[ OK ] Started Getty on tty2. [ OK ] Started Getty on tty1. [ OK ] Started Serial Getty on ttyS0. [ OK ] Reached target Login Prompts. Starting Load/Save RF Kill Switch Status... [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Load/Save RF Kill Switch Status. [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.3' (ECDSA) to the list of known hosts. 2020/05/23 06:59:06 fuzzer started 2020/05/23 06:59:07 dialing manager at 10.128.0.26:38661 2020/05/23 06:59:07 syscalls: 3055 2020/05/23 06:59:07 code coverage: enabled 2020/05/23 06:59:07 comparison tracing: enabled 2020/05/23 06:59:07 extra coverage: enabled 2020/05/23 06:59:07 setuid sandbox: enabled 2020/05/23 06:59:07 namespace sandbox: enabled 2020/05/23 06:59:07 Android sandbox: /sys/fs/selinux/policy does not exist 2020/05/23 06:59:07 fault injection: enabled 2020/05/23 06:59:07 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/05/23 06:59:07 net packet injection: enabled 2020/05/23 06:59:07 net device setup: enabled 2020/05/23 06:59:07 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/05/23 06:59:07 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/05/23 06:59:07 USB emulation: enabled 07:01:01 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="665f07000005eb3014203873bc3376", 0xf}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) syzkaller login: [ 175.826658][ T6838] IPVS: ftp: loaded support on port[0] = 21 07:01:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/62, 0x3e}, {0x0}], 0x2}}], 0x2, 0x0, 0x0) [ 176.023767][ T6838] chnl_net:caif_netlink_parms(): no params data found [ 176.167959][ T6838] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.191503][ T6838] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.199357][ T6838] device bridge_slave_0 entered promiscuous mode 07:01:02 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) ioctl$SIOCSIFHWADDR(r1, 0x8937, &(0x7f0000000000)={'veth0_vlan\x00', @random="01003a1e2410"}) [ 176.224044][ T6838] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.231850][ T6957] IPVS: ftp: loaded support on port[0] = 21 [ 176.242866][ T6838] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.256536][ T6838] device bridge_slave_1 entered promiscuous mode [ 176.327232][ T6838] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 176.366245][ T6838] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 176.445547][ T7004] IPVS: ftp: loaded support on port[0] = 21 [ 176.466218][ T6838] team0: Port device team_slave_0 added [ 176.548650][ T6838] team0: Port device team_slave_1 added [ 176.594623][ T6957] chnl_net:caif_netlink_parms(): no params data found [ 176.606808][ T6838] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 176.615641][ T6838] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 176.643757][ T6838] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 176.682309][ T6838] batman_adv: batadv0: Adding interface: batadv_slave_1 07:01:02 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003b80)=[{{0x0, 0x0, &(0x7f00000003c0)=[{0x0}], 0x1}}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) [ 176.689346][ T6838] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 176.725820][ T6838] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 176.845335][ T6838] device hsr_slave_0 entered promiscuous mode [ 176.912849][ T6838] device hsr_slave_1 entered promiscuous mode 07:01:02 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="665f07000005eb3014203873bc33760036f300000000007dc0c6b18f7f80", 0x1e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 177.011046][ T7142] IPVS: ftp: loaded support on port[0] = 21 [ 177.073970][ T6957] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.081146][ T6957] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.094410][ T6957] device bridge_slave_0 entered promiscuous mode [ 177.156405][ T6957] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.171492][ T6957] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.179640][ T6957] device bridge_slave_1 entered promiscuous mode [ 177.282698][ T6957] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 177.294854][ T6957] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 177.310363][ T7004] chnl_net:caif_netlink_parms(): no params data found [ 177.355332][ T7261] IPVS: ftp: loaded support on port[0] = 21 [ 177.405763][ T6957] team0: Port device team_slave_0 added [ 177.426519][ T6957] team0: Port device team_slave_1 added 07:01:03 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$alg(0x26, 0x5, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0xffffffffffffff81}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x4000000000003bb, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pselect6(0x40, &(0x7f0000000100), 0x0, &(0x7f0000000140)={0x5b3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0) [ 177.543004][ T6957] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 177.549995][ T6957] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 177.577932][ T6957] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 177.610449][ T6957] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 177.627478][ T6957] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 177.657615][ T6957] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 177.726957][ T7004] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.745092][ T7004] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.754842][ T7004] device bridge_slave_0 entered promiscuous mode [ 177.767673][ T7004] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.774812][ T7004] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.788520][ T7004] device bridge_slave_1 entered promiscuous mode [ 177.898045][ T6838] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 177.977773][ T6838] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 178.026141][ T6838] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 178.123720][ T6957] device hsr_slave_0 entered promiscuous mode [ 178.172100][ T6957] device hsr_slave_1 entered promiscuous mode [ 178.231927][ T6957] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 178.239981][ T6957] Cannot create hsr debugfs directory [ 178.249296][ T7004] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 178.263070][ T7004] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 178.283988][ T6838] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 178.356102][ T7372] IPVS: ftp: loaded support on port[0] = 21 [ 178.356236][ T7142] chnl_net:caif_netlink_parms(): no params data found [ 178.423332][ T7004] team0: Port device team_slave_0 added [ 178.457475][ T7004] team0: Port device team_slave_1 added [ 178.584239][ T7004] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 178.591250][ T7004] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 178.619797][ T7004] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 178.652437][ T7142] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.659546][ T7142] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.670555][ T7142] device bridge_slave_0 entered promiscuous mode [ 178.688355][ T7004] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 178.698373][ T7004] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 178.726293][ T7004] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 178.746986][ T7142] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.754836][ T7142] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.764530][ T7142] device bridge_slave_1 entered promiscuous mode [ 178.808395][ T7142] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 178.835996][ T7261] chnl_net:caif_netlink_parms(): no params data found [ 178.860265][ T7142] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 178.915392][ T7004] device hsr_slave_0 entered promiscuous mode [ 178.971908][ T7004] device hsr_slave_1 entered promiscuous mode [ 179.011569][ T7004] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 179.019137][ T7004] Cannot create hsr debugfs directory [ 179.110579][ T7142] team0: Port device team_slave_0 added [ 179.164985][ T7142] team0: Port device team_slave_1 added [ 179.274046][ T6838] 8021q: adding VLAN 0 to HW filter on device bond0 [ 179.296213][ T7142] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 179.307942][ T7142] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 179.334711][ T7142] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 179.346239][ T7261] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.354455][ T7261] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.367925][ T7261] device bridge_slave_0 entered promiscuous mode [ 179.395879][ T7142] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 179.406153][ T7142] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 179.432609][ T7142] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 179.447911][ T7261] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.455138][ T7261] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.463802][ T7261] device bridge_slave_1 entered promiscuous mode [ 179.474961][ T7372] chnl_net:caif_netlink_parms(): no params data found [ 179.494470][ T6957] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 179.534058][ T6957] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 179.598937][ T6957] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 179.667231][ T6957] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 179.776734][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 179.786089][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 179.823293][ T7261] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 179.838958][ T7261] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 179.862830][ T7372] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.869998][ T7372] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.878935][ T7372] device bridge_slave_0 entered promiscuous mode [ 179.889822][ T6838] 8021q: adding VLAN 0 to HW filter on device team0 [ 179.925208][ T7261] team0: Port device team_slave_0 added [ 179.976133][ T7142] device hsr_slave_0 entered promiscuous mode [ 180.034273][ T7142] device hsr_slave_1 entered promiscuous mode [ 180.085165][ T7142] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 180.092962][ T7142] Cannot create hsr debugfs directory [ 180.098656][ T7372] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.106470][ T7372] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.114710][ T7372] device bridge_slave_1 entered promiscuous mode [ 180.135949][ T7261] team0: Port device team_slave_1 added [ 180.158093][ T7004] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 180.231152][ T7004] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 180.313648][ T7372] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 180.330175][ T7004] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 180.360891][ T7004] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 180.438945][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 180.447604][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 180.456476][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.463822][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 180.474488][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 180.498355][ T7372] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 180.510179][ T7261] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 180.520337][ T7261] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 180.547204][ T7261] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 180.573185][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 180.589836][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 180.599049][ T3103] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.606197][ T3103] bridge0: port 2(bridge_slave_1) entered forwarding state [ 180.623804][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 180.660661][ T7261] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 180.669903][ T7261] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 180.698770][ T7261] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 180.724652][ T7372] team0: Port device team_slave_0 added [ 180.749498][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 180.779961][ T7372] team0: Port device team_slave_1 added [ 180.810088][ T7372] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 180.819630][ T7372] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 180.847489][ T7372] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 180.929512][ T7261] device hsr_slave_0 entered promiscuous mode [ 180.982256][ T7261] device hsr_slave_1 entered promiscuous mode [ 181.042173][ T7261] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 181.049762][ T7261] Cannot create hsr debugfs directory [ 181.067513][ T2571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 181.077201][ T2571] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 181.087171][ T7372] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 181.094829][ T7372] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 181.122008][ T7372] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 181.197362][ T7372] device hsr_slave_0 entered promiscuous mode [ 181.252238][ T7372] device hsr_slave_1 entered promiscuous mode [ 181.311742][ T7372] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 181.319726][ T7372] Cannot create hsr debugfs directory [ 181.348376][ T2571] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 181.356795][ T2571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 181.366206][ T2571] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 181.383525][ T6957] 8021q: adding VLAN 0 to HW filter on device bond0 [ 181.401086][ T6838] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 181.413122][ T6838] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 