b899cec03feef4d0351733dc1be700dd112f962b0a2687f7d6b5a3faf798672a0df0d4e48808f096b848aa51bdc116d1fbb05ddce170", 0xf2}], 0xa, &(0x7f0000003300)=ANY=[@ANYBLOB="28000000000000000100000001000000", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r6, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYRES32=r7, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=r7, @ANYRES32=0x0, @ANYBLOB="000000003000000000000000010000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYRES32=r6, @ANYBLOB="a8b9c336b8f90291afc36f7763e26c6e46367e3d69c50e3bccde95f0c1e4dd5f9bde7d73baa6a92b39ccd431c3a1a15a0000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT, @ANYRES32, @ANYRES32, @ANYRES32=r6, @ANYRES32=r4, @ANYRES32=r3, @ANYRES32=r6, @ANYRES32=r8], 0x140, 0x4000004}}], 0x2, 0x4000000) sendmsg$nl_xfrm(r0, &(0x7f00000008c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000880)={&(0x7f0000000580)=@updsa={0x2d0, 0x1a, 0x400, 0x70bd2a, 0x25dfdbfc, {{@in6=@loopback, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4e20, 0x101, 0x4e24, 0x5, 0xa, 0x0, 0x0, 0x3c, r1, r7}, {@in=@multicast1, 0x4d3, 0x6c}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, {0x9, 0xfffffffffffffffb, 0x80000000, 0x7, 0x20, 0x8, 0x7fff, 0x3}, {0xcf3, 0xbe, 0x9}, {0x90d3, 0x8, 0x3f}, 0x70bd2a, 0x3503, 0x2, 0x6, 0x3}, [@algo_comp={0xca, 0x3, {{'lzjh\x00'}, 0x410, "e5f4a9219c5fe110aa9b1255bc6d68cede0b806c3c1eb8db6fe3829fbe4fbf5d2487abe3e24a3673243f6183f3d8e03852f5229a57944c6917b2d9d9eea0aa1ce95161f0d5ae29f05c269a4b4747354dedd08d58f971e86e096faafe6803631ae4f44678012068b8582eefef07395b280d462cfcaaf0206189c36a69118bf8a568cf"}}, @XFRMA_SET_MARK_MASK={0x8, 0x1e, 0x101}, @sec_ctx={0xf7, 0x8, {0xf3, 0x8, 0x0, 0x8, 0xeb, "15cec4551e0255003fa510999ff5c1bf5cb6963776a70c0615a3298c86251b5c159ba854a3bd19c2c047a783e901c614a2e36814c165c2c5c1bfc8d29ab794d6d9efca38c820ac97ea85d0cc3594c2d25d6a69efeafbf3087585080e26f794fb5e7c3e9f8a617f6bbfcbe4c2b7cda97da60ca2e6abe1859e876c5af15a55975698e27ba3fce59d8a6def170604a7d8b47f3d1b159bd500008deeb3b5d98923489286cad6d2b24a50075db2380624badd88545c1dfed43d4ac72a616bfa9b285fb9b2dc6c09e5a90e43d473b58a19ed3878d009fc08f0bf262fde5f963d82359afb9b61e8d4e4c5c1697e39"}}, @srcaddr={0x14, 0xd, @in=@loopback}]}, 0x2d0}}, 0x40000) socket$nl_xfrm(0x10, 0x3, 0x6) (async) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0xa, &(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) (async) socket$unix(0x1, 0x8a02f18e7204c4a7, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000100)={'vcan0\x00'}) (async) socket$can_bcm(0x1d, 0x2, 0x2) (async) connect$can_bcm(r3, &(0x7f0000000000), 0x10) (async) sendmsg$can_bcm(r3, 0x0, 0x0) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) setsockopt$inet_MCAST_JOIN_GROUP(r4, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) (async) socket(0xa, 0x3, 0x2) (async) ioctl$sock_inet6_SIOCSIFDSTADDR(r5, 0x541b, 0x0) (async) socket$nl_netfilter(0x10, 0x3, 0xc) (async) sendmsg$NFQNL_MSG_CONFIG(r6, &(0x7f0000000180)={0x0, 0xfffffffffffffe6d, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, 0x2, 0x3, 0x101, 0x0, 0x0, {0x0, 0x0, 0x1000}, [@NFQA_CFG_QUEUE_MAXLEN={0x8}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x19}, @NFQA_CFG_CMD={0x8, 0x1, {0x1}}]}, 0x2c}}, 0x0) (async) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000240)) (async) sendmsg$nl_netfilter(r5, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={&(0x7f00000005c0)=ANY=[@ANYRES32=r7, @ANYBLOB="00aa8171e5406e82cad3479b6588b148c2d38e2459daa57c2c3c34adc4ff4cef1b90fd5ed839cdc189988c296489c9c6930bb3dd3e52201688e1fba8e3a3c27bd30ff94ca4787ef436163301ba554b33a7ca6adf00cdc0fd8dd2ab8f15928a19e96423f2bb45bd957269c6e0311da2aea8d896a480d0259633376a8925d331118276fd73ba770b4873d3bd0d965ae236ec9c626e05ec926be457ee5f2ef1800c03addce71a8f2b62483c75db"], 0x1184}, 0x1, 0x0, 0x0, 0x11}, 0x80) (async) socket$nl_netfilter(0x10, 0x3, 0xc) (async) sendmsg$NFQNL_MSG_CONFIG(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, 0x2, 0x3, 0x101, 0x0, 0x0, {}, [@NFQA_CFG_QUEUE_MAXLEN={0x8}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x10}, @NFQA_CFG_CMD={0x8, 0x1, {0x1, 0x0, 0x11}}]}, 0x2c}}, 0x0) (async) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003540)=[{{0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000001a80)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}], 0x40, 0x4000}}, {{0x0, 0x0, &(0x7f0000003000)=[{&(0x7f0000001ac0)="adb9c2cad7b453b7abaaa9117d4c077ccfc8de896c5f71da1f7798fd1338978eb7db791b268916b7467f4a643ffcfada6d04fdfc76b6523b4e", 0x39}, {&(0x7f0000001b00)}, {0x0}, {&(0x7f0000001bc0)="c5fd433c82510f209f7330ab1cc5adac336ade696a3faa7ad34ea9bcb3430e0aa666c197c0a35b4f50dd2c6523827ab626b253da74588e299679ea1f53854f7be2a1d52754a2b27e3699e6d1750c0c7e2bb5ed639642ac29fd6b42872854b178a868fb769d05c14917fb3fe060516983750bd1c7", 0x74}, {0x0}, {&(0x7f0000001d40)="d1a751eeef3a6df66eca5109ce14cc3a785febdc1b4b2a4a35632680e6e1a72400947a7c1fcbbe71809edf7360bf4727f269b810437de9d6f2ac1ee46f8d15f1005c3e1587e1b2b98b89e72c3730069c205360840c1b9416a9c8084d84032c5963daf65cbc", 0x65}, {&(0x7f0000001dc0)}, {&(0x7f0000001800)="88d63700001a81728fca3c3e0c5da5f94a4b4a6fb76b02e8d3b9f2eaa8fd9676f4ac12638ce8fe7a5395580f9c84224e3fa8aa1aebc94a8d7ac9fc9a47ea0251c1ab4b6be149aaabe390494ad94905d5f4ef9237556405f89cc080bf7ec3700dcce8912aac85f6eb0501c91a4a5e07f33701a1f0f41bfafcf4bcd43d42d55fe62c6cec55a2e460bd42466dafb2f462758a66c0", 0x93}, {&(0x7f0000002e80)="dfa2cb585b857f6168035e3d39e1f49c8931d8953ef69c6d81ab3bca6aae1aaa2c1ff05237f7666098f89564d227fa35815982205546ac9148c2bde47f5bbf31f67dd285824b9e95f661494ffaabf0922857c1924279edc1644dc67830b00ee4f72e731239563a825a6be9aebd04769c4a8e18b1eda3b5be91c2947972", 0x7d}, {&(0x7f0000002f00)="043ca17b7a28d6750e4f0bbe694995fb1b352120ea06abe108f18ea6b7044bf1ff3c5098196e51d612d78e8a175902d8842d27ded9b222be9f38d2edfbd7ec1b8bd229da6894bdf0cd807c9fc701763d72d8e6ac115a8f17a399260486a04f1a6853b3f53c1fdedc1774d5e27c66881e72e56b40c50bc01a45625c0b31858a6bdc5e1c9520d14e41639400dd4cda6cbf1c07ad8cc61f0441aeae3320071d8f6d1ccdebfa3bcb5632a3692fafdb4bf5fe39347411948566515acddb22b899cec03feef4d0351733dc1be700dd112f962b0a2687f7d6b5a3faf798672a0df0d4e48808f096b848aa51bdc116d1fbb05ddce170", 0xf2}], 0xa, &(0x7f0000003300)=ANY=[@ANYBLOB="28000000000000000100000001000000", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r6, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYRES32=r7, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=r7, @ANYRES32=0x0, @ANYBLOB="000000003000000000000000010000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYRES32=r6, @ANYBLOB="a8b9c336b8f90291afc36f7763e26c6e46367e3d69c50e3bccde95f0c1e4dd5f9bde7d73baa6a92b39ccd431c3a1a15a0000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT, @ANYRES32, @ANYRES32, @ANYRES32=r6, @ANYRES32=r4, @ANYRES32=r3, @ANYRES32=r6, @ANYRES32=r8], 0x140, 0x4000004}}], 0x2, 0x4000000) (async) sendmsg$nl_xfrm(r0, &(0x7f00000008c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000880)={&(0x7f0000000580)=@updsa={0x2d0, 0x1a, 0x400, 0x70bd2a, 0x25dfdbfc, {{@in6=@loopback, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4e20, 0x101, 0x4e24, 0x5, 0xa, 0x0, 0x0, 0x3c, r1, r7}, {@in=@multicast1, 0x4d3, 0x6c}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, {0x9, 0xfffffffffffffffb, 0x80000000, 0x7, 0x20, 0x8, 0x7fff, 0x3}, {0xcf3, 0xbe, 0x9}, {0x90d3, 0x8, 0x3f}, 0x70bd2a, 0x3503, 0x2, 0x6, 0x3}, [@algo_comp={0xca, 0x3, {{'lzjh\x00'}, 0x410, "e5f4a9219c5fe110aa9b1255bc6d68cede0b806c3c1eb8db6fe3829fbe4fbf5d2487abe3e24a3673243f6183f3d8e03852f5229a57944c6917b2d9d9eea0aa1ce95161f0d5ae29f05c269a4b4747354dedd08d58f971e86e096faafe6803631ae4f44678012068b8582eefef07395b280d462cfcaaf0206189c36a69118bf8a568cf"}}, @XFRMA_SET_MARK_MASK={0x8, 0x1e, 0x101}, @sec_ctx={0xf7, 0x8, {0xf3, 0x8, 0x0, 0x8, 0xeb, "15cec4551e0255003fa510999ff5c1bf5cb6963776a70c0615a3298c86251b5c159ba854a3bd19c2c047a783e901c614a2e36814c165c2c5c1bfc8d29ab794d6d9efca38c820ac97ea85d0cc3594c2d25d6a69efeafbf3087585080e26f794fb5e7c3e9f8a617f6bbfcbe4c2b7cda97da60ca2e6abe1859e876c5af15a55975698e27ba3fce59d8a6def170604a7d8b47f3d1b159bd500008deeb3b5d98923489286cad6d2b24a50075db2380624badd88545c1dfed43d4ac72a616bfa9b285fb9b2dc6c09e5a90e43d473b58a19ed3878d009fc08f0bf262fde5f963d82359afb9b61e8d4e4c5c1697e39"}}, @srcaddr={0x14, 0xd, @in=@loopback}]}, 0x2d0}}, 0x40000) (async) 16:42:01 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0xe00, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000213001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:42:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000313001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:42:02 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0xf, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:02 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x60000000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:42:02 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DEST(r3, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x6c, r4, 0x2, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e24}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x9e4}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x6}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e24}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20000000}, 0x8800) sendfile(r2, r1, 0x0, 0x2000d000484) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@mcast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}}}, &(0x7f0000000380)=0xe8) sendmsg$nl_xfrm(r1, &(0x7f0000000680)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000640)={&(0x7f00000003c0)=@polexpire={0x250, 0x1b, 0x400, 0x70bd28, 0x25dfdbfe, {{{@in=@rand_addr=0x64010102, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e21, 0x6829, 0x4e23, 0x0, 0xa, 0x80, 0x20, 0x1d, 0x0, r5}, {0x9, 0x1a25, 0x2, 0x9, 0x800, 0x6, 0xffffffffffffffff, 0x401}, {0x1, 0x54, 0xfffffffffffffff7, 0x1}, 0x2bd, 0x6e6bba, 0x1, 0x1, 0x1, 0x1}}, [@algo_aead={0x94, 0x12, {{'pcrypt(aegis128-generic)\x00'}, 0x240, 0xc0, "55097b8c5159a4ba857d29c7d97bee0e5fcf87ccffa3075b230c38352f26e2895d9e5180f3d4051f2b115fd770a83c1897637f209b82ed6d4cc1a68bb6a3d02bbe12999a49772a6c"}}, @algo_crypt={0xf9, 0x2, {{'xchacha20-generic\x00'}, 0x588, "6272d401135c0c0dfcffe03970e5e8f67f72aea7c957e52b5c10220bf9ddfeb6ec200f55d500d45b9f93e16739d621691af3c69f3eaf832dc9d3baf2137ebca4734b94d0631735c8178bbb1c198567777c1e9515c5008177c9147109abb7e8a864cd7d51ae1fbd64fe3c60692ab9c45de02e98e635c5fd3ff0befb74e6261637ba06821a9b82caa1fa8bee9eaf57bccb8d4fc4e91cad7e43f13c62ae118ee196cf7eab497db577609b2e21f4202d6df22a"}}]}, 0x250}, 0x1, 0x0, 0x0, 0x4000011}, 0x8011) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a0010000100013070000000000000000ffffffff000000000000000000000000fe8000000000000000000000000000bb000000000000000000000000000000006e46a3ad", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe8000000000000000000000000000bb0000000032000000ac14140000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a0000008b000000000000004800020063626328626c6f776669736829000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c0017000000000000000000000000000000000000000000000000004c001400636d6163286165732900"/344], 0x1a0}}, 0x0) 16:42:02 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0xf00, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:02 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x80010000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) [ 248.709483][ T7966] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.5'. 