Warning: Permanently added '10.128.0.216' (ECDSA) to the list of known hosts. 2021/10/18 12:51:14 fuzzer started 2021/10/18 12:51:15 dialing manager at 10.128.0.169:45165 2021/10/18 12:51:18 syscalls: 1698 2021/10/18 12:51:18 code coverage: enabled 2021/10/18 12:51:18 comparison tracing: enabled 2021/10/18 12:51:18 extra coverage: enabled 2021/10/18 12:51:18 setuid sandbox: enabled 2021/10/18 12:51:18 namespace sandbox: enabled 2021/10/18 12:51:18 Android sandbox: /sys/fs/selinux/policy does not exist 2021/10/18 12:51:18 fault injection: enabled 2021/10/18 12:51:18 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/10/18 12:51:18 net packet injection: enabled 2021/10/18 12:51:18 net device setup: enabled 2021/10/18 12:51:18 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/10/18 12:51:18 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/10/18 12:51:18 USB emulation: enabled 2021/10/18 12:51:18 hci packet injection: enabled 2021/10/18 12:51:18 wifi device emulation: enabled 2021/10/18 12:51:18 802.15.4 emulation: enabled 2021/10/18 12:51:18 fetching corpus: 0, signal 0/2000 (executing program) syzkaller login: [ 71.080876][ T6529] cgroup: Unknown subsys name 'net' [ 71.092813][ T6529] cgroup: Unknown subsys name 'rlimit' 2021/10/18 12:51:18 fetching corpus: 50, signal 43161/46418 (executing program) 2021/10/18 12:51:18 fetching corpus: 100, signal 59301/63808 (executing program) 2021/10/18 12:51:18 fetching corpus: 150, signal 67343/73156 (executing program) 2021/10/18 12:51:19 fetching corpus: 200, signal 76897/83774 (executing program) 2021/10/18 12:51:19 fetching corpus: 250, signal 81972/90039 (executing program) 2021/10/18 12:51:19 fetching corpus: 300, signal 89836/98839 (executing program) 2021/10/18 12:51:19 fetching corpus: 350, signal 94023/104012 (executing program) 2021/10/18 12:51:19 fetching corpus: 400, signal 97663/108683 (executing program) 2021/10/18 12:51:19 fetching corpus: 450, signal 101463/113394 (executing program) 2021/10/18 12:51:19 fetching corpus: 500, signal 105312/118094 (executing program) 2021/10/18 12:51:20 fetching corpus: 550, signal 108949/122574 (executing program) 2021/10/18 12:51:20 fetching corpus: 600, signal 111642/126169 (executing program) 2021/10/18 12:51:20 fetching corpus: 650, signal 114675/129978 (executing program) 2021/10/18 12:51:20 fetching corpus: 700, signal 117721/133762 (executing program) 2021/10/18 12:51:20 fetching corpus: 750, signal 120100/136907 (executing program) 2021/10/18 12:51:20 fetching corpus: 800, signal 121996/139568 (executing program) 2021/10/18 12:51:20 fetching corpus: 850, signal 124380/142614 (executing program) 2021/10/18 12:51:20 fetching corpus: 900, signal 126601/145519 (executing program) 2021/10/18 12:51:21 fetching corpus: 950, signal 129888/149267 (executing program) 2021/10/18 12:51:21 fetching corpus: 999, signal 131787/151845 (executing program) 2021/10/18 12:51:21 fetching corpus: 1049, signal 134200/154828 (executing program) 2021/10/18 12:51:21 fetching corpus: 1099, signal 135910/157176 (executing program) 2021/10/18 12:51:21 fetching corpus: 1149, signal 138556/160271 (executing program) 2021/10/18 12:51:21 fetching corpus: 1198, signal 140699/162890 (executing program) 2021/10/18 12:51:22 fetching corpus: 1248, signal 142909/165493 (executing program) 2021/10/18 12:51:22 fetching corpus: 1298, signal 144335/167469 (executing program) 2021/10/18 12:51:22 fetching corpus: 1348, signal 146620/170104 (executing program) 2021/10/18 12:51:22 fetching corpus: 1398, signal 148462/172374 (executing program) 2021/10/18 12:51:22 fetching corpus: 1448, signal 150043/174373 (executing program) 2021/10/18 12:51:22 fetching corpus: 1497, signal 151587/176318 (executing program) 2021/10/18 12:51:22 fetching corpus: 1546, signal 153150/178299 (executing program) 2021/10/18 12:51:23 fetching corpus: 1596, signal 154146/179800 (executing program) 2021/10/18 12:51:23 fetching corpus: 1646, signal 155837/181841 (executing program) 2021/10/18 12:51:23 fetching corpus: 1696, signal 157210/183612 (executing program) 2021/10/18 12:51:23 fetching corpus: 1746, signal 158593/185367 (executing program) 2021/10/18 12:51:23 fetching corpus: 1796, signal 159772/186928 (executing program) 2021/10/18 12:51:23 fetching corpus: 1846, signal 161302/188763 (executing program) 2021/10/18 12:51:24 fetching corpus: 1896, signal 162658/190428 (executing program) 2021/10/18 12:51:24 fetching corpus: 1946, signal 163976/191991 (executing program) 2021/10/18 12:51:24 fetching corpus: 1995, signal 165263/193539 (executing program) 2021/10/18 12:51:24 fetching corpus: 2044, signal 166854/195286 (executing program) 2021/10/18 12:51:24 fetching corpus: 2094, signal 168176/196899 (executing program) 2021/10/18 12:51:24 fetching corpus: 2144, signal 169676/198581 (executing program) 2021/10/18 12:51:24 fetching corpus: 2194, signal 170639/199868 (executing program) 2021/10/18 12:51:25 fetching corpus: 2244, signal 171878/201327 (executing program) 2021/10/18 12:51:25 fetching corpus: 2294, signal 172846/202579 (executing program) 2021/10/18 12:51:25 fetching corpus: 2344, signal 173644/203732 (executing program) 2021/10/18 12:51:25 fetching corpus: 2394, signal 174561/204915 (executing program) 2021/10/18 12:51:25 fetching corpus: 2444, signal 175660/206207 (executing program) 2021/10/18 12:51:25 fetching corpus: 2493, signal 177137/207697 (executing program) 2021/10/18 12:51:26 fetching corpus: 2542, signal 178551/209117 (executing program) 2021/10/18 12:51:26 fetching corpus: 2592, signal 179663/210293 (executing program) 2021/10/18 12:51:26 fetching corpus: 2642, signal 180659/211479 (executing program) 2021/10/18 12:51:26 fetching corpus: 2691, signal 182067/212868 (executing program) 2021/10/18 12:51:26 fetching corpus: 2741, signal 182842/213874 (executing program) 2021/10/18 12:51:26 fetching corpus: 2789, signal 183956/215014 (executing program) 2021/10/18 12:51:27 fetching corpus: 2838, signal 184851/216067 (executing program) 2021/10/18 12:51:27 fetching corpus: 2888, signal 185713/217063 (executing program) 2021/10/18 12:51:27 fetching corpus: 2937, signal 186981/218260 (executing program) 2021/10/18 12:51:27 fetching corpus: 2987, signal 187828/219235 (executing program) 2021/10/18 12:51:27 fetching corpus: 3037, signal 188938/220366 (executing program) 2021/10/18 12:51:27 fetching corpus: 3087, signal 189958/221370 (executing program) 2021/10/18 12:51:28 fetching corpus: 3137, signal 190925/222336 (executing program) 2021/10/18 12:51:28 fetching corpus: 3187, signal 191523/223114 (executing program) 2021/10/18 12:51:28 fetching corpus: 3237, signal 192483/224060 (executing program) 2021/10/18 12:51:28 fetching corpus: 3287, signal 193132/224857 (executing program) 2021/10/18 12:51:28 fetching corpus: 3337, signal 194073/225766 (executing program) 2021/10/18 12:51:28 fetching corpus: 3387, signal 195394/226836 (executing program) 2021/10/18 12:51:28 fetching corpus: 3437, signal 196119/227613 (executing program) 2021/10/18 12:51:29 fetching corpus: 3487, signal 197487/228705 (executing program) 2021/10/18 12:51:29 fetching corpus: 3537, signal 198766/229698 (executing program) 2021/10/18 12:51:29 fetching corpus: 3587, signal 199563/230433 (executing program) 2021/10/18 12:51:29 fetching corpus: 3637, signal 200445/231253 (executing program) 2021/10/18 12:51:29 fetching corpus: 3687, signal 201061/231947 (executing program) 2021/10/18 12:51:29 fetching corpus: 3737, signal 201887/232648 (executing program) 2021/10/18 12:51:30 fetching corpus: 3787, signal 202789/233447 (executing program) 2021/10/18 12:51:30 fetching corpus: 3837, signal 203663/234149 (executing program) 2021/10/18 12:51:30 fetching corpus: 3886, signal 204366/234806 (executing program) 2021/10/18 12:51:30 fetching corpus: 3936, signal 205080/235399 (executing program) 2021/10/18 12:51:30 fetching corpus: 3986, signal 205882/236062 (executing program) 2021/10/18 12:51:30 fetching corpus: 4036, signal 206582/236660 (executing program) 2021/10/18 12:51:30 fetching corpus: 4086, signal 207602/237355 (executing program) 2021/10/18 12:51:31 fetching corpus: 4136, signal 208533/238008 (executing program) 2021/10/18 12:51:31 fetching corpus: 4185, signal 209117/238563 (executing program) 2021/10/18 12:51:31 fetching corpus: 4235, signal 209921/239169 (executing program) 2021/10/18 12:51:31 fetching corpus: 4285, signal 210747/239757 (executing program) 2021/10/18 12:51:31 fetching corpus: 4335, signal 211868/240452 (executing program) 2021/10/18 12:51:31 fetching corpus: 4385, signal 212435/240935 (executing program) 2021/10/18 12:51:31 fetching corpus: 4435, signal 213484/241576 (executing program) 2021/10/18 12:51:32 fetching corpus: 4485, signal 214064/242078 (executing program) 2021/10/18 12:51:32 fetching corpus: 4535, signal 214954/242634 (executing program) 2021/10/18 12:51:32 fetching corpus: 4583, signal 215540/243091 (executing program) 2021/10/18 12:51:32 fetching corpus: 4632, signal 216279/243589 (executing program) 2021/10/18 12:51:32 fetching corpus: 4681, signal 216923/244060 (executing program) 2021/10/18 12:51:32 fetching corpus: 4731, signal 217388/244452 (executing program) 2021/10/18 12:51:33 fetching corpus: 4779, signal 218110/244863 (executing program) 2021/10/18 12:51:33 fetching corpus: 4828, signal 218677/245277 (executing program) 2021/10/18 12:51:33 fetching corpus: 4877, signal 219282/245675 (executing program) 2021/10/18 12:51:33 fetching corpus: 4927, signal 219813/246049 (executing program) 2021/10/18 12:51:33 fetching corpus: 4976, signal 220502/246450 (executing program) 2021/10/18 12:51:33 fetching corpus: 5025, signal 221367/246864 (executing program) 2021/10/18 12:51:34 fetching corpus: 5075, signal 221936/247219 (executing program) 2021/10/18 12:51:34 fetching corpus: 5125, signal 222303/247530 (executing program) 2021/10/18 12:51:34 fetching corpus: 5175, signal 223132/247897 (executing program) 2021/10/18 12:51:34 fetching corpus: 5225, signal 223775/248190 (executing program) 2021/10/18 12:51:34 fetching corpus: 5275, signal 224474/248547 (executing program) 2021/10/18 12:51:34 fetching corpus: 5325, signal 225233/248858 (executing program) 2021/10/18 12:51:35 fetching corpus: 5374, signal 225862/249168 (executing program) 2021/10/18 12:51:35 fetching corpus: 5424, signal 226408/249463 (executing program) 2021/10/18 12:51:35 fetching corpus: 5474, signal 226898/249717 (executing program) 2021/10/18 12:51:35 fetching corpus: 5523, signal 227575/249992 (executing program) 2021/10/18 12:51:35 fetching corpus: 5573, signal 228108/250242 (executing program) 2021/10/18 12:51:35 fetching corpus: 5623, signal 228794/250519 (executing program) 2021/10/18 12:51:35 fetching corpus: 5673, signal 229388/250760 (executing program) 2021/10/18 12:51:35 fetching corpus: 5723, signal 229885/251021 (executing program) 2021/10/18 12:51:36 fetching corpus: 5773, signal 230480/251254 (executing program) 2021/10/18 12:51:36 fetching corpus: 5823, signal 231010/251483 (executing program) 2021/10/18 12:51:36 fetching corpus: 5873, signal 231648/251675 (executing program) 2021/10/18 12:51:36 fetching corpus: 5923, signal 232066/251883 (executing program) 2021/10/18 12:51:36 fetching corpus: 5973, signal 232706/252072 (executing program) 2021/10/18 12:51:37 fetching corpus: 6023, signal 233159/252226 (executing program) 2021/10/18 12:51:37 fetching corpus: 6073, signal 233658/252396 (executing program) 2021/10/18 12:51:37 fetching corpus: 6122, signal 234145/252554 (executing program) 2021/10/18 12:51:37 fetching corpus: 6172, signal 234794/252695 (executing program) 2021/10/18 12:51:37 fetching corpus: 6221, signal 235191/252841 (executing program) 2021/10/18 12:51:37 fetching corpus: 6271, signal 235690/252903 (executing program) 2021/10/18 12:51:37 fetching corpus: 6321, signal 236233/252903 (executing program) 2021/10/18 12:51:37 fetching corpus: 6371, signal 236730/252903 (executing program) 2021/10/18 12:51:37 fetching corpus: 6421, signal 237204/252903 (executing program) 2021/10/18 12:51:38 fetching corpus: 6471, signal 237853/252903 (executing program) 2021/10/18 12:51:38 fetching corpus: 6519, signal 238348/252903 (executing program) 2021/10/18 12:51:38 fetching corpus: 6569, signal 238757/252937 (executing program) 2021/10/18 12:51:38 fetching corpus: 6619, signal 239186/252937 (executing program) 2021/10/18 12:51:38 fetching corpus: 6669, signal 239551/252937 (executing program) 2021/10/18 12:51:38 fetching corpus: 6719, signal 240044/252937 (executing program) 2021/10/18 12:51:38 fetching corpus: 6769, signal 240616/252937 (executing program) 2021/10/18 12:51:39 fetching corpus: 6819, signal 241084/252937 (executing program) 2021/10/18 12:51:39 fetching corpus: 6869, signal 241634/252937 (executing program) 2021/10/18 12:51:39 fetching corpus: 6919, signal 242106/252939 (executing program) 2021/10/18 12:51:39 fetching corpus: 6968, signal 242547/252943 (executing program) 2021/10/18 12:51:39 fetching corpus: 7017, signal 243030/252943 (executing program) 2021/10/18 12:51:39 fetching corpus: 7066, signal 243437/252952 (executing program) 2021/10/18 12:51:39 fetching corpus: 7115, signal 243790/252952 (executing program) 2021/10/18 12:51:40 fetching corpus: 7165, signal 244247/252969 (executing program) 2021/10/18 12:51:40 fetching corpus: 7214, signal 244728/252969 (executing program) 2021/10/18 12:51:40 fetching corpus: 7264, signal 245215/252969 (executing program) 2021/10/18 12:51:40 fetching corpus: 7314, signal 245862/252969 (executing program) 2021/10/18 12:51:40 fetching corpus: 7364, signal 246447/252969 (executing program) 2021/10/18 12:51:40 fetching corpus: 7413, signal 246984/252979 (executing program) 2021/10/18 12:51:40 fetching corpus: 7462, signal 247486/252980 (executing program) 2021/10/18 12:51:41 fetching corpus: 7511, signal 247931/253000 (executing program) 2021/10/18 12:51:41 fetching corpus: 7561, signal 248366/253000 (executing program) 2021/10/18 12:51:41 fetching corpus: 7611, signal 248725/253002 (executing program) 2021/10/18 12:51:41 fetching corpus: 7661, signal 249239/253008 (executing program) 2021/10/18 12:51:41 fetching corpus: 7711, signal 249618/253008 (executing program) 2021/10/18 12:51:41 fetching corpus: 7761, signal 249945/253008 (executing program) 2021/10/18 12:51:42 fetching corpus: 7810, signal 250293/253008 (executing program) 2021/10/18 12:51:42 fetching corpus: 7859, signal 250608/253008 (executing program) 2021/10/18 12:51:42 fetching corpus: 7859, signal 250608/253008 (executing program) 2021/10/18 12:51:43 starting 6 fuzzer processes 12:51:43 executing program 0: r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000151300000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=ANY=[@ANYBLOB="880000002c00270d00"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000e0ff00000d0001006d61746368616c6c0000000054000200500002004c000100090001006373756d00000000200002801c00010008"], 0x88}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x6c50a96ae300b3, 0x0) 12:51:43 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) bind$can_j1939(r0, &(0x7f0000008f40), 0x18) 12:51:44 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xb, 0xa, 0x209e20, 0x2, 0x1}, 0x40) sendmsg$inet(0xffffffffffffffff, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0}, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000440)=""/130}, 0x20) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000200)={r0, &(0x7f00000000c0), &(0x7f0000000340)=""/187}, 0x20) 12:51:44 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000000180), 0xc) 12:51:44 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x1e, &(0x7f0000000000), 0x4) 12:51:45 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, 0x0, 0x0) unshare(0x40000000) [ 98.107871][ T6542] chnl_net:caif_netlink_parms(): no params data found [ 98.314509][ T6542] bridge0: port 1(bridge_slave_0) entered blocking state [ 98.325292][ T6542] bridge0: port 1(bridge_slave_0) entered disabled state [ 98.335449][ T6542] device bridge_slave_0 entered promiscuous mode [ 98.349991][ T6542] bridge0: port 2(bridge_slave_1) entered blocking state [ 98.357433][ T6542] bridge0: port 2(bridge_slave_1) entered disabled state [ 98.365046][ T6542] device bridge_slave_1 entered promiscuous mode [ 98.400637][ T6542] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 98.413832][ T6542] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 98.458846][ T6542] team0: Port device team_slave_0 added [ 98.470897][ T6542] team0: Port device team_slave_1 added [ 98.520237][ T6542] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 98.530145][ T6542] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 98.576754][ T6542] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 98.611305][ T6542] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 98.631562][ T6542] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 98.661982][ T6542] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 98.792028][ T6542] device hsr_slave_0 entered promiscuous mode [ 98.798727][ T6542] device hsr_slave_1 entered promiscuous mode [ 98.818119][ T6546] chnl_net:caif_netlink_parms(): no params data found [ 99.074126][ T6546] bridge0: port 1(bridge_slave_0) entered blocking state [ 99.088106][ T6546] bridge0: port 1(bridge_slave_0) entered disabled state [ 99.097460][ T6546] device bridge_slave_0 entered promiscuous mode [ 99.112323][ T6548] chnl_net:caif_netlink_parms(): no params data found [ 99.123040][ T6546] bridge0: port 2(bridge_slave_1) entered blocking state [ 99.131219][ T6546] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.141161][ T6546] device bridge_slave_1 entered promiscuous mode [ 99.223846][ T6546] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 99.272060][ T6546] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 99.338363][ T6546] team0: Port device team_slave_0 added [ 99.352845][ T6546] team0: Port device team_slave_1 added [ 99.488746][ T6548] bridge0: port 1(bridge_slave_0) entered blocking state [ 99.497183][ T6548] bridge0: port 1(bridge_slave_0) entered disabled state [ 99.504904][ T6548] device bridge_slave_0 entered promiscuous mode [ 99.525521][ T6546] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 99.532759][ T6546] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 99.559044][ T6546] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 99.573407][ T6548] bridge0: port 2(bridge_slave_1) entered blocking state [ 99.580775][ T6548] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.589046][ T6548] device bridge_slave_1 entered promiscuous mode [ 99.613531][ T6546] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 99.621962][ T6546] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 99.648704][ T6546] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 99.693582][ T6542] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 99.701737][ T25] Bluetooth: hci0: command 0x0409 tx timeout [ 99.735094][ T6548] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 99.764160][ T6546] device hsr_slave_0 entered promiscuous mode [ 99.771955][ T6546] device hsr_slave_1 entered promiscuous mode [ 99.781737][ T6546] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 99.790309][ T6546] Cannot create hsr debugfs directory [ 99.796973][ T6542] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 99.820991][ T6548] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 99.847293][ T6542] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 99.864734][ T6566] chnl_net:caif_netlink_parms(): no params data found [ 99.900074][ T6542] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 99.944207][ T6548] team0: Port device team_slave_0 added [ 99.969581][ T6548] team0: Port device team_slave_1 added [ 100.044617][ T6548] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 100.051978][ T6548] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 100.079602][ T6548] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 100.114495][ T6548] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 100.122327][ T6548] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 100.149589][ T6548] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 100.227695][ T6566] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.234832][ T6566] bridge0: port 1(bridge_slave_0) entered disabled state [ 100.243635][ T6566] device bridge_slave_0 entered promiscuous mode [ 100.252101][ T5] Bluetooth: hci2: command 0x0409 tx timeout [ 100.253703][ T6566] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.266488][ T6566] bridge0: port 2(bridge_slave_1) entered disabled state [ 100.277377][ T6566] device bridge_slave_1 entered promiscuous mode [ 100.299815][ T6548] device hsr_slave_0 entered promiscuous mode [ 100.306880][ T6548] device hsr_slave_1 entered promiscuous mode [ 100.313430][ T6548] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 100.321218][ T6548] Cannot create hsr debugfs directory [ 100.386299][ T6566] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 100.430816][ T6566] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 100.502050][ T6546] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 100.512863][ T6546] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 100.531588][ T6566] team0: Port device team_slave_0 added [ 100.548943][ T6546] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 100.558483][ T6566] team0: Port device team_slave_1 added [ 100.573211][ T2979] Bluetooth: hci3: command 0x0409 tx timeout [ 100.594018][ T6546] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 100.608438][ T6542] 8021q: adding VLAN 0 to HW filter on device bond0 [ 100.664754][ T6566] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 100.678374][ T6566] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 100.709309][ T6566] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 100.722852][ T6566] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 100.730003][ T6566] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 100.757194][ T6566] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 100.794472][ T6542] 8021q: adding VLAN 0 to HW filter on device team0 [ 100.803420][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 100.813585][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 100.868976][ T6566] device hsr_slave_0 entered promiscuous mode [ 100.877533][ T6566] device hsr_slave_1 entered promiscuous mode [ 100.884115][ T6566] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 100.893265][ T6566] Cannot create hsr debugfs directory [ 100.911687][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 100.920813][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 100.931051][ T25] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.938317][ T25] bridge0: port 1(bridge_slave_0) entered forwarding state [ 100.947969][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 100.957167][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 100.967584][ T25] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.974701][ T25] bridge0: port 2(bridge_slave_1) entered forwarding state [ 100.983216][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 100.992323][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 101.010805][ T7801] Bluetooth: hci4: command 0x0409 tx timeout [ 101.020398][ T6548] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 101.034956][ T6548] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 101.050771][ T6548] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 101.062821][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 101.087422][ T6548] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 101.097539][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 101.107195][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 101.115875][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 101.124630][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 101.134217][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 101.143410][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 101.152346][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 101.200446][ T6542] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 101.213248][ T6542] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 101.222120][ T7817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 101.231525][ T7817] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 101.282763][ T6546] 8021q: adding VLAN 0 to HW filter on device bond0 [ 101.341359][ T6546] 8021q: adding VLAN 0 to HW filter on device team0 [ 101.358614][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 101.367532][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 101.374990][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 101.384112][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 101.400257][ T6542] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 101.433128][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 101.442287][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 101.452017][ T25] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.459105][ T25] bridge0: port 1(bridge_slave_0) entered forwarding state [ 101.493662][ T7801] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 101.502140][ T7801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 101.511614][ T7801] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 101.520433][ T7801] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.527557][ T7801] bridge0: port 2(bridge_slave_1) entered forwarding state [ 101.535380][ T7801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 101.566234][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 101.575105][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 101.584570][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 101.606765][ T7833] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 101.614671][ T7833] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 101.624405][ T7833] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 101.634007][ T7833] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 101.642760][ T7833] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 101.652811][ T7833] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 101.661486][ T7833] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 101.670439][ T7833] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 101.679618][ T7833] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 101.698083][ T6548] 8021q: adding VLAN 0 to HW filter on device bond0 [ 101.708475][ T6566] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 101.720904][ T6566] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 101.732013][ T6546] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 101.748498][ T6566] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 101.759970][ T6566] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 101.767006][ T7833] Bluetooth: hci0: command 0x041b tx timeout [ 101.793814][ T6548] 8021q: adding VLAN 0 to HW filter on device team0 [ 101.808731][ T7833] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 101.817165][ T7833] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 101.824784][ T7833] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 101.834097][ T7833] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 101.843143][ T7833] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 101.852272][ T7833] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 101.861315][ T7833] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.868700][ T7833] bridge0: port 1(bridge_slave_0) entered forwarding state [ 101.880331][ T6542] device veth0_vlan entered promiscuous mode [ 101.895371][ T7833] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 101.903514][ T7833] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 101.911782][ T7833] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 101.942715][ T6542] device veth1_vlan entered promiscuous mode [ 101.951125][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 101.961680][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 101.971034][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 101.980070][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.987197][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 101.994754][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 102.003699][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 102.012615][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 102.021839][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 102.030436][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 102.038088][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 102.052765][ T6546] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 102.087800][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 102.099318][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 102.107315][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 102.119474][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 102.128338][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 102.140187][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 102.148722][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 102.160465][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 102.179774][ T6548] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 102.206931][ T7833] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 102.215953][ T7833] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 102.235878][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 