181.482223][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 181.490738][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 181.518898][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 181.527815][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 181.536971][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 181.545262][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 181.561933][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 181.607154][ T6957] 8021q: adding VLAN 0 to HW filter on device team0 [ 181.656995][ T2485] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 181.667018][ T2485] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 181.676940][ T2485] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.684094][ T2485] bridge0: port 1(bridge_slave_0) entered forwarding state [ 181.691831][ T2485] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 181.700419][ T2485] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 181.709718][ T2485] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.716836][ T2485] bridge0: port 2(bridge_slave_1) entered forwarding state [ 181.725941][ T2485] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 181.734140][ T2485] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 181.741823][ T2485] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 181.773911][ T7142] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 181.794538][ T7142] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 181.886591][ T7142] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 181.952419][ T7142] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 181.993985][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 182.019459][ T6838] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 182.074240][ T7004] 8021q: adding VLAN 0 to HW filter on device bond0 [ 182.092471][ T2485] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 182.158734][ T7372] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 182.226320][ T2571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 182.236054][ T2571] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 182.245387][ T2571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 182.255451][ T2571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 182.264921][ T2571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 182.274424][ T2571] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 182.284868][ T2571] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 182.330335][ T7372] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 182.358499][ T7372] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 182.445054][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 182.454258][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 182.463851][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 182.473348][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 182.482695][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 182.490999][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 182.501040][ T7372] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 182.558811][ T7004] 8021q: adding VLAN 0 to HW filter on device team0 [ 182.566253][ T7261] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 182.643111][ T6838] device veth0_vlan entered promiscuous mode [ 182.662594][ T7261] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 182.694233][ T7261] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 182.749363][ T7261] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 182.816831][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 182.825200][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 182.844777][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 182.853325][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 182.861082][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 182.870590][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 182.880734][ T2758] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.887916][ T2758] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.898564][ T6838] device veth1_vlan entered promiscuous mode [ 182.933652][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 182.946411][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 182.955570][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 182.967774][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 182.975524][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 182.983898][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 182.993537][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 183.002480][ T3103] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.009777][ T3103] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.041069][ T6957] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 183.077411][ T2571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 183.116518][ T2485] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 183.130823][ T2485] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 183.140212][ T2485] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 183.152040][ T2485] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 183.197297][ T2485] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 183.206881][ T2485] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 183.216037][ T2485] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 183.225562][ T2485] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 183.234912][ T2485] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 183.244626][ T2485] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 183.267647][ T6838] device veth0_macvtap entered promiscuous mode [ 183.288895][ T2485] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 183.297925][ T2485] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 183.310164][ T2485] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 183.331650][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 183.340147][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 183.356588][ T6838] device veth1_macvtap entered promiscuous mode [ 183.375802][ T7004] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 183.443474][ T7142] 8021q: adding VLAN 0 to HW filter on device bond0 [ 183.450504][ T2571] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 183.458677][ T2571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 183.470817][ T2571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 183.480082][ T2571] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 183.492641][ T2571] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 183.502173][ T6957] device veth0_vlan entered promiscuous mode [ 183.560114][ T7261] 8021q: adding VLAN 0 to HW filter on device bond0 [ 183.570100][ T7372] 8021q: adding VLAN 0 to HW filter on device bond0 [ 183.584803][ T6838] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 183.600080][ T6957] device veth1_vlan entered promiscuous