16:42:02 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 16:42:02 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x28, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000413001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:42:02 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DEST(r3, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x6c, r4, 0x2, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e24}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x9e4}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x6}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e24}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20000000}, 0x8800) sendfile(r2, r1, 0x0, 0x2000d000484) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@mcast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}}}, &(0x7f0000000380)=0xe8) sendmsg$nl_xfrm(r1, &(0x7f0000000680)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000640)={&(0x7f00000003c0)=@polexpire={0x250, 0x1b, 0x400, 0x70bd28, 0x25dfdbfe, {{{@in=@rand_addr=0x64010102, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e21, 0x6829, 0x4e23, 0x0, 0xa, 0x80, 0x20, 0x1d, 0x0, r5}, {0x9, 0x1a25, 0x2, 0x9, 0x800, 0x6, 0xffffffffffffffff, 0x401}, {0x1, 0x54, 0xfffffffffffffff7, 0x1}, 0x2bd, 0x6e6bba, 0x1, 0x1, 0x1, 0x1}}, [@algo_aead={0x94, 0x12, {{'pcrypt(aegis128-generic)\x00'}, 0x240, 0xc0, "55097b8c5159a4ba857d29c7d97bee0e5fcf87ccffa3075b230c38352f26e2895d9e5180f3d4051f2b115fd770a83c1897637f209b82ed6d4cc1a68bb6a3d02bbe12999a49772a6c"}}, @algo_crypt={0xf9, 0x2, {{'xchacha20-generic\x00'}, 0x588, "6272d401135c0c0dfcffe03970e5e8f67f72aea7c957e52b5c10220bf9ddfeb6ec200f55d500d45b9f93e16739d621691af3c69f3eaf832dc9d3baf2137ebca4734b94d0631735c8178bbb1c198567777c1e9515c5008177c9147109abb7e8a864cd7d51ae1fbd64fe3c60692ab9c45de02e98e635c5fd3ff0befb74e6261637ba06821a9b82caa1fa8bee9eaf57bccb8d4fc4e91cad7e43f13c62ae118ee196cf7eab497db577609b2e21f4202d6df22a"}}]}, 0x250}, 0x1, 0x0, 0x0, 0x4000011}, 0x8011) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a0010000100013070000000000000000ffffffff000000000000000000000000fe8000000000000000000000000000bb000000000000000000000000000000006e46a3ad", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe8000000000000000000000000000bb0000000032000000ac14140000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a0000008b000000000000004800020063626328626c6f776669736829000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c0017000000000000000000000000000000000000000000000000004c001400636d6163286165732900"/344], 0x1a0}}, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0xb00000000065808, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200), 0xffffffffffffffff) (async) sendmsg$IPVS_CMD_DEL_DEST(r3, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x6c, r4, 0x2, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e24}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x9e4}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x6}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e24}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20000000}, 0x8800) (async) sendfile(r2, r1, 0x0, 0x2000d000484) (async) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@mcast1, @in=@empty}}, {{@in6=@private0}}}, &(0x7f0000000380)=0xe8) (async) sendmsg$nl_xfrm(r1, &(0x7f0000000680)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000640)={&(0x7f00000003c0)=@polexpire={0x250, 0x1b, 0x400, 0x70bd28, 0x25dfdbfe, {{{@in=@rand_addr=0x64010102, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e21, 0x6829, 0x4e23, 0x0, 0xa, 0x80, 0x20, 0x1d, 0x0, r5}, {0x9, 0x1a25, 0x2, 0x9, 0x800, 0x6, 0xffffffffffffffff, 0x401}, {0x1, 0x54, 0xfffffffffffffff7, 0x1}, 0x2bd, 0x6e6bba, 0x1, 0x1, 0x1, 0x1}}, [@algo_aead={0x94, 0x12, {{'pcrypt(aegis128-generic)\x00'}, 0x240, 0xc0, "55097b8c5159a4ba857d29c7d97bee0e5fcf87ccffa3075b230c38352f26e2895d9e5180f3d4051f2b115fd770a83c1897637f209b82ed6d4cc1a68bb6a3d02bbe12999a49772a6c"}}, @algo_crypt={0xf9, 0x2, {{'xchacha20-generic\x00'}, 0x588, "6272d401135c0c0dfcffe03970e5e8f67f72aea7c957e52b5c10220bf9ddfeb6ec200f55d500d45b9f93e16739d621691af3c69f3eaf832dc9d3baf2137ebca4734b94d0631735c8178bbb1c198567777c1e9515c5008177c9147109abb7e8a864cd7d51ae1fbd64fe3c60692ab9c45de02e98e635c5fd3ff0befb74e6261637ba06821a9b82caa1fa8bee9eaf57bccb8d4fc4e91cad7e43f13c62ae118ee196cf7eab497db577609b2e21f4202d6df22a"}}]}, 0x250}, 0x1, 0x0, 0x0, 0x4000011}, 0x8011) (async) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a0010000100013070000000000000000ffffffff000000000000000000000000fe8000000000000000000000000000bb000000000000000000000000000000006e46a3ad", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe8000000000000000000000000000bb0000000032000000ac14140000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a0000008b000000000000004800020063626328626c6f776669736829000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c0017000000000000000000000000000000000000000000000000004c001400636d6163286165732900"/344], 0x1a0}}, 0x0) (async) 16:42:02 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x1100, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:02 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x84010000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:42:02 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x98010000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) [ 249.206502][ T7979] netlink: 396 bytes leftover after parsing attributes in process `syz-executor.2'. [ 249.218219][ T7974] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.5'. 16:42:02 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000513001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:42:02 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x1300, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:02 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0xb00000000065808, 0x0) (async) r2 = socket$nl_route(0x10, 0x3, 0x0) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DEST(r3, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x6c, r4, 0x2, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e24}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x9e4}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x6}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e24}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20000000}, 0x8800) (async) sendfile(r2, r1, 0x0, 0x2000d000484) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@mcast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}}}, &(0x7f0000000380)=0xe8) sendmsg$nl_xfrm(r1, &(0x7f0000000680)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000640)={&(0x7f00000003c0)=@polexpire={0x250, 0x1b, 0x400, 0x70bd28, 0x25dfdbfe, {{{@in=@rand_addr=0x64010102, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e21, 0x6829, 0x4e23, 0x0, 0xa, 0x80, 0x20, 0x1d, 0x0, r5}, {0x9, 0x1a25, 0x2, 0x9, 0x800, 0x6, 0xffffffffffffffff, 0x401}, {0x1, 0x54, 0xfffffffffffffff7, 0x1}, 0x2bd, 0x6e6bba, 0x1, 0x1, 0x1, 0x1}}, [@algo_aead={0x94, 0x12, {{'pcrypt(aegis128-generic)\x00'}, 0x240, 0xc0, "55097b8c5159a4ba857d29c7d97bee0e5fcf87ccffa3075b230c38352f26e2895d9e5180f3d4051f2b115fd770a83c1897637f209b82ed6d4cc1a68bb6a3d02bbe12999a49772a6c"}}, @algo_crypt={0xf9, 0x2, {{'xchacha20-generic\x00'}, 0x588, "6272d401135c0c0dfcffe03970e5e8f67f72aea7c957e52b5c10220bf9ddfeb6ec200f55d500d45b9f93e16739d621691af3c69f3eaf832dc9d3baf2137ebca4734b94d0631735c8178bbb1c198567777c1e9515c5008177c9147109abb7e8a864cd7d51ae1fbd64fe3c60692ab9c45de02e98e635c5fd3ff0befb74e6261637ba06821a9b82caa1fa8bee9eaf57bccb8d4fc4e91cad7e43f13c62ae118ee196cf7eab497db577609b2e21f4202d6df22a"}}]}, 0x250}, 0x1, 0x0, 0x0, 0x4000011}, 0x8011) (async) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a0010000100013070000000000000000ffffffff000000000000000000000000fe8000000000000000000000000000bb000000000000000000000000000000006e46a3ad", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe8000000000000000000000000000bb0000000032000000ac14140000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a0000008b000000000000004800020063626328626c6f776669736829000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c0017000000000000000000000000000000000000000000000000004c001400636d6163286165732900"/344], 0x1a0}}, 0x0) 16:42:02 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x9effffff, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) [ 249.479133][ T8002] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.5'. 16:42:03 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 16:42:03 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x3f00, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000613001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:42:03 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0xc9000000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:42:03 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x2, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:03 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, 0x0, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [@ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x4}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x4}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x3}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20008000}, 0x10080) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x58, 0x2, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x58}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYRES64=r2, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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", @ANYRESOCT=r1, @ANYRES16=r2], 0x15c}, 0x1, 0x0, 0x0, 0x1}, 0x0) 16:42:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000713001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:42:03 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x3, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:03 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0xf0ffffff, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:42:03 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x6000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:03 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, 0x0, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [@ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x4}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x4}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x3}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20008000}, 0x10080) (async) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) (async) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x58, 0x2, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x58}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYRES64=r2, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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", @ANYRESOCT=r1, @ANYRES16=r2], 0x15c}, 0x1, 0x0, 0x0, 0x1}, 0x0) 16:42:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000813001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:42:04 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 16:42:04 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x4, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:04 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0xfffff000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:42:04 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0xa001, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:04 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, 0x0, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [@ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x4}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x4}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x3}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20008000}, 0x10080) (async) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) (async) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x58, 0x2, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x58}}, 0x0) (async, rerun: 32) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYRES64=r2, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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", @ANYRESOCT=r1, @ANYRES16=r2], 0x15c}, 0x1, 0x0, 0x0, 0x1}, 0x0) (rerun: 32) 16:42:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000913001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:42:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000a13001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:42:04 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x5, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:04 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0xffffff7f, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:42:04 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x58, 0x2, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x58}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x58, 0x2, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x58}}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f0000000380)={{0x14}, [@NFT_MSG_DELRULE={0x100, 0x8, 0xa, 0x101, 0x0, 0x0, {0x7, 0x0, 0x8}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_USERDATA={0xae, 0x7, 0x1, 0x0, "c1b50da34711a64a8e900d41657afc87747d1e4ec3b3b9a44e6155713b506628d9a25826938843d06b12d62b2b578090ad0a69ea623df021f649114ecfc0d4d5f9c70663877a5adda6d7155285e2cee8710bb4195d9d2a5df5b2f7a563f94fc84ff181abad7ff0cb194c46fb7c456eb85d13b86b3711ebf18bc7f171eb3656586aecea4404ba74f451184bde26fe44a3079a2697d18b2cc191da75616cc05abe850ca5b12981a1d04ac3"}, @NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x2}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x5}, @NFTA_RULE_ID={0x8}, @NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x3}, @NFTA_RULE_COMPAT={0xc, 0x5, 0x0, 0x1, [@NFTA_RULE_COMPAT_PROTO_BRIDGE={0x8, 0x1, 0x1, 0x0, 0x600}]}]}, @NFT_MSG_DELRULE={0x20, 