102.243282][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 102.264194][ T6542] device veth0_macvtap entered promiscuous mode [ 102.282477][ T6546] device veth0_vlan entered promiscuous mode [ 102.290181][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 102.301091][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 102.309882][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 102.320020][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 102.329308][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 102.338486][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 102.347273][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 102.356973][ T2979] Bluetooth: hci2: command 0x041b tx timeout [ 102.362403][ T6548] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 102.377642][ T6542] device veth1_macvtap entered promiscuous mode [ 102.391187][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 102.408004][ T6546] device veth1_vlan entered promiscuous mode [ 102.442839][ T6542] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 102.461944][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 102.470746][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 102.482767][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 102.491975][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 102.509503][ T6566] 8021q: adding VLAN 0 to HW filter on device bond0 [ 102.519350][ T6542] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 102.534999][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 102.544521][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 102.554609][ T6542] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 102.567746][ T6542] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 102.579034][ T6542] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 102.591020][ T6542] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 102.613932][ T7833] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 102.622385][ T7833] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 102.644085][ T6566] 8021q: adding VLAN 0 to HW filter on device team0 [ 102.646065][ T1052] Bluetooth: hci3: command 0x041b tx timeout [ 102.664804][ T6548] device veth0_vlan entered promiscuous mode [ 102.671908][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 102.681746][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 102.696853][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 102.704659][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 102.712879][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 102.721795][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 102.736960][ T6546] device veth0_macvtap entered promiscuous mode [ 102.749061][ T6546] device veth1_macvtap entered promiscuous mode [ 102.764847][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 102.776422][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 102.784347][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 102.793773][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 102.802687][ T25] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.809807][ T25] bridge0: port 1(bridge_slave_0) entered forwarding state [ 102.826358][ T6548] device veth1_vlan entered promiscuous mode [ 102.863145][ T6546] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 102.879844][ T6546] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 102.907355][ T6546] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 102.914823][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 102.924733][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 102.933420][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 102.942451][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 102.951305][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.958447][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 102.966669][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 102.975454][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 102.983913][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 103.017053][ T6546] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 103.029206][ T6546] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 103.044946][ T6546] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 103.053056][ T1052] Bluetooth: hci4: command 0x041b tx timeout [ 103.066025][ T7876] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 103.074007][ T7876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 103.084078][ T7876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 103.093029][ T7876] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 103.102049][ T7876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 103.110913][ T7876] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 103.119637][ T7876] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 103.129822][ T7876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 103.144157][ T7876] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 103.159863][ T6566] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 103.170403][ T6566] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 103.189193][ T6546] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 103.199158][ T6546] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 103.211904][ T6546] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 103.221084][ T6546] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 103.246218][ T7801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 103.254504][ T7801] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 103.264027][ T7801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 103.273170][ T7801] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 103.281824][ T7801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 103.290928][ T7801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 103.312976][ T6548] device veth0_macvtap entered promiscuous mode [ 103.318889][ T8] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 103.342741][ T8] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 103.352179][ T7801] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 103.366530][ T7801] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 103.374421][ T7801] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 103.414272][ T6548] device veth1_macvtap entered promiscuous mode [ 103.427355][ T7801] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 103.436519][ T7801] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 103.443936][ T7801] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 103.467851][ T6566] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 103.519291][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 103.542396][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 103.581158][ T6548] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 103.592341][ T6548] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 103.609760][ T6548] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 103.622086][ T6548] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 103.635082][ T6548] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 103.655516][ T8] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 103.663681][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 103.672080][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 103.682230][ T8] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 103.693373][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 103.702479][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 103.727614][ T6548] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 103.762458][ T6548] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 103.781566][ T6548] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 103.799352][ T6548] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 103.817048][ T6548] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 103.842180][ T7916] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 103.846492][ T1052] Bluetooth: hci0: command 0x040f tx timeout [ 103.860255][ T7801] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 103.875609][ T7801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 103.896912][ T6548] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 103.908095][ T6548] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 103.918030][ T6548] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 103.927749][ T6548] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 103.944958][ T7916] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 103.959931][ T7916] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 103.984533][ T1086] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 104.012156][ T7916] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 104.023633][ T7916] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 104.025451][ T1086] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 104.035110][ T7876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 104.054782][ T7876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 104.076314][ T7916] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 104.088974][ T7927] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 104.099987][ T7927] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 104.111361][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 104.139354][ T7927] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 104.150964][ T7927] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 12:51:51 executing program 0: r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000151300000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=ANY=[@ANYBLOB="880000002c00270d00"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000e0ff00000d0001006d61746368616c6c0000000054000200500002004c000100090001006373756d00000000200002801c00010008"], 0x88}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x6c50a96ae300b3, 0x0) [ 104.189028][ T7876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 104.198187][ T7876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 104.214828][ T7876] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 104.250741][ T7876] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 12:51:51 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xb, 0xa, 0x209e20, 0x2, 0x1}, 0x40) sendmsg$inet(0xffffffffffffffff, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0}, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000440)=""/130}, 0x20) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000200)={r0, &(0x7f00000000c0), &(0x7f0000000340)=""/187}, 0x20) [ 104.325286][ T6566] device veth0_vlan entered promiscuous mode [ 104.367045][ T6566] device veth1_vlan entered promiscuous mode [ 104.387378][ T8] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 104.405807][ T1052] Bluetooth: hci2: command 0x040f tx timeout 12:51:51 executing program 0: r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000151300000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=ANY=[@ANYBLOB="880000002c00270d00"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000e0ff00000d0001006d61746368616c6c0000000054000200500002004c000100090001006373756d00000000200002801c00010008"], 0x88}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x6c50a96ae300b3, 0x0) [ 104.407486][ T8] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 104.448094][ T7735] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 104.466136][ T7735] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 12:51:51 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xb, 0xa, 0x209e20, 0x2, 0x1}, 0x40) sendmsg$inet(0xffffffffffffffff, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0}, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000440)=""/130}, 0x20) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000200)={r0, &(0x7f00000000c0), &(0x7f0000000340)=""/187}, 0x20) [ 104.518886][ T7735] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 12:51:51 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xb, 0xa, 0x209e20, 0x2, 0x1}, 0x40) sendmsg$inet(0xffffffffffffffff, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0}, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000440)=""/130}, 0x20) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000200)={r0, &(0x7f00000000c0), &(0x7f0000000340)=""/187}, 0x20) [ 104.620924][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 104.636162][ T10] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 104.653458][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 12:51:51 executing program 0: r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000151300000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=ANY=[@ANYBLOB="880000002c00270d00"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000e0ff00000d0001006d61746368616c6c0000000054000200500002004c000100090001006373756d00000000200002801c00010008"], 0x88}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x6c50a96ae300b3, 0x0) [ 104.679457][ T10] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 104.691830][ T6566] device veth0_macvtap entered promiscuous mode 12:51:52 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xb, 0xa, 0x209e20, 0x2, 0x1}, 0x40) sendmsg$inet(0xffffffffffffffff, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0}, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000440)=""/130}, 0x20) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000200)={r0, &(0x7f00000000c0), &(0x7f0000000340)=""/187}, 0x20) [ 104.725461][ T1052] Bluetooth: hci3: command 0x040f tx timeout [ 104.736094][ T7735] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 104.748510][ T7735] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 104.810298][ T6566] device veth1_macvtap entered promiscuous mode [ 104.911154][ T6566] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 104.986157][ T6566] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 105.039873][ T6566] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 105.061112][ T6566] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 105.074200][ T6566] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 105.085243][ T6566] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 105.097412][ T6566] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 105.124622][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 105.130499][ T2979] Bluetooth: hci4: command 0x040f tx timeout [ 105.137059][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 105.156485][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 105.172641][ T6566] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 105.190469][ T6566] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 105.202158][ T6566] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 105.214889][ T6566] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 105.227177][ T6566] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 105.244837][ T6566] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 105.256784][ T6566] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 105.270205][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 105.279469][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 105.293517][ T6566] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 105.305554][ T6566] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 105.314350][ T6566] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 105.330365][ T6566] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 105.409320][ T6496] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 105.422186][ T6496] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 105.452097][ T7876] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 105.473214][ T6496] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 105.484114][ T6496] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 105.498814][ T7876] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 105.925949][ T7] Bluetooth: hci0: command 0x0419 tx timeout [ 106.485396][ T1052] Bluetooth: hci2: command 0x0419 tx timeout [ 106.805713][ T2979] Bluetooth: hci3: command 0x0419 tx timeout [ 107.205436][ T2979] Bluetooth: hci4: command 0x0419 tx timeout [ 112.230144][ T8010] chnl_net:caif_netlink_parms(): no params data found [ 112.296826][ T8010] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.306148][ T8010] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.315494][ T8010] device bridge_slave_0 entered promiscuous mode [ 112.323569][ T8010] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.331042][ T8010] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.340527][ T8010] device bridge_slave_1 entered promiscuous mode [ 112.373389][ T8010] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 112.386471][ T8010] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 112.421256][ T8010] team0: Port device team_slave_0 added [ 112.429193][ T8010] team0: Port device team_slave_1 added [ 112.460385][ T8010] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 112.467444][ T8010] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 112.496055][ T8010] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 112.509282][ T8010] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 112.516963][ T8010] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 112.543707][ T8010] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 112.585042][ T8010] device hsr_slave_0 entered promiscuous mode [ 112.591733][ T8010] device hsr_slave_1 entered promiscuous mode [ 112.599898][ T8010] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 112.608525][ T8010] Cannot create hsr debugfs directory [ 112.740996][ T8010] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 112.751508][ T8010] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 112.764687][ T8010] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 112.775308][ T8010] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 112.800098][ T8010] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.807377][ T8010] bridge0: port 2(bridge_slave_1) entered forwarding state [ 112.815627][ T8010] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.822811][ T8010] bridge0: port 1(bridge_slave_0) entered forwarding state [ 112.879528][ T8010] 8021q: adding VLAN 0 to HW filter on device bond0 [ 112.893592][ T7801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 112.901951][ T7801] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.911396][ T7801] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.920771][ T7801] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 112.933794][ T8010] 8021q: adding VLAN 0 to HW filter on device team0 [ 112.947452][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 112.958097][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.965526][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 112.991890][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 113.001475][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.008561][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 113.032163][ T8010] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 113.042939][ T8010] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 113.059660][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 113.068963][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 113.077982][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 113.086667][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 113.095896][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 113.103469][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 113.124565][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 113.131964][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 113.143556][ T8010] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 113.215542][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 113.234079][ T7801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 113.246555][ T7801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 113.257386][ T7801] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 113.267360][ T7801] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 113.278117][ T8010] device veth0_vlan entered promiscuous mode [ 113.295882][ T8010] device veth1_vlan entered promiscuous mode [ 113.319381][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 113.329277][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 113.338184][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 113.346770][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 113.358041][ T8010] device veth0_macvtap entered promiscuous mode [ 113.374301][ T8010] device veth1_macvtap entered promiscuous mode [ 113.391644][ T8010] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 113.403348][ T8010] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 113.413350][ T8010] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 113.424094][ T8010] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 113.434285][ T8010] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 113.445015][ T8010] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 113.454943][ T8010] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 113.465634][ T8010] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 113.478501][ T8010] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 113.490646][ T7801] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 113.499409][ T7801] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 113.511383][ T7801] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 113.520348][ T7801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 113.536460][ T8010] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 113.547389][ T8010] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 113.558180][ T8010] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 113.569784][ T8010] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 113.580654][ T8010] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 113.595373][ T8010] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 113.607783][ T8010] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 113.619512][ T8010] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 113.630919][ T8010] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 113.640472][ T1052] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 113.649623][ T1052] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 113.661934][ T8010] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 113.671162][ T8010] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 113.680722][ T8010] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 113.690353][ T8010] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 113.774006][ T8] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 113.801631][ T8] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 113.815530][ T7801] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 113.833105][ T1086] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 113.842649][ T1086] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 113.856910][ T7801] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 114.088895][ T1873] Bluetooth: hci5: command 0x0409 tx timeout [ 116.164327][ T5] Bluetooth: hci5: command 0x041b tx timeout [ 118.244611][ T5] Bluetooth: hci5: command 0x040f tx timeout [ 120.334379][ T5] Bluetooth: hci5: command 0x0419 tx timeout [ 123.621425][ T8415] chnl_net:caif_netlink_parms(): no params data found [ 123.681911][ T8415] bridge0: port 1(bridge_slave_0) entered blocking state [ 123.690687][ T8415] bridge0: port 1(bridge_slave_0) entered disabled state [ 123.700125][ T8415] device bridge_slave_0 entered promiscuous mode [ 123.711594][ T8415] bridge0: port 2(bridge_slave_1) entered blocking state [ 123.721588][ T8415] bridge0: port 2(bridge_slave_1) entered disabled state [ 123.730356][ T8415] device bridge_slave_1 entered promiscuous mode [ 123.759260][ T8415] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 123.774516][ T8415] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 123.812618][ T8415] team0: Port device team_slave_0 added [ 123.821494][ T8415] team0: Port device team_slave_1 added [ 123.857219][ T8415] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 123.865555][ T8415] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 123.893556][ T8415] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 123.908221][ T8415] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 123.916972][ T8415] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 123.944226][ T8415] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 123.986994][ T8415] device hsr_slave_0 entered promiscuous mode [ 123.994605][ T8415] device hsr_slave_1 entered promiscuous mode [ 124.001198][ T8415] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 124.010650][ T8415] Cannot create hsr debugfs directory [ 124.149276][ T8415] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 124.158594][ T8415] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 124.169431][ T8415] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 124.188328][ T8415] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 124.217113][ T8415] bridge0: port 2(bridge_slave_1) entered blocking state [ 124.224346][ T8415] bridge0: port 2(bridge_slave_1) entered forwarding state [ 124.231769][ T8415] bridge0: port 1(bridge_slave_0) entered blocking state [ 124.238907][ T8415] bridge0: port 1(bridge_slave_0) entered forwarding state [ 124.291677][ T8415] 8021q: adding VLAN 0 to HW filter on device bond0 [ 124.308011][ T7817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 124.317852][ T7817] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.336538][ T7817] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.346273][ T7817] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 124.360826][ T8415] 8021q: adding VLAN 0 to HW filter on device team0 [ 124.372263][ T1052] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 124.385790][ T1052] bridge0: port 1(bridge_slave_0) entered blocking state [ 124.393007][ T1052] bridge0: port 1(bridge_slave_0) entered forwarding state [ 124.411059][ T7817] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 124.419546][ T7817] bridge0: port 2(bridge_slave_1) entered blocking state [ 124.426665][ T7817] bridge0: port 2(bridge_slave_1) entered forwarding state [ 124.449945][ T1052] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 124.458922][ T1052] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 124.470733][ T7817] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 124.487343][ T7817] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 124.505709][ T1052] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 124.518797][ T8415] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 124.541924][ T7817] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 124.549623][ T7817] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 124.566343][ T8415] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 124.588366][ T1052] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 124.597684][ T1052] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 124.620331][ T1052] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 124.628937][ T1052] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 124.640040][ T1052] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 124.648648][ T1052] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 124.658987][ T8415] device veth0_vlan entered promiscuous mode [ 124.674904][ T8415] device veth1_vlan entered promiscuous mode [ 124.698912][ T1052] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 124.707641][ T1052] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 124.716501][ T1052] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 124.725855][ T1052] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 124.740727][ T8415] device veth0_macvtap entered promiscuous mode [ 124.751893][ T8415] device veth1_macvtap entered promiscuous mode [ 124.772093][ T8415] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 124.783498][ T8415] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 124.793771][ T8415] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 124.805406][ T8415] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 124.815610][ T8415] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 124.826412][ T8415] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 124.837561][ T8415] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 124.848332][ T8415] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 124.858572][ T8415] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 124.869358][ T8415] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 124.880993][ T8415] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 124.895063][ T7801] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 124.903030][ T7801] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 124.912569][ T7801] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 124.922406][ T7801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 124.937572][ T8415] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 124.948333][ T8415] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 124.959236][ T8415] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 124.972886][ T8415] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 124.983525][ T8415] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 124.995880][ T8415] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 125.006246][ T8415] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 