mode [ 183.607870][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 183.616313][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 183.624338][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 183.633463][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 183.648715][ T7142] 8021q: adding VLAN 0 to HW filter on device team0 [ 183.667308][ T6838] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 183.688183][ T7004] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 183.699681][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 183.708508][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 183.717390][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 183.726524][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 183.760650][ T2485] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 183.770057][ T2485] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 183.780652][ T2485] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.787888][ T2485] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.798575][ T2485] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 183.807591][ T2485] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 183.816190][ T2485] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.823452][ T2485] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.831092][ T2485] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 183.839199][ T2485] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 183.847905][ T2485] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 183.919742][ T7261] 8021q: adding VLAN 0 to HW filter on device team0 [ 183.928897][ T7372] 8021q: adding VLAN 0 to HW filter on device team0 [ 183.942448][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 183.950757][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 183.959826][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 184.006283][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 184.020306][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 184.030183][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 184.043438][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 184.055468][ T2573] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.062561][ T2573] bridge0: port 1(bridge_slave_0) entered forwarding state [ 184.071411][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 184.084954][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 184.094932][ T2573] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.102061][ T2573] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.112285][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 184.120948][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 184.133436][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 184.145117][ T2573] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.152303][ T2573] bridge0: port 1(bridge_slave_0) entered forwarding state [ 184.162032][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 184.170691][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 184.184522][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 184.193322][ T2573] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.200390][ T2573] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.208225][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 184.216969][ T2573] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 184.236099][ T6957] device veth0_macvtap entered promiscuous mode [ 184.321094][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 184.329813][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 184.340784][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 184.350466][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 184.359495][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 184.369003][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 184.378219][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 184.387471][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 184.397203][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 184.406632][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 184.415692][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 184.425108][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 184.434066][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 184.443546][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 184.452973][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 184.461170][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 184.475406][ T6957] device veth1_macvtap entered promiscuous mode [ 184.491963][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 184.499985][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 184.510589][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 184.519359][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 184.528672][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 184.537964][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 184.546770][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 184.557387][ T7142] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 184.666332][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 184.684247][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 184.702404][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 184.711006][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 184.744835][ T7004] device veth0_vlan entered promiscuous mode [ 184.756109][ T6957] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 184.768760][ T6957] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 184.783163][ T6957] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 184.796280][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 184.805087][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 184.820035][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 184.830011][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 184.866696][ T6957] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 184.878890][ T6957] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 184.896525][ T6957] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 184.906063][ T2571] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 184.916835][ T2571] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 184.925491][ T2571] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 184.937670][ T2571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 184.952906][ T7142] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 184.971680][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 184.980469][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 184.995912][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 185.004109][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 185.017464][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 185.029128][ T7004] device veth1_vlan entered promiscuous mode [ 185.043719][