0x8, 0xa, 0x201, 0x0, 0x0, {0xa, 0x0, 0x9}, [@NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x148}, 0x1, 0x0, 0x0, 0x804}, 0x4000000) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x5, &(0x7f0000000040)=[{0x1, 0x38, 0x6, 0xbf}, {0x401, 0x1, 0x81, 0x2}, {0x4, 0xba, 0x0, 0x7f}, {0x6, 0x69, 0x20, 0x8}, {0x8, 0x81, 0x0, 0x80000001}]}, 0x10) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:04 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0xb401, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:04 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0xe900, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:04 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0xf000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:04 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x58, 0x2, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x58}}, 0x0) (async) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x58, 0x2, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x58}}, 0x0) (async) sendmsg$NFT_BATCH(r1, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f0000000380)={{0x14}, [@NFT_MSG_DELRULE={0x100, 0x8, 0xa, 0x101, 0x0, 0x0, {0x7, 0x0, 0x8}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_USERDATA={0xae, 0x7, 0x1, 0x0, "c1b50da34711a64a8e900d41657afc87747d1e4ec3b3b9a44e6155713b506628d9a25826938843d06b12d62b2b578090ad0a69ea623df021f649114ecfc0d4d5f9c70663877a5adda6d7155285e2cee8710bb4195d9d2a5df5b2f7a563f94fc84ff181abad7ff0cb194c46fb7c456eb85d13b86b3711ebf18bc7f171eb3656586aecea4404ba74f451184bde26fe44a3079a2697d18b2cc191da75616cc05abe850ca5b12981a1d04ac3"}, @NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x2}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x5}, @NFTA_RULE_ID={0x8}, @NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x3}, @NFTA_RULE_COMPAT={0xc, 0x5, 0x0, 0x1, [@NFTA_RULE_COMPAT_PROTO_BRIDGE={0x8, 0x1, 0x1, 0x0, 0x600}]}]}, @NFT_MSG_DELRULE={0x20, 0x8, 0xa, 0x201, 0x0, 0x0, {0xa, 0x0, 0x9}, [@NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x148}, 0x1, 0x0, 0x0, 0x804}, 0x4000000) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x5, &(0x7f0000000040)=[{0x1, 0x38, 0x6, 0xbf}, {0x401, 0x1, 0x81, 0x2}, {0x4, 0xba, 0x0, 0x7f}, {0x6, 0x69, 0x20, 0x8}, {0x8, 0x81, 0x0, 0x80000001}]}, 0x10) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x58, 0x2, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x58}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x58, 0x2, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x58}}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f0000000380)={{0x14}, [@NFT_MSG_DELRULE={0x100, 0x8, 0xa, 0x101, 0x0, 0x0, {0x7, 0x0, 0x8}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_USERDATA={0xae, 0x7, 0x1, 0x0, "c1b50da34711a64a8e900d41657afc87747d1e4ec3b3b9a44e6155713b506628d9a25826938843d06b12d62b2b578090ad0a69ea623df021f649114ecfc0d4d5f9c70663877a5adda6d7155285e2cee8710bb4195d9d2a5df5b2f7a563f94fc84ff181abad7ff0cb194c46fb7c456eb85d13b86b3711ebf18bc7f171eb3656586aecea4404ba74f451184bde26fe44a3079a2697d18b2cc191da75616cc05abe850ca5b12981a1d04ac3"}, @NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x2}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x5}, @NFTA_RULE_ID={0x8}, @NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x3}, @NFTA_RULE_COMPAT={0xc, 0x5, 0x0, 0x1, [@NFTA_RULE_COMPAT_PROTO_BRIDGE={0x8, 0x1, 0x1, 0x0, 0x600}]}]}, @NFT_MSG_DELRULE={0x20, 0x8, 0xa, 0x201, 0x0, 0x0, {0xa, 0x0, 0x9}, [@NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x148}, 0x1, 0x0, 0x0, 0x804}, 0x4000000) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x5, &(0x7f0000000040)=[{0x1, 0x38, 0x6, 0xbf}, {0x401, 0x1, 0x81, 0x2}, {0x4, 0xba, 0x0, 0x7f}, {0x6, 0x69, 0x20, 0x8}, {0x8, 0x81, 0x0, 0x80000001}]}, 0x10) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:04 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0xffffff9e, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:42:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000c13001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:42:04 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x6, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000e13001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:42:04 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x34000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:04 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0xfffffff0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:42:04 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x7, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:04 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x58, 0x2, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x58}}, 0x0) (async) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x58, 0x2, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x58}}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f0000000380)={{0x14}, [@NFT_MSG_DELRULE={0x100, 0x8, 0xa, 0x101, 0x0, 0x0, {0x7, 0x0, 0x8}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_USERDATA={0xae, 0x7, 0x1, 0x0, "c1b50da34711a64a8e900d41657afc87747d1e4ec3b3b9a44e6155713b506628d9a25826938843d06b12d62b2b578090ad0a69ea623df021f649114ecfc0d4d5f9c70663877a5adda6d7155285e2cee8710bb4195d9d2a5df5b2f7a563f94fc84ff181abad7ff0cb194c46fb7c456eb85d13b86b3711ebf18bc7f171eb3656586aecea4404ba74f451184bde26fe44a3079a2697d18b2cc191da75616cc05abe850ca5b12981a1d04ac3"}, @NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x2}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x5}, @NFTA_RULE_ID={0x8}, @NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x3}, @NFTA_RULE_COMPAT={0xc, 0x5, 0x0, 0x1, [@NFTA_RULE_COMPAT_PROTO_BRIDGE={0x8, 0x1, 0x1, 0x0, 0x600}]}]}, @NFT_MSG_DELRULE={0x20, 0x8, 0xa, 0x201, 0x0, 0x0, {0xa, 0x0, 0x9}, [@NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x148}, 0x1, 0x0, 0x0, 0x804}, 0x4000000) (async) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x5, &(0x7f0000000040)=[{0x1, 0x38, 0x6, 0xbf}, {0x401, 0x1, 0x81, 0x2}, {0x4, 0xba, 0x0, 0x7f}, {0x6, 0x69, 0x20, 0x8}, {0x8, 0x81, 0x0, 0x80000001}]}, 0x10) (async) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:04 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:42:05 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x8, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:05 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x400300, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000f13001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:42:05 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0xffffffff, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:42:05 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PROBE_CLIENT(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, 0x0, 0x400, 0x70bd29, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x20, 0x9}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20008018) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="a0140000100013070000002000000000fbffffff000000000000000000000001fe8000000019b30000000000000000bb000000000000000000000000000b000097773d5b1a47", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe8000000000000000000000000000bb0000000032000000ac14140000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003756e67c35037a652f0000000000000000000000000000000000000000000000000a0000008b000000000000004800020063626328626c6f776669736829000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000001c0017000000000000000000000000000000000000000000000000004c001400636d6163286165732900"/353], 0x1a0}}, 0x0) 16:42:05 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x9, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900001013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:42:05 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0xf0ffff, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:05 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:42:05 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PROBE_CLIENT(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, 0x0, 0x400, 0x70bd29, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x20, 0x9}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20008018) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="a0140000100013070000002000000000fbffffff000000000000000000000001fe8000000019b30000000000000000bb000000000000000000000000000b000097773d5b1a47", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe8000000000000000000000000000bb0000000032000000ac14140000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003756e67c35037a652f0000000000000000000000000000000000000000000000000a0000008b000000000000004800020063626328626c6f776669736829000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000001c0017000000000000000000000000000000000000000000000000004c001400636d6163286165732900"/353], 0x1a0}}, 0x0) 16:42:05 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0xa, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:05 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x1000000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:42:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900004813001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:42:05 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x1000000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:05 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x2, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:42:05 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PROBE_CLIENT(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, 0x0, 0x400, 0x70bd29, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x20, 0x9}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20008018) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="a0140000100013070000002000000000fbffffff000000000000000000000001fe8000000019b30000000000000000bb000000000000000000000000000b000097773d5b1a47", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe8000000000000000000000000000bb0000000032000000ac14140000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003756e67c35037a652f0000000000000000000000000000000000000000000000000a0000008b000000000000004800020063626328626c6f776669736829000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000001c0017000000000000000000000000000000000000000000000000004c001400636d6163286165732900"/353], 0x1a0}}, 0x0) 16:42:05 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0xb, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:05 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0xe, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900004c13001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:42:05 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x2000000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:05 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {0x0, 0x0, 0xa626}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:05 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x3, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:42:06 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x7, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:06 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0xf, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900006013001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:42:06 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x3000000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:06 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) (async) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {0x0, 0x0, 0xa626}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:06 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x4, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:42:06 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x1300, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:42:06 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x10, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900006813001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:42:06 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x4000000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:06 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x5, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:42:06 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {0x0, 0x0, 0xa626}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:06 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x2, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:06 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x11, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900006c13001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:42:06 