125.017100][ T8415] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 125.027132][ T8415] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 125.037975][ T8415] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 125.049721][ T8415] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 125.058798][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 125.068103][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 125.080667][ T8415] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 125.089977][ T8415] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 125.099080][ T8415] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 125.109470][ T8415] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 125.193067][ T8] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 125.237210][ T8] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 125.254966][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 125.267442][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 125.277219][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 125.290754][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 12:52:12 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x2, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg$unix(r1, &(0x7f0000000b40)=[{{&(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e, 0x0}}], 0x1, 0x0) close(r1) sendmmsg(r0, &(0x7f0000002a00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 12:52:12 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0xff00, 'team0\x00'}) 12:52:12 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xb, 0xa, 0x209e20, 0x2, 0x1}, 0x40) sendmsg$inet(0xffffffffffffffff, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0}, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000440)=""/130}, 0x20) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000200)={r0, &(0x7f00000000c0), &(0x7f0000000340)=""/187}, 0x20) 12:52:12 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x1e, &(0x7f0000000000), 0x4) 12:52:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="0a0775b0", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="f297c0eccf859705acf983fd5b4b6039b63eac610b", 0x8}, {&(0x7f0000001400)="c98812c1be8a", 0xffffffc8}, {&(0x7f00000012c0)="406f2bef596a8a3130012ee7bf", 0xd}, {&(0x7f0000001300)="7f5549f794326461", 0x8}], 0x4, &(0x7f00000000c0)=[@op={0x18}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001500)=""/74, 0x4a}, {&(0x7f0000001580)=""/32, 0x2fa80}], 0x2}, 0x0) 12:52:12 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, 0x0, 0x0) unshare(0x40000000) [ 125.445785][ T7] Bluetooth: hci1: command 0x0409 tx timeout 12:52:12 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0xff00, 'team0\x00'}) 12:52:12 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x1e, &(0x7f0000000000), 0x4) 12:52:12 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xb, 0xa, 0x209e20, 0x2, 0x1}, 0x40) sendmsg$inet(0xffffffffffffffff, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0}, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000440)=""/130}, 0x20) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000200)={r0, &(0x7f00000000c0), &(0x7f0000000340)=""/187}, 0x20) 12:52:12 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x2, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg$unix(r1, &(0x7f0000000b40)=[{{&(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e, 0x0}}], 0x1, 0x0) close(r1) sendmmsg(r0, &(0x7f0000002a00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 12:52:13 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0xff00, 'team0\x00'}) 12:52:13 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x1e, &(0x7f0000000000), 0x4) 12:52:13 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, 0x0, 0x0) unshare(0x40000000) 12:52:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0900000000000000006a82b97c000900010073797a3000000000080002400000000214000000110001"], 0x50}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETTABLE(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, 0x1, 0xa, 0x101, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 12:52:13 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x2, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg$unix(r1, &(0x7f0000000b40)=[{{&(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e, 0x0}}], 0x1, 0x0) close(r1) sendmmsg(r0, &(0x7f0000002a00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 12:52:13 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0xff00, 'team0\x00'}) 12:52:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0900000000000000006a82b97c000900010073797a3000000000080002400000000214000000110001"], 0x50}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETTABLE(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, 0x1, 0xa, 0x101, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 12:52:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) accept4(r0, 0x0, 0x0, 0x0) 12:52:13 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x2, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg$unix(r1, &(0x7f0000000b40)=[{{&(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e, 0x0}}], 0x1, 0x0) close(r1) sendmmsg(r0, &(0x7f0000002a00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 12:52:13 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0x6, @local}, 0x10) 12:52:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="0a0775b0", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="f297c0eccf859705acf983fd5b4b6039b63eac610b", 0x8}, {&(0x7f0000001400)="c98812c1be8a", 0xffffffc8}, {&(0x7f00000012c0)="406f2bef596a8a3130012ee7bf", 0xd}, {&(0x7f0000001300)="7f5549f794326461", 0x8}], 0x4, &(0x7f00000000c0)=[@op={0x18}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001500)=""/74, 0x4a}, {&(0x7f0000001580)=""/32, 0x2fa80}], 0x2}, 0x0) 12:52:13 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, 0x0, 0x0) unshare(0x40000000) 12:52:13 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0x6, @local}, 0x10) 12:52:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="0a0775b0", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="f297c0eccf859705acf983fd5b4b6039b63eac610b", 0x8}, {&(0x7f0000001400)="c98812c1be8a", 0xffffffc8}, {&(0x7f00000012c0)="406f2bef596a8a3130012ee7bf", 0xd}, {&(0x7f0000001300)="7f5549f794326461", 0x8}], 0x4, &(0x7f00000000c0)=[@op={0x18}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001500)=""/74, 0x4a}, {&(0x7f0000001580)=""/32, 0x2fa80}], 0x2}, 0x0) 12:52:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0900000000000000006a82b97c000900010073797a3000000000080002400000000214000000110001"], 0x50}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETTABLE(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, 0x1, 0xa, 0x101, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 12:52:13 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000200)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @local}}) 12:52:14 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0x6, @local}, 0x10) 12:52:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0900000000000000006a82b97c000900010073797a3000000000080002400000000214000000110001"], 0x50}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETTABLE(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, 0x1, 0xa, 0x101, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 12:52:14 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@empty, @in6=@dev}, {@in=@private, 0x0, 0x32}, @in=@multicast2, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x0, 0x20}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 12:52:14 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0x6, @local}, 0x10) 12:52:14 executing program 5: r0 = socket$caif_seqpacket(0x25, 0x5, 0x5) connect$caif(r0, &(0x7f0000000040)=@dbg, 0x18) 12:52:14 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x20002, 0x0) 12:52:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="0a0775b0", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="f297c0eccf859705acf983fd5b4b6039b63eac610b", 0x8}, {&(0x7f0000001400)="c98812c1be8a", 0xffffffc8}, {&(0x7f00000012c0)="406f2bef596a8a3130012ee7bf", 0xd}, {&(0x7f0000001300)="7f5549f794326461", 0x8}], 0x4, &(0x7f00000000c0)=[@op={0x18}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001500)=""/74, 0x4a}, {&(0x7f0000001580)=""/32, 0x2fa80}], 0x2}, 0x0) 12:52:14 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x88) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000080)=0x20000000005, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x280, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140), 0x2cf}}], 0xa0cbcb, 0x0) 12:52:14 executing program 5: r0 = socket$caif_seqpacket(0x25, 0x5, 0x5) connect$caif(r0, &(0x7f0000000040)=@dbg, 0x18) 12:52:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="0a0775b0", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="f297c0eccf859705acf983fd5b4b6039b63eac610b", 0x8}, {&(0x7f0000001400)="c98812c1be8a", 0xffffffc8}, {&(0x7f00000012c0)="406f2bef596a8a3130012ee7bf", 0xd}, {&(0x7f0000001300)="7f5549f794326461", 0x8}], 0x4, &(0x7f00000000c0)=[@op={0x18}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001500)=""/74, 0x4a}, {&(0x7f0000001580)=""/32, 0x2fa80}], 0x2}, 0x0) 12:52:14 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@empty, @in6=@dev}, {@in=@private, 0x0, 0x32}, @in=@multicast2, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x0, 0x20}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 12:52:14 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000040), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x5, 0x241, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "930db625702c9e86"}}, 0x48}}, 0x0) 12:52:14 executing program 5: r0 = socket$caif_seqpacket(0x25, 0x5, 0x5) connect$caif(r0, &(0x7f0000000040)=@dbg, 0x18) 12:52:14 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x88) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000080)=0x20000000005, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x280, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140), 0x2cf}}], 0xa0cbcb, 0x0) [ 127.523580][ T1052] Bluetooth: hci1: command 0x041b tx timeout 12:52:14 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x88) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000080)=0x20000000005, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x280, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140), 0x2cf}}], 0xa0cbcb, 0x0) 12:52:15 executing program 5: r0 = socket$caif_seqpacket(0x25, 0x5, 0x5) connect$caif(r0, &(0x7f0000000040)=@dbg, 0x18) 12:52:15 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000040), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x5, 0x241, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "930db625702c9e86"}}, 0x48}}, 0x0) 12:52:15 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@empty, @in6=@dev}, {@in=@private, 0x0, 0x32}, @in=@multicast2, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x0, 0x20}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 12:52:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="0a0775b0", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="f297c0eccf859705acf983fd5b4b6039b63eac610b", 0x8}, {&(0x7f0000001400)="c98812c1be8a", 0xffffffc8}, {&(0x7f00000012c0)="406f2bef596a8a3130012ee7bf", 0xd}, {&(0x7f0000001300)="7f5549f794326461", 0x8}], 0x4, &(0x7f00000000c0)=[@op={0x18}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001500)=""/74, 0x4a}, {&(0x7f0000001580)=""/32, 0x2fa80}], 0x2}, 0x0) 12:52:15 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000001d00), 0x8) 12:52:15 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x88) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000080)=0x20000000005, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x280, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140), 0x2cf}}], 0xa0cbcb, 0x0) 12:52:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="0a0775b0", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="f297c0eccf859705acf983fd5b4b6039b63eac610b", 0x8}, {&(0x7f0000001400)="c98812c1be8a", 0xffffffc8}, {&(0x7f00000012c0)="406f2bef596a8a3130012ee7bf", 0xd}, {&(0x7f0000001300)="7f5549f794326461", 0x8}], 0x4, &(0x7f00000000c0)=[@op={0x18}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001500)=""/74, 0x4a}, {&(0x7f0000001580)=""/32, 0x2fa80}], 0x2}, 0x0) 12:52:15 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@empty, @in6=@dev}, {@in=@private, 0x0, 0x32}, @in=@multicast2, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x0, 0x20}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 12:52:15 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000040), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x5, 0x241, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "930db625702c9e86"}}, 0x48}}, 0x0) 12:52:15 executing program 0: unshare(0x40000400) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000040000000000000000ff01850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000180)={'raw\x00', 0x0, [0x3, 0x1ff, 0x7, 0x0, 0x20]}, &(0x7f0000000080)=0x54) 12:52:15 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000001d00), 0x8) 12:52:15 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000001d00), 0x8) 12:52:15 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) accept4(r0, &(0x7f0000000100)=@sco={0x1f, @none}, &(0x7f0000000000)=0x80, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) 12:52:16 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000040), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x5, 0x241, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "930db625702c9e86"}}, 0x48}}, 0x0) 12:52:16 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000001d00), 0x8) 12:52:16 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYNAME(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000400)={0x1c, 0xe, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x10}]}, 0x1c}}, 0x0) 12:52:16 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0x2, 0x3, 0x101, 0x0, 0x0, {}, [@NFQA_CFG_CMD={0x8, 0x1, {0x4}}]}, 0x1c}}, 0x0) 12:52:16 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) accept4(r0, &(0x7f0000000100)=@sco={0x1f, @none}, &(0x7f0000000000)=0x80, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) 12:52:16 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) accept4(r0, &(0x7f0000000100)=@sco={0x1f, @none}, &(0x7f0000000000)=0x80, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) 12:52:16 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYNAME(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000400)={0x1c, 0xe, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x10}]}, 0x1c}}, 0x0) 12:52:16 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1, 0x4}]}, &(0x7f0000000100)='GPL\x00'}, 0x48) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000140)={'erspan0\x00', &(0x7f0000000240)={'syztnl2\x00', 0x0, 0x700, 0x7, 0x480f, 0x200, {{0x1a, 0x4, 0x3, 0x1, 0x68, 0x0, 0x0, 0x0, 0x2f, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x29}, {[@timestamp_addr={0x44, 0x1c, 0x0, 0x1, 0x2, [{@dev={0xac, 0x14, 0x14, 0x17}}, {@multicast1, 0x6}, {@loopback, 0x2}]}, @ssrr={0x89, 0x13, 0x1b, [@multicast2, @multicast2, @rand_addr=0x64010100, @rand_addr=0x64010101]}, @timestamp_addr={0x44, 0xc, 0xd5, 0x1, 0xc, [{@multicast1, 0xaf78}]}, @generic={0x89, 0x12, "5371783ae6fa01b5040e42560a0000d3"}, @ra={0x94, 0x4, 0x1}, @ssrr={0x89, 0x3, 0xd7}]}}}}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000009c0)=ANY=[@ANYBLOB="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", @ANYRES64=r1, @ANYRES16], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x10, &(0x7f0000000600)={&(0x7f0000000d80)=""/4096, 0x1000}}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xa, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="85000000a0000000350000000000000085000000080000009500000000000000e135dee43f5d62cdaf5bb32c301264de232ce03ca49ba60071b592758143664bf85056627ce336472821023a89dba77c8ea9b6ee1398ae73749be1537086ae214b648801a3f00574709ddccbce9ffab95dbc042fc0c3cd37b7baa14007c92d4cf2d339bf6dc7229cdac23d9c280569e2db7a6231813205b5b8cbd97b7563dcbdbfba95ec64e00dbba2a909bd6a9d45359cf11ad81000fb0f5548ced9733ca0fe9d54299ffd9762b770e5ca8cdad72f668dbfa9a21d9e8c4afb7203e71a4dcefc7a45eab7e2b8296e3a9ab49386337eed9787"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x41}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0x2000000, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000}, 0x28) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001e001909"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) [ 129.603542][ T1052] Bluetooth: hci1: command 0x040f tx timeout 12:52:17 executing program 0: unshare(0x40000400) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000040000000000000000ff01850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000180)={'raw\x00', 0x0, [0x3, 0x1ff, 0x7, 0x0, 0x20]}, &(0x7f0000000080)=0x54) 12:52:17 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) write$binfmt_misc(r1, &(0x7f0000000040)={'syz1'}, 0x4) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$binfmt_script(r1, 0x0, 0xfffffe3e) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 12:52:17 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYNAME(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000400)={0x1c, 0xe, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x10}]}, 0x1c}}, 0x0) 12:52:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x201, 0x0, 0x0, {0x1}}, 0x14}}, 0x0) 12:52:17 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) accept4(r0, &(0x7f0000000100)=@sco={0x1f, @none}, &(0x7f0000000000)=0x80, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) 12:52:17 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYNAME(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000400)={0x1c, 0xe, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x10}]}, 0x1c}}, 0x0) 12:52:17 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) write$binfmt_misc(r1, &(0x7f0000000040)={'syz1'}, 0x4) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$binfmt_script(r1, 0x0, 0xfffffe3e) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 12:52:17 executing program 4: unshare(0x40000400) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000040000000000000000ff01850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000180)={'raw\x00', 0x0, [0x3, 0x1ff, 0x7, 0x0, 0x20]}, &(0x7f0000000080)=0x54) 12:52:17 executing program 1: unshare(0x40000400) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000040000000000000000ff01850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000180)={'raw\x00', 0x0, [0x3, 0x1ff, 0x7, 0x0, 0x20]}, &(0x7f0000000080)=0x54) 12:52:17 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) write$binfmt_misc(r1, &(0x7f0000000040)={'syz1'}, 0x4) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$binfmt_script(r1, 0x0, 0xfffffe3e) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 12:52:17 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2400001) r1 = accept(r0, 0x0, 0x0) close(r1) 12:52:17 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1, 0x4}]}, &(0x7f0000000100)='GPL\x00'}, 0x48) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000140)={'erspan0\x00', &(0x7f0000000240)={'syztnl2\x00', 0x0, 0x700, 0x7, 0x480f, 0x200, {{0x1a, 0x4, 0x3, 0x1, 0x68, 0x0, 0x0, 0x0, 0x2f, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x29}, {[@timestamp_addr={0x44, 0x1c, 0x0, 0x1, 0x2, [{@dev={0xac, 0x14, 0x14, 0x17}}, {@multicast1, 0x6}, {@loopback, 0x2}]}, @ssrr={0x89, 0x13, 0x1b, [@multicast2, @multicast2, @rand_addr=0x64010100, @rand_addr=0x64010101]}, @timestamp_addr={0x44, 0xc, 0xd5, 0x1, 0xc, [{@multicast1, 0xaf78}]}, @generic={0x89, 0x12, "5371783ae6fa01b5040e42560a0000d3"}, @ra={0x94, 0x4, 0x1}, @ssrr={0x89, 0x3, 0xd7}]}}}}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000009c0)=ANY=[@ANYBLOB="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", @ANYRES64=r1, @ANYRES16], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x10, &(0x7f0000000600)={&(0x7f0000000d80)=""/4096, 0x1000}}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xa, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="85000000a0000000350000000000000085000000080000009500000000000000e135dee43f5d62cdaf5bb32c301264de232ce03ca49ba60071b592758143664bf85056627ce336472821023a89dba77c8ea9b6ee1398ae73749be1537086ae214b648801a3f00574709ddccbce9ffab95dbc042fc0c3cd37b7baa14007c92d4cf2d339bf6dc7229cdac23d9c280569e2db7a6231813205b5b8cbd97b7563dcbdbfba95ec64e00dbba2a909bd6a9d45359cf11ad81000fb0f5548ced9733ca0fe9d54299ffd9762b770e5ca8cdad72f668dbfa9a21d9e8c4afb7203e71a4dcefc7a45eab7e2b8296e3a9ab49386337eed9787"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x41}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0x2000000, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000}, 0x28) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001e001909"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) [ 131.683110][ T5] Bluetooth: hci1: command 0x0419 tx timeout 12:52:19 executing program 0: unshare(0x40000400) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000040000000000000000ff01850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000180)={'raw\x00', 0x0, [0x3, 0x1ff, 0x7, 0x0, 0x20]}, &(0x7f0000000080)=0x54) 12:52:19 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) write$binfmt_misc(r1, &(0x7f0000000040)={'syz1'}, 0x4) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$binfmt_script(r1, 0x0, 0xfffffe3e) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 12:52:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1, 0x4}]}, &(0x7f0000000100)='GPL\x00'}, 0x48) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000140)={'erspan0\x00', &(0x7f0000000240)={'syztnl2\x00', 0x0, 0x700, 0x7, 0x480f, 0x200, {{0x1a, 0x4, 0x3, 0x1, 0x68, 0x0, 0x0, 0x0, 0x2f, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x29}, {[@timestamp_addr={0x44, 0x1c, 0x0, 0x1, 0x2, [{@dev={0xac, 0x14, 0x14, 0x17}}, {@multicast1, 0x6}, {@loopback, 0x2}]}, @ssrr={0x89, 0x13, 0x1b, [@multicast2, @multicast2, @rand_addr=0x64010100, @rand_addr=0x64010101]}, @timestamp_addr={0x44, 0xc, 0xd5, 0x1, 0xc, [{@multicast1, 0xaf78}]}, @generic={0x89, 0x12, "5371783ae6fa01b5040e42560a0000d3"}, @ra={0x94, 0x4, 0x1}, @ssrr={0x89, 0x3, 0xd7}]}}}}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000009c0)=ANY=[@ANYBLOB="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", @ANYRES64=r1, @ANYRES16], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x10, &(0x7f0000000600)={&(0x7f0000000d80)=""/4096, 0x1000}}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xa, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="85000000a0000000350000000000000085000000080000009500000000000000e135dee43f5d62cdaf5bb32c301264de232ce03ca49ba60071b592758143664bf85056627ce336472821023a89dba77c8ea9b6ee1398ae73749be1537086ae214b648801a3f00574709ddccbce9ffab95dbc042fc0c3cd37b7baa14007c92d4cf2d339bf6dc7229cdac23d9c280569e2db7a6231813205b5b8cbd97b7563dcbdbfba95ec64e00dbba2a909bd6a9d45359cf11ad81000fb0f5548ced9733ca0fe9d54299ffd9762b770e5ca8cdad72f668dbfa9a21d9e8c4afb7203e71a4dcefc7a45eab7e2b8296e3a9ab49386337eed9787"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x41}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0x2000000, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000}, 0x28) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001e001909"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 12:52:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1, 0x4}]}, &(0x7f0000000100)='GPL\x00'}, 0x48) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000140)={'erspan0\x00', &(0x7f0000000240)={'syztnl2\x00', 0x0, 0x700, 0x7, 0x480f, 0x200, {{0x1a, 0x4, 0x3, 0x1, 0x68, 0x0, 0x0, 0x0, 0x2f, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x29}, {[@timestamp_addr={0x44, 0x1c, 0x0, 0x1, 0x2, [{@dev={0xac, 0x14, 0x14, 0x17}}, {@multicast1, 0x6}, {@loopback, 0x2}]}, @ssrr={0x89, 0x13, 0x1b, [@multicast2, @multicast2, @rand_addr=0x64010100, @rand_addr=0x64010101]}, @timestamp_addr={0x44, 0xc, 0xd5, 0x1, 0xc, [{@multicast1, 0xaf78}]}, @generic={0x89, 0x12, "5371783ae6fa01b5040e42560a0000d3"}, @ra={0x94, 0x4, 0x1}, @ssrr={0x89, 0x3, 0xd7}]}}}}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000009c0)=ANY=[@ANYBLOB="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", @ANYRES64=r1, @ANYRES16], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x10, &(0x7f0000000600)={&(0x7f0000000d80)=""/4096, 0x1000}}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xa, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="85000000a0000000350000000000000085000000080000009500000000000000e135dee43f5d62cdaf5bb32c301264de232ce03ca49ba60071b592758143664bf85056627ce336472821023a89dba77c8ea9b6ee1398ae73749be1537086ae214b648801a3f00574709ddccbce9ffab95dbc042fc0c3cd37b7baa14007c92d4cf2d339bf6dc7229cdac23d9c280569e2db7a6231813205b5b8cbd97b7563dcbdbfba95ec64e00dbba2a909bd6a9d45359cf11ad81000fb0f5548ced9733ca0fe9d54299ffd9762b770e5ca8cdad72f668dbfa9a21d9e8c4afb7203e71a4dcefc7a45eab7e2b8296e3a9ab49386337eed9787"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x41}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0x2000000, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000}, 0x28) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001e001909"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 12:52:19 executing program 4: unshare(0x40000400) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000040000000000000000ff01850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000180)={'raw\x00', 0x0, [0x3, 0x1ff, 0x7, 0x0, 0x20]}, &(0x7f0000000080)=0x54) 12:52:19 executing program 1: unshare(0x40000400) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000040000000000000000ff01850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000180)={'raw\x00', 0x0, [0x3, 0x1ff, 0x7, 0x0, 0x20]}, &(0x7f0000000080)=0x54) [ 132.483747][ T1358] ieee802154 phy0 wpan0: encryption failed: -22 [ 132.490519][ T1358] ieee802154 phy1 wpan1: encryption failed: -22 12:52:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1, 0x4}]}, &(0x7f0000000100)='GPL\x00'}, 0x48) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000140)={'erspan0\x00', &(0x7f0000000240)={'syztnl2\x00', 0x0, 0x700, 0x7, 0x480f, 0x200, {{0x1a, 0x4, 0x3, 0x1, 0x68, 0x0, 0x0, 0x0, 0x2f, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x29}, {[@timestamp_addr={0x44, 0x1c, 0x0, 0x1, 0x2, [{@dev={0xac, 0x14, 0x14, 0x17}}, {@multicast1, 0x6}, {@loopback, 0x2}]}, @ssrr={0x89, 0x13, 0x1b, [@multicast2, @multicast2, @rand_addr=0x64010100, @rand_addr=0x64010101]}, @timestamp_addr={0x44, 0xc, 0xd5, 0x1, 0xc, [{@multicast1, 0xaf78}]}, @generic={0x89, 0x12, "5371783ae6fa01b5040e42560a0000d3"}, @ra={0x94, 0x4, 0x1}, @ssrr={0x89, 0x3, 0xd7}]}}}}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000009c0)=ANY=[@ANYBLOB="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", @ANYRES64=r1, @ANYRES16], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x10, &(0x7f0000000600)={&(0x7f0000000d80)=""/4096, 0x1000}}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xa, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="85000000a0000000350000000000000085000000080000009500000000000000e135dee43f5d62cdaf5bb32c301264de232ce03ca49ba60071b592758143664bf85056627ce336472821023a89dba77c8ea9b6ee1398ae73749be1537086ae214b648801a3f00574709ddccbce9ffab95dbc042fc0c3cd37b7baa14007c92d4cf2d339bf6dc7229cdac23d9c280569e2db7a6231813205b5b8cbd97b7563dcbdbfba95ec64e00dbba2a909bd6a9d45359cf11ad81000fb0f5548ced9733ca0fe9d54299ffd9762b770e5ca8cdad72f668dbfa9a21d9e8c4afb7203e71a4dcefc7a45eab7e2b8296e3a9ab49386337eed9787"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x41}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0x2000000, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000}, 0x28) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001e001909"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 12:52:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1, 0x4}]}, &(0x7f0000000100)='GPL\x00'}, 0x48) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000140)={'erspan0\x00', &(0x7f0000000240)={'syztnl2\x00', 0x0, 0x700, 0x7, 0x480f, 0x200, {{0x1a, 0x4, 0x3, 0x1, 0x68, 0x0, 0x0, 0x0, 0x2f, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x29}, {[@timestamp_addr={0x44, 0x1c, 0x0, 0x1, 0x2, [{@dev={0xac, 0x14, 0x14, 0x17}}, {@multicast1, 0x6}, {@loopback, 0x2}]}, @ssrr={0x89, 0x13, 0x1b, [@multicast2, @multicast2, @rand_addr=0x64010100, @rand_addr=0x64010101]}, @timestamp_addr={0x44, 0xc, 0xd5, 0x1, 0xc, [{@multicast1, 0xaf78}]}, @generic={0x89, 0x12, "5371783ae6fa01b5040e42560a0000d3"}, @ra={0x94, 0x4, 0x1}, @ssrr={0x89, 0x3, 0xd7}]}}}}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000009c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007f51e8ba63cca555fedbe9d8f3b423cdacfa7e32fe023136f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506ab084a7d06d7535f76907fc6751dfb265a0e3ccae669e173a649c1cf96587d452d64e7cc957d77578f4c34235138d552100003559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c33283ba58d31a20a2251258f8a97db00fab5e2658d496c09aa88154870e1a8f84e1ba1eb78ac3bed28fd11aecac588eeb77ad9c58d57e89f1dc39ab3a6f6044e8f367091e8a650dee4c175ff1cb3db0aae57442bcc270b6daed55dd3b691aeb66730db9ac069bc67a97a1ae1f42619a666f58a18e42e3f7b486fafd84a7b72a8c38ee0eb309a6d53e8643d5241749fc936dc6df8ac2e3e3498247d8e79a730ed0226bb35d503fb156472e9c7489e18764871b70b3d732a8d6ed0edadef0084c71f18264f38d0fd8d3b0cbcccc799ce008b0af879abeec0cff38dcf49939b6b1204a550ab43f0d7a6469ad90eb2eb94bae1226ce2c9734fcf59407b7fd3c5e5e0fca61a8c1a62d9f20c333816af8aa70271f0cd26d818e367da1c2a777e057199ae0e43306de9b114bef8c2f6a834b94207390d3604b7b3c00000000", @ANYRES64=r1, @ANYRES16], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x10, &(0x7f0000000600)={&(0x7f0000000d80)=""/4096, 