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x6, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:42:06 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x13, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:06 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x5000000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:06 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x4000000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900007413001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:42:06 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x7, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:42:06 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x60, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:06 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x1000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:06 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x6000000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900007a13001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:42:06 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x8, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:42:06 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0xf0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:06 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x7000000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:06 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c, 0x17, {0x0, 0x3}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="390000007b001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:42:06 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'ip6gre0\x00', 0x0, 0x2f, 0x80, 0x9, 0x4, 0x15, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, 0x20, 0x40, 0x2, 0x1}}) r2 = socket$unix(0x1, 0x8a02f18e7204c4a7, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000100)={'vcan0\x00'}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r3, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r4, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r5 = socket(0xa, 0x3, 0x2) ioctl$sock_inet6_SIOCSIFDSTADDR(r5, 0x541b, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r6, &(0x7f0000000180)={0x0, 0xfffffffffffffe6d, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, 0x2, 0x3, 0x101, 0x0, 0x0, {0x0, 0x0, 0x1000}, [@NFQA_CFG_QUEUE_MAXLEN={0x8}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x19}, @NFQA_CFG_CMD={0x8, 0x1, {0x1}}]}, 0x2c}}, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000240)=0x0) sendmsg$nl_netfilter(r5, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={&(0x7f00000005c0)=ANY=[@ANYRES32=r7, @ANYBLOB="00aa8171e5406e82cad3479b6588b148c2d38e2459daa57c2c3c34adc4ff4cef1b90fd5ed839cdc189988c296489c9c6930bb3dd3e52201688e1fba8e3a3c27bd30ff94ca4787ef436163301ba554b33a7ca6adf00cdc0fd8dd2ab8f15928a19e96423f2bb45bd957269c6e0311da2aea8d896a480d0259633376a8925d331118276fd73ba770b4873d3bd0d965ae236ec9c626e05ec926be457ee5f2ef1800c03addce71a8f2b62483c75db"], 0x1184}, 0x1, 0x0, 0x0, 0x11}, 0x80) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, 0x2, 0x3, 0x101, 0x0, 0x0, {}, [@NFQA_CFG_QUEUE_MAXLEN={0x8}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x10}, @NFQA_CFG_CMD={0x8, 0x1, {0x1, 0x0, 0x11}}]}, 0x2c}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003540)=[{{0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000001a80)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}], 0x40, 0x4000}}, {{0x0, 0x0, &(0x7f0000003000)=[{&(0x7f0000001ac0)="adb9c2cad7b453b7abaaa9117d4c077ccfc8de896c5f71da1f7798fd1338978eb7db791b268916b7467f4a643ffcfada6d04fdfc76b6523b4e", 0x39}, {&(0x7f0000001b00)}, {0x0}, {&(0x7f0000001bc0)="c5fd433c82510f209f7330ab1cc5adac336ade696a3faa7ad34ea9bcb3430e0aa666c197c0a35b4f50dd2c6523827ab626b253da74588e299679ea1f53854f7be2a1d52754a2b27e3699e6d1750c0c7e2bb5ed639642ac29fd6b42872854b178a868fb769d05c14917fb3fe060516983750bd1c7", 0x74}, {0x0}, {&(0x7f0000001d40)="d1a751eeef3a6df66eca5109ce14cc3a785febdc1b4b2a4a35632680e6e1a72400947a7c1fcbbe71809edf7360bf4727f269b810437de9d6f2ac1ee46f8d15f1005c3e1587e1b2b98b89e72c3730069c205360840c1b9416a9c8084d84032c5963daf65cbc", 0x65}, {&(0x7f0000001dc0)}, {&(0x7f0000001800)="88d63700001a81728fca3c3e0c5da5f94a4b4a6fb76b02e8d3b9f2eaa8fd9676f4ac12638ce8fe7a5395580f9c84224e3fa8aa1aebc94a8d7ac9fc9a47ea0251c1ab4b6be149aaabe390494ad94905d5f4ef9237556405f89cc080bf7ec3700dcce8912aac85f6eb0501c91a4a5e07f33701a1f0f41bfafcf4bcd43d42d55fe62c6cec55a2e460bd42466dafb2f462758a66c0", 0x93}, {&(0x7f0000002e80)="dfa2cb585b857f6168035e3d39e1f49c8931d8953ef69c6d81ab3bca6aae1aaa2c1ff05237f7666098f89564d227fa35815982205546ac9148c2bde47f5bbf31f67dd285824b9e95f661494ffaabf0922857c1924279edc1644dc67830b00ee4f72e731239563a825a6be9aebd04769c4a8e18b1eda3b5be91c2947972", 0x7d}, {&(0x7f0000002f00)="043ca17b7a28d6750e4f0bbe694995fb1b352120ea06abe108f18ea6b7044bf1ff3c5098196e51d612d78e8a175902d8842d27ded9b222be9f38d2edfbd7ec1b8bd229da6894bdf0cd807c9fc701763d72d8e6ac115a8f17a399260486a04f1a6853b3f53c1fdedc1774d5e27c66881e72e56b40c50bc01a45625c0b31858a6bdc5e1c9520d14e41639400dd4cda6cbf1c07ad8cc61f0441aeae3320071d8f6d1ccdebfa3bcb5632a3692fafdb4bf5fe39347411948566515acddb22b899cec03feef4d0351733dc1be700dd112f962b0a2687f7d6b5a3faf798672a0df0d4e48808f096b848aa51bdc116d1fbb05ddce170", 0xf2}], 0xa, &(0x7f0000003300)=ANY=[@ANYBLOB="28000000000000000100000001000000", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r6, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYRES32=r7, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=r7, @ANYRES32=0x0, @ANYBLOB="000000003000000000000000010000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYRES32=r6, @ANYBLOB="a8b9c336b8f90291afc36f7763e26c6e46367e3d69c50e3bccde95f0c1e4dd5f9bde7d73baa6a92b39ccd431c3a1a15a0000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT, @ANYRES32, @ANYRES32, @ANYRES32=r6, @ANYRES32=r4, @ANYRES32=r3, @ANYRES32=r6, @ANYRES32=r8], 0x140, 0x4000004}}], 0x2, 0x4000000) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000380)=@report={0x80, 0x20, 0x100, 0x70bd2d, 0x25dfdbfe, {0x0, {@in6=@private1={0xfc, 0x1, '\x00', 0x1}, @in=@empty, 0x4e20, 0x101, 0x4e22, 0x401, 0x2, 0xc0, 0xa0, 0x87, r1, r7}}, [@XFRMA_SET_MARK={0x8, 0x1d, 0x8}, @user_kmaddress={0x2c, 0x13, {@in=@local, @in6=@mcast2, 0x0, 0x2}}]}, 0x80}, 0x1, 0x0, 0x0, 0x80}, 0x80) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:06 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x136, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:07 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x8000000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x9, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:42:07 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x10000000, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="390000000f001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:42:07 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x180, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'ip6gre0\x00', 0x0, 0x2f, 0x80, 0x9, 0x4, 0x15, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, 0x20, 0x40, 0x2, 0x1}}) r2 = socket$unix(0x1, 0x8a02f18e7204c4a7, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000100)={'vcan0\x00'}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r3, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r4, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r5 = socket(0xa, 0x3, 0x2) ioctl$sock_inet6_SIOCSIFDSTADDR(r5, 0x541b, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r6, &(0x7f0000000180)={0x0, 0xfffffffffffffe6d, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, 0x2, 0x3, 0x101, 0x0, 0x0, {0x0, 0x0, 0x1000}, [@NFQA_CFG_QUEUE_MAXLEN={0x8}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x19}, @NFQA_CFG_CMD={0x8, 0x1, {0x1}}]}, 0x2c}}, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000240)=0x0) sendmsg$nl_netfilter(r5, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={&(0x7f00000005c0)=ANY=[@ANYRES32=r7, @ANYBLOB="00aa8171e5406e82cad3479b6588b148c2d38e2459daa57c2c3c34adc4ff4cef1b90fd5ed839cdc189988c296489c9c6930bb3dd3e52201688e1fba8e3a3c27bd30ff94ca4787ef436163301ba554b33a7ca6adf00cdc0fd8dd2ab8f15928a19e96423f2bb45bd957269c6e0311da2aea8d896a480d0259633376a8925d331118276fd73ba770b4873d3bd0d965ae236ec9c626e05ec926be457ee5f2ef1800c03addce71a8f2b62483c75db"], 0x1184}, 0x1, 0x0, 0x0, 0x11}, 0x80) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, 0x2, 0x3, 0x101, 0x0, 0x0, {}, [@NFQA_CFG_QUEUE_MAXLEN={0x8}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x10}, @NFQA_CFG_CMD={0x8, 0x1, {0x1, 0x0, 0x11}}]}, 0x2c}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003540)=[{{0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000001a80)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}], 0x40, 0x4000}}, {{0x0, 0x0, &(0x7f0000003000)=[{&(0x7f0000001ac0)="adb9c2cad7b453b7abaaa9117d4c077ccfc8de896c5f71da1f7798fd1338978eb7db791b268916b7467f4a643ffcfada6d04fdfc76b6523b4e", 0x39}, {&(0x7f0000001b00)}, {0x0}, {&(0x7f0000001bc0)="c5fd433c82510f209f7330ab1cc5adac336ade696a3faa7ad34ea9bcb3430e0aa666c197c0a35b4f50dd2c6523827ab626b253da74588e299679ea1f53854f7be2a1d52754a2b27e3699e6d1750c0c7e2bb5ed639642ac29fd6b42872854b178a868fb769d05c14917fb3fe060516983750bd1c7", 0x74}, {0x0}, {&(0x7f0000001d40)="d1a751eeef3a6df66eca5109ce14cc3a785febdc1b4b2a4a35632680e6e1a72400947a7c1fcbbe71809edf7360bf4727f269b810437de9d6f2ac1ee46f8d15f1005c3e1587e1b2b98b89e72c3730069c205360840c1b9416a9c8084d84032c5963daf65cbc", 0x65}, {&(0x7f0000001dc0)}, {&(0x7f0000001800)="88d63700001a81728fca3c3e0c5da5f94a4b4a6fb76b02e8d3b9f2eaa8fd9676f4ac12638ce8fe7a5395580f9c84224e3fa8aa1aebc94a8d7ac9fc9a47ea0251c1ab4b6be149aaabe390494ad94905d5f4ef9237556405f89cc080bf7ec3700dcce8912aac85f6eb0501c91a4a5e07f33701a1f0f41bfafcf4bcd43d42d55fe62c6cec55a2e460bd42466dafb2f462758a66c0", 0x93}, {&(0x7f0000002e80)="dfa2cb585b857f6168035e3d39e1f49c8931d8953ef69c6d81ab3bca6aae1aaa2c1ff05237f7666098f89564d227fa35815982205546ac9148c2bde47f5bbf31f67dd285824b9e95f661494ffaabf0922857c1924279edc1644dc67830b00ee4f72e731239563a825a6be9aebd04769c4a8e18b1eda3b5be91c2947972", 0x7d}, {&(0x7f0000002f00)="043ca17b7a28d6750e4f0bbe694995fb1b352120ea06abe108f18ea6b7044bf1ff3c5098196e51d612d78e8a175902d8842d27ded9b222be9f38d2edfbd7ec1b8bd229da6894bdf0cd807c9fc701763d72d8e6ac115a8f17a399260486a04f1a6853b3f53c1fdedc1774d5e27c66881e72e56b40c50bc01a45625c0b31858a6bdc5e1c9520d14e41639400dd4cda6cbf1c07ad8cc61f0441aeae3320071d8f6d1ccdebfa3bcb5632a3692fafdb4bf5fe39347411948566515acddb22b899cec03feef4d0351733dc1be700dd112f962b0a2687f7d6b5a3faf798672a0df0d4e48808f096b848aa51bdc116d1fbb05ddce170", 0xf2}], 0xa, &(0x7f0000003300)=ANY=[@ANYBLOB="28000000000000000100000001000000", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r6, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYRES32=r7, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=r7, @ANYRES32=0x0, @ANYBLOB="000000003000000000000000010000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYRES32=r6, @ANYBLOB="a8b9c336b8f90291afc36f7763e26c6e46367e3d69c50e3bccde95f0c1e4dd5f9bde7d73baa6a92b39ccd431c3a1a15a0000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT, @ANYRES32, @ANYRES32, @ANYRES32=r6, @ANYRES32=r4, @ANYRES32=r3, @ANYRES32=r6, @ANYRES32=r8], 0x140, 0x4000004}}], 0x2, 0x4000000) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000380)=@report={0x80, 0x20, 0x100, 0x70bd2d, 0x25dfdbfe, {0x0, {@in6=@private1={0xfc, 0x1, '\x00', 0x1}, @in=@empty, 0x4e20, 0x101, 0x4e22, 0x401, 0x2, 0xc0, 0xa0, 0x87, r1, r7}}, [@XFRMA_SET_MARK={0x8, 0x1d, 0x8}, @user_kmaddress={0x2c, 0x13, {@in=@local, @in6=@mcast2, 0x0, 0x2}}]}, 0x80}, 0x1, 0x0, 0x0, 0x80}, 0x80) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) (async) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'ip6gre0\x00', 0x0, 0x2f, 0x80, 0x9, 0x4, 0x15, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, 0x20, 0x40, 0x2, 0x1}}) (async) socket$unix(0x1, 0x8a02f18e7204c4a7, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000100)={'vcan0\x00'}) (async) socket$can_bcm(0x1d, 0x2, 0x2) (async) connect$can_bcm(r3, &(0x7f0000000000), 0x10) (async) sendmsg$can_bcm(r3, 0x0, 0x0) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) setsockopt$inet_MCAST_JOIN_GROUP(r4, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) (async) socket(0xa, 0x3, 0x2) (async) ioctl$sock_inet6_SIOCSIFDSTADDR(r5, 0x541b, 0x0) (async) socket$nl_netfilter(0x10, 0x3, 0xc) (async) sendmsg$NFQNL_MSG_CONFIG(r6, &(0x7f0000000180)={0x0, 0xfffffffffffffe6d, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, 0x2, 0x3, 0x101, 0x0, 0x0, {0x0, 0x0, 0x1000}, [@NFQA_CFG_QUEUE_MAXLEN={0x8}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x19}, @NFQA_CFG_CMD={0x8, 0x1, {0x1}}]}, 0x2c}}, 0x0) (async) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000240)) (async) sendmsg$nl_netfilter(r5, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={&(0x7f00000005c0)=ANY=[@ANYRES32=r7, @ANYBLOB="00aa8171e5406e82cad3479b6588b148c2d38e2459daa57c2c3c34adc4ff4cef1b90fd5ed839cdc189988c296489c9c6930bb3dd3e52201688e1fba8e3a3c27bd30ff94ca4787ef436163301ba554b33a7ca6adf00cdc0fd8dd2ab8f15928a19e96423f2bb45bd957269c6e0311da2aea8d896a480d0259633376a8925d331118276fd73ba770b4873d3bd0d965ae236ec9c626e05ec926be457ee5f2ef1800c03addce71a8f2b62483c75db"], 0x1184}, 0x1, 0x0, 0x0, 0x11}, 0x80) (async) socket$nl_netfilter(0x10, 0x3, 0xc) (async) sendmsg$NFQNL_MSG_CONFIG(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, 0x2, 0x3, 0x101, 0x0, 0x0, {}, [@NFQA_CFG_QUEUE_MAXLEN={0x8}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x10}, @NFQA_CFG_CMD={0x8, 0x1, {0x1, 0x0, 0x11}}]}, 0x2c}}, 0x0) (async) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003540)=[{{0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000001a80)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}], 0x40, 0x4000}}, {{0x0, 0x0, &(0x7f0000003000)=[{&(0x7f0000001ac0)="adb9c2cad7b453b7abaaa9117d4c077ccfc8de896c5f71da1f7798fd1338978eb7db791b268916b7467f4a643ffcfada6d04fdfc76b6523b4e", 0x39}, {&(0x7f0000001b00)}, {0x0}, {&(0x7f0000001bc0)="c5fd433c82510f209f7330ab1cc5adac336ade696a3faa7ad34ea9bcb3430e0aa666c197c0a35b4f50dd2c6523827ab626b253da74588e299679ea1f53854f7be2a1d52754a2b27e3699e6d1750c0c7e2bb5ed639642ac29fd6b42872854b178a868fb769d05c14917fb3fe060516983750bd1c7", 0x74}, {0x0}, {&(0x7f0000001d40)="d1a751eeef3a6df66eca5109ce14cc3a785febdc1b4b2a4a35632680e6e1a72400947a7c1fcbbe71809edf7360bf4727f269b810437de9d6f2ac1ee46f8d15f1005c3e1587e1b2b98b89e72c3730069c205360840c1b9416a9c8084d84032c5963daf65cbc", 0x65}, {&(0x7f0000001dc0)}, {&(0x7f0000001800)="88d63700001a81728fca3c3e0c5da5f94a4b4a6fb76b02e8d3b9f2eaa8fd9676f4ac12638ce8fe7a5395580f9c84224e3fa8aa1aebc94a8d7ac9fc9a47ea0251c1ab4b6be149aaabe390494ad94905d5f4ef9237556405f89cc080bf7ec3700dcce8912aac85f6eb0501c91a4a5e07f33701a1f0f41bfafcf4bcd43d42d55fe62c6cec55a2e460bd42466dafb2f462758a66c0", 0x93}, {&(0x7f0000002e80)="dfa2cb585b857f6168035e3d39e1f49c8931d8953ef69c6d81ab3bca6aae1aaa2c1ff05237f7666098f89564d227fa35815982205546ac9148c2bde47f5bbf31f67dd285824b9e95f661494ffaabf0922857c1924279edc1644dc67830b00ee4f72e731239563a825a6be9aebd04769c4a8e18b1eda3b5be91c2947972", 0x7d}, {&(0x7f0000002f00)="043ca17b7a28d6750e4f0bbe694995fb1b352120ea06abe108f18ea6b7044bf1ff3c5098196e51d612d78e8a175902d8842d27ded9b222be9f38d2edfbd7ec1b8bd229da6894bdf0cd807c9fc701763d72d8e6ac115a8f17a399260486a04f1a6853b3f53c1fdedc1774d5e27c66881e72e56b40c50bc01a45625c0b31858a6bdc5e1c9520d14e41639400dd4cda6cbf1c07ad8cc61f0441aeae3320071d8f6d1ccdebfa3bcb5632a3692fafdb4bf5fe39347411948566515acddb22b899cec03feef4d0351733dc1be700dd112f962b0a2687f7d6b5a3faf798672a0df0d4e48808f096b848aa51bdc116d1fbb05ddce170", 0xf2}], 0xa, &(0x7f0000003300)=ANY=[@ANYBLOB="28000000000000000100000001000000", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r6, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYRES32=r7, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=r7, @ANYRES32=0x0, @ANYBLOB="000000003000000000000000010000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYRES32=r6, @ANYBLOB="a8b9c336b8f90291afc36f7763e26c6e46367e3d69c50e3bccde95f0c1e4dd5f9bde7d73baa6a92b39ccd431c3a1a15a0000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT, @ANYRES32, @ANYRES32, @ANYRES32=r6, @ANYRES32=r4, @ANYRES32=r3, @ANYRES32=r6, @ANYRES32=r8], 0x140, 0x4000004}}], 0x2, 0x4000000) (async) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000380)=@report={0x80, 0x20, 0x100, 0x70bd2d, 0x25dfdbfe, {0x0, {@in6=@private1={0xfc, 0x1, '\x00', 0x1}, @in=@empty, 0x4e20, 0x101, 0x4e22, 0x401, 0x2, 0xc0, 0xa0, 0x87, r1, r7}}, [@XFRMA_SET_MARK={0x8, 0x1d, 0x8}, @user_kmaddress={0x2c, 0x13, {@in=@local, @in6=@mcast2, 0x0, 0x2}}]}, 0x80}, 0x1, 0x0, 0x0, 0x80}, 0x80) (async) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) (async) 16:42:07 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x9000000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:07 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {0x300000000000000}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:07 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x1a0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="390000007b001118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:42:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0xa, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:42:07 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0xa000000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:07 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x180, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) (async) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'ip6gre0\x00', 0x0, 0x2f, 0x80, 0x9, 0x4, 0x15, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, 0x20, 0x40, 0x2, 0x1}}) r2 = socket$unix(0x1, 0x8a02f18e7204c4a7, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000100)={'vcan0\x00'}) (async) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) (async) sendmsg$can_bcm(r3, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r4, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) (async) r5 = socket(0xa, 0x3, 0x2) ioctl$sock_inet6_SIOCSIFDSTADDR(r5, 0x541b, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r6, &(0x7f0000000180)={0x0, 0xfffffffffffffe6d, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, 0x2, 0x3, 0x101, 0x0, 0x0, {0x0, 0x0, 0x1000}, [@NFQA_CFG_QUEUE_MAXLEN={0x8}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x19}, @NFQA_CFG_CMD={0x8, 0x1, {0x1}}]}, 0x2c}}, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000240)=0x0) sendmsg$nl_netfilter(r5, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={&(0x7f00000005c0)=ANY=[@ANYRES32=r7, @ANYBLOB="00aa8171e5406e82cad3479b6588b148c2d38e2459daa57c2c3c34adc4ff4cef1b90fd5ed839cdc189988c296489c9c6930bb3dd3e52201688e1fba8e3a3c27bd30ff94ca4787ef436163301ba554b33a7ca6adf00cdc0fd8dd2ab8f15928a19e96423f2bb45bd957269c6e0311da2aea8d896a480d0259633376a8925d331118276fd73ba770b4873d3bd0d965ae236ec9c626e05ec926be457ee5f2ef1800c03addce71a8f2b62483c75db"], 0x1184}, 0x1, 0x0, 0x0, 0x11}, 0x80) (async) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, 0x2, 0x3, 0x101, 0x0, 0x0, {}, [@NFQA_CFG_QUEUE_MAXLEN={0x8}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x10}, @NFQA_CFG_CMD={0x8, 0x1, {0x1, 0x0, 0x11}}]}, 0x2c}}, 0x0) (async) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003540)=[{{0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000001a80)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}], 0x40, 0x4000}}, {{0x0, 0x0, &(0x7f0000003000)=[{&(0x7f0000001ac0)="adb9c2cad7b453b7abaaa9117d4c077ccfc8de896c5f71da1f7798fd1338978eb7db791b268916b7467f4a643ffcfada6d04fdfc76b6523b4e", 0x39}, {&(0x7f0000001b00)}, {0x0}, {&(0x7f0000001bc0)="c5fd433c82510f209f7330ab1cc5adac336ade696a3faa7ad34ea9bcb3430e0aa666c197c0a35b4f50dd2c6523827ab626b253da74588e299679ea1f53854f7be2a1d52754a2b27e3699e6d1750c0c7e2bb5ed639642ac29fd6b42872854b178a868fb769d05c14917fb3fe060516983750bd1c7", 0x74}, {0x0}, {&(0x7f0000001d40)="d1a751eeef3a6df66eca5109ce14cc3a785febdc1b4b2a4a35632680e6e1a72400947a7c1fcbbe71809edf7360bf4727f269b810437de9d6f2ac1ee46f8d15f1005c3e1587e1b2b98b89e72c3730069c205360840c1b9416a9c8084d84032c5963daf65cbc", 0x65}, {&(0x7f0000001dc0)}, {&(0x7f0000001800)="88d63700001a81728fca3c3e0c5da5f94a4b4a6fb76b02e8d3b9f2eaa8fd9676f4ac12638ce8fe7a5395580f9c84224e3fa8aa1aebc94a8d7ac9fc9a47ea0251c1ab4b6be149aaabe390494ad94905d5f4ef9237556405f89cc080bf7ec3700dcce8912aac85f6eb0501c91a4a5e07f33701a1f0f41bfafcf4bcd43d42d55fe62c6cec55a2e460bd42466dafb2f462758a66c0", 0x93}, {&(0x7f0000002e80)="dfa2cb585b857f6168035e3d39e1f49c8931d8953ef69c6d81ab3bca6aae1aaa2c1ff05237f7666098f89564d227fa35815982205546ac9148c2bde47f5bbf31f67dd285824b9e95f661494ffaabf0922857c1924279edc1644dc67830b00ee4f72e731239563a825a6be9aebd04769c4a8e18b1eda3b5be91c2947972", 0x7d}, {&(0x7f0000002f00)="043ca17b7a28d6750e4f0bbe694995fb1b352120ea06abe108f18ea6b7044bf1ff3c5098196e51d612d78e8a175902d8842d27ded9b222be9f38d2edfbd7ec1b8bd229da6894bdf0cd807c9fc701763d72d8e6ac115a8f17a399260486a04f1a6853b3f53c1fdedc1774d5e27c66881e72e56b40c50bc01a45625c0b31858a6bdc5e1c9520d14e41639400dd4cda6cbf1c07ad8cc61f0441aeae3320071d8f6d1ccdebfa3bcb5632a3692fafdb4bf5fe39347411948566515acddb22b899cec03feef4d0351733dc1be700dd112f962b0a2687f7d6b5a3faf798672a0df0d4e48808f096b848aa51bdc116d1fbb05ddce170", 0xf2}], 0xa, &(0x7f0000003300)=ANY=[@ANYBLOB="28000000000000000100000001000000", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r6, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYRES32=r7, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=r7, @ANYRES32=0x0, @ANYBLOB="000000003000000000000000010000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYRES32=r6, @ANYBLOB="a8b9c336b8f90291afc36f7763e26c6e46367e3d69c50e3bccde95f0c1e4dd5f9bde7d73baa6a92b39ccd431c3a1a15a0000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT, @ANYRES32, @ANYRES32, @ANYRES32=r6, @ANYRES32=r4, @ANYRES32=r3, @ANYRES32=r6, @ANYRES32=r8], 0x140, 0x4000004}}], 0x2, 0x4000000) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000380)=@report={0x80, 0x20, 0x100, 0x70bd2d, 0x25dfdbfe, {0x0, {@in6=@private1={0xfc, 0x1, '\x00', 0x1}, @in=@empty, 0x4e20, 0x101, 0x4e22, 0x401, 0x2, 0xc0, 0xa0, 0x87, r1, r7}}, [@XFRMA_SET_MARK={0x8, 0x1d, 0x8}, @user_kmaddress={0x2c, 0x13, {@in=@local, @in6=@mcast2, 0x0, 0x2}}]}, 0x80}, 0x1, 0x0, 0x0, 0x80}, 0x80) (async) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013021118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:42:07 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x1b4, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:07 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0xb000000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0xb, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:42:07 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x10, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013031118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:42:07 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x300, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="a0010000100013070000000000000000ffffffff000000000000000000000000fe8000000000000000000000000000bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x1a0}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[], 0xb5d264) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000240)=ANY=[], 0xb5d264) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r2, 0x0) setsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000140)=0x3f, 0x4) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r5, r4, 0x0, 0x2000d000484) getsockname$packet(r4, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000700)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000680)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000640)={&(0x7f00000003c0)=@deltaction={0x260, 0x31, 0x100, 0x70bd2d, 0x25dfdbfb, {}, [@TCA_ACT_TAB={0x24, 0x1, [{0x14, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0xc, 0x18, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x2}}]}, @TCA_ACT_TAB={0x50, 0x1, [{0xc, 0x16, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x6}}, {0xc, 0x3, 0x0, 0x0, @TCA_ACT_KIND={0x7, 0x1, 'xt\x00'}}, {0xc, 0xc, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9a}}, {0xc, 0xf, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x2}}, {0x10, 0x17, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0xc, 0x3, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3ff}}]}, @TCA_ACT_TAB={0x44, 0x1, [{0xc, 0x8, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x21c59c6a}}, {0xc, 0x8, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0xc, 0xd, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0x10, 0x6, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0xc, 0x1, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9c60}}]}, @TCA_ACT_TAB={0x8c, 0x1, [{0xc, 0x13, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfe4e}}, {0x10, 0x14, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0xc, 0x15, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x200000}}, {0x10, 0x1d, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'sample\x00'}}, {0x10, 0x13, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x10, 