0x1000}}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xa, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="85000000a0000000350000000000000085000000080000009500000000000000e135dee43f5d62cdaf5bb32c301264de232ce03ca49ba60071b592758143664bf85056627ce336472821023a89dba77c8ea9b6ee1398ae73749be1537086ae214b648801a3f00574709ddccbce9ffab95dbc042fc0c3cd37b7baa14007c92d4cf2d339bf6dc7229cdac23d9c280569e2db7a6231813205b5b8cbd97b7563dcbdbfba95ec64e00dbba2a909bd6a9d45359cf11ad81000fb0f5548ced9733ca0fe9d54299ffd9762b770e5ca8cdad72f668dbfa9a21d9e8c4afb7203e71a4dcefc7a45eab7e2b8296e3a9ab49386337eed9787"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x41}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0x2000000, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000}, 0x28) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001e001909"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 12:52:21 executing program 0: unshare(0x40000400) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000040000000000000000ff01850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000180)={'raw\x00', 0x0, [0x3, 0x1ff, 0x7, 0x0, 0x20]}, &(0x7f0000000080)=0x54) 12:52:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1, 0x4}]}, &(0x7f0000000100)='GPL\x00'}, 0x48) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000140)={'erspan0\x00', &(0x7f0000000240)={'syztnl2\x00', 0x0, 0x700, 0x7, 0x480f, 0x200, {{0x1a, 0x4, 0x3, 0x1, 0x68, 0x0, 0x0, 0x0, 0x2f, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x29}, {[@timestamp_addr={0x44, 0x1c, 0x0, 0x1, 0x2, [{@dev={0xac, 0x14, 0x14, 0x17}}, {@multicast1, 0x6}, {@loopback, 0x2}]}, @ssrr={0x89, 0x13, 0x1b, [@multicast2, @multicast2, @rand_addr=0x64010100, @rand_addr=0x64010101]}, @timestamp_addr={0x44, 0xc, 0xd5, 0x1, 0xc, [{@multicast1, 0xaf78}]}, @generic={0x89, 0x12, "5371783ae6fa01b5040e42560a0000d3"}, @ra={0x94, 0x4, 0x1}, @ssrr={0x89, 0x3, 0xd7}]}}}}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000009c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007f51e8ba63cca555fedbe9d8f3b423cdacfa7e32fe023136f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506ab084a7d06d7535f76907fc6751dfb265a0e3ccae669e173a649c1cf96587d452d64e7cc957d77578f4c34235138d552100003559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c33283ba58d31a20a2251258f8a97db00fab5e2658d496c09aa88154870e1a8f84e1ba1eb78ac3bed28fd11aecac588eeb77ad9c58d57e89f1dc39ab3a6f6044e8f367091e8a650dee4c175ff1cb3db0aae57442bcc270b6daed55dd3b691aeb66730db9ac069bc67a97a1ae1f42619a666f58a18e42e3f7b486fafd84a7b72a8c38ee0eb309a6d53e8643d5241749fc936dc6df8ac2e3e3498247d8e79a730ed0226bb35d503fb156472e9c7489e18764871b70b3d732a8d6ed0edadef0084c71f18264f38d0fd8d3b0cbcccc799ce008b0af879abeec0cff38dcf49939b6b1204a550ab43f0d7a6469ad90eb2eb94bae1226ce2c9734fcf59407b7fd3c5e5e0fca61a8c1a62d9f20c333816af8aa70271f0cd26d818e367da1c2a777e057199ae0e43306de9b114bef8c2f6a834b94207390d3604b7b3c00000000", @ANYRES64=r1, @ANYRES16], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x10, &(0x7f0000000600)={&(0x7f0000000d80)=""/4096, 0x1000}}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xa, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="85000000a0000000350000000000000085000000080000009500000000000000e135dee43f5d62cdaf5bb32c301264de232ce03ca49ba60071b592758143664bf85056627ce336472821023a89dba77c8ea9b6ee1398ae73749be1537086ae214b648801a3f00574709ddccbce9ffab95dbc042fc0c3cd37b7baa14007c92d4cf2d339bf6dc7229cdac23d9c280569e2db7a6231813205b5b8cbd97b7563dcbdbfba95ec64e00dbba2a909bd6a9d45359cf11ad81000fb0f5548ced9733ca0fe9d54299ffd9762b770e5ca8cdad72f668dbfa9a21d9e8c4afb7203e71a4dcefc7a45eab7e2b8296e3a9ab49386337eed9787"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x41}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0x2000000, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000}, 0x28) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001e001909"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 12:52:23 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2400001) r1 = accept(r0, 0x0, 0x0) close(r1) 12:52:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1, 0x4}]}, &(0x7f0000000100)='GPL\x00'}, 0x48) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000140)={'erspan0\x00', &(0x7f0000000240)={'syztnl2\x00', 0x0, 0x700, 0x7, 0x480f, 0x200, {{0x1a, 0x4, 0x3, 0x1, 0x68, 0x0, 0x0, 0x0, 0x2f, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x29}, {[@timestamp_addr={0x44, 0x1c, 0x0, 0x1, 0x2, [{@dev={0xac, 0x14, 0x14, 0x17}}, {@multicast1, 0x6}, {@loopback, 0x2}]}, @ssrr={0x89, 0x13, 0x1b, [@multicast2, @multicast2, @rand_addr=0x64010100, @rand_addr=0x64010101]}, @timestamp_addr={0x44, 0xc, 0xd5, 0x1, 0xc, [{@multicast1, 0xaf78}]}, @generic={0x89, 0x12, "5371783ae6fa01b5040e42560a0000d3"}, @ra={0x94, 0x4, 0x1}, @ssrr={0x89, 0x3, 0xd7}]}}}}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000009c0)=ANY=[@ANYBLOB="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", @ANYRES64=r1, @ANYRES16], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x10, &(0x7f0000000600)={&(0x7f0000000d80)=""/4096, 0x1000}}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xa, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="85000000a0000000350000000000000085000000080000009500000000000000e135dee43f5d62cdaf5bb32c301264de232ce03ca49ba60071b592758143664bf85056627ce336472821023a89dba77c8ea9b6ee1398ae73749be1537086ae214b648801a3f00574709ddccbce9ffab95dbc042fc0c3cd37b7baa14007c92d4cf2d339bf6dc7229cdac23d9c280569e2db7a6231813205b5b8cbd97b7563dcbdbfba95ec64e00dbba2a909bd6a9d45359cf11ad81000fb0f5548ced9733ca0fe9d54299ffd9762b770e5ca8cdad72f668dbfa9a21d9e8c4afb7203e71a4dcefc7a45eab7e2b8296e3a9ab49386337eed9787"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x41}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0x2000000, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000}, 0x28) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001e001909"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 12:52:23 executing program 4: unshare(0x40000400) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000040000000000000000ff01850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000180)={'raw\x00', 0x0, [0x3, 0x1ff, 0x7, 0x0, 0x20]}, &(0x7f0000000080)=0x54) 12:52:23 executing program 1: unshare(0x40000400) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000040000000000000000ff01850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000180)={'raw\x00', 0x0, [0x3, 0x1ff, 0x7, 0x0, 0x20]}, &(0x7f0000000080)=0x54) 12:52:23 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1, 0x4}]}, &(0x7f0000000100)='GPL\x00'}, 0x48) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000140)={'erspan0\x00', &(0x7f0000000240)={'syztnl2\x00', 0x0, 0x700, 0x7, 0x480f, 0x200, {{0x1a, 0x4, 0x3, 0x1, 0x68, 0x0, 0x0, 0x0, 0x2f, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x29}, {[@timestamp_addr={0x44, 0x1c, 0x0, 0x1, 0x2, [{@dev={0xac, 0x14, 0x14, 0x17}}, {@multicast1, 0x6}, {@loopback, 0x2}]}, @ssrr={0x89, 0x13, 0x1b, [@multicast2, @multicast2, @rand_addr=0x64010100, @rand_addr=0x64010101]}, @timestamp_addr={0x44, 0xc, 0xd5, 0x1, 0xc, [{@multicast1, 0xaf78}]}, @generic={0x89, 0x12, "5371783ae6fa01b5040e42560a0000d3"}, @ra={0x94, 0x4, 0x1}, @ssrr={0x89, 0x3, 0xd7}]}}}}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000009c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007f51e8ba63cca555fedbe9d8f3b423cdacfa7e32fe023136f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506ab084a7d06d7535f76907fc6751dfb265a0e3ccae669e173a649c1cf96587d452d64e7cc957d77578f4c34235138d552100003559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c33283ba58d31a20a2251258f8a97db00fab5e2658d496c09aa88154870e1a8f84e1ba1eb78ac3bed28fd11aecac588eeb77ad9c58d57e89f1dc39ab3a6f6044e8f367091e8a650dee4c175ff1cb3db0aae57442bcc270b6daed55dd3b691aeb66730db9ac069bc67a97a1ae1f42619a666f58a18e42e3f7b486fafd84a7b72a8c38ee0eb309a6d53e8643d5241749fc936dc6df8ac2e3e3498247d8e79a730ed0226bb35d503fb156472e9c7489e18764871b70b3d732a8d6ed0edadef0084c71f18264f38d0fd8d3b0cbcccc799ce008b0af879abeec0cff38dcf49939b6b1204a550ab43f0d7a6469ad90eb2eb94bae1226ce2c9734fcf59407b7fd3c5e5e0fca61a8c1a62d9f20c333816af8aa70271f0cd26d818e367da1c2a777e057199ae0e43306de9b114bef8c2f6a834b94207390d3604b7b3c00000000", @ANYRES64=r1, @ANYRES16], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x10, &(0x7f0000000600)={&(0x7f0000000d80)=""/4096, 0x1000}}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xa, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="85000000a0000000350000000000000085000000080000009500000000000000e135dee43f5d62cdaf5bb32c301264de232ce03ca49ba60071b592758143664bf85056627ce336472821023a89dba77c8ea9b6ee1398ae73749be1537086ae214b648801a3f00574709ddccbce9ffab95dbc042fc0c3cd37b7baa14007c92d4cf2d339bf6dc7229cdac23d9c280569e2db7a6231813205b5b8cbd97b7563dcbdbfba95ec64e00dbba2a909bd6a9d45359cf11ad81000fb0f5548ced9733ca0fe9d54299ffd9762b770e5ca8cdad72f668dbfa9a21d9e8c4afb7203e71a4dcefc7a45eab7e2b8296e3a9ab49386337eed9787"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x41}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0x2000000, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000}, 0x28) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001e001909"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 12:52:23 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1, 0x4}]}, &(0x7f0000000100)='GPL\x00'}, 0x48) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000140)={'erspan0\x00', &(0x7f0000000240)={'syztnl2\x00', 0x0, 0x700, 0x7, 0x480f, 0x200, {{0x1a, 0x4, 0x3, 0x1, 0x68, 0x0, 0x0, 0x0, 0x2f, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x29}, {[@timestamp_addr={0x44, 0x1c, 0x0, 0x1, 0x2, [{@dev={0xac, 0x14, 0x14, 0x17}}, {@multicast1, 0x6}, {@loopback, 0x2}]}, @ssrr={0x89, 0x13, 0x1b, [@multicast2, @multicast2, @rand_addr=0x64010100, @rand_addr=0x64010101]}, @timestamp_addr={0x44, 0xc, 0xd5, 0x1, 0xc, [{@multicast1, 0xaf78}]}, @generic={0x89, 0x12, "5371783ae6fa01b5040e42560a0000d3"}, @ra={0x94, 0x4, 0x1}, @ssrr={0x89, 0x3, 0xd7}]}}}}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000009c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007f51e8ba63cca555fedbe9d8f3b423cdacfa7e32fe023136f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506ab084a7d06d7535f76907fc6751dfb265a0e3ccae669e173a649c1cf96587d452d64e7cc957d77578f4c34235138d552100003559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c33283ba58d31a20a2251258f8a97db00fab5e2658d496c09aa88154870e1a8f84e1ba1eb78ac3bed28fd11aecac588eeb77ad9c58d57e89f1dc39ab3a6f6044e8f367091e8a650dee4c175ff1cb3db0aae57442bcc270b6daed55dd3b691aeb66730db9ac069bc67a97a1ae1f42619a666f58a18e42e3f7b486fafd84a7b72a8c38ee0eb309a6d53e8643d5241749fc936dc6df8ac2e3e3498247d8e79a730ed0226bb35d503fb156472e9c7489e18764871b70b3d732a8d6ed0edadef0084c71f18264f38d0fd8d3b0cbcccc799ce008b0af879abeec0cff38dcf49939b6b1204a550ab43f0d7a6469ad90eb2eb94bae1226ce2c9734fcf59407b7fd3c5e5e0fca61a8c1a62d9f20c333816af8aa70271f0cd26d818e367da1c2a777e057199ae0e43306de9b114bef8c2f6a834b94207390d3604b7b3c00000000", @ANYRES64=r1, @ANYRES16], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x10, &(0x7f0000000600)={&(0x7f0000000d80)=""/4096, 0x1000}}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xa, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="85000000a0000000350000000000000085000000080000009500000000000000e135dee43f5d62cdaf5bb32c301264de232ce03ca49ba60071b592758143664bf85056627ce336472821023a89dba77c8ea9b6ee1398ae73749be1537086ae214b648801a3f00574709ddccbce9ffab95dbc042fc0c3cd37b7baa14007c92d4cf2d339bf6dc7229cdac23d9c280569e2db7a6231813205b5b8cbd97b7563dcbdbfba95ec64e00dbba2a909bd6a9d45359cf11ad81000fb0f5548ced9733ca0fe9d54299ffd9762b770e5ca8cdad72f668dbfa9a21d9e8c4afb7203e71a4dcefc7a45eab7e2b8296e3a9ab49386337eed9787"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x41}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0x2000000, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000}, 0x28) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001e001909"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 12:52:24 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2400001) r1 = accept(r0, 0x0, 0x0) close(r1) 12:52:24 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1, 0x4}]}, &(0x7f0000000100)='GPL\x00'}, 0x48) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000140)={'erspan0\x00', &(0x7f0000000240)={'syztnl2\x00', 0x0, 0x700, 0x7, 0x480f, 0x200, {{0x1a, 0x4, 0x3, 0x1, 0x68, 0x0, 0x0, 0x0, 0x2f, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x29}, {[@timestamp_addr={0x44, 0x1c, 0x0, 0x1, 0x2, [{@dev={0xac, 0x14, 0x14, 0x17}}, {@multicast1, 0x6}, {@loopback, 0x2}]}, @ssrr={0x89, 0x13, 0x1b, [@multicast2, @multicast2, @rand_addr=0x64010100, @rand_addr=0x64010101]}, @timestamp_addr={0x44, 0xc, 0xd5, 0x1, 0xc, [{@multicast1, 0xaf78}]}, @generic={0x89, 0x12, "5371783ae6fa01b5040e42560a0000d3"}, @ra={0x94, 0x4, 0x1}, @ssrr={0x89, 0x3, 0xd7}]}}}}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000009c0)=ANY=[@ANYBLOB="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", @ANYRES64=r1, @ANYRES16], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x10, &(0x7f0000000600)={&(0x7f0000000d80)=""/4096, 0x1000}}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xa, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="85000000a0000000350000000000000085000000080000009500000000000000e135dee43f5d62cdaf5bb32c301264de232ce03ca49ba60071b592758143664bf85056627ce336472821023a89dba77c8ea9b6ee1398ae73749be1537086ae214b648801a3f00574709ddccbce9ffab95dbc042fc0c3cd37b7baa14007c92d4cf2d339bf6dc7229cdac23d9c280569e2db7a6231813205b5b8cbd97b7563dcbdbfba95ec64e00dbba2a909bd6a9d45359cf11ad81000fb0f5548ced9733ca0fe9d54299ffd9762b770e5ca8cdad72f668dbfa9a21d9e8c4afb7203e71a4dcefc7a45eab7e2b8296e3a9ab49386337eed9787"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x41}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0x2000000, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000}, 0x28) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001e001909"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 12:52:24 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1, 0x4}]}, &(0x7f0000000100)='GPL\x00'}, 0x48) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000140)={'erspan0\x00', &(0x7f0000000240)={'syztnl2\x00', 0x0, 0x700, 0x7, 0x480f, 0x200, {{0x1a, 0x4, 0x3, 0x1, 0x68, 0x0, 0x0, 0x0, 0x2f, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x29}, {[@timestamp_addr={0x44, 0x1c, 0x0, 0x1, 0x2, [{@dev={0xac, 0x14, 0x14, 0x17}}, {@multicast1, 0x6}, {@loopback, 0x2}]}, @ssrr={0x89, 0x13, 0x1b, [@multicast2, @multicast2, @rand_addr=0x64010100, @rand_addr=0x64010101]}, @timestamp_addr={0x44, 0xc, 0xd5, 0x1, 0xc, [{@multicast1, 0xaf78}]}, @generic={0x89, 0x12, "5371783ae6fa01b5040e42560a0000d3"}, @ra={0x94, 0x4, 0x1}, @ssrr={0x89, 0x3, 0xd7}]}}}}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000009c0)=ANY=[@ANYBLOB="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", @ANYRES64=r1, @ANYRES16], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x10, &(0x7f0000000600)={&(0x7f0000000d80)=""/4096, 0x1000}}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xa, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="85000000a0000000350000000000000085000000080000009500000000000000e135dee43f5d62cdaf5bb32c301264de232ce03ca49ba60071b592758143664bf85056627ce336472821023a89dba77c8ea9b6ee1398ae73749be1537086ae214b648801a3f00574709ddccbce9ffab95dbc042fc0c3cd37b7baa14007c92d4cf2d339bf6dc7229cdac23d9c280569e2db7a6231813205b5b8cbd97b7563dcbdbfba95ec64e00dbba2a909bd6a9d45359cf11ad81000fb0f5548ced9733ca0fe9d54299ffd9762b770e5ca8cdad72f668dbfa9a21d9e8c4afb7203e71a4dcefc7a45eab7e2b8296e3a9ab49386337eed9787"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x41}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0x2000000, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000}, 0x28) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001e001909"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 12:52:25 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) connect(r0, &(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x80) 12:52:25 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) connect(r0, &(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x80) 12:52:25 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x31, 0x0, &(0x7f00000006c0)) 12:52:25 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2400001) r1 = accept(r0, 0x0, 0x0) close(r1) 12:52:25 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, 0x0, 0x0) 12:52:25 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1, 0x4}]}, &(0x7f0000000100)='GPL\x00'}, 0x48) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000140)={'erspan0\x00', &(0x7f0000000240)={'syztnl2\x00', 0x0, 0x700, 0x7, 0x480f, 0x200, {{0x1a, 0x4, 0x3, 0x1, 0x68, 0x0, 0x0, 0x0, 0x2f, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x29}, {[@timestamp_addr={0x44, 0x1c, 0x0, 0x1, 0x2, [{@dev={0xac, 0x14, 0x14, 0x17}}, {@multicast1, 0x6}, {@loopback, 0x2}]}, @ssrr={0x89, 0x13, 0x1b, [@multicast2, @multicast2, @rand_addr=0x64010100, @rand_addr=0x64010101]}, @timestamp_addr={0x44, 0xc, 0xd5, 0x1, 0xc, [{@multicast1, 0xaf78}]}, @generic={0x89, 0x12, "5371783ae6fa01b5040e42560a0000d3"}, @ra={0x94, 0x4, 0x1}, @ssrr={0x89, 0x3, 0xd7}]}}}}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000009c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007f51e8ba63cca555fedbe9d8f3b423cdacfa7e32fe023136f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506ab084a7d06d7535f76907fc6751dfb265a0e3ccae669e173a649c1cf96587d452d64e7cc957d77578f4c34235138d552100003559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c33283ba58d31a20a2251258f8a97db00fab5e2658d496c09aa88154870e1a8f84e1ba1eb78ac3bed28fd11aecac588eeb77ad9c58d57e89f1dc39ab3a6f6044e8f367091e8a650dee4c175ff1cb3db0aae57442bcc270b6daed55dd3b691aeb66730db9ac069bc67a97a1ae1f42619a666f58a18e42e3f7b486fafd84a7b72a8c38ee0eb309a6d53e8643d5241749fc936dc6df8ac2e3e3498247d8e79a730ed0226bb35d503fb156472e9c7489e18764871b70b3d732a8d6ed0edadef0084c71f18264f38d0fd8d3b0cbcccc799ce008b0af879abeec0cff38dcf49939b6b1204a550ab43f0d7a6469ad90eb2eb94bae1226ce2c9734fcf59407b7fd3c5e5e0fca61a8c1a62d9f20c333816af8aa70271f0cd26d818e367da1c2a777e057199ae0e43306de9b114bef8c2f6a834b94207390d3604b7b3c00000000", @ANYRES64=r1, @ANYRES16], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x10, &(0x7f0000000600)={&(0x7f0000000d80)=""/4096, 0x1000}}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xa, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="85000000a0000000350000000000000085000000080000009500000000000000e135dee43f5d62cdaf5bb32c301264de232ce03ca49ba60071b592758143664bf85056627ce336472821023a89dba77c8ea9b6ee1398ae73749be1537086ae214b648801a3f00574709ddccbce9ffab95dbc042fc0c3cd37b7baa14007c92d4cf2d339bf6dc7229cdac23d9c280569e2db7a6231813205b5b8cbd97b7563dcbdbfba95ec64e00dbba2a909bd6a9d45359cf11ad81000fb0f5548ced9733ca0fe9d54299ffd9762b770e5ca8cdad72f668dbfa9a21d9e8c4afb7203e71a4dcefc7a45eab7e2b8296e3a9ab49386337eed9787"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x41}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0x2000000, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000}, 0x28) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001e001909"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 12:52:25 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) connect(r0, &(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x80) 12:52:25 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x31, 0x0, &(0x7f00000006c0)) 12:52:25 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, 0x0, 0x0) 12:52:26 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) connect(r0, &(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x80) 12:52:26 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x31, 0x0, &(0x7f00000006c0)) 12:52:26 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2400001) r1 = accept(r0, 0x0, 0x0) close(r1) 12:52:26 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, 0x0, 0x0) 12:52:26 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x200000000003, 0x3) shutdown(r0, 0x0) read(r0, &(0x7f0000002400)=""/93, 0x5d) 12:52:26 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, 0x0, 0x0) 12:52:26 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2400001) r1 = accept(r0, 0x0, 0x0) close(r1) 12:52:26 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x31, 0x0, &(0x7f00000006c0)) 12:52:26 executing program 0: r0 = socket$qrtr(0x2a, 0x2, 0x0) bind$qrtr(r0, &(0x7f0000000000)={0x2a, 0x1}, 0xc) connect$qrtr(r0, &(0x7f0000000040), 0xc) 12:52:26 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x200000000003, 0x3) shutdown(r0, 0x0) read(r0, &(0x7f0000002400)=""/93, 0x5d) 12:52:26 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000022c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002c3f2cc2b7954244cef7499cde2bbaf4b06d3585a09a87507ebf4e43bc0658762ed55085cf8702ad8e903b6b4ffed774ed895262ed0c327b659c42efa26cea824437ac96d08e4837dc985d1aa663ee6b103f031eac3f2bca284eb4c5a0ec5217d69d979840e61301d2620b100978fb95052314e981fa7f0b63a65b4ef141ea48bd8eda96c0a016e08a52774f17fe3846c6b7ed8fd7f6d14c337f1f3e0961feb9d055f3be59a183266d055f0366119272b41b6b777ff8a91d80189d1f7a3b02cc2e42dd0d19fa0f0f586bdd3cca4e73ffe0e0e481b45d4a6817011f2bd32d88643295752d28ecff13f759f97588bc049569f11f9d4ebe641fc7a9aa715a94a49dc5800fb849468cbe2542f40de59d04ac34c431ceccc10936f6154d10c1536c9afdbbbed4a41b078800666f1f0dc114bc6415bcbb161feb447be7edddaf048e583c3e58659ce656254aa597db450fed1f654c6daaa541da20592c71fd296f81631495f99e3ea62d7efb9fb0bbc557b63a942aee21d86c8c7d11baee4f5100329ac1f92ab38f415ebe3abc7260658572739a0d1dba4fc4ec44274f40c341990e9605dc74857eee83b9dd46fe30041e4e3e39cf5bd1ceb7dcd85622e6ad4703dfde3b5bf5476783d48cd620ca00877d38b7da4040c379a6c5ff442ce047e0c329d9576e8cf070708cc5966258e6ac3933e68628039e226abad8fb1d922109237e572c3afa59f55ff74bdbdf364a09faf3410e84c4379679674976cdb2f9d7458d2b6e8163a4b52f56b43c973c800f768d092695e95a6bc3e1fd5efceb2d924a180bb9300b3313f6c76d7a06d774ea5286bf071445829b00296924b3e0e01f039d37883d620fa1e63c88a035873006a6aef52ec3c811aa60ec7d607c11dbea2e1bbac9d976f31b55220f10b7804b99087b3e8a076c5c798485e5d00c3f0325f30e597593e30c5b805df8cb049b856c8bc6a8463f2feebf41a8603dd3f58f9f28c09e17b672150c2b5c036a63e27aede9573af558e9747c5bb10dd18a82772b4871ee000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x20000027, &(0x7f00000004c0)="b95b03b700030000009e40f086dd1fff090000000000000177fbac141412e0000007c699da153f08e0e6e380f60108f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b333c20c9ec0c222d644bdcb178c1cc53d6960fbb842d6a33dfcde3a1e1848135214baf139753866cadcbe3ce52505e992818cc452bee339d9ab076f484020eaa348a21d7911e4c44905256ec2cc54cca47a198b00c10aff62a4bed43a2ebcad92743fb22c593f28fd4bb7c703cde9cae0569d4c8d9a823f2c12863f7a6c0cf88ed22aae4f6f084508833b61429a25773eedf63dd9f33d430f2a0a30a7761db16fe0f743b95ded898c28aac1256ce2751b3d738899b8b19d9052b7f13ff94", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffed8, 0x1d4}, 0x28) 12:52:27 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x200000000003, 0x3) shutdown(r0, 0x0) read(r0, &(0x7f0000002400)=""/93, 0x5d) 12:52:27 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000001580), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f00000015c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 12:52:27 executing program 0: r0 = socket$qrtr(0x2a, 0x2, 0x0) bind$qrtr(r0, &(0x7f0000000000)={0x2a, 0x1}, 0xc) connect$qrtr(r0, &(0x7f0000000040), 0xc) 12:52:27 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2400001) r1 = accept(r0, 0x0, 0x0) close(r1) 12:52:27 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x200000000003, 0x3) shutdown(r0, 0x0) read(r0, &(0x7f0000002400)=""/93, 0x5d) 12:52:27 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000001580), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f00000015c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 12:52:27 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x20000027, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffed8, 0x1d4}, 0x28) 12:52:28 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x20000027, &(0x7f00000004c0)="b95b03b700030000009e40f086dd1fff090000000000000177fbac141412e0000007c699da153f08e0e6e380f60108f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b333c20c9ec0c222d644bdcb178c1cc53d6960fbb842d6a33dfcde3a1e1848135214baf139753866cadcbe3ce52505e992818cc452bee339d9ab076f484020eaa348a21d7911e4c44905256ec2cc54cca47a198b00c10aff62a4bed43a2ebcad92743fb22c593f28fd4bb7c703cde9cae0569d4c8d9a823f2c12863f7a6c0cf88ed22aae4f6f084508833b61429a25773eedf63dd9f33d430f2a0a30a7761db16fe0f743b95ded898c28aac1256ce2751b3d738899b8b19d9052b7f13ff94", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffed8, 0x1d4}, 0x28) 12:52:28 executing program 0: r0 = socket$qrtr(0x2a, 0x2, 0x0) bind$qrtr(r0, &(0x7f0000000000)={0x2a, 0x1}, 0xc) connect$qrtr(r0, &(0x7f0000000040), 0xc) 12:52:28 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000001580), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f00000015c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 12:52:28 executing program 4: r0 = socket$qrtr(0x2a, 0x2, 0x0) bind$qrtr(r0, &(0x7f0000000000)={0x2a, 0x1}, 0xc) connect$qrtr(r0, &(0x7f0000000040), 0xc) 12:52:28 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x20}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) write$cgroup_int(r2, &(0x7f0000000380), 0x1040c) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x800000071}) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000200)="e0", 0x1}], 0x1, 0x0, 0x0) ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, &(0x7f0000000240)={0x0, &(0x7f0000000140)}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)={0x0, r2, 0x7d}) 12:52:28 executing program 4: r0 = socket$qrtr(0x2a, 0x2, 0x0) bind$qrtr(r0, &(0x7f0000000000)={0x2a, 0x1}, 0xc) connect$qrtr(r0, &(0x7f0000000040), 0xc) 12:52:28 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000001580), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f00000015c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 12:52:28 executing program 0: r0 = socket$qrtr(0x2a, 0x2, 0x0) bind$qrtr(r0, &(0x7f0000000000)={0x2a, 0x1}, 0xc) connect$qrtr(r0, &(0x7f0000000040), 0xc) 12:52:29 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x20000027, &(0x7f00000004c0)="b95b03b700030000009e40f086dd1fff090000000000000177fbac141412e0000007c699da153f08e0e6e380f60108f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b333c20c9ec0c222d644bdcb178c1cc53d6960fbb842d6a33dfcde3a1e1848135214baf139753866cadcbe3ce52505e992818cc452bee339d9ab076f484020eaa348a21d7911e4c44905256ec2cc54cca47a198b00c10aff62a4bed43a2ebcad92743fb22c593f28fd4bb7c703cde9cae0569d4c8d9a823f2c12863f7a6c0cf88ed22aae4f6f084508833b61429a25773eedf63dd9f33d430f2a0a30a7761db16fe0f743b95ded898c28aac1256ce2751b3d738899b8b19d9052b7f13ff94", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffed8, 0x1d4}, 0x28) 12:52:29 executing program 4: r0 = socket$qrtr(0x2a, 0x2, 0x0) bind$qrtr(r0, &(0x7f0000000000)={0x2a, 0x1}, 0xc) connect$qrtr(r0, &(0x7f0000000040), 0xc) 12:52:29 executing program 0: sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@dev, 0x4d5, 0x32}, 0x0, @in6=@ipv4={'\x00', '\xff\xff', @local}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 12:52:29 executing program 3: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[], 0x48}}, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r1, @ANYBLOB="0001000000000000240012000c0001006272696467650000140002000800050001000000080001"], 0x44}}, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000002c0)={0xf0, 0x0, 0x0, 0x0, 0x0, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8}, {0x6}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6}}]}, 0xf0}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) 12:52:29 executing program 2: socket$netlink(0x10, 0x3, 0x0) r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x41) unshare(0x4a000400) 12:52:29 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)=""/172, 0xac}}], 0x1, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0)=0x27d7, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r0, &(0x7f00000010c0), 0x300, 0xff00, 0x0) 12:52:29 executing program 3: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[], 0x48}}, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r1, @ANYBLOB="0001000000000000240012000c0001006272696467650000140002000800050001000000080001"], 0x44}}, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000002c0)={0xf0, 0x0, 0x0, 0x0, 0x0, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8}, {0x6}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6}}]}, 0xf0}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) 12:52:29 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, 0x0) 12:52:29 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x20}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) write$cgroup_int(r2, &(0x7f0000000380), 0x1040c) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x800000071}) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000200)="e0", 0x1}], 0x1, 0x0, 0x0) ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, &(0x7f0000000240)={0x0, &(0x7f0000000140)}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)={0x0, r2, 0x7d}) 12:52:29 executing program 3: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[], 0x48}}, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r1, @ANYBLOB="0001000000000000240012000c0001006272696467650000140002000800050001000000080001"], 0x44}}, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000002c0)={0xf0, 0x0, 0x0, 0x0, 0x0, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8}, {0x6}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6}}]}, 0xf0}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) 12:52:29 executing program 2: socket$netlink(0x10, 0x3, 0x0) r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x41) unshare(0x4a000400) 12:52:30 executing program 3: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[], 0x48}}, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r1, @ANYBLOB="0001000000000000240012000c0001006272696467650000140002000800050001000000080001"], 0x44}}, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000002c0)={0xf0, 0x0, 0x0, 0x0, 0x0, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8}, {0x6}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6}}]}, 0xf0}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) 12:52:30 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x20}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) write$cgroup_int(r2, &(0x7f0000000380), 0x1040c) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x800000071}) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000200)="e0", 0x1}], 0x1, 0x0, 0x0) ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, &(0x7f0000000240)={0x0, &(0x7f0000000140)}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)={0x0, r2, 0x7d}) 12:52:30 executing program 0: sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@dev, 0x4d5, 0x32}, 0x0, @in6=@ipv4={'\x00', '\xff\xff', @local}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 12:52:30 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x20}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) write$cgroup_int(r2, &(0x7f0000000380), 0x1040c) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x800000071}) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000200)="e0", 0x1}], 0x1, 0x0, 0x0) ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, &(0x7f0000000240)={0x0, &(0x7f0000000140)}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)={0x0, r2, 0x7d}) 12:52:30 executing program 2: socket$netlink(0x10, 0x3, 0x0) r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x41) unshare(0x4a000400) 12:52:30 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x20}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) write$cgroup_int(r2, &(0x7f0000000380), 0x1040c) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x800000071}) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000200)="e0", 0x1}], 0x1, 0x0, 0x0) ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, &(0x7f0000000240)={0x0, &(0x7f0000000140)}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)={0x0, r2, 0x7d}) 12:52:31 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)=""/172, 0xac}}], 0x1, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0)=0x27d7, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r0, &(0x7f00000010c0), 0x300, 0xff00, 0x0) 12:52:31 executing program 2: socket$netlink(0x10, 0x3, 0x0) r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x41) unshare(0x4a000400) 12:52:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x20}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) write$cgroup_int(r2, &(0x7f0000000380), 0x1040c) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x800000071}) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000200)="e0", 0x1}], 0x1, 0x0, 0x0) ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, &(0x7f0000000240)={0x0, &(0x7f0000000140)}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)={0x0, r2, 0x7d}) 12:52:31 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)=""/172, 0xac}}], 0x1, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0)=0x27d7, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r0, &(0x7f00000010c0), 0x300, 0xff00, 0x0) 12:52:31 executing program 0: sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@dev, 0x4d5, 0x32}, 0x0, @in6=@ipv4={'\x00', '\xff\xff', @local}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 12:52:31 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x20}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) write$cgroup_int(r2, &(0x7f0000000380), 0x1040c) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x800000071}) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000200)="e0", 0x1}], 0x1, 0x0, 0x0) ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, &(0x7f0000000240)={0x0, &(0x7f0000000140)}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)={0x0, r2, 0x7d}) 12:52:32 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x20}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) write$cgroup_int(r2, &(0x7f0000000380), 0x1040c) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x800000071}) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000200)="e0", 0x1}], 0x1, 0x0, 0x0) ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, &(0x7f0000000240)={0x0, &(0x7f0000000140)}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)={0x0, r2, 0x7d}) 12:52:32 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x20}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) write$cgroup_int(r2, &(0x7f0000000380), 0x1040c) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x800000071}) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000200)="e0", 0x1}], 0x1, 0x0, 0x0) ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, &(0x7f0000000240)={0x0, &(0x7f0000000140)}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)={0x0, r2, 0x7d}) 12:52:32 executing program 0: sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@dev, 0x4d5, 0x32}, 0x0, @in6=@ipv4={'\x00', '\xff\xff', @local}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 12:52:32 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x20}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) write$cgroup_int(r2, &(0x7f0000000380), 0x1040c) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x800000071}) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000200)="e0", 0x1}], 0x1, 0x0, 0x0) ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, &(0x7f0000000240)={0x0, &(0x7f0000000140)}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)={0x0, r2, 0x7d}) 12:52:33 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)=""/172, 0xac}}], 0x1, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0)=0x27d7, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r0, &(0x7f00000010c0), 0x300, 0xff00, 0x0) 12:52:33 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)=""/172, 0xac}}], 0x1, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0)=0x27d7, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r0, &(0x7f00000010c0), 0x300, 0xff00, 0x0) 12:52:33 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x20}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) write$cgroup_int(r2, &(0x7f0000000380), 0x1040c) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x800000071}) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000200)="e0", 0x1}], 0x1, 0x0, 0x0) ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, &(0x7f0000000240)={0x0, &(0x7f0000000140)}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)={0x0, r2, 0x7d}) 12:52:33 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x20}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) write$cgroup_int(r2, &(0x7f0000000380), 0x1040c) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x800000071}) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000200)="e0", 0x1}], 0x1, 0x0, 0x0) ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, &(0x7f0000000240)={0x0, &(0x7f0000000140)}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)={0x0, r2, 0x7d}) 12:52:33 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x20}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) write$cgroup_int(r2, &(0x7f0000000380), 0x1040c) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x800000071}) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000200)="e0", 0x1}], 0x1, 0x0, 0x0) ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, &(0x7f0000000240)={0x0, &(0x7f0000000140)}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)={0x0, r2, 0x7d}) 12:52:33 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f0000000680)={0x1f, 0x0, @fixed, 0x0, 0x2}, 0xe) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, 0x0, 0x0) 12:52:33 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f0000000680)={0x1f, 0x0, @fixed, 0x0, 0x2}, 0xe) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, 0x0, 0x0) 12:52:33 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f0000000680)={0x1f, 0x0, @fixed, 0x0, 0x2}, 0xe) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, 0x0, 0x0) 12:52:34 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x20}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) write$cgroup_int(r2, &(0x7f0000000380), 0x1040c) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x800000071}) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000200)="e0", 0x1}], 0x1, 0x0, 0x0) ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, &(0x7f0000000240)={0x0, &(0x7f0000000140)}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)={0x0, r2, 0x7d}) 12:52:34 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x20}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) write$cgroup_int(r2, &(0x7f0000000380), 0x1040c) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x800000071}) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000200)="e0", 0x1}], 0x1, 0x0, 0x0) ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, &(0x7f0000000240)={0x0, &(0x7f0000000140)}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)={0x0, r2, 0x7d}) 12:52:34 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f0000000680)={0x1f, 0x0, @fixed, 0x0, 0x2}, 0xe) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, 0x0, 0x0) 12:52:34 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x20}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) write$cgroup_int(r2, &(0x7f0000000380), 0x1040c) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x800000071}) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000200)="e0", 0x1}], 0x1, 0x0, 0x0) ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, &(0x7f0000000240)={0x0, &(0x7f0000000140)}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)={0x0, r2, 0x7d}) 12:52:34 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)=""/172, 0xac}}], 0x1, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0)=0x27d7, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r0, &(0x7f00000010c0), 0x300, 0xff00, 0x0) 12:52:34 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f0000000680)={0x1f, 0x0, @fixed, 0x0, 0x2}, 0xe) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, 0x0, 0x0) 12:52:34 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)=""/172, 0xac}}], 0x1, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0)=0x27d7, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r0, &(0x7f00000010c0), 0x300, 0xff00, 0x0) 12:52:34 executing program 5: socket(0x0, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=@deltfilter={0x24, 0x2d, 0x400, 0x0, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, {0x0, 0x3}}}, 0x24}}, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4240a2a0) socket$nl_route(0x10, 0x3, 0x0) unshare(0x0) r0 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r0, &(0x7f0000000040), 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) 12:52:34 executing program 3: socketpair(0x25, 0x1, 0x0, &(0x7f0000000240)) 12:52:34 executing program 2: syz_emit_ethernet(0x46, &(0x7f00000000c0)={@random="6d4eb1698397", @broadcast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @private=0xa0100fd, @local}, @time_exceeded={0x3, 0x0, 0x0, 0x3, 0x0, 0x3f00, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c, 0x0, @loopback, @loopback}, "2af5e007865b7289"}}}}}, 0x0) 12:52:35 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f0000000680)={0x1f, 0x0, @fixed, 0x0, 0x2}, 0xe) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, 0x0, 0x0) 12:52:35 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0x10, &(0x7f0000000000), 0x2) 12:52:35 executing program 2: syz_emit_ethernet(0x46, &(0x7f00000000c0)={@random="6d4eb1698397", @broadcast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @private=0xa0100fd, @local}, @time_exceeded={0x3, 0x0, 0x0, 0x3, 0x0, 0x3f00, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c, 0x0, @loopback, @loopback}, "2af5e007865b7289"}}}}}, 0x0) 12:52:35 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f0000000680)={0x1f, 0x0, @fixed, 0x0, 0x2}, 0xe) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, 0x0, 0x0) 12:52:35 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0x10, &(0x7f0000000000), 0x2) 12:52:35 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000240)='geneve0\x00', 0x10) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x1dee8ca, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab01109bc31d41e44f96f67971b8ed8a3dc9eb4133a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffff000b}}], 0x400000000000132, 0x4000000) 12:52:36 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 12:52:36 executing program 2: syz_emit_ethernet(0x46, &(0x7f00000000c0)={@random="6d4eb1698397", @broadcast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @private=0xa0100fd, @local}, @time_exceeded={0x3, 0x0, 0x0, 0x3, 0x0, 0x3f00, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c, 0x0, @loopback, @loopback}, "2af5e007865b7289"}}}}}, 0x0) 12:52:36 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0x10, &(0x7f0000000000), 0x2) 12:52:36 executing program 5: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000240)='geneve0\x00', 0x10) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x1dee8ca, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab01109bc31d41e44f96f67971b8ed8a3dc9eb4133a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffff000b}}], 0x400000000000132, 0x4000000) 12:52:36 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x3, 0x106) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x29, 0x18, 0x0, 0x0) 12:52:36 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000240)='geneve0\x00', 0x10) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x1dee8ca, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab01109bc31d41e44f96f67971b8ed8a3dc9eb4133a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffff000b}}], 0x400000000000132, 0x4000000) 12:52:36 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 12:52:36 executing program 2: syz_emit_ethernet(0x46, &(0x7f00000000c0)={@random="6d4eb1698397", @broadcast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @private=0xa0100fd, @local}, @time_exceeded={0x3, 0x0, 0x0, 0x3, 0x0, 0x3f00, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c, 0x0, @loopback, @loopback}, "2af5e007865b7289"}}}}}, 0x0) 12:52:36 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0x10, &(0x7f0000000000), 0x2) 12:52:36 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x3, 0x106) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x29, 0x18, 0x0, 0x0) 12:52:36 executing program 3: r0 = socket$inet(0x2, 0x6000000000000003, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) sendto$inet(r0, &(0x7f00000000c0)="d25fca5d8c69e6814ca14a035acbc9585b6a18d2", 0x14, 0x0, &(0x7f0000000140)={0x2, 0x0, @multicast1}, 0x10) 12:52:36 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 12:52:36 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x4010) getsockname$packet(r4, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x40}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 12:52:36 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 12:52:36 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x3, 0x106) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x29, 0x18, 0x0, 0x0) 12:52:37 executing program 5: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000240)='geneve0\x00', 0x10) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x1dee8ca, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab01109bc31d41e44f96f67971b8ed8a3dc9eb4133a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffff000b}}], 0x400000000000132, 0x4000000) 12:52:37 executing program 3: r0 = socket$inet(0x2, 0x6000000000000003, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) sendto$inet(r0, &(0x7f00000000c0)="d25fca5d8c69e6814ca14a035acbc9585b6a18d2", 0x14, 0x0, &(0x7f0000000140)={0x2, 0x0, @multicast1}, 0x10) 12:52:37 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000240)='geneve0\x00', 0x10) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x1dee8ca, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab01109bc31d41e44f96f67971b8ed8a3dc9eb4133a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffff000b}}], 0x400000000000132, 0x4000000) 12:52:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000300)={0x34, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_COALESCE_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_COALESCE_RX_MAX_FRAMES={0x8}]}, 0x34}}, 0x0) 12:52:37 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x3, 0x106) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x29, 0x18, 0x0, 0x0) 12:52:37 executing program 3: r0 = socket$inet(0x2, 0x6000000000000003, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) sendto$inet(r0, &(0x7f00000000c0)="d25fca5d8c69e6814ca14a035acbc9585b6a18d2", 0x14, 0x0, &(0x7f0000000140)={0x2, 0x0, @multicast1}, 0x10) 12:52:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000300)={0x34, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_COALESCE_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_COALESCE_RX_MAX_FRAMES={0x8}]}, 0x34}}, 0x0) 12:52:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@raw={'raw\x00', 0x3c1, 0x3, 0x388, 0x0, 0x5c, 0x160, 0x1a8, 0x3e0, 0x2b8, 0x228, 0x228, 0x2b8, 0x228, 0x3, 0x0, {[{{@uncond, 0x0, 0x148, 0x1a8, 0x52020000, {}, [@common=@unspec=@rateest={{0x68}, {'netpci0\x00', 'wlan1\x00', 0x1c, 0x3}}, @common=@unspec=@time={{0x38}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@local}}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e8) 12:52:37 executing program 3: r0 = socket$inet(0x2, 0x6000000000000003, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) sendto$inet(r0, &(0x7f00000000c0)="d25fca5d8c69e6814ca14a035acbc9585b6a18d2", 0x14, 0x0, &(0x7f0000000140)={0x2, 0x0, @multicast1}, 0x10) 12:52:37 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x4010) getsockname$packet(r4, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x40}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 12:52:37 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000240)='geneve0\x00', 0x10) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x1dee8ca, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab01109bc31d41e44f96f67971b8ed8a3dc9eb4133a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffff000b}}], 0x400000000000132, 0x4000000) 12:52:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000300)={0x34, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_COALESCE_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_COALESCE_RX_MAX_FRAMES={0x8}]}, 0x34}}, 0x0) 12:52:37 executing program 5: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000240)='geneve0\x00', 0x10) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x1dee8ca, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab01109bc31d41e44f96f67971b8ed8a3dc9eb4133a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffff000b}}], 0x400000000000132, 0x4000000) 12:52:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@raw={'raw\x00', 0x3c1, 0x3, 0x388, 0x0, 0x5c, 0x160, 0x1a8, 0x3e0, 0x2b8, 0x228, 0x228, 0x2b8, 0x228, 0x3, 0x0, {[{{@uncond, 0x0, 0x148, 0x1a8, 0x52020000, {}, [@common=@unspec=@rateest={{0x68}, {'netpci0\x00', 'wlan1\x00', 0x1c, 0x3}}, @common=@unspec=@time={{0x38}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@local}}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e8) 12:52:37 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)={&(0x7f0000001400)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010029bd7000fbdbdf250100000000000000014100000018001700000015000000017d64703a73"], 0x34}}, 0x0) [ 150.584127][ T9964] tipc: Enabling of bearer <}dp:s> rejected, media not registered 12:52:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000300)={0x34, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_COALESCE_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_COALESCE_RX_MAX_FRAMES={0x8}]}, 0x34}}, 0x0) 12:52:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@raw={'raw\x00', 0x3c1, 0x3, 0x388, 0x0, 0x5c, 0x160, 0x1a8, 0x3e0, 0x2b8, 0x228, 0x228, 0x2b8, 0x228, 0x3, 0x0, {[{{@uncond, 0x0, 0x148, 0x1a8, 0x52020000, {}, [@common=@unspec=@rateest={{0x68}, {'netpci0\x00', 'wlan1\x00', 0x1c, 0x3}}, @common=@unspec=@time={{0x38}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@local}}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e8) [ 150.648952][ T9966] tipc: Enabling of bearer <}dp:s> rejected, media not registered 12:52:38 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)={&(0x7f0000001400)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010029bd7000fbdbdf250100000000000000014100000018001700000015000000017d64703a73"], 0x34}}, 0x0) 12:52:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@raw={'raw\x00', 0x3c1, 0x3, 0x388, 0x0, 0x5c, 0x160, 0x1a8, 0x3e0, 0x2b8, 0x228, 0x228, 0x2b8, 0x228, 0x3, 0x0, {[{{@uncond, 0x0, 0x148, 0x1a8, 0x52020000, {}, [@common=@unspec=@rateest={{0x68}, {'netpci0\x00', 'wlan1\x00', 0x1c, 0x3}}, @common=@unspec=@time={{0x38}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@local}}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e8) 12:52:38 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x4010) getsockname$packet(r4, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x40}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 12:52:38 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000300)=[@in6={0xa, 0x4e23, 0x0, @empty}], 0x1c) sendto$inet6(r0, &(0x7f0000000000)="ce", 0x1, 0x0, &(0x7f0000000240)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000440), &(0x7f0000000180)=0x8) [ 151.029549][ T9977] tipc: Enabling of bearer <}dp:s> rejected, media not registered 12:52:38 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x4010) getsockname$packet(r4, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x40}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 12:52:38 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="2400000000000000290000003900000000020201"], 0x50}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x0) 12:52:38 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)={&(0x7f0000001400)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010029bd7000fbdbdf250100000000000000014100000018001700000015000000017d64703a73"], 0x34}}, 0x0) 12:52:38 executing program 1: socket(0x40000000015, 0x805, 0x0) r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) [ 151.604803][ T9995] tipc: Enabling of bearer <}dp:s> rejected, media not registered 12:52:38 executing program 1: socket(0x40000000015, 0x805, 0x0) r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) 12:52:39 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="2400000000000000290000003900000000020201"], 0x50}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x0) 12:52:39 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)={&(0x7f0000001400)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010029bd7000fbdbdf250100000000000000014100000018001700000015000000017d64703a73"], 0x34}}, 0x0) 12:52:39 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000300)=[@in6={0xa, 0x4e23, 0x0, @empty}], 0x1c) sendto$inet6(r0, &(0x7f0000000000)="ce", 0x1, 0x0, &(0x7f0000000240)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000440), &(0x7f0000000180)=0x8) 12:52:39 executing program 1: socket(0x40000000015, 0x805, 0x0) r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) [ 151.930351][T10012] tipc: Enabling of bearer <}dp:s> rejected, media not registered 12:52:39 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x4010) getsockname$packet(r4, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x40}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 12:52:39 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="2400000000000000290000003900000000020201"], 0x50}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x0) 12:52:39 executing program 1: socket(0x40000000015, 0x805, 0x0) r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x271f, &(0x7f0000019440)=""/102389, &(0x7f00000000c0)=0x18ff5) 12:52:39 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x4010) getsockname$packet(r4, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x40}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 12:52:39 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="2400000000000000290000003900000000020201"], 0x50}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x0) 12:52:39 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="2400000000000000290000003900000000020201"], 0x50}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x0) 12:52:39 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'batadv_slave_0\x00'}) 12:52:39 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000300)=[@in6={0xa, 0x4e23, 0x0, @empty}], 0x1c) sendto$inet6(r0, &(0x7f0000000000)="ce", 0x1, 0x0, &(0x7f0000000240)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000440), &(0x7f0000000180)=0x8) [ 152.630132][T10035] batman_adv: batadv0: Interface deactivated: batadv_slave_0 12:52:40 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x60, &(0x7f0000000040)=[{&(0x7f0000000080)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e", 0x1b}, {&(0x7f0000000100)="a1a10b9a979fb85511eef06629c3678b4d00ae", 0x13}], 0x2}, 0x0) 12:52:40 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="2400000000000000290000003900000000020201"], 0x50}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x0) 12:52:40 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'batadv_slave_0\x00'}) [ 152.874910][T10043] bridge0: port 2(bridge_slave_1) entered disabled state [ 152.883349][T10043] bridge0: port 1(bridge_slave_0) entered disabled state [ 152.918373][T10043] device bridge0 entered promiscuous mode 12:52:40 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x4010) getsockname$packet(r4, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5}, @IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x40}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 12:52:40 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="2400000000000000290000003900000000020201"], 0x50}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x0) [ 153.077002][T10045] __nla_validate_parse: 15 callbacks suppressed [ 153.077020][T10045] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 153.109647][T10045] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.116910][T10045] bridge0: port 2(bridge_slave_1) entered forwarding state [ 153.124462][T10045] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.131543][T10045] bridge0: port 1(bridge_slave_0) entered forwarding state 12:52:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x20, 0x1, 0x1, 0x201, 0x0, 0x0, {}, [@CTA_NAT_SRC={0xc, 0x19, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @multicast2}]}]}, 0x20}}, 0x0) 12:52:40 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000300)=[@in6={0xa, 0x4e23, 0x0, @empty}], 0x1c) sendto$inet6(r0, &(0x7f0000000000)="ce", 0x1, 0x0, &(0x7f0000000240)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000440), &(0x7f0000000180)=0x8) [ 153.211032][T10045] device bridge0 left promiscuous mode [ 153.264662][T10045] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.271963][T10045] bridge0: port 1(bridge_slave_0) entered disabled state [ 153.323811][T10045] device bridge0 entered promiscuous mode 12:52:40 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x60, &(0x7f0000000040)=[{&(0x7f0000000080)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e", 0x1b}, {&(0x7f0000000100)="a1a10b9a979fb85511eef06629c3678b4d00ae", 0x13}], 0x2}, 0x0) 12:52:40 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'batadv_slave_0\x00'}) 12:52:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x20, 0x1, 0x1, 0x201, 0x0, 0x0, {}, [@CTA_NAT_SRC={0xc, 0x19, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @multicast2}]}]}, 0x20}}, 0x0) 12:52:40 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x60, &(0x7f0000000040)=[{&(0x7f0000000080)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e", 0x1b}, {&(0x7f0000000100)="a1a10b9a979fb85511eef06629c3678b4d00ae", 0x13}], 0x2}, 0x0) [ 153.653535][T10069] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 153.685735][T10069] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.692975][T10069] bridge0: port 2(bridge_slave_1) entered forwarding state 12:52:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x20, 0x1, 0x1, 0x201, 0x0, 0x0, {}, [@CTA_NAT_SRC={0xc, 0x19, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @multicast2}]}]}, 0x20}}, 0x0) [ 153.700403][T10069] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.707662][T10069] bridge0: port 1(bridge_slave_0) entered forwarding state 12:52:41 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) sendto$packet(r0, &(0x7f0000000080)="f1b05dc74d349eb65054b18886dd", 0x36, 0x0, &(0x7f00000000c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) [ 153.825401][T10069] device bridge0 left promiscuous mode [ 153.859303][T10072] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.866789][T10072] bridge0: port 1(bridge_slave_0) entered disabled state 12:52:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x20, 0x1, 0x1, 0x201, 0x0, 0x0, {}, [@CTA_NAT_SRC={0xc, 0x19, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @multicast2}]}]}, 0x20}}, 0x0) 12:52:41 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'batadv_slave_0\x00'}) [ 153.920866][T10072] device bridge0 entered promiscuous mode 12:52:41 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x60, &(0x7f0000000040)=[{&(0x7f0000000080)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e", 0x1b}, {&(0x7f0000000100)="a1a10b9a979fb85511eef06629c3678b4d00ae", 0x13}], 0x2}, 0x0) 12:52:41 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) sendto$packet(r0, &(0x7f0000000080)="f1b05dc74d349eb65054b18886dd", 0x36, 0x0, &(0x7f00000000c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) [ 154.071799][T10073] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 154.081256][T10073] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.088418][T10073] bridge0: port 2(bridge_slave_1) entered forwarding state [ 154.095871][T10073] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.103035][T10073] bridge0: port 1(bridge_slave_0) entered forwarding state 12:52:41 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) sendto$packet(r0, &(0x7f0000000080)="f1b05dc74d349eb65054b18886dd", 0x36, 0x0, &(0x7f00000000c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) 12:52:41 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x268f) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) write$cgroup_int(r0, &(0x7f0000000000), 0x10c000) 12:52:41 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x9, 0x209e20, 0x2, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x4, r0}, 0x38) [ 154.234657][T10073] device bridge0 left promiscuous mode [ 154.291951][T10088] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.299247][T10088] bridge0: port 1(bridge_slave_0) entered disabled state 12:52:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000008180)={0x0, 0x0, &(0x7f0000008140)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c0000005e000100"/20, @ANYRES32=r2, @ANYBLOB='\\'], 0x1c}}, 0x0) 12:52:41 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x60, &(0x7f0000000040)=[{&(0x7f0000000080)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e", 0x1b}, {&(0x7f0000000100)="a1a10b9a979fb85511eef06629c3678b4d00ae", 0x13}], 0x2}, 0x0) [ 154.362752][T10088] device bridge0 entered promiscuous mode [ 154.431919][T10089] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 154.441384][T10089] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.448543][T10089] bridge0: port 2(bridge_slave_1) entered forwarding state [ 154.456378][T10089] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.463533][T10089] bridge0: port 1(bridge_slave_0) entered forwarding state 12:52:41 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) sendto$packet(r0, &(0x7f0000000080)="f1b05dc74d349eb65054b18886dd", 0x36, 0x0, &(0x7f00000000c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) [ 154.574086][T10089] device bridge0 left promiscuous mode 12:52:41 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x9, 0x209e20, 0x2, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x4, r0}, 0x38) 12:52:41 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x268f) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) write$cgroup_int(r0, &(0x7f0000000000), 0x10c000) [ 154.652240][T10101] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.659518][T10101] bridge0: port 1(bridge_slave_0) entered disabled state 12:52:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000008180)={0x0, 0x0, &(0x7f0000008140)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c0000005e000100"/20, @ANYRES32=r2, @ANYBLOB='\\'], 0x1c}}, 0x0) [ 154.715230][T10101] device bridge0 entered promiscuous mode 12:52:42 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x60, &(0x7f0000000040)=[{&(0x7f0000000080)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e", 0x1b}, {&(0x7f0000000100)="a1a10b9a979fb85511eef06629c3678b4d00ae", 0x13}], 0x2}, 0x0) [ 154.819481][T10103] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 154.865463][T10103] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.872679][T10103] bridge0: port 2(bridge_slave_1) entered forwarding state [ 154.880188][T10103] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.887318][T10103] bridge0: port 1(bridge_slave_0) entered forwarding state 12:52:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000008180)={0x0, 0x0, &(0x7f0000008140)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c0000005e000100"/20, @ANYRES32=r2, @ANYBLOB='\\'], 0x1c}}, 0x0) 12:52:42 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x9, 0x209e20, 0x2, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x4, r0}, 0x38) [ 154.983735][T10103] device bridge0 left promiscuous mode [ 155.012027][T10114] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.019277][T10114] bridge0: port 1(bridge_slave_0) entered disabled state 12:52:42 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x268f) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) write$cgroup_int(r0, &(0x7f0000000000), 0x10c000) 12:52:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000008180)={0x0, 0x0, &(0x7f0000008140)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c0000005e000100"/20, @ANYRES32=r2, @ANYBLOB='\\'], 0x1c}}, 0x0) 12:52:42 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x60, &(0x7f0000000040)=[{&(0x7f0000000080)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e", 0x1b}, {&(0x7f0000000100)="a1a10b9a979fb85511eef06629c3678b4d00ae", 0x13}], 0x2}, 0x0) [ 155.077608][T10114] device bridge0 entered promiscuous mode [ 155.138606][T10115] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 155.166393][T10115] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.173804][T10115] bridge0: port 2(bridge_slave_1) entered forwarding state [ 155.181267][T10115] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.188400][T10115] bridge0: port 1(bridge_slave_0) entered forwarding state [ 155.286269][T10115] device bridge0 left promiscuous mode 12:52:42 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x9, 0x209e20, 0x2, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x4, r0}, 0x38) [ 155.344527][T10126] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.351800][T10126] bridge0: port 1(bridge_slave_0) entered disabled state 12:52:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000008180)={0x0, 0x0, &(0x7f0000008140)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c0000005e000100"/20, @ANYRES32=r2, @ANYBLOB='\\'], 0x1c}}, 0x0) 12:52:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000008180)={0x0, 0x0, &(0x7f0000008140)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c0000005e000100"/20, @ANYRES32=r2, @ANYBLOB='\\'], 0x1c}}, 0x0) [ 155.399059][T10126] device bridge0 entered promiscuous mode 12:52:42 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x268f) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) write$cgroup_int(r0, &(0x7f0000000000), 0x10c000) 12:52:42 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x268f) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) write$cgroup_int(r0, &(0x7f0000000000), 0x10c000) [ 155.514988][T10127] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 155.557683][T10127] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.564919][T10127] bridge0: port 2(bridge_slave_1) entered forwarding state [ 155.572367][T10127] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.579457][T10127] bridge0: port 1(bridge_slave_0) entered forwarding state 12:52:42 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x268f) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) write$cgroup_int(r0, &(0x7f0000000000), 0x10c000) [ 155.691170][T10127] device bridge0 left promiscuous mode 12:52:43 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000c40)={&(0x7f0000000340)={0x44, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x5, 0x4, "e3"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}]}]}, 0x44}}, 0x0) 12:52:43 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000008180)={0x0, 0x0, &(0x7f0000008140)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c0000005e000100"/20, @ANYRES32=r2, @ANYBLOB='\\'], 0x1c}}, 0x0) 12:52:43 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8914, &(0x7f0000000040)={'wlan1\x00'}) 12:52:43 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x268f) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) write$cgroup_int(r0, &(0x7f0000000000), 0x10c000) 12:52:43 executing program 2: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x48c20002, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_ACTOR_SYS_PRIO={0x6, 0x1d}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 12:52:43 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x268f) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) write$cgroup_int(r0, &(0x7f0000000000), 0x10c000) 12:52:43 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x64, 0x9, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x14}, @NFTA_SET_DESC={0x20, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_CONCAT={0x1c, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8}]}, {0xc, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}]}]}]}]}], {0x14, 0x10}}, 0xac}}, 0x0) 12:52:43 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000c40)={&(0x7f0000000340)={0x44, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x5, 0x4, "e3"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}]}]}, 0x44}}, 0x0) [ 156.175002][T10152] netlink: 'syz-executor.2': attribute type 29 has an invalid length. 12:52:43 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8914, &(0x7f0000000040)={'wlan1\x00'}) 12:52:43 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x268f) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) write$cgroup_int(r0, &(0x7f0000000000), 0x10c000) 12:52:43 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000c40)={&(0x7f0000000340)={0x44, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x5, 0x4, "e3"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}]}]}, 0x44}}, 0x0) 12:52:43 executing program 2: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x48c20002, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_ACTOR_SYS_PRIO={0x6, 0x1d}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 12:52:43 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x64, 0x9, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x14}, @NFTA_SET_DESC={0x20, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_CONCAT={0x1c, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8}]}, {0xc, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}]}]}]}]}], {0x14, 0x10}}, 0xac}}, 0x0) 12:52:43 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x268f) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) write$cgroup_int(r0, &(0x7f0000000000), 0x10c000) 12:52:43 executing program 0: mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000006, 0x40030, 0xffffffffffffffff, 0x0) 12:52:43 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8914, &(0x7f0000000040)={'wlan1\x00'}) [ 156.646753][T10202] netlink: 'syz-executor.2': attribute type 29 has an invalid length. 12:52:44 executing program 0: mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000006, 0x40030, 0xffffffffffffffff, 0x0) 12:52:44 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000c40)={&(0x7f0000000340)={0x44, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x5, 0x4, "e3"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}]}]}, 0x44}}, 0x0) 12:52:44 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8914, &(0x7f0000000040)={'wlan1\x00'}) 12:52:44 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x64, 0x9, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x14}, @NFTA_SET_DESC={0x20, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_CONCAT={0x1c, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8}]}, {0xc, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}]}]}]}]}], {0x14, 0x10}}, 0xac}}, 0x0) 12:52:44 executing program 2: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x48c20002, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_ACTOR_SYS_PRIO={0x6, 0x1d}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 12:52:44 executing program 4: ppoll(&(0x7f0000001280)=[{}, {0xffffffffffffffff, 0x148}, {0xffffffffffffffff, 0x400}, {0xffffffffffffffff, 0x60}, {0xffffffffffffffff, 0xc04c}], 0x5, &(0x7f0000001340)={0x0, 0x989680}, &(0x7f0000001380)={[0xfffffffffffffffb]}, 0x8) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000001580)=ANY=[@ANYRESDEC=r0], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendto$netrom(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x50, &(0x7f0000001200)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) pipe(0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x28012, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r3, r1, 0x0, 0x100000001) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c9, 0x0) socket$inet(0x2, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0xb00000000065808, 0x0) preadv(r4, &(0x7f0000001300)=[{&(0x7f0000000200)=""/4096, 0x3ff800}], 0x17, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) close(r2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x0) recvmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) 12:52:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r1, &(0x7f0000004bc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3fffffffffffe9e, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) sendmmsg(r3, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x851) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000f5dfe4), 0x1c) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000080)=0x10, 0x4) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYRESHEX=r2, @ANYRESDEC=r4], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) write(r5, 0x0, 0x0) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r6, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r6, &(0x7f0000000100)=ANY=[], 0x6) recvmmsg(r6, &(0x7f0000000600), 0x204083acb88ff8b, 0x2, 0x0) 12:52:44 executing program 0: mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000006, 0x40030, 0xffffffffffffffff, 0x0) 12:52:44 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x19, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x18}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 157.167600][T10256] netlink: 'syz-executor.2': attribute type 29 has an invalid length. 12:52:44 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x64, 0x9, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x14}, @NFTA_SET_DESC={0x20, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_CONCAT={0x1c, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8}]}, {0xc, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}]}]}]}]}], {0x14, 0x10}}, 0xac}}, 0x0) 12:52:44 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x19, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x18}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 12:52:44 executing program 2: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x48c20002, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_ACTOR_SYS_PRIO={0x6, 0x1d}, @IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) 12:52:44 executing program 0: mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000006, 0x40030, 0xffffffffffffffff, 0x0) [ 157.546444][ T26] audit: type=1804 audit(1634561564.808:2): pid=10299 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir040810606/syzkaller.UQFEep/45/cgroup.controllers" dev="sda1" ino=14089 res=1 errno=0 12:52:44 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x19, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x18}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 157.671909][T10310] netlink: 'syz-executor.2': attribute type 29 has an invalid length. [ 157.734817][ T26] audit: type=1804 audit(1634561564.998:3): pid=10301 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir040810606/syzkaller.UQFEep/45/memory.events" dev="sda1" ino=14085 res=1 errno=0 12:52:45 executing program 5: setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000000c0)='veno\x00', 0x5) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev}, 0x1c) r0 = socket$alg(0x26, 0x5, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'sha256-ssse3\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000001740)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes128\x00'}, 0x58) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e4) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000000)="f4", 0x1}, {&(0x7f0000000540)='\a', 0x7ffff000}], 0x2}}], 0x1, 0x0) 12:52:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x19, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x18}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 158.142283][ T26] audit: type=1804 audit(1634561565.408:4): pid=10299 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir040810606/syzkaller.UQFEep/45/cgroup.controllers" dev="sda1" ino=14089 res=1 errno=0 12:52:45 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x2f7, 0x69, 0x4300, &(0x7f0000000280)="b95b03b75b030700009e40f008001fffffe100434000638477fbac14143ae0000001c699da153f08a0e6e380f60105f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b33", 0x0, 0xc661, 0x6000000000000000, 0x0, 0x59, &(0x7f0000000040)="10496660", &(0x7f0000000040)}, 0x28) 12:52:46 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r1, &(0x7f0000004bc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3fffffffffffe9e, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) sendmmsg(r3, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x851) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000f5dfe4), 0x1c) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000080)=0x10, 0x4) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYRESHEX=r2, @ANYRESDEC=r4], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) write(r5, 0x0, 0x0) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r6, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r6, &(0x7f0000000100)=ANY=[], 0x6) recvmmsg(r6, &(0x7f0000000600), 0x204083acb88ff8b, 0x2, 0x0) 12:52:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x290, 0xf8, 0xf8, 0x0, 0xf8, 0xf8, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'bridge_slave_1\x00', 'vxcan1\x00', {}, {}, 0x6, 0x0, 0x5, 0x48}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@ipv6header={{0x28}}]}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x88) 12:52:46 executing program 4: ppoll(&(0x7f0000001280)=[{}, {0xffffffffffffffff, 0x148}, {0xffffffffffffffff, 0x400}, {0xffffffffffffffff, 0x60}, {0xffffffffffffffff, 0xc04c}], 0x5, &(0x7f0000001340)={0x0, 0x989680}, &(0x7f0000001380)={[0xfffffffffffffffb]}, 0x8) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000001580)=ANY=[@ANYRESDEC=r0], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendto$netrom(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x50, &(0x7f0000001200)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) pipe(0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x28012, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r3, r1, 0x0, 0x100000001) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c9, 0x0) socket$inet(0x2, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0xb00000000065808, 0x0) preadv(r4, &(0x7f0000001300)=[{&(0x7f0000000200)=""/4096, 0x3ff800}], 0x17, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) close(r2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x0) recvmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) 12:52:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r1, &(0x7f0000004bc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3fffffffffffe9e, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) sendmmsg(r3, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x851) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000f5dfe4), 0x1c) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000080)=0x10, 0x4) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYRESHEX=r2, @ANYRESDEC=r4], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) write(r5, 0x0, 0x0) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r6, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r6, &(0x7f0000000100)=ANY=[], 0x6) recvmmsg(r6, &(0x7f0000000600), 0x204083acb88ff8b, 0x2, 0x0) 12:52:46 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x2f7, 0x69, 0x4300, &(0x7f0000000280)="b95b03b75b030700009e40f008001fffffe100434000638477fbac14143ae0000001c699da153f08a0e6e380f60105f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b33", 0x0, 0xc661, 0x6000000000000000, 0x0, 0x59, &(0x7f0000000040)="10496660", &(0x7f0000000040)}, 0x28) 12:52:46 executing program 5: setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000000c0)='veno\x00', 0x5) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev}, 0x1c) r0 = socket$alg(0x26, 0x5, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'sha256-ssse3\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000001740)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes128\x00'}, 0x58) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e4) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000000)="f4", 0x1}, {&(0x7f0000000540)='\a', 0x7ffff000}], 0x2}}], 0x1, 0x0) 12:52:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x290, 0xf8, 0xf8, 0x0, 0xf8, 0xf8, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'bridge_slave_1\x00', 'vxcan1\x00', {}, {}, 0x6, 0x0, 0x5, 0x48}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@ipv6header={{0x28}}]}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x88) 12:52:46 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x2f7, 0x69, 0x4300, &(0x7f0000000280)="b95b03b75b030700009e40f008001fffffe100434000638477fbac14143ae0000001c699da153f08a0e6e380f60105f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b33", 0x0, 0xc661, 0x6000000000000000, 0x0, 0x59, &(0x7f0000000040)="10496660", &(0x7f0000000040)}, 0x28) [ 159.550346][ T26] audit: type=1804 audit(1634561566.808:5): pid=10381 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir040810606/syzkaller.UQFEep/46/cgroup.controllers" dev="sda1" ino=14121 res=1 errno=0 12:52:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x290, 0xf8, 0xf8, 0x0, 0xf8, 0xf8, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'bridge_slave_1\x00', 'vxcan1\x00', {}, {}, 0x6, 0x0, 0x5, 0x48}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@ipv6header={{0x28}}]}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x88) 12:52:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x290, 0xf8, 0xf8, 0x0, 0xf8, 0xf8, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'bridge_slave_1\x00', 'vxcan1\x00', {}, {}, 0x6, 0x0, 0x5, 0x48}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@ipv6header={{0x28}}]}, @common=@inet=@SYNPROXY={0x28}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x88) 12:52:47 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x2f7, 0x69, 0x4300, &(0x7f0000000280)="b95b03b75b030700009e40f008001fffffe100434000638477fbac14143ae0000001c699da153f08a0e6e380f60105f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b33", 0x0, 0xc661, 0x6000000000000000, 0x0, 0x59, &(0x7f0000000040)="10496660", &(0x7f0000000040)}, 0x28) [ 160.013627][ T26] audit: type=1804 audit(1634561567.268:6): pid=10384 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir040810606/syzkaller.UQFEep/46/memory.events" dev="sda1" ino=14089 res=1 errno=0 12:52:47 executing program 0: ppoll(&(0x7f0000001280)=[{}, {0xffffffffffffffff, 0x148}, {0xffffffffffffffff, 0x400}, {0xffffffffffffffff, 0x60}, {0xffffffffffffffff, 0xc04c}], 0x5, &(0x7f0000001340)={0x0, 0x989680}, &(0x7f0000001380)={[0xfffffffffffffffb]}, 0x8) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000001580)=ANY=[@ANYRESDEC=r0], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendto$netrom(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x50, &(0x7f0000001200)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) pipe(0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x28012, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r3, r1, 0x0, 0x100000001) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c9, 0x0) socket$inet(0x2, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0xb00000000065808, 0x0) preadv(r4, &(0x7f0000001300)=[{&(0x7f0000000200)=""/4096, 0x3ff800}], 0x17, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) close(r2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x0) recvmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) 12:52:47 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r1, &(0x7f0000004bc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3fffffffffffe9e, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) sendmmsg(r3, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x851) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000f5dfe4), 0x1c) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000080)=0x10, 0x4) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYRESHEX=r2, @ANYRESDEC=r4], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) write(r5, 0x0, 0x0) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r6, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r6, &(0x7f0000000100)=ANY=[], 0x6) recvmmsg(r6, &(0x7f0000000600), 0x204083acb88ff8b, 0x2, 0x0) [ 160.667601][ T26] audit: type=1804 audit(1634561567.928:7): pid=10404 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir225076959/syzkaller.WMbhGL/61/cgroup.controllers" dev="sda1" ino=14110 res=1 errno=0 12:52:48 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r1, &(0x7f0000004bc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3fffffffffffe9e, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) sendmmsg(r3, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x851) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000f5dfe4), 0x1c) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000080)=0x10, 0x4) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYRESHEX=r2, @ANYRESDEC=r4], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) write(r5, 0x0, 0x0) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r6, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r6, &(0x7f0000000100)=ANY=[], 0x6) recvmmsg(r6, &(0x7f0000000600), 0x204083acb88ff8b, 0x2, 0x0) 12:52:48 executing program 5: setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000000c0)='veno\x00', 0x5) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev}, 0x1c) r0 = socket$alg(0x26, 0x5, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'sha256-ssse3\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000001740)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes128\x00'}, 0x58) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e4) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000000)="f4", 0x1}, {&(0x7f0000000540)='\a', 0x7ffff000}], 0x2}}], 0x1, 0x0) 12:52:48 executing program 4: ppoll(&(0x7f0000001280)=[{}, {0xffffffffffffffff, 0x148}, {0xffffffffffffffff, 0x400}, {0xffffffffffffffff, 0x60}, {0xffffffffffffffff, 0xc04c}], 0x5, &(0x7f0000001340)={0x0, 0x989680}, &(0x7f0000001380)={[0xfffffffffffffffb]}, 0x8) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000001580)=ANY=[@ANYRESDEC=r0], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendto$netrom(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x50, &(0x7f0000001200)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) pipe(0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x28012, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r3, r1, 0x0, 0x100000001) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c9, 0x0) socket$inet(0x2, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0xb00000000065808, 0x0) preadv(r4, &(0x7f0000001300)=[{&(0x7f0000000200)=""/4096, 0x3ff800}], 0x17, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) close(r2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x0) recvmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) 12:52:48 executing program 2: ppoll(&(0x7f0000001280)=[{}, {0xffffffffffffffff, 0x148}, {0xffffffffffffffff, 0x400}, {0xffffffffffffffff, 0x60}, {0xffffffffffffffff, 0xc04c}], 0x5, &(0x7f0000001340)={0x0, 0x989680}, &(0x7f0000001380)={[0xfffffffffffffffb]}, 0x8) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000001580)=ANY=[@ANYRESDEC=r0], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendto$netrom(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x50, &(0x7f0000001200)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) pipe(0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x28012, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r3, r1, 0x0, 0x100000001) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c9, 0x0) socket$inet(0x2, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0xb00000000065808, 0x0) preadv(r4, &(0x7f0000001300)=[{&(0x7f0000000200)=""/4096, 0x3ff800}], 0x17, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) close(r2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x0) recvmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) [ 161.143703][ T26] audit: type=1804 audit(1634561568.408:8): pid=10406 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir225076959/syzkaller.WMbhGL/61/memory.events" dev="sda1" ino=14112 res=1 errno=0 [ 161.327006][ T26] audit: type=1804 audit(1634561568.448:9): pid=10419 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir468060968/syzkaller.Wucj57/53/cgroup.controllers" dev="sda1" ino=14131 res=1 errno=0 [ 161.589479][ T26] audit: type=1804 audit(1634561568.768:10): pid=10429 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir040810606/syzkaller.UQFEep/47/cgroup.controllers" dev="sda1" ino=14136 res=1 errno=0 [ 161.852354][ T26] audit: type=1804 audit(1634561568.968:11): pid=10420 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir468060968/syzkaller.Wucj57/53/memory.events" dev="sda1" ino=14121 res=1 errno=0 12:52:49 executing program 5: setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000000c0)='veno\x00', 0x5) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev}, 0x1c) r0 = socket$alg(0x26, 0x5, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'sha256-ssse3\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000001740)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes128\x00'}, 0x58) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e4) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000000)="f4", 0x1}, {&(0x7f0000000540)='\a', 0x7ffff000}], 0x2}}], 0x1, 0x0) 12:52:49 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r1, &(0x7f0000004bc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3fffffffffffe9e, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) sendmmsg(r3, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x851) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000f5dfe4), 0x1c) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000080)=0x10, 0x4) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYRESHEX=r2, @ANYRESDEC=r4], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) write(r5, 0x0, 0x0) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r6, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r6, &(0x7f0000000100)=ANY=[], 0x6) recvmmsg(r6, &(0x7f0000000600), 0x204083acb88ff8b, 0x2, 0x0) 12:52:49 executing program 0: ppoll(&(0x7f0000001280)=[{}, {0xffffffffffffffff, 0x148}, {0xffffffffffffffff, 0x400}, {0xffffffffffffffff, 0x60}, {0xffffffffffffffff, 0xc04c}], 0x5, &(0x7f0000001340)={0x0, 0x989680}, &(0x7f0000001380)={[0xfffffffffffffffb]}, 0x8) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000001580)=ANY=[@ANYRESDEC=r0], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendto$netrom(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x50, &(0x7f0000001200)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) pipe(0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x28012, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r3, r1, 0x0, 0x100000001) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c9, 0x0) socket$inet(0x2, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0xb00000000065808, 0x0) preadv(r4, &(0x7f0000001300)=[{&(0x7f0000000200)=""/4096, 0x3ff800}], 0x17, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) close(r2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x0) recvmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) 12:52:49 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r1, &(0x7f0000004bc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3fffffffffffe9e, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) sendmmsg(r3, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x851) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000f5dfe4), 0x1c) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000080)=0x10, 0x4) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYRESHEX=r2, @ANYRESDEC=r4], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) write(r5, 0x0, 0x0) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r6, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r6, &(0x7f0000000100)=ANY=[], 0x6) recvmmsg(r6, &(0x7f0000000600), 0x204083acb88ff8b, 0x2, 0x0) 12:52:49 executing program 2: ppoll(&(0x7f0000001280)=[{}, {0xffffffffffffffff, 0x148}, {0xffffffffffffffff, 0x400}, {0xffffffffffffffff, 0x60}, {0xffffffffffffffff, 0xc04c}], 0x5, &(0x7f0000001340)={0x0, 0x989680}, &(0x7f0000001380)={[0xfffffffffffffffb]}, 0x8) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000001580)=ANY=[@ANYRESDEC=r0], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendto$netrom(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x50, &(0x7f0000001200)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) pipe(0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x28012, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r3, r1, 0x0, 0x100000001) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c9, 0x0) socket$inet(0x2, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0xb00000000065808, 0x0) preadv(r4, &(0x7f0000001300)=[{&(0x7f0000000200)=""/4096, 0x3ff800}], 0x17, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) close(r2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x0) recvmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) [ 162.820470][ T26] kauditd_printk_skb: 1 callbacks suppressed [ 162.820486][ T26] audit: type=1804 audit(1634561570.078:13): pid=10449 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir225076959/syzkaller.WMbhGL/62/cgroup.controllers" dev="sda1" ino=14111 res=1 errno=0 12:52:50 executing program 4: ppoll(&(0x7f0000001280)=[{}, {0xffffffffffffffff, 0x148}, {0xffffffffffffffff, 0x400}, {0xffffffffffffffff, 0x60}, {0xffffffffffffffff, 0xc04c}], 0x5, &(0x7f0000001340)={0x0, 0x989680}, &(0x7f0000001380)={[0xfffffffffffffffb]}, 0x8) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000001580)=ANY=[@ANYRESDEC=r0], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendto$netrom(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x50, &(0x7f0000001200)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) pipe(0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x28012, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r3, r1, 0x0, 0x100000001) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c9, 0x0) socket$inet(0x2, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0xb00000000065808, 0x0) preadv(r4, &(0x7f0000001300)=[{&(0x7f0000000200)=""/4096, 0x3ff800}], 0x17, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) close(r2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x0) recvmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) [ 163.222800][ T26] audit: type=1804 audit(1634561570.488:14): pid=10459 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir468060968/syzkaller.Wucj57/54/cgroup.controllers" dev="sda1" ino=14140 res=1 errno=0 12:52:50 executing program 5: ppoll(&(0x7f0000001280)=[{}, {0xffffffffffffffff, 0x148}, {0xffffffffffffffff, 0x400}, {0xffffffffffffffff, 0x60}, {0xffffffffffffffff, 0xc04c}], 0x5, &(0x7f0000001340)={0x0, 0x989680}, &(0x7f0000001380)={[0xfffffffffffffffb]}, 0x8) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000001580)=ANY=[@ANYRESDEC=r0], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendto$netrom(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x50, &(0x7f0000001200)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) pipe(0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x28012, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r3, r1, 0x0, 0x100000001) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c9, 0x0) socket$inet(0x2, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0xb00000000065808, 0x0) preadv(r4, &(0x7f0000001300)=[{&(0x7f0000000200)=""/4096, 0x3ff800}], 0x17, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) close(r2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x0) recvmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) [ 163.375804][ T26] audit: type=1804 audit(1634561570.628:15): pid=10451 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir225076959/syzkaller.WMbhGL/62/memory.events" dev="sda1" ino=14118 res=1 errno=0 12:52:50 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r1, &(0x7f0000004bc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3fffffffffffe9e, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) sendmmsg(r3, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x851) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000f5dfe4), 0x1c) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000080)=0x10, 0x4) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYRESHEX=r2, @ANYRESDEC=r4], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) write(r5, 0x0, 0x0) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r6, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r6, &(0x7f0000000100)=ANY=[], 0x6) recvmmsg(r6, &(0x7f0000000600), 0x204083acb88ff8b, 0x2, 0x0) [ 163.721576][ T26] audit: type=1804 audit(1634561570.978:16): pid=10469 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir040810606/syzkaller.UQFEep/48/cgroup.controllers" dev="sda1" ino=14127 res=1 errno=0 12:52:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r1, &(0x7f0000004bc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3fffffffffffe9e, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) sendmmsg(r3, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x851) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000f5dfe4), 0x1c) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000080)=0x10, 0x4) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYRESHEX=r2, @ANYRESDEC=r4], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) write(r5, 0x0, 0x0) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r6, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r6, &(0x7f0000000100)=ANY=[], 0x6) recvmmsg(r6, &(0x7f0000000600), 0x204083acb88ff8b, 0x2, 0x0) [ 163.923079][ T26] audit: type=1804 audit(1634561571.018:17): pid=10460 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir468060968/syzkaller.Wucj57/54/memory.events" dev="sda1" ino=14133 res=1 errno=0 [ 164.149901][ T26] audit: type=1804 audit(1634561571.048:18): pid=10471 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir715988866/syzkaller.t5DMny/50/cgroup.controllers" dev="sda1" ino=14085 res=1 errno=0 12:52:51 executing program 0: ppoll(&(0x7f0000001280)=[{}, {0xffffffffffffffff, 0x148}, {0xffffffffffffffff, 0x400}, {0xffffffffffffffff, 0x60}, {0xffffffffffffffff, 0xc04c}], 0x5, &(0x7f0000001340)={0x0, 0x989680}, &(0x7f0000001380)={[0xfffffffffffffffb]}, 0x8) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000001580)=ANY=[@ANYRESDEC=r0], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendto$netrom(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x50, &(0x7f0000001200)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) pipe(0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x28012, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r3, r1, 0x0, 0x100000001) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c9, 0x0) socket$inet(0x2, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0xb00000000065808, 0x0) preadv(r4, &(0x7f0000001300)=[{&(0x7f0000000200)=""/4096, 0x3ff800}], 0x17, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) close(r2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x0) recvmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) [ 164.364700][T10451] syz-executor.0 (10451) used greatest stack depth: 21760 bytes left [ 164.477047][ T26] audit: type=1804 audit(1634561571.448:19): pid=10470 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir040810606/syzkaller.UQFEep/48/memory.events" dev="sda1" ino=14106 res=1 errno=0 12:52:52 executing program 2: ppoll(&(0x7f0000001280)=[{}, {0xffffffffffffffff, 0x148}, {0xffffffffffffffff, 0x400}, {0xffffffffffffffff, 0x60}, {0xffffffffffffffff, 0xc04c}], 0x5, &(0x7f0000001340)={0x0, 0x989680}, &(0x7f0000001380)={[0xfffffffffffffffb]}, 0x8) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000001580)=ANY=[@ANYRESDEC=r0], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendto$netrom(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x50, &(0x7f0000001200)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) pipe(0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x28012, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r3, r1, 0x0, 0x100000001) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c9, 0x0) socket$inet(0x2, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0xb00000000065808, 0x0) preadv(r4, &(0x7f0000001300)=[{&(0x7f0000000200)=""/4096, 0x3ff800}], 0x17, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) close(r2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x0) recvmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) [ 164.710537][ T26] audit: type=1804 audit(1634561571.498:20): pid=10472 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir715988866/syzkaller.t5DMny/50/memory.events" dev="sda1" ino=14112 res=1 errno=0 12:52:52 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r1, &(0x7f0000004bc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3fffffffffffe9e, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) sendmmsg(r3, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x851) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000f5dfe4), 0x1c) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000080)=0x10, 0x4) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYRESHEX=r2, @ANYRESDEC=r4], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) write(r5, 0x0, 0x0) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r6, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r6, &(0x7f0000000100)=ANY=[], 0x6) recvmmsg(r6, &(0x7f0000000600), 0x204083acb88ff8b, 0x2, 0x0) 12:52:52 executing program 5: ppoll(&(0x7f0000001280)=[{}, {0xffffffffffffffff, 0x148}, {0xffffffffffffffff, 0x400}, {0xffffffffffffffff, 0x60}, {0xffffffffffffffff, 0xc04c}], 0x5, &(0x7f0000001340)={0x0, 0x989680}, &(0x7f0000001380)={[0xfffffffffffffffb]}, 0x8) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000001580)=ANY=[@ANYRESDEC=r0], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendto$netrom(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x50, &(0x7f0000001200)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) pipe(0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x28012, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r3, r1, 0x0, 0x100000001) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c9, 0x0) socket$inet(0x2, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0xb00000000065808, 0x0) preadv(r4, &(0x7f0000001300)=[{&(0x7f0000000200)=""/4096, 0x3ff800}], 0x17, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) close(r2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x0) recvmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) [ 165.050313][ T26] audit: type=1804 audit(1634561572.309:21): pid=10495 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir225076959/syzkaller.WMbhGL/63/cgroup.controllers" dev="sda1" ino=14133 res=1 errno=0 12:52:52 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r1, &(0x7f0000004bc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3fffffffffffe9e, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) sendmmsg(r3, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x851) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000f5dfe4), 0x1c) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000080)=0x10, 0x4) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYRESHEX=r2, @ANYRESDEC=r4], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) write(r5, 0x0, 0x0) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r6, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r6, &(0x7f0000000100)=ANY=[], 0x6) recvmmsg(r6, &(0x7f0000000600), 0x204083acb88ff8b, 0x2, 0x0) 12:52:52 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r1, &(0x7f0000004bc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3fffffffffffe9e, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) sendmmsg(r3, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x851) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000f5dfe4), 0x1c) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000080)=0x10, 0x4) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYRESHEX=r2, @ANYRESDEC=r4], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) write(r5, 0x0, 0x0) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r6, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r6, &(0x7f0000000100)=ANY=[], 0x6) recvmmsg(r6, &(0x7f0000000600), 0x204083acb88ff8b, 0x2, 0x0) [ 165.365880][ T26] audit: type=1804 audit(1634561572.629:22): pid=10502 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir468060968/syzkaller.Wucj57/55/cgroup.controllers" dev="sda1" ino=14119 res=1 errno=0 12:52:53 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r1, &(0x7f0000004bc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3fffffffffffe9e, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) sendmmsg(r3, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x851) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000f5dfe4), 0x1c) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000080)=0x10, 0x4) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYRESHEX=r2, @ANYRESDEC=r4], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) write(r5, 0x0, 0x0) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r6, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r6, &(0x7f0000000100)=ANY=[], 0x6) recvmmsg(r6, &(0x7f0000000600), 0x204083acb88ff8b, 0x2, 0x0) 12:52:53 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r1, &(0x7f0000004bc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3fffffffffffe9e, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) sendmmsg(r3, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x851) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000f5dfe4), 0x1c) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000080)=0x10, 0x4) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYRESHEX=r2, @ANYRESDEC=r4], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) write(r5, 0x0, 0x0) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r6, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r6, &(0x7f0000000100)=ANY=[], 0x6) recvmmsg(r6, &(0x7f0000000600), 0x204083acb88ff8b, 0x2, 0x0) 12:52:53 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r1, &(0x7f0000004bc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3fffffffffffe9e, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) sendmmsg(r3, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x851) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000f5dfe4), 0x1c) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000080)=0x10, 0x4) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYRESHEX=r2, @ANYRESDEC=r4], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) write(r5, 0x0, 0x0) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r6, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r6, &(0x7f0000000100)=ANY=[], 0x6) recvmmsg(r6, &(0x7f0000000600), 0x204083acb88ff8b, 0x2, 0x0) 12:52:54 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r1, &(0x7f0000004bc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3fffffffffffe9e, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) sendmmsg(r3, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x851) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000f5dfe4), 0x1c) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000080)=0x10, 0x4) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYRESHEX=r2, @ANYRESDEC=r4], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) write(r5, 0x0, 0x0) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r6, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r6, &(0x7f0000000100)=ANY=[], 0x6) recvmmsg(r6, &(0x7f0000000600), 0x204083acb88ff8b, 0x2, 0x0) 12:52:54 executing program 2: r0 = socket(0x1000000010, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x40}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000400ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x24, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x5, 0x4}}}, 0x24}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 12:52:54 executing program 5: ppoll(&(0x7f0000001280)=[{}, {0xffffffffffffffff, 0x148}, {0xffffffffffffffff, 0x400}, {0xffffffffffffffff, 0x60}, {0xffffffffffffffff, 0xc04c}], 0x5, &(0x7f0000001340)={0x0, 0x989680}, &(0x7f0000001380)={[0xfffffffffffffffb]}, 0x8) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000001580)=ANY=[@ANYRESDEC=r0], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendto$netrom(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x50, &(0x7f0000001200)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) pipe(0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x28012, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r3, r1, 0x0, 0x100000001) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c9, 0x0) socket$inet(0x2, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0xb00000000065808, 0x0) preadv(r4, &(0x7f0000001300)=[{&(0x7f0000000200)=""/4096, 0x3ff800}], 0x17, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) close(r2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x0) recvmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) [ 167.120927][T10551] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 167.265997][T10553] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 12:52:54 executing program 2: r0 = socket(0x1000000010, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x40}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000400ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x24, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x5, 0x4}}}, 0x24}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) [ 167.600678][T10575] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 12:52:55 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r1, &(0x7f0000004bc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3fffffffffffe9e, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) sendmmsg(r3, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x851) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000f5dfe4), 0x1c) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000080)=0x10, 0x4) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYRESHEX=r2, @ANYRESDEC=r4], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) write(r5, 0x0, 0x0) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r6, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r6, &(0x7f0000000100)=ANY=[], 0x6) recvmmsg(r6, &(0x7f0000000600), 0x204083acb88ff8b, 0x2, 0x0) 12:52:55 executing program 2: r0 = socket(0x1000000010, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x40}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000400ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x24, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x5, 0x4}}}, 0x24}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 12:52:55 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r1, &(0x7f0000004bc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3fffffffffffe9e, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) sendmmsg(r3, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x851) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000f5dfe4), 0x1c) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000080)=0x10, 0x4) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYRESHEX=r2, @ANYRESDEC=r4], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) write(r5, 0x0, 0x0) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r6, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r6, &(0x7f0000000100)=ANY=[], 0x6) recvmmsg(r6, &(0x7f0000000600), 0x204083acb88ff8b, 0x2, 0x0) 12:52:55 executing program 3: r0 = socket(0x1000000010, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x40}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000400ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x24, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x5, 0x4}}}, 0x24}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) [ 168.081442][T10595] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 168.092211][ T26] kauditd_printk_skb: 5 callbacks suppressed [ 168.092226][ T26] audit: type=1804 audit(1634561575.359:28): pid=10572 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir715988866/syzkaller.t5DMny/52/memory.events" dev="sda1" ino=14113 res=1 errno=0 12:52:55 executing program 1: unshare(0x8000000) unshare(0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, 0x0, 0x0) [ 168.289863][T10602] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 12:52:55 executing program 2: r0 = socket(0x1000000010, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x40}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000400ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x24, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x5, 0x4}}}, 0x24}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 12:52:55 executing program 3: r0 = socket(0x1000000010, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x40}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000400ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x24, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x5, 0x4}}}, 0x24}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 12:52:55 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005072a369fb10000000005000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000024001d0f00"/20, @ANYRES32=r4, @ANYBLOB="00000000f1ffffff000000000b00010064736d61726b00000c0002000600010008"], 0x3c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=@newtfilter={0x24, 0x2a, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x24}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x0, &(0x7f0000000100)}], 0x464eb69030a5456, 0x0) [ 168.771570][T10638] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 168.913298][T10641] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 12:52:56 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x78, 0x9, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2}, @NFTA_SET_EXPR={0x3c, 0x11, 0x0, 0x1, @exthdr={{0xb}, @val={0x2c, 0x2, 0x0, 0x1, [@NFTA_EXTHDR_DREG={0x8}, @NFTA_EXTHDR_LEN={0x8}, @NFTA_EXTHDR_OFFSET={0x8}, @NFTA_EXTHDR_TYPE={0x5}, @NFTA_EXTHDR_FLAGS={0x8}]}}}]}], {0x14, 0x10}}, 0xc0}}, 0x0) [ 169.034017][T10643] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 169.148249][T10653] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 12:52:56 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @rand_addr=0x40}]}, &(0x7f0000000180)=0x10) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x7d, &(0x7f0000000100)=@sack_info={r3}, 0xc) 12:52:56 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r1, &(0x7f0000004bc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3fffffffffffe9e, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) sendmmsg(r3, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x851) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000f5dfe4), 0x1c) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000080)=0x10, 0x4) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYRESHEX=r2, @ANYRESDEC=r4], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) write(r5, 0x0, 0x0) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r6, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r6, &(0x7f0000000100)=ANY=[], 0x6) recvmmsg(r6, &(0x7f0000000600), 0x204083acb88ff8b, 0x2, 0x0) 12:52:56 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005072a369fb10000000005000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000024001d0f00"/20, @ANYRES32=r4, @ANYBLOB="00000000f1ffffff000000000b00010064736d61726b00000c0002000600010008"], 0x3c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=@newtfilter={0x24, 0x2a, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x24}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x0, &(0x7f0000000100)}], 0x464eb69030a5456, 0x0) [ 169.417991][T10692] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 12:52:56 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x78, 0x9, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2}, @NFTA_SET_EXPR={0x3c, 0x11, 0x0, 0x1, @exthdr={{0xb}, @val={0x2c, 0x2, 0x0, 0x1, [@NFTA_EXTHDR_DREG={0x8}, @NFTA_EXTHDR_LEN={0x8}, @NFTA_EXTHDR_OFFSET={0x8}, @NFTA_EXTHDR_TYPE={0x5}, @NFTA_EXTHDR_FLAGS={0x8}]}}}]}], {0x14, 0x10}}, 0xc0}}, 0x0) 12:52:56 executing program 3: r0 = socket(0x1000000010, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x40}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000400ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x24, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x5, 0x4}}}, 0x24}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 12:52:56 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @rand_addr=0x40}]}, &(0x7f0000000180)=0x10) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x7d, &(0x7f0000000100)=@sack_info={r3}, 0xc) 12:52:56 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005072a369fb10000000005000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000024001d0f00"/20, @ANYRES32=r4, @ANYBLOB="00000000f1ffffff000000000b00010064736d61726b00000c0002000600010008"], 0x3c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=@newtfilter={0x24, 0x2a, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x24}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x0, &(0x7f0000000100)}], 0x464eb69030a5456, 0x0) 12:52:56 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005072a369fb10000000005000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000024001d0f00"/20, @ANYRES32=r4, @ANYBLOB="00000000f1ffffff000000000b00010064736d61726b00000c0002000600010008"], 0x3c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=@newtfilter={0x24, 0x2a, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x24}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x0, &(0x7f0000000100)}], 0x464eb69030a5456, 0x0) 12:52:57 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @rand_addr=0x40}]}, &(0x7f0000000180)=0x10) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x7d, &(0x7f0000000100)=@sack_info={r3}, 0xc) 12:52:57 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x78, 0x9, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2}, @NFTA_SET_EXPR={0x3c, 0x11, 0x0, 0x1, @exthdr={{0xb}, @val={0x2c, 0x2, 0x0, 0x1, [@NFTA_EXTHDR_DREG={0x8}, @NFTA_EXTHDR_LEN={0x8}, @NFTA_EXTHDR_OFFSET={0x8}, @NFTA_EXTHDR_TYPE={0x5}, @NFTA_EXTHDR_FLAGS={0x8}]}}}]}], {0x14, 0x10}}, 0xc0}}, 0x0) 12:52:57 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x0, 0x0) 12:52:57 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x78, 0x9, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2}, @NFTA_SET_EXPR={0x3c, 0x11, 0x0, 0x1, @exthdr={{0xb}, @val={0x2c, 0x2, 0x0, 0x1, [@NFTA_EXTHDR_DREG={0x8}, @NFTA_EXTHDR_LEN={0x8}, @NFTA_EXTHDR_OFFSET={0x8}, @NFTA_EXTHDR_TYPE={0x5}, @NFTA_EXTHDR_FLAGS={0x8}]}}}]}], {0x14, 0x10}}, 0xc0}}, 0x0) 12:52:57 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @rand_addr=0x40}]}, &(0x7f0000000180)=0x10) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x7d, &(0x7f0000000100)=@sack_info={r3}, 0xc) 12:52:57 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000440), r1) sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="01022c2a7000fedbdf2502000000080001"], 0x1c}}, 0x0) 12:52:57 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005072a369fb10000000005000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000024001d0f00"/20, @ANYRES32=r4, @ANYBLOB="00000000f1ffffff000000000b00010064736d61726b00000c0002000600010008"], 0x3c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=@newtfilter={0x24, 0x2a, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x24}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x0, &(0x7f0000000100)}], 0x464eb69030a5456, 0x0) 12:52:57 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005072a369fb10000000005000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000024001d0f00"/20, @ANYRES32=r4, @ANYBLOB="00000000f1ffffff000000000b00010064736d61726b00000c0002000600010008"], 0x3c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=@newtfilter={0x24, 0x2a, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x24}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x0, &(0x7f0000000100)}], 0x464eb69030a5456, 0x0) 12:52:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@typedef={0x1, 0x0, 0x0, 0x8, 0x2}, @union={0x0, 0x0, 0x0, 0xd}]}, {0x0, [0x61]}}, &(0x7f0000000180)=""/143, 0x33, 0x8f, 0x1}, 0x20) 12:52:57 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000004c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f0000000100)={0x2c, r1, 0xe21, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_TX_RATES={0x10, 0x5a, 0x0, 0x1, [@NL80211_BAND_5GHZ={0xc, 0x1, 0x0, 0x1, [@NL80211_TXRATE_HT={0x6, 0x2, [{}, {}]}]}]}]}, 0x2c}}, 0x0) 12:52:57 executing program 0: r0 = socket$inet6(0x10, 0x108000000003, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="5500000019007faf37c0f2b2a4a280930a000310000243dc900523693900090010000000010000000800050000000e00080000000004d5440a009b84136ef75afb83de448daa7227c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 12:52:57 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'syztnl1\x00', 0x0}) 12:52:57 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x2, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xad}]}, &(0x7f0000000040)='GPL\x00', 0x5, 0xb6, &(0x7f0000000080)=""/182, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 12:52:57 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000004c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f0000000100)={0x2c, r1, 0xe21, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_TX_RATES={0x10, 0x5a, 0x0, 0x1, [@NL80211_BAND_5GHZ={0xc, 0x1, 0x0, 0x1, [@NL80211_TXRATE_HT={0x6, 0x2, [{}, {}]}]}]}]}, 0x2c}}, 0x0) 12:52:58 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005072a369fb10000000005000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000024001d0f00"/20, @ANYRES32=r4, @ANYBLOB="00000000f1ffffff000000000b00010064736d61726b00000c0002000600010008"], 0x3c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=@newtfilter={0x24, 0x2a, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x24}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x0, &(0x7f0000000100)}], 0x464eb69030a5456, 0x0) 12:52:58 executing program 0: r0 = socket$inet6(0x10, 0x108000000003, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="5500000019007faf37c0f2b2a4a280930a000310000243dc900523693900090010000000010000000800050000000e00080000000004d5440a009b84136ef75afb83de448daa7227c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 12:52:58 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x5}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 12:52:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000004c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f0000000100)={0x2c, r1, 0xe21, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_TX_RATES={0x10, 0x5a, 0x0, 0x1, [@NL80211_BAND_5GHZ={0xc, 0x1, 0x0, 0x1, [@NL80211_TXRATE_HT={0x6, 0x2, [{}, {}]}]}]}]}, 0x2c}}, 0x0) 12:52:58 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="0209000002"], 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203060910"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400008a, 0x0) 12:52:58 executing program 0: r0 = socket$inet6(0x10, 0x108000000003, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="5500000019007faf37c0f2b2a4a280930a000310000243dc900523693900090010000000010000000800050000000e00080000000004d5440a009b84136ef75afb83de448daa7227c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 12:52:58 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x2, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xad}]}, &(0x7f0000000040)='GPL\x00', 0x5, 0xb6, &(0x7f0000000080)=""/182, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 12:52:58 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TUNSETNOCSUM(r0, 0x400454ca, 0x400000) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x0, 0x1, 0x9, 0x9}, {0x1ff, 0x9, 0x8, 0x2}, {0xb000, 0x3f, 0x40, 0xffffffc0}]}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_ACTOR_SYSTEM={0x8, 0x1a, @remote}]}}}]}, 0x3c}}, 0x0) pread64(r4, &(0x7f00000002c0)=""/69, 0x45, 0xd9af) r5 = socket$inet6(0xa, 0x3, 0x5) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg$inet6(r5, &(0x7f0000000580)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) readv(r5, &(0x7f0000000140)=[{&(0x7f0000000280)=""/128, 0x80}], 0x1) write$binfmt_misc(r3, &(0x7f00000001c0)=ANY=[@ANYRES32=r5, @ANYRESHEX=r5], 0xfffffecc) ioctl$TUNSETLINK(r3, 0x400454cd, 0xfffe) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000200)=@newlink={0x68, 0x10, 0x503, 0x0, 0x29d24, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1428}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x28, 0x2, 0x0, 0x1, [@IFLA_MACSEC_PROTECT={0x5}, @IFLA_MACSEC_PORT={0x6}, @IFLA_MACSEC_SCI={0xc}, @IFLA_MACSEC_REPLAY_PROTECT={0xfffffffffffffe4e, 0xc, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x68}}, 0x0) 12:52:58 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x5}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 12:52:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000004c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f0000000100)={0x2c, r1, 0xe21, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_TX_RATES={0x10, 0x5a, 0x0, 0x1, [@NL80211_BAND_5GHZ={0xc, 0x1, 0x0, 0x1, [@NL80211_TXRATE_HT={0x6, 0x2, [{}, {}]}]}]}]}, 0x2c}}, 0x0) 12:52:58 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x5}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 12:52:58 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x2, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xad}]}, &(0x7f0000000040)='GPL\x00', 0x5, 0xb6, &(0x7f0000000080)=""/182, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 12:52:58 executing program 0: r0 = socket$inet6(0x10, 0x108000000003, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="5500000019007faf37c0f2b2a4a280930a000310000243dc900523693900090010000000010000000800050000000e00080000000004d5440a009b84136ef75afb83de448daa7227c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 12:52:58 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x5}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 12:52:58 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x5}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 12:52:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20004}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x8c10, &(0x7f0000000240)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x205}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 12:52:58 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x5}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 12:52:58 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x2, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xad}]}, &(0x7f0000000040)='GPL\x00', 0x5, 0xb6, &(0x7f0000000080)=""/182, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 12:52:58 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x5}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 193.931961][ T1358] ieee802154 phy0 wpan0: encryption failed: -22 [ 193.938309][ T1358] ieee802154 phy1 wpan1: encryption failed: -22 [ 221.598671][ T9329] Bluetooth: hci4: command 0x0406 tx timeout [ 221.604743][ T9329] Bluetooth: hci2: command 0x0406 tx timeout [ 221.608900][ T9726] Bluetooth: hci0: command 0x0406 tx timeout [ 221.617831][ T9726] Bluetooth: hci3: command 0x0406 tx timeout [ 236.966399][ T7817] Bluetooth: hci5: command 0x0406 tx timeout [ 247.194986][ T7817] Bluetooth: hci1: command 0x0406 tx timeout [ 255.356147][ T1358] ieee802154 phy0 wpan0: encryption failed: -22 [ 255.362439][ T1358] ieee802154 phy1 wpan1: encryption failed: -22 [ 316.788614][ T27] INFO: task syz-executor.4:10849 blocked for more than 143 seconds. [ 316.790952][ T1358] ieee802154 phy0 wpan0: encryption failed: -22 [ 316.796933][ T27] Not tainted 5.15.0-rc5-syzkaller #0 [ 316.803423][ T1358] ieee802154 phy1 wpan1: encryption failed: -22 [ 316.837415][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 316.848805][ T27] task:syz-executor.4 state:D stack:28152 pid:10849 ppid: 6566 flags:0x00000004 [ 316.858041][ T27] Call Trace: [ 316.867970][ T27] __schedule+0xb44/0x5960 [ 316.875897][ T27] ? find_held_lock+0x2d/0x110 [ 316.888202][ T27] ? __mutex_lock+0x9c0/0x12f0 [ 316.893090][ T27] ? io_schedule_timeout+0x140/0x140 [ 316.905085][ T27] schedule+0xd3/0x270 [ 316.909254][ T27] schedule_preempt_disabled+0xf/0x20 [ 316.914638][ T27] __mutex_lock+0xa34/0x12f0 [ 316.922870][ T27] ? tun_chr_close+0x3a/0x180 [ 316.927646][ T27] ? mutex_lock_io_nested+0x1150/0x1150 [ 316.933278][ T27] ? fcntl_setlk+0xd50/0xd50 [ 316.937971][ T27] tun_chr_close+0x3a/0x180 [ 316.951641][ T27] __fput+0x288/0x9f0 [ 316.971956][ T27] ? __tun_detach+0x13d0/0x13d0 [ 316.976850][ T27] task_work_run+0xdd/0x1a0 [ 316.988194][ T27] exit_to_user_mode_prepare+0x27e/0x290 [ 316.993909][ T27] syscall_exit_to_user_mode+0x19/0x60 [ 316.999695][ T27] do_syscall_64+0x42/0xb0 [ 317.004130][ T27] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 317.011831][ T27] RIP: 0033:0x7f6bedd4c67b [ 317.016258][ T27] RSP: 002b:00007ffdd2510fa0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 317.027214][ T27] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 00007f6bedd4c67b [ 317.037422][ T27] RDX: 0000001b2d12b984 RSI: ffffffff8135b322 RDI: 0000000000000003 [ 317.047489][ T27] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000001b2d12b744 [ 317.061609][ T27] R10: 0000000000001497 R11: 0000000000000293 R12: 00007f6bede9db60 [ 317.070360][ T27] R13: 00007f6bede9db60 R14: 00007f6bede9cf60 R15: 0000000000029cc7 [ 317.078819][ T27] ? __cpu_to_node+0x82/0xb0 [ 317.083556][ T27] INFO: task syz-executor.0:10876 blocked for more than 143 seconds. [ 317.092187][ T27] Not tainted 5.15.0-rc5-syzkaller #0 [ 317.098293][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 317.107054][ T27] task:syz-executor.0 state:D stack:28272 pid:10876 ppid: 6542 flags:0x00004004 [ 317.116731][ T27] Call Trace: [ 317.120455][ T27] __schedule+0xb44/0x5960 [ 317.124892][ T27] ? find_held_lock+0x2d/0x110 [ 317.130569][ T27] ? __mutex_lock+0x9c0/0x12f0 [ 317.135358][ T27] ? io_schedule_timeout+0x140/0x140 [ 317.141218][ T27] schedule+0xd3/0x270 [ 317.145308][ T27] schedule_preempt_disabled+0xf/0x20 [ 317.151235][ T27] __mutex_lock+0xa34/0x12f0 [ 317.155854][ T27] ? rtnetlink_rcv_msg+0x3be/0xb80 [ 317.161641][ T27] ? mutex_lock_io_nested+0x1150/0x1150 [ 317.167215][ T27] ? rtnetlink_rcv_msg+0x388/0xb80 [ 317.173761][ T27] rtnetlink_rcv_msg+0x3be/0xb80 [ 317.182029][ T27] ? rtnl_newlink+0xa0/0xa0 [ 317.186582][ T27] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 317.192430][ T27] netlink_rcv_skb+0x153/0x420 [ 317.197278][ T27] ? rtnl_newlink+0xa0/0xa0 [ 317.202450][ T27] ? netlink_ack+0xa60/0xa60 [ 317.207052][ T27] ? netlink_deliver_tap+0x1a2/0xc30 [ 317.212536][ T27] ? netlink_deliver_tap+0x1b1/0xc30 [ 317.217867][ T27] netlink_unicast+0x533/0x7d0 [ 317.223009][ T27] ? netlink_attachskb+0x880/0x880 [ 317.229049][ T27] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 317.235373][ T27] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 317.241725][ T27] ? __phys_addr_symbol+0x2c/0x70 [ 317.246806][ T27] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 317.252789][ T27] ? __check_object_size+0x16e/0x3f0 [ 317.258286][ T27] netlink_sendmsg+0x86d/0xda0 [ 317.263066][ T27] ? netlink_unicast+0x7d0/0x7d0 [ 317.268000][ T27] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 317.275175][ T27] ? netlink_unicast+0x7d0/0x7d0 [ 317.280193][ T27] sock_sendmsg+0xcf/0x120 [ 317.284707][ T27] ____sys_sendmsg+0x6e8/0x810 [ 317.293938][ T27] ? kernel_sendmsg+0x50/0x50 [ 317.298734][ T27] ? do_recvmmsg+0x6d0/0x6d0 [ 317.303332][ T27] ? lock_chain_count+0x20/0x20 [ 317.308381][ T27] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 317.314393][ T27] ___sys_sendmsg+0xf3/0x170 [ 317.319137][ T27] ? sendmsg_copy_msghdr+0x160/0x160 [ 317.324438][ T27] ? __fget_files+0x21b/0x3e0 [ 317.329422][ T27] ? lock_downgrade+0x6e0/0x6e0 [ 317.334770][ T27] ? __fget_files+0x23d/0x3e0 [ 317.339552][ T27] ? __fget_light+0xea/0x280 [ 317.344165][ T27] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 317.350782][ T27] __sys_sendmsg+0xe5/0x1b0 [ 317.355313][ T27] ? __sys_sendmsg_sock+0x30/0x30 [ 317.360479][ T27] ? syscall_enter_from_user_mode+0x21/0x70 [ 317.366389][ T27] do_syscall_64+0x35/0xb0 [ 317.371005][ T27] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 317.376907][ T27] RIP: 0033:0x7f27899cfa39 [ 317.382092][ T27] RSP: 002b:00007f2786f24188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 317.390704][ T27] RAX: ffffffffffffffda RBX: 00007f2789ad3020 RCX: 00007f27899cfa39 [ 317.401195][ T27] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000004 [ 317.413007][ T27] RBP: 00007f2789a29c5f R08: 0000000000000000 R09: 0000000000000000 [ 317.423095][ T27] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 317.435927][ T27] R13: 00007fffd597911f R14: 00007f2786f24300 R15: 0000000000022000 [ 317.446027][ T27] INFO: task syz-executor.0:10888 blocked for more than 144 seconds. [ 317.455960][ T27] Not tainted 5.15.0-rc5-syzkaller #0 [ 317.462374][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 317.471613][ T27] task:syz-executor.0 state:D stack:27552 pid:10888 ppid: 6542 flags:0x00000004 [ 317.481727][ T27] Call Trace: [ 317.485030][ T27] __schedule+0xb44/0x5960 [ 317.490749][ T27] ? find_held_lock+0x2d/0x110 [ 317.495529][ T27] ? __mutex_lock+0x9c0/0x12f0 [ 317.501479][ T27] ? io_schedule_timeout+0x140/0x140 [ 317.506797][ T27] schedule+0xd3/0x270 [ 317.511886][ T27] schedule_preempt_disabled+0xf/0x20 [ 317.517368][ T27] __mutex_lock+0xa34/0x12f0 [ 317.522628][ T27] ? rtnetlink_rcv_msg+0x3be/0xb80 [ 317.527762][ T27] ? mutex_lock_io_nested+0x1150/0x1150 [ 317.534172][ T27] ? rtnetlink_rcv_msg+0x388/0xb80 [ 317.540955][ T27] rtnetlink_rcv_msg+0x3be/0xb80 [ 317.545926][ T27] ? rtnl_newlink+0xa0/0xa0 [ 317.551326][ T27] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 317.556647][ T27] netlink_rcv_skb+0x153/0x420 [ 317.562833][ T27] ? rtnl_newlink+0xa0/0xa0 [ 317.567354][ T27] ? netlink_ack+0xa60/0xa60 [ 317.572942][ T27] ? netlink_deliver_tap+0x1a2/0xc30 [ 317.578578][ T27] ? netlink_deliver_tap+0x1b1/0xc30 [ 317.583895][ T27] netlink_unicast+0x533/0x7d0 [ 317.589311][ T27] ? netlink_attachskb+0x880/0x880 [ 317.594441][ T27] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 317.601710][ T27] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 317.607982][ T27] ? __phys_addr_symbol+0x2c/0x70 [ 317.613526][ T27] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 317.622215][ T27] ? __check_object_size+0x16e/0x3f0 [ 317.627527][ T27] netlink_sendmsg+0x86d/0xda0 [ 317.632661][ T27] ? netlink_unicast+0x7d0/0x7d0 [ 317.637680][ T27] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 317.645108][ T27] ? netlink_unicast+0x7d0/0x7d0 [ 317.651577][ T27] sock_sendmsg+0xcf/0x120 [ 317.656025][ T27] ____sys_sendmsg+0x6e8/0x810 [ 317.661830][ T27] ? kernel_sendmsg+0x50/0x50 [ 317.666538][ T27] ? do_recvmmsg+0x6d0/0x6d0 [ 317.672701][ T27] ? lock_chain_count+0x20/0x20 [ 317.677578][ T27] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 317.684955][ T27] ___sys_sendmsg+0xf3/0x170 [ 317.690126][ T27] ? sendmsg_copy_msghdr+0x160/0x160 [ 317.695424][ T27] ? __fget_files+0x21b/0x3e0 [ 317.700475][ T27] ? lock_downgrade+0x6e0/0x6e0 [ 317.705356][ T27] ? __fget_files+0x23d/0x3e0 [ 317.710670][ T27] ? __fget_light+0xea/0x280 [ 317.715284][ T27] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 317.722587][ T27] __sys_sendmsg+0xe5/0x1b0 [ 317.727109][ T27] ? __sys_sendmsg_sock+0x30/0x30 [ 317.732540][ T27] ? syscall_enter_from_user_mode+0x21/0x70 [ 317.738861][ T27] do_syscall_64+0x35/0xb0 [ 317.743863][ T27] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 317.751410][ T27] RIP: 0033:0x7f27899cfa39 [ 317.755837][ T27] RSP: 002b:00007f2786f03188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 317.765176][ T27] RAX: ffffffffffffffda RBX: 00007f2789ad30e0 RCX: 00007f27899cfa39 [ 317.774071][ T27] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 317.782830][ T27] RBP: 00007f2789a29c5f R08: 0000000000000000 R09: 0000000000000000 [ 317.791804][ T27] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 317.800878][ T27] R13: 00007fffd597911f R14: 00007f2786f03300 R15: 0000000000022000 [ 317.809699][ T27] INFO: task syz-executor.0:10890 blocked for more than 144 seconds. [ 317.817807][ T27] Not tainted 5.15.0-rc5-syzkaller #0 [ 317.824600][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 317.833490][ T27] task:syz-executor.0 state:D stack:27904 pid:10890 ppid: 6542 flags:0x00004004 [ 317.843755][ T27] Call Trace: [ 317.847082][ T27] __schedule+0xb44/0x5960 [ 317.852949][ T27] ? find_held_lock+0x2d/0x110 [ 317.857733][ T27] ? __mutex_lock+0x9c0/0x12f0 [ 317.863903][ T27] ? io_schedule_timeout+0x140/0x140 [ 317.870771][ T27] schedule+0xd3/0x270 [ 317.875864][ T27] schedule_preempt_disabled+0xf/0x20 [ 317.883894][ T27] __mutex_lock+0xa34/0x12f0 [ 317.889152][ T27] ? rtnetlink_rcv_msg+0x3be/0xb80 [ 317.894269][ T27] ? mutex_lock_io_nested+0x1150/0x1150 [ 317.900899][ T27] ? rtnetlink_rcv_msg+0x388/0xb80 [ 317.906149][ T27] rtnetlink_rcv_msg+0x3be/0xb80 [ 317.914769][ T27] ? rtnl_newlink+0xa0/0xa0 [ 317.922477][ T27] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 317.927800][ T27] netlink_rcv_skb+0x153/0x420 [ 317.933479][ T27] ? rtnl_newlink+0xa0/0xa0 [ 317.937988][ T27] ? netlink_ack+0xa60/0xa60 [ 317.943007][ T27] ? netlink_deliver_tap+0x1a2/0xc30 [ 317.949129][ T27] ? netlink_deliver_tap+0x1b1/0xc30 [ 317.954448][ T27] netlink_unicast+0x533/0x7d0 [ 317.962101][ T27] ? netlink_attachskb+0x880/0x880 [ 317.967245][ T27] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 317.978293][ T27] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 317.984598][ T27] ? __phys_addr_symbol+0x2c/0x70 [ 317.989855][ T27] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 317.995666][ T27] ? __check_object_size+0x16e/0x3f0 [ 318.001132][ T27] netlink_sendmsg+0x86d/0xda0 [ 318.005911][ T27] ? netlink_unicast+0x7d0/0x7d0 [ 318.010960][ T27] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 318.017254][ T27] ? netlink_unicast+0x7d0/0x7d0 [ 318.022357][ T27] sock_sendmsg+0xcf/0x120 [ 318.026807][ T27] ____sys_sendmsg+0x6e8/0x810 [ 318.031678][ T27] ? kernel_sendmsg+0x50/0x50 [ 318.036395][ T27] ? do_recvmmsg+0x6d0/0x6d0 [ 318.041905][ T27] ? lock_chain_count+0x20/0x20 [ 318.046781][ T27] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 318.053306][ T27] ___sys_sendmsg+0xf3/0x170 [ 318.057913][ T27] ? sendmsg_copy_msghdr+0x160/0x160 [ 318.063378][ T27] ? __fget_files+0x21b/0x3e0 [ 318.068470][ T27] ? lock_downgrade+0x6e0/0x6e0 [ 318.073347][ T27] ? __fget_files+0x23d/0x3e0 [ 318.082610][ T27] ? __fget_light+0xea/0x280 [ 318.087412][ T27] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 318.093735][ T27] __sys_sendmsg+0xe5/0x1b0 [ 318.098472][ T27] ? __sys_sendmsg_sock+0x30/0x30 [ 318.103589][ T27] ? syscall_enter_from_user_mode+0x21/0x70 [ 318.109608][ T27] do_syscall_64+0x35/0xb0 [ 318.114240][ T27] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 318.120340][ T27] RIP: 0033:0x7f27899cfa39 [ 318.124763][ T27] RSP: 002b:00007f2786ec1188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 318.133413][ T27] RAX: ffffffffffffffda RBX: 00007f2789ad3260 RCX: 00007f27899cfa39 [ 318.141715][ T27] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000004 [ 318.151084][ T27] RBP: 00007f2789a29c5f R08: 0000000000000000 R09: 0000000000000000 [ 318.159297][ T27] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 318.167292][ T27] R13: 00007fffd597911f R14: 00007f2786ec1300 R15: 0000000000022000 [ 318.175449][ T27] [ 318.175449][ T27] Showing all locks held in the system: [ 318.183391][ T27] 1 lock held by khungtaskd/27: [ 318.190563][ T27] #0: ffffffff8b981ee0 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 [ 318.200854][ T27] 3 locks held by kworker/0:2/1052: [ 318.206063][ T27] #0: ffff888010c65d38 ((wq_completion)events_power_efficient){+.+.}-{0:0}, at: process_one_work+0x8a3/0x16b0 [ 318.218009][ T27] #1: ffffc900046efdb0 ((reg_check_chans).work){+.+.}-{0:0}, at: process_one_work+0x8d7/0x16b0 [ 318.229169][ T27] #2: ffffffff8d0e8ea8 (rtnl_mutex){+.+.}-{3:3}, at: reg_check_chans_work+0x83/0xe10 [ 318.239160][ T27] 3 locks held by kworker/1:3/2950: [ 318.244365][ T27] #0: ffff888147d8ad38 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x8a3/0x16b0 [ 318.256119][ T27] #1: ffffc90002b8fdb0 ((addr_chk_work).work){+.+.}-{0:0}, at: process_one_work+0x8d7/0x16b0 [ 318.267242][ T27] #2: ffffffff8d0e8ea8 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_verify_work+0xa/0x20 [ 318.277977][ T27] 1 lock held by in:imklog/6233: [ 318.283391][ T27] #0: ffff888013bd9270 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe9/0x100 [ 318.292769][ T27] 1 lock held by syz-executor.4/10849: [ 318.299013][ T27] #0: ffffffff8d0e8ea8 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3a/0x180 [ 318.310007][ T27] 1 lock held by syz-executor.0/10873: [ 318.315542][ T27] #0: ffffffff8d0e8ea8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x3be/0xb80 [ 318.325342][ T27] 1 lock held by syz-executor.0/10876: [ 318.331163][ T27] #0: ffffffff8d0e8ea8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x3be/0xb80 [ 318.341064][ T27] 1 lock held by syz-executor.0/10888: [ 318.346587][ T27] #0: ffffffff8d0e8ea8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x3be/0xb80 [ 318.356961][ T27] 1 lock held by syz-executor.0/10890: [ 318.362497][ T27] #0: ffffffff8d0e8ea8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x3be/0xb80 [ 318.372786][ T27] [ 318.375117][ T27] ============================================= [ 318.375117][ T27] [ 318.383679][ T27] NMI backtrace for cpu 0 [ 318.387996][ T27] CPU: 0 PID: 27 Comm: khungtaskd Not tainted 5.15.0-rc5-syzkaller #0 [ 318.396140][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.406273][ T27] Call Trace: [ 318.409544][ T27] dump_stack_lvl+0xcd/0x134 [ 318.414298][ T27] nmi_cpu_backtrace.cold+0x47/0x144 [ 318.419690][ T27] ? lapic_can_unplug_cpu+0x80/0x80 [ 318.424967][ T27] nmi_trigger_cpumask_backtrace+0x1ae/0x220 [ 318.430977][ T27] watchdog+0xc1d/0xf50 [ 318.435161][ T27] ? reset_hung_task_detector+0x30/0x30 [ 318.440711][ T27] kthread+0x3e5/0x4d0 [ 318.444822][ T27] ? set_kthread_struct+0x130/0x130 [ 318.450009][ T27] ret_from_fork+0x1f/0x30 [ 318.454735][ T27] Sending NMI from CPU 0 to CPUs 1: [ 318.460338][ C1] NMI backtrace for cpu 1 [ 318.460348][ C1] CPU: 1 PID: 2963 Comm: systemd-journal Not tainted 5.15.0-rc5-syzkaller #0 [ 318.460369][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.460379][ C1] RIP: 0010:generic_permission+0xf1/0x5b0 [ 318.460460][ C1] Code: e9 03 0f b6 0c 01 48 89 f8 83 e0 07 83 c0 03 38 c8 7c 08 84 c9 0f 85 01 03 00 00 45 8b 7f 2c 44 89 f7 44 89 fe e8 2f 93 aa ff <45> 39 fe 75 3d e8 f5 8a aa ff c1 eb 06 44 89 e0 f7 d3 83 e0 07 21 [ 318.460478][ C1] RSP: 0018:ffffc90002bafae0 EFLAGS: 00000246 [ 318.460493][ C1] RAX: 0000000000000000 RBX: 00000000000041ed RCX: 0000000000000000 [ 318.460505][ C1] RDX: 0000000000000000 RSI: ffff88807b773900 RDI: 0000000000000003 [ 318.460517][ C1] RBP: ffff88807ef93f58 R08: 0000000000000000 R09: 0000000000000000 [ 318.460529][ C1] R10: ffffffff81cc5a91 R11: 0000000000000000 R12: 0000000000000081 [ 318.460541][ C1] R13: ffffffff8b83fac0 R14: 0000000000000000 R15: 0000000000000000 [ 318.460554][ C1] FS: 00007f3238c578c0(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 [ 318.460573][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 318.460586][ C1] CR2: 00007f323608e000 CR3: 0000000023968000 CR4: 00000000003506e0 [ 318.460599][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 318.460610][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 318.460622][ C1] Call Trace: [ 318.460630][ C1] inode_permission.part.0+0x95/0x440 [ 318.460654][ C1] link_path_walk.part.0+0x277/0xd00 [ 318.460680][ C1] ? walk_component+0x6a0/0x6a0 [ 318.460702][ C1] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 318.460727][ C1] path_lookupat+0xc8/0x860 [ 318.460752][ C1] filename_lookup+0x1c6/0x590 [ 318.460775][ C1] ? may_linkat+0x2d0/0x2d0 [ 318.460800][ C1] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 318.460822][ C1] ? __check_object_size+0x16e/0x3f0 [ 318.460847][ C1] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 318.460869][ C1] ? strncpy_from_user+0x2a0/0x3e0 [ 318.460922][ C1] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 318.460944][ C1] ? getname_flags.part.0+0x1dd/0x4f0 [ 318.460966][ C1] ? projid_m_show+0x220/0x220 [ 318.461015][ C1] user_path_at_empty+0x42/0x60 [ 318.461039][ C1] do_faccessat+0x127/0x850 [ 318.461062][ C1] ? stream_open+0x60/0x60 [ 318.461084][ C1] ? __secure_computing+0x104/0x360 [ 318.461110][ C1] do_syscall_64+0x35/0xb0 [ 318.461131][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 318.461151][ C1] RIP: 0033:0x7f3237f129c7 [ 318.461166][ C1] Code: 83 c4 08 48 3d 01 f0 ff ff 73 01 c3 48 8b 0d c8 d4 2b 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 b8 15 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d a1 d4 2b 00 f7 d8 64 89 01 48 [ 318.461183][ C1] RSP: 002b:00007ffe57519568 EFLAGS: 00000246 ORIG_RAX: 0000000000000015 [ 318.461201][ C1] RAX: ffffffffffffffda RBX: 00007ffe5751c590 RCX: 00007f3237f129c7 [ 318.461214][ C1] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000055a4295099a3 [ 318.461232][ C1] RBP: 00007ffe575196b0 R08: 000055a4294ff3e5 R09: 0000000000000018 [ 318.461245][ C1] R10: 0000000000000069 R11: 0000000000000246 R12: 0000000000000000 [ 318.461256][ C1] R13: 0000000000000000 R14: 000055a42b09f8a0 R15: 00007ffe57519ba0 [ 318.464868][ T27] Kernel panic - not syncing: hung_task: blocked tasks [ 318.784125][ T27] CPU: 0 PID: 27 Comm: khungtaskd Not tainted 5.15.0-rc5-syzkaller #0 [ 318.792281][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.802511][ T27] Call Trace: [ 318.805960][ T27] dump_stack_lvl+0xcd/0x134 [ 318.810558][ T27] panic+0x2b0/0x6dd [ 318.815100][ T27] ? __warn_printk+0xf3/0xf3 [ 318.819808][ T27] ? lapic_can_unplug_cpu+0x80/0x80 [ 318.825033][ T27] ? preempt_schedule_thunk+0x16/0x18 [ 318.830413][ T27] ? nmi_trigger_cpumask_backtrace+0x191/0x220 [ 318.836581][ T27] ? watchdog.cold+0x130/0x158 [ 318.841412][ T27] watchdog.cold+0x141/0x158 [ 318.846093][ T27] ? reset_hung_task_detector+0x30/0x30 [ 318.851645][ T27] kthread+0x3e5/0x4d0 [ 318.855719][ T27] ? set_kthread_struct+0x130/0x130 [ 318.861002][ T27] ret_from_fork+0x1f/0x30 [ 318.865849][ T27] Kernel Offset: disabled [ 318.870172][ T27] Rebooting in 86400 seconds..