0x19, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0xc, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0xc, 0xf, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x6158000}}, {0xc, 0xe, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7}}, {0xc, 0xb, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}]}, @TCA_ACT_TAB={0x20, 0x1, [{0x10, 0x6, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}, {0xc, 0x19, 0x0, 0x0, @TCA_ACT_KIND={0x7, 0x1, 'xt\x00'}}]}, @TCA_ACT_TAB={0x10, 0x1, [{0xc, 0x20, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}]}, @TCA_ACT_TAB={0x4c, 0x1, [{0xc, 0x5, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0xc, 0xa, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x2}}, {0xc, 0xb, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0xc, 0x13, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0xc, 0x1f, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0xc, 0x1c, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x51}}]}, @TCA_ACT_TAB={0x60, 0x1, [{0xc, 0x20, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0x10, 0x8, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}, {0x10, 0xb, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'sample\x00'}}, {0xc, 0x1, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x14, 0x1b, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}]}, @TCA_ACT_TAB={0x2c, 0x1, [{0xc, 0x1c, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}, {0xc, 0x7, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}]}, 0x260}, 0x1, 0x0, 0x0, 0x20000004}, 0x40000) sendmsg$nl_xfrm(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@getspdinfo={0x14, 0x25, 0x1, 0x70bd28, 0x25dfdbfc, 0xffff8000, [""]}, 0x14}}, 0x8000) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@getchain={0x2c, 0x66, 0x200, 0x70bd2d, 0x25dfdbff, {0x0, 0x0, 0x0, r6, {0x3, 0xffff}, {0xfff2, 0xfff2}, {0xfff1, 0xfff3}}, [{0x8, 0xb, 0x80}]}, 0x2c}, 0x1, 0x0, 0x0, 0x24006081}, 0x4000800) socketpair(0x27, 0x4, 0xae49, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000007c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r7, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x28, 0x0, 0x100, 0x70bd28, 0x25dfdbfd, {{}, {@void, @val={0x8, 0x3, r8}, @val={0xc, 0x99, {0x400, 0x1b}}}}, ["", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x44000) 16:42:07 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0xe000000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0xe, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:42:07 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0xa, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013041118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:42:07 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x500, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:07 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0xf000000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:07 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) (fail_nth: 1) 16:42:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0xf, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:42:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013051118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:42:07 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x600, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:07 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x10000000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:08 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="a0010000100013070000000000000000ffffffff000000000000000000000000fe8000000000000000000000000000bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x1a0}}, 0x0) (async, rerun: 32) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) (rerun: 32) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[], 0xb5d264) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000240)=ANY=[], 0xb5d264) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r2, 0x0) setsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000140)=0x3f, 0x4) (async, rerun: 32) r3 = socket$nl_route(0x10, 0x3, 0x0) (rerun: 32) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0xb00000000065808, 0x0) (async) r5 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r5, r4, 0x0, 0x2000d000484) getsockname$packet(r4, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000700)=0x14) (async) sendmsg$nl_route_sched(r3, &(0x7f0000000680)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000640)={&(0x7f00000003c0)=@deltaction={0x260, 0x31, 0x100, 0x70bd2d, 0x25dfdbfb, {}, [@TCA_ACT_TAB={0x24, 0x1, [{0x14, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0xc, 0x18, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x2}}]}, @TCA_ACT_TAB={0x50, 0x1, [{0xc, 0x16, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x6}}, {0xc, 0x3, 0x0, 0x0, @TCA_ACT_KIND={0x7, 0x1, 'xt\x00'}}, {0xc, 0xc, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9a}}, {0xc, 0xf, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x2}}, {0x10, 0x17, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0xc, 0x3, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3ff}}]}, @TCA_ACT_TAB={0x44, 0x1, [{0xc, 0x8, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x21c59c6a}}, {0xc, 0x8, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0xc, 0xd, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0x10, 0x6, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0xc, 0x1, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9c60}}]}, @TCA_ACT_TAB={0x8c, 0x1, [{0xc, 0x13, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfe4e}}, {0x10, 0x14, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0xc, 0x15, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x200000}}, {0x10, 0x1d, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'sample\x00'}}, {0x10, 0x13, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x10, 0x19, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0xc, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0xc, 0xf, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x6158000}}, {0xc, 0xe, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7}}, {0xc, 0xb, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}]}, @TCA_ACT_TAB={0x20, 0x1, [{0x10, 0x6, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}, {0xc, 0x19, 0x0, 0x0, @TCA_ACT_KIND={0x7, 0x1, 'xt\x00'}}]}, @TCA_ACT_TAB={0x10, 0x1, [{0xc, 0x20, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}]}, @TCA_ACT_TAB={0x4c, 0x1, [{0xc, 0x5, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0xc, 0xa, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x2}}, {0xc, 0xb, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0xc, 0x13, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0xc, 0x1f, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0xc, 0x1c, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x51}}]}, @TCA_ACT_TAB={0x60, 0x1, [{0xc, 0x20, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0x10, 0x8, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}, {0x10, 0xb, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'sample\x00'}}, {0xc, 0x1, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x14, 0x1b, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}]}, @TCA_ACT_TAB={0x2c, 0x1, [{0xc, 0x1c, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}, {0xc, 0x7, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}]}, 0x260}, 0x1, 0x0, 0x0, 0x20000004}, 0x40000) sendmsg$nl_xfrm(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@getspdinfo={0x14, 0x25, 0x1, 0x70bd28, 0x25dfdbfc, 0xffff8000, [""]}, 0x14}}, 0x8000) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@getchain={0x2c, 0x66, 0x200, 0x70bd2d, 0x25dfdbff, {0x0, 0x0, 0x0, r6, {0x3, 0xffff}, {0xfff2, 0xfff2}, {0xfff1, 0xfff3}}, [{0x8, 0xb, 0x80}]}, 0x2c}, 0x1, 0x0, 0x0, 0x24006081}, 0x4000800) (async, rerun: 32) socketpair(0x27, 0x4, 0xae49, &(0x7f0000000740)={0xffffffffffffffff}) (rerun: 32) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000007c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r7, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x28, 0x0, 0x100, 0x70bd28, 0x25dfdbfd, {{}, {@void, @val={0x8, 0x3, r8}, @val={0xc, 0x99, {0x400, 0x1b}}}}, ["", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x44000) 16:42:08 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x10, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:42:08 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x700, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013061118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:42:08 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x11000000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 255.314420][ T8260] FAULT_INJECTION: forcing a failure. [ 255.314420][ T8260] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 255.327694][ T27] audit: type=1804 audit(1692895328.804:8): pid=8249 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir326969871/syzkaller.PBP6hN/241/cgroup.controllers" dev="sda1" ino=1967 res=1 errno=0 16:42:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013071118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:42:08 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x13000000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 255.496751][ T8260] CPU: 0 PID: 8260 Comm: syz-executor.0 Not tainted 6.5.0-rc6-syzkaller-01712-g23c167af2404 #0 [ 255.507181][ T8260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 255.517291][ T8260] Call Trace: [ 255.520622][ T8260] [ 255.523605][ T8260] dump_stack_lvl+0x125/0x1b0 [ 255.528529][ T8260] should_fail_ex+0x496/0x5b0 [ 255.533347][ T8260] _copy_from_user+0x30/0xf0 [ 255.538023][ T8260] do_tcp_getsockopt+0x96a/0x2760 [ 255.543193][ T8260] ? print_usage_bug.part.0+0x640/0x670 [ 255.548865][ T8260] ? tcp_get_timestamping_opt_stats+0xd50/0xd50 [ 255.555230][ T8260] ? _parse_integer+0x30/0x30 [ 255.560000][ T8260] ? __lock_acquire+0xc8f/0x5de0 [ 255.565032][ T8260] ? aa_label_sk_perm+0x154/0x540 [ 255.570285][ T8260] ? aa_profile_af_perm+0x470/0x470 [ 255.575567][ T8260] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 255.581726][ T8260] ? get_pid_task+0xeb/0x250 [ 255.586421][ T8260] ? reacquire_held_locks+0x4b0/0x4b0 [ 255.591874][ T8260] ? kstrtouint+0x130/0x130 [ 255.596472][ T8260] ? preempt_count_sub+0x150/0x150 [ 255.601639][ T8260] ? reacquire_held_locks+0x4b0/0x4b0 [ 255.607065][ T8260] ? aa_sk_perm+0x2c1/0xae0 [ 255.611623][ T8260] ? aa_af_perm+0x260/0x260 [ 255.616177][ T8260] tcp_getsockopt+0xd1/0xf0 [ 255.620725][ T8260] ? bpf_lsm_socket_getsockopt+0x9/0x10 [ 255.626348][ T8260] ? sock_def_destruct+0x10/0x10 [ 255.631376][ T8260] __sys_getsockopt+0x220/0x6a0 [ 255.636260][ T8260] ? __ia32_sys_setsockopt+0x150/0x150 [ 255.641759][ T8260] ? fput+0x30/0x1a0 [ 255.645704][ T8260] ? ksys_write+0x1a7/0x250 [ 255.650251][ T8260] ? __ia32_sys_read+0xb0/0xb0 [ 255.655070][ T8260] __x64_sys_getsockopt+0xbd/0x150 [ 255.660209][ T8260] ? syscall_enter_from_user_mode+0x26/0x80 [ 255.666211][ T8260] do_syscall_64+0x38/0xb0 [ 255.670703][ T8260] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 255.676692][ T8260] RIP: 0033:0x7fca4bc7cae9 [ 255.681158][ T8260] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 255.700813][ T8260] RSP: 002b:00007fca4c95e0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 255.709262][ T8260] RAX: ffffffffffffffda RBX: 00007fca4bd9bf80 RCX: 00007fca4bc7cae9 [ 255.717279][ T8260] RDX: 0000000000000023 RSI: 0000000000000006 RDI: 0000000000000003 [ 255.725276][ T8260] RBP: 00007fca4c95e120 R08: 0000000020000380 R09: 0000000000000000 [ 255.733291][ T8260] R10: 0000000020000140 R11: 0000000000000246 R12: 0000000000000001 [ 255.741285][ T8260] R13: 000000000000004d R14: 00007fca4bd9bf80 R15: 00007fff50df24a8 [ 255.749299][ T8260] 16:42:09 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffe97, 0x24004000, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000453000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)=0x40) 16:42:09 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x900, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013081118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:42:09 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x11, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:42:09 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x3f000000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:09 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="a0010000100013070000000000000000ffffffff000000000000000000000000fe8000000000000000000000000000bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x1a0}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[], 0xb5d264) (async, rerun: 32) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) (rerun: 32) write$binfmt_script(r2, &(0x7f0000000240)=ANY=[], 0xb5d264) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r2, 0x0) setsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000140)=0x3f, 0x4) (async) r3 = socket$nl_route(0x10, 0x3, 0x0) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0xb00000000065808, 0x0) (async) r5 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r5, r4, 0x0, 0x2000d000484) (async) getsockname$packet(r4, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000700)=0x14) (async, rerun: 32) sendmsg$nl_route_sched(r3, &(0x7f0000000680)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000640)={&(0x7f00000003c0)=@deltaction={0x260, 0x31, 0x100, 0x70bd2d, 0x25dfdbfb, {}, [@TCA_ACT_TAB={0x24, 0x1, [{0x14, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0xc, 0x18, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x2}}]}, @TCA_ACT_TAB={0x50, 0x1, [{0xc, 0x16, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x6}}, {0xc, 0x3, 0x0, 0x0, @TCA_ACT_KIND={0x7, 0x1, 'xt\x00'}}, {0xc, 0xc, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9a}}, {0xc, 0xf, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x2}}, {0x10, 0x17, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0xc, 0x3, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3ff}}]}, @TCA_ACT_TAB={0x44, 0x1, [{0xc, 0x8, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x21c59c6a}}, {0xc, 0x8, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0xc, 0xd, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0x10, 0x6, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0xc, 0x1, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9c60}}]}, @TCA_ACT_TAB={0x8c, 0x1, [{0xc, 0x13, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfe4e}}, {0x10, 0x14, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0xc, 0x15, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x200000}}, {0x10, 0x1d, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'sample\x00'}}, {0x10, 0x13, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x10, 0x19, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0xc, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0xc, 0xf, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x6158000}}, {0xc, 0xe, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7}}, {0xc, 0xb, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}]}, @TCA_ACT_TAB={0x20, 0x1, [{0x10, 0x6, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}, {0xc, 0x19, 0x0, 0x0, @TCA_ACT_KIND={0x7, 0x1, 'xt\x00'}}]}, @TCA_ACT_TAB={0x10, 0x1, [{0xc, 0x20, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}]}, @TCA_ACT_TAB={0x4c, 0x1, [{0xc, 0x5, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0xc, 0xa, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x2}}, {0xc, 0xb, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0xc, 0x13, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0xc, 0x1f, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0xc, 0x1c, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x51}}]}, @TCA_ACT_TAB={0x60, 0x1, [{0xc, 0x20, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0x10, 0x8, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}, {0x10, 0xb, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'sample\x00'}}, {0xc, 0x1, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x14, 0x1b, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}]}, @TCA_ACT_TAB={0x2c, 0x1, [{0xc, 0x1c, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}, {0xc, 0x7, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}]}, 0x260}, 0x1, 0x0, 0x0, 0x20000004}, 0x40000) (rerun: 32) sendmsg$nl_xfrm(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@getspdinfo={0x14, 0x25, 0x1, 0x70bd28, 0x25dfdbfc, 0xffff8000, [""]}, 0x14}}, 0x8000) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@getchain={0x2c, 0x66, 0x200, 0x70bd2d, 0x25dfdbff, {0x0, 0x0, 0x0, r6, {0x3, 0xffff}, {0xfff2, 0xfff2}, {0xfff1, 0xfff3}}, [{0x8, 0xb, 0x80}]}, 0x2c}, 0x1, 0x0, 0x0, 0x24006081}, 0x4000800) (async) socketpair(0x27, 0x4, 0xae49, &(0x7f0000000740)={0xffffffffffffffff}) (async) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000007c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r7, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x28, 0x0, 0x100, 0x70bd28, 0x25dfdbfd, {{}, {@void, @val={0x8, 0x3, r8}, @val={0xc, 0x99, {0x400, 0x1b}}}}, ["", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x44000) 16:42:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013091118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:42:09 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x60000000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:09 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x13, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:42:09 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0xa00, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:09 executing program 5: ioctl$EXT4_IOC_GETSTATE(0xffffffffffffffff, 0x40046629, &(0x7f0000000380)) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000400)={0x8, &(0x7f00000003c0)=[{0x1, 0x3, 0x1, 0x400}, {0x6, 0x4, 0x0, 0x5}, {0x6, 0x3}, {0x5, 0x3f, 0x7f, 0x80000000}, {0x0, 0xc0, 0x1, 0x5}, {0xa9, 0x0, 0xdc, 0x5}, {0x7679, 0x6, 0x1f, 0x5}, {0x9, 0x6, 0x7, 0xfffffffa}]}, 0x10) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote, 0x0, 0x0, 0x0, 0x81}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DEL_KEY(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x64, 0x0, 0x200, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "08bb0f40bd"}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "86480f0c65"}, @NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac05}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x8, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x1}, @NL80211_ATTR_KEY_SEQ={0x7, 0xa, '\x000x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) setsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f00000011c0)="57fc3a4a7c25d1f1627a385737", 0xd) sendmsg$nl_route_sched(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000007400)=ANY=[@ANYBLOB="4400000f00ac732f81a97a9c2900000000000000", @ANYRES32=r2, @ANYBLOB="0000f1ffffffffff000000000900010068667363000000001400020010000300"/44], 0x44}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)=@newtclass={0x8d4, 0x28, 0x8, 0x70bd25, 0x25dfdbff, {0x0, 0x0, 0x0, r2, {0x7, 0xb}, {0x4, 0x3}, {0xfff3, 0x9}}, [@TCA_RATE={0x6, 0x5, {0x81, 0x2}}, @tclass_kind_options=@c_cake={0x9}, @tclass_kind_options=@c_cbq={{0x8}, {0x884, 0x2, [@TCA_CBQ_WRROPT={0x10, 0x2, {0x0, 0x8, 0x5, 0x1, 0x845b, 0x7f}}, @TCA_CBQ_RTAB={0x404, 0x6, [0x8000, 0x2, 0x7f, 0x3, 0x1c2c398, 0x7, 0x4, 0x2, 0x8001, 0xffffff01, 0x4, 0x9, 0x101, 0xffffffc0, 0x401, 0x9, 0xffffffff, 0x80000001, 0x20, 0x7fffffff, 0x76e4, 0x7, 0x800, 0x4, 0x1, 0x8, 0x7f, 0xfff, 0x9, 0x1b, 0xb7, 0x40, 0x7fffffff, 0x7, 0x5, 0x0, 0x3, 0x0, 0x1, 0x2, 0x7fff, 0x6, 0x4, 0x8, 0x1f, 0x46, 0x422, 0x7, 0x7, 0x1ff, 0x3, 0x4, 0x800, 0x37a, 0x4, 0x100, 0x2c6f2562, 0x80, 0xb490, 0x101, 0x1ff, 0x9, 0xcbbc, 0x400000, 0x5, 0x400, 0x8, 0x4, 0x0, 0xfffff8b6, 0xff, 0xe56d, 0x3, 0x3, 0xdf, 0x4, 0x3, 0x3, 0x7fffffff, 0x3, 0x100, 0x1f, 0x4, 0x5, 0x0, 0x2, 0x40, 0x8, 0x8001, 0xb773, 0x6, 0x8320, 0x180, 0x2733, 0x0, 0x1, 0x80000001, 0x4, 0x9, 0xfffffc01, 0x1f, 0x40, 0x8, 0x4, 0xfff, 0x3, 0x1, 0x9, 0x0, 0x4, 0x1000, 0x100, 0x10001, 0x0, 0x5, 0x2, 0x7, 0x8, 0x0, 0x5, 0x1, 0x400, 0x3, 0x7, 0x3ff, 0x97, 0xd6de, 0x80, 0xca7d, 0x7fffffff, 0x2e, 0x8, 0x6, 0x7, 0xffffffd0, 0x7, 0x1, 0x10000, 0x9, 0x3453, 0x4, 0x401, 0x100000, 0x44, 0x80, 0x1, 0x2, 0x7, 0x9, 0x8, 0x9, 0x9, 0x3, 0x5, 0x6, 0x0, 0x6, 0x14c2, 0x13, 0x3, 0x8, 0x0, 0x8, 0x8, 0x5, 0xfffff001, 0x1, 0x7, 0x4, 0x10001, 0x0, 0xd5, 0x8, 0x1, 0x4, 0xfffff000, 0x1, 0x2, 0x2, 0x7fff, 0x5, 0xb4, 0xffffffff, 0x10001, 0x9, 0x9, 0x8, 0x6, 0x0, 0x2, 0x9, 0x5, 0x7fffffff, 0x2, 0xffff, 0x9, 0x4, 0x6, 0x80, 0x3, 0xfffffff8, 0xe47c, 0x1f, 0x401, 0x2, 0xb96, 0x0, 0x401, 0xada5, 0x8, 0x7fffffff, 0x1, 0x80, 0x8, 0x80000000, 0xfffffffa, 0x4, 0x2, 0xb36c, 0x7fff, 0xcb, 0xff, 0x7fff, 0xfffffffc, 0x7, 0x0, 0xffffffe1, 0x7, 0xfffffff9, 0x217e6a48, 0x100, 0x400, 0x0, 0x8000, 0x6, 0x5, 0x800, 0xfff, 0x6, 0x9, 0x3, 0x1, 0x7, 0x9, 0x81, 0xff, 0x31, 0x9, 0x7fff, 0x3c4fe04d, 0xfffffffc, 0x1, 0x3, 0x401, 0x12, 0x6]}, @TCA_CBQ_FOPT={0x10, 0x3, {{0x6}, 0xffffffff, 0x1ff}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x23, 0x2, 0x8, 0x7, 0x3f, 0x7, 0x7, 0xf6}}, @TCA_CBQ_RATE={0x10, 0x5, {0x9, 0x0, 0x7, 0x40, 0x5, 0x2}}, @TCA_CBQ_RTAB={0x404, 0x6, [0x401, 0xfff, 0x1, 0x27, 0x8, 0x200000, 0x0, 0x7d4b8e1c, 0x4, 0x100, 0x1ff, 0x6, 0x81, 0x3195eae5, 0x4, 0x6, 0x4e, 0x401, 0x7, 0xd48, 0xa2, 0x5, 0x7, 0x400, 0x9, 0x1, 0x0, 0x7f, 0x6, 0x480000, 0x7, 0x17be, 0x4, 0x0, 0x9, 0x7ff, 0x20, 0x3ff, 0x8, 0x200, 0x0, 0x5, 0x8, 0x5b, 0x7, 0x1, 0x69694b29, 0x4, 0x0, 0x7ff, 0x7fff, 0x8, 0x4, 0xfb7b, 0x200, 0x2, 0xfffffffa, 0xcc, 0x1, 0xffff, 0x5, 0x40000000, 0x1, 0x5, 0x6, 0x7, 0x7fff, 0x1, 0x8, 0x7, 0x7, 0x2, 0x7fff, 0x7, 0xfffffc01, 0x3, 0x8000, 0x100, 0xcc, 0x3, 0x8001, 0x1, 0x6, 0x0, 0x6, 0x5, 0x8bdd, 0x1, 0x7fff, 0x2817, 0x7fff, 0xa, 0x81, 0x7ff, 0x64, 0x2, 0x8, 0x3, 0xef, 0x84, 0x4, 0x400, 0x10000000, 0xe07, 0x10000, 0xd840, 0x10000, 0x9, 0x4, 0x8000, 0x0, 0x2, 0x8000, 0x5, 0xad, 0x200, 0x0, 0x9, 0x7, 0x1, 0x400, 0x5b, 0x1000, 0x4, 0x2, 0x40, 0x7fff, 0x3, 0x3, 0x7, 0xa5e, 0xffff, 0x0, 0x4, 0x96ba, 0x7, 0x3, 0x7f, 0x2, 0x9, 0x1000000, 0xd0, 0x1, 0xd13, 0x7, 0x1ff, 0x6, 0x8, 0x3, 0x7, 0x7, 0x6, 0x9, 0x5, 0x4, 0x9, 0xb05d, 0x3, 0x8000, 0xd01, 0x1, 0x3, 0x36b, 0x40, 0x7, 0x2, 0x6, 0x1000000, 0x26800000, 0x64781657, 0x4, 0x2, 0x5, 0xa2a4, 0x2, 0x1, 0x5, 0x3, 0x81, 0x9, 0x7f, 0x200, 0x5, 0xfa, 0x6, 0x7, 0x9c, 0x3, 0x800, 0x1, 0xfff, 0x7, 0x1, 0xe1a, 0x7, 0x4, 0x101, 0x5, 0x7, 0x101, 0x9, 0xc28e, 0x80000001, 0xd339, 0x0, 0x7, 0x50, 0x0, 0x2, 0x19de92d2, 0x2, 0x0, 0x7, 0x400000, 0x3, 0x4, 0x1, 0x5149, 0x3e0595d9, 0xa45d, 0xb1a, 0x7, 0x8, 0x2, 0x80000001, 0x6, 0x8, 0x400, 0x7, 0x400, 0x9e, 0x800, 0xff, 0x7, 0x8000, 0x1f, 0x7, 0x8000, 0x3, 0x3, 0x0, 0x10000, 0x7, 0x7, 0x1, 0x3, 0xffff, 0x1, 0x8001, 0x2, 0x1, 0x680, 0x7, 0x7fff, 0x9, 0x90]}, @TCA_CBQ_WRROPT={0x10, 0x2, {0x1, 0x8, 0x1e, 0xc0, 0x7fff, 0x40}}, @TCA_CBQ_FOPT={0x10, 0x3, {{0x1, 0x1}, 0x8, 0x40}}, @TCA_CBQ_FOPT={0x10, 0x3, {{0x1, 0xd}, 0x8, 0x401}}]}}, @TCA_RATE={0x6, 0x5, {0x1f, 0x7f}}, @TCA_RATE={0x6, 0x5, {0x5, 0xc0}}]}, 0x8d4}, 0x1, 0x0, 0x0, 0x20000000}, 0x4040004) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000001100)=ANY=[@ANYBLOB="240000001900000129bd7000fcdbdf251d01030008000900", @ANYRES32=r2, @ANYBLOB="05000d000200000023f98ca98a852c3970dcb75b09aaac6c079e50f3aeb208fc5669724fd22a33227ead852d6ef756e07fea7cd7d3bc2160af377744bdc3c95252eeca6f361b542dccd9039ca27adbc90d3c7029b14d7ab79a3df01d20bfd13a5d6514efd4a903008e20de7fbd82598d6cb4f0e61db5b9"], 0x24}, 0x1, 0x0, 0x0, 0x8045}, 0x20000061) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000010c0)={&(0x7f0000000f80)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001080)={&(0x7f0000000fc0)=@gettaction={0x94, 0x32, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [@action_gd=@TCA_ACT_TAB={0x24, 0x1, [{0x14, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0xc, 0x13, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}]}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x8}, @action_gd=@TCA_ACT_TAB={0x54, 0x1, [{0xc, 0x13, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x300000}}, {0xc, 0xe, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x60}}, {0x10, 0x1f, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}, {0xc, 0xe, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1800}}, {0x10, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}, {0xc, 0x1f, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}]}]}, 0x94}}, 0x4004884) sendmsg$nl_route_sched(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000007400)=@newqdisc={0x44, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_USC={0x10}}}]}, 0x44}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@gettclass={0x24, 0x25, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0x4, 0xfff1}}}, 0x24}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000e80)=@mpls_delroute={0xcc, 0x19, 0x10, 0x70bd29, 0x25dfdbfd, {0x1c, 0x14, 0x20, 0x1, 0x0, 0x1, 0xff, 0x8, 0x600}, [@RTA_MULTIPATH={0xc, 0x9, {0x7fff, 0x24, 0x3f, r2}}, @RTA_MULTIPATH={0xc, 0x9, {0x973, 0x11, 0x20, r6}}, @RTA_OIF={0x8, 0x4, r2}, @RTA_NEWDST={0x84, 0x13, [{0x0, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x89, 0x0, 0x1}, {0x81, 0x0, 0x1}, {0xcd, 0x0, 0x1}, {0xcd}, {0x3ff, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0xffff9}, {0x3}, {0xfffc1, 0x0, 0x1}, {0x2}, {0x8, 0x0, 0x1}, {0x8000, 0x0, 0x1}, {0x7}, {0x3f, 0x0, 0x1}, {0x6}, {0x0, 0x0, 0x1}, {0x8}, {0xb8ef, 0x0, 0x1}, {0x75}, {0xffff}, {0x9}, {0x8, 0x0, 0x1}, {0x101}, {0x1, 0x0, 0x1}, {0x5}, {0x1f}, {0x7fff}, {0x1}]}, @RTA_MULTIPATH={0xc, 0x9, {0xb32, 0x10, 0x81, r2}}]}, 0xcc}, 0x1, 0x0, 0x0, 0x81}, 0x4000) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newsa={0x1c8, 0x10, 0x713, 0x0, 0x0, {{@in=@private=0xa010102, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {0x0, 0x0, 0x8001}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x44, 0x17, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, [0x4, 0x4, 0xfe2, 0x4, 0x2, 0x80000000, 0x1000, 0x6, 0x2, 0x9c7]}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1c8}}, 0x0) 16:42:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013601118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:42:11 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x184, 0x10, 0x713, 0x0, 0x300, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x184}}, 0x0) 16:42:11 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0xffffff7f, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) 16:42:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013681118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 16:42:11 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x3f00, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 258.273934][ T8387] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 16:42:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="39000000136c1118680907070000000f0018ff3f0400000017b76c1700000000040037000a11030001342564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) [ 258.415358][ T8394] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 16:42:11 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x1a0, 0x10, 0x713, 0x6000, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8b}, [@algo_crypt={0x48, 0x2, {{'cbc(blowfish)\x00'}}}, @replay_esn_val={0x1c}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x1a0}}, 0x0) [ 258.512768][ T8394] ------------[ cut here ]------------ [ 258.518400][ T8394] WARNING: CPU: 1 PID: 8394 at net/core/dev.c:9593 dev_index_reserve+0x1a2/0x1c0 [ 258.527723][ T8394] Modules linked in: [ 258.531692][ T8394] CPU: 1 PID: 8394 Comm: syz-executor.5 Not tainted 6.5.0-rc6-syzkaller-01712-g23c167af2404 #0 [ 258.542273][ T8394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 258.552460][ T8394] RIP: 0010:dev_index_reserve+0x1a2/0x1c0 [ 258.558953][ T8394] Code: 00 31 d2 4d 8d 45 50 b9 ff ff ff 7f 48 8d 74 24 20 e8 02 3e 02 02 4c 89 e7 89 c3 e8 c8 38 11 02 e9 48 ff ff ff e8 6e f2 5d f9 <0f> 0b bb ea ff ff ff e9 52 ff ff ff e8 4d 87 0d 02 66 66 2e 0f 1f [ 258.578979][ T8394] RSP: 0018:ffffc9000387efa8 EFLAGS: 00010283 [ 258.585166][ T8394] RAX: 00000000000128b3 RBX: 000000008446f870 RCX: ffffc9000db9b000 [ 258.593621][ T8394] RDX: 0000000000040000 RSI: ffffffff88282e22 RDI: 0000000000000005 [ 258.601649][ T8394] RBP: 1ffff9200070fdf5 R08: 0000000000000005 R09: 0000000000000000 [ 258.609817][ T8394] R10: 000000008446f870 R11: 0000000000094000 R12: ffff8880463e6010 [ 258.618085][ T8394] R13: ffff88802c000000 R14: ffff8880463e6000 R15: ffff8880463e60f8 [ 258.626188][ T8394] FS: 00007f22505dc6c0(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 [ 258.635329][ T8394] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 258.641982][ T8394] CR2: 00007f549ef75198 CR3: 0000000023b78000 CR4: 00000000003506e0 [ 258.650111][ T8394] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 258.658221][ T8394] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 258.666974][ T8394] Call Trace: [ 258.670303][ T8394] [ 258.673521][ T8394] ? __warn+0xe6/0x380 [ 258.677659][ T8394] ? dev_index_reserve+0x1a2/0x1c0 [ 258.682911][ T8394] ? report_bug+0x3bc/0x580 [ 258.687507][ T8394] ? handle_bug+0x3c/0x70 [ 258.691892][ T8394] ? exc_invalid_op+0x17/0x40 [ 258.696709][ T8394] ? asm_exc_invalid_op+0x1a/0x20 [ 258.701801][ T8394] ? dev_index_reserve+0x1a2/0x1c0 [ 258.707051][ T8394] ? dev_index_reserve+0x1a2/0x1c0 [ 258.712258][ T8394] ? dev_index_reserve+0x1a2/0x1c0 [ 258.717540][ T8394] ? tc_run+0x530/0x530 [ 258.721760][ T8394] ? __kmalloc+0xe2/0x100 [ 258.726275][ T8394] ? veth_dev_init+0x1c0/0x350 [ 258.731217][ T8394] ? veth_get_num_queues+0x50/0x50 [ 258.736514][ T8394] register_netdevice+0x69a/0x1490 [ 258.741736][ T8394] ? unregister_netdevice_queue+0x3c0/0x3c0 [ 258.747823][ T8394] ? dev_addr_mod+0x39d/0x640 [ 258.752570][ T8394] veth_newlink+0x521/0xa50 [ 258.757241][ T8394] ? veth_set_features+0x2d0/0x2d0 [ 258.763069][ T8394] ? rtnl_create_link+0xc9c/0xfd0 [ 258.768235][ T8394] ? __rtnl_newlink+0x1075/0x18c0 [ 258.773547][ T8394] ? rtnl_newlink+0x67/0xa0 [ 258.778218][ T8394] ? __kmalloc_node+0xe7/0x100 [ 258.783216][ T8394] ? __xdp_rxq_info_reg+0x18c/0x340 [ 258.788580][ T8394] ? alloc_netdev_mqs+0xee6/0x1290 [ 258.793865][ T8394] ? rtnl_create_link+0xa6d/0xfd0 [ 258.798972][ T8394] ? veth_set_features+0x2d0/0x2d0 [ 258.804292][ T8394] __rtnl_newlink+0x115e/0x18c0 [ 258.809255][ T8394] ? rtnl_link_unregister+0x260/0x260 [ 258.814836][ T8394] rtnl_newlink+0x67/0xa0 [ 258.819252][ T8394] ? __rtnl_newlink+0x18c0/0x18c0 [ 258.824458][ T8394] rtnetlink_rcv_msg+0x439/0xd30 [ 258.829484][ T8394] ? rtnl_getlink+0xb40/0xb40 [ 258.834368][ T8394] netlink_rcv_skb+0x16b/0x440 [ 258.839280][ T8394] ? rtnl_getlink+0xb40/0xb40 [ 258.844146][ T8394] ? netlink_ack+0x1370/0x1370 [ 258.849007][ T8394] ? netlink_deliver_tap+0x1b1/0xd10 [ 258.854460][ T8394] netlink_unicast+0x536/0x810 [ 258.859295][ T8394] ? netlink_attachskb+0x870/0x870 [ 258.865411][ T8394] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 258.871506][ T8394] ? __phys_addr_symbol+0x30/0x70 [ 258.876920][ T8394] ? __check_object_size+0x323/0x740 [ 258.882288][ T8394] netlink_sendmsg+0x93c/0xe40 [ 258.887217][ T8394] ? netlink_unicast+0x810/0x810 [ 258.892227][ T8394] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 258.897700][ T8394] ? netlink_unicast+0x810/0x810 [ 258.902733][ T8394] sock_sendmsg+0xd9/0x180 [ 258.907395][ T8394] ____sys_sendmsg+0x6ac/0x940 [ 258.912239][ T8394] ? copy_msghdr_from_user+0x10b/0x160 [ 258.917964][ T8394] ? kernel_sendmsg+0x50/0x50 [ 258.922736][ T8394] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 258.930839][ T8394] ___sys_sendmsg+0x135/0x1d0 [ 258.935630][ T8394] ? do_recvmmsg+0x740/0x740 [ 258.940341][ T8394] ? __fget_light+0xe6/0x260 [ 258.945205][ T8394] __sys_sendmsg+0x117/0x1e0 [ 258.949858][ T8394] ? __sys_sendmsg_sock+0x30/0x30 [ 258.955028][ T8394] ? xfd_validate_state+0x5d/0x180 [ 258.960278][ T8394] ? syscall_enter_from_user_mode+0x26/0x80 [ 258.967060][ T8394] do_syscall_64+0x38/0xb0 [ 258.971570][ T8394] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 258.977802][ T8394] RIP: 0033:0x7f224f87cae9 [ 258.982278][ T8394] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 259.002072][ T8394] RSP: 002b:00007f22505dc0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 259.010610][ T8394] RAX: ffffffffffffffda RBX: 00007f224f99c050 RCX: 00007f224f87cae9 [ 259.018811][ T8394] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 259.027673][ T8394] RBP: 00007f224f8c847a R08: 0000000000000000 R09: 0000000000000000 [ 259.035788][ T8394] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 259.043945][ T8394] R13: 000000000000006e R14: 00007f224f99c050 R15: 00007ffdede7f488 [ 259.052004][ T8394] [ 259.055165][ T8394] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 259.062485][ T8394] CPU: 1 PID: 8394 Comm: syz-executor.5 Not tainted 6.5.0-rc6-syzkaller-01712-g23c167af2404 #0 [ 259.072948][ T8394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 259.083042][ T8394] Call Trace: [ 259.086339][ T8394] [ 259.089295][ T8394] dump_stack_lvl+0xd9/0x1b0 [ 259.094027][ T8394] panic+0x6a4/0x750 [ 259.097958][ T8394] ? panic_smp_self_stop+0xa0/0xa0 [ 259.103102][ T8394] ? show_trace_log_lvl+0x29d/0x3c0 [ 259.108367][ T8394] ? dev_index_reserve+0x1a2/0x1c0 [ 259.113517][ T8394] check_panic_on_warn+0xab/0xb0 [ 259.118491][ T8394] __warn+0xf2/0x380 [ 259.122421][ T8394] ? dev_index_reserve+0x1a2/0x1c0 [ 259.127573][ T8394] report_bug+0x3bc/0x580 [ 259.131952][ T8394] handle_bug+0x3c/0x70 [ 259.136133][ T8394] exc_invalid_op+0x17/0x40 [ 259.140664][ T8394] asm_exc_invalid_op+0x1a/0x20 [ 259.145546][ T8394] RIP: 0010:dev_index_reserve+0x1a2/0x1c0 [ 259.151312][ T8394] Code: 00 31 d2 4d 8d 45 50 b9 ff ff ff 7f 48 8d 74 24 20 e8 02 3e 02 02 4c 89 e7 89 c3 e8 c8 38 11 02 e9 48 ff ff ff e8 6e f2 5d f9 <0f> 0b bb ea ff ff ff e9 52 ff ff ff e8 4d 87 0d 02 66 66 2e 0f 1f [ 259.170955][ T8394] RSP: 0018:ffffc9000387efa8 EFLAGS: 00010283 [ 259.177063][ T8394] RAX: 00000000000128b3 RBX: 000000008446f870 RCX: ffffc9000db9b000 [ 259.185062][ T8394] RDX: 0000000000040000 RSI: ffffffff88282e22 RDI: 0000000000000005 [ 259.193057][ T8394] RBP: 1ffff9200070fdf5 R08: 0000000000000005 R09: 0000000000000000 [ 259.201055][ T8394] R10: 000000008446f870 R11: 0000000000094000 R12: ffff8880463e6010 [ 259.209054][ T8394] R13: ffff88802c000000 R14: ffff8880463e6000 R15: ffff8880463e60f8 [ 259.217102][ T8394] ? dev_index_reserve+0x1a2/0x1c0 [ 259.222286][ T8394] ? dev_index_reserve+0x1a2/0x1c0 [ 259.227442][ T8394] ? tc_run+0x530/0x530 [ 259.231627][ T8394] ? __kmalloc+0xe2/0x100 [ 259.236009][ T8394] ? veth_dev_init+0x1c0/0x350 [ 259.240812][ T8394] ? veth_get_num_queues+0x50/0x50 [ 259.245980][ T8394] register_netdevice+0x69a/0x1490 [ 259.251165][ T8394] ? unregister_netdevice_queue+0x3c0/0x3c0 [ 259.257110][ T8394] ? dev_addr_mod+0x39d/0x640 [ 259.261834][ T8394] veth_newlink+0x521/0xa50 [ 259.266377][ T8394] ? veth_set_features+0x2d0/0x2d0 [ 259.271713][ T8394] ? rtnl_create_link+0xc9c/0xfd0 [ 259.276791][ T8394] ? __rtnl_newlink+0x1075/0x18c0 [ 259.281865][ T8394] ? rtnl_newlink+0x67/0xa0 [ 259.286567][ T8394] ? __kmalloc_node+0xe7/0x100 [ 259.291380][ T8394] ? __xdp_rxq_info_reg+0x18c/0x340 [ 259.296621][ T8394] ? alloc_netdev_mqs+0xee6/0x1290 [ 259.301778][ T8394] ? rtnl_create_link+0xa6d/0xfd0 [ 259.306848][ T8394] ? veth_set_features+0x2d0/0x2d0 [ 259.312247][ T8394] __rtnl_newlink+0x115e/0x18c0 [ 259.317156][ T8394] ? rtnl_link_unregister+0x260/0x260 [ 259.322605][ T8394] rtnl_newlink+0x67/0xa0 [ 259.326981][ T8394] ? __rtnl_newlink+0x18c0/0x18c0 [ 259.332050][ T8394] rtnetlink_rcv_msg+0x439/0xd30 [ 259.337121][ T8394] ? rtnl_getlink+0xb40/0xb40 [ 259.341855][ T8394] netlink_rcv_skb+0x16b/0x440 [ 259.346659][ T8394] ? rtnl_getlink+0xb40/0xb40 [ 259.351386][ T8394] ? netlink_ack+0x1370/0x1370 [ 259.356196][ T8394] ? netlink_deliver_tap+0x1b1/0xd10 [ 259.361516][ T8394] netlink_unicast+0x536/0x810 [ 259.366318][ T8394] ? netlink_attachskb+0x870/0x870 [ 259.371460][ T8394] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 259.377428][ T8394] ? __phys_addr_symbol+0x30/0x70 [ 259.382488][ T8394] ? __check_object_size+0x323/0x740 [ 259.387816][ T8394] netlink_sendmsg+0x93c/0xe40 [ 259.392629][ T8394] ? netlink_unicast+0x810/0x810 [ 259.397616][ T8394] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 259.402948][ T8394] ? netlink_unicast+0x810/0x810 [ 259.408016][ T8394] sock_sendmsg+0xd9/0x180 [ 259.412477][ T8394] ____sys_sendmsg+0x6ac/0x940 [ 259.417285][ T8394] ? copy_msghdr_from_user+0x10b/0x160 [ 259.422776][ T8394] ? kernel_sendmsg+0x50/0x50 [ 259.427505][ T8394] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 259.433546][ T8394] ___sys_sendmsg+0x135/0x1d0 [ 259.438346][ T8394] ? do_recvmmsg+0x740/0x740 [ 259.442996][ T8394] ? __fget_light+0xe6/0x260 [ 259.447637][ T8394] __sys_sendmsg+0x117/0x1e0 [ 259.452285][ T8394] ? __sys_sendmsg_sock+0x30/0x30 [ 259.457624][ T8394] ? xfd_validate_state+0x5d/0x180 [ 259.462799][ T8394] ? syscall_enter_from_user_mode+0x26/0x80 [ 259.468748][ T8394] do_syscall_64+0x38/0xb0 [ 259.473213][ T8394] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 259.479183][ T8394] RIP: 0033:0x7f224f87cae9 [ 259.483627][ T8394] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 259.503267][ T8394] RSP: 002b:00007f22505dc0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 259.511712][ T8394] RAX: ffffffffffffffda RBX: 00007f224f99c050 RCX: 00007f224f87cae9 [ 259.519711][ T8394] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 259.527805][ T8394] RBP: 00007f224f8c847a R08: 0000000000000000 R09: 0000000000000000 [ 259.535797][ T8394] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 259.543810][ T8394] R13: 000000000000006e R14: 00007f224f99c050 R15: 00007ffdede7f488 [ 259.551821][ T8394] [ 259.555126][ T8394] Kernel Offset: disabled [ 259.559463][ T8394] Rebooting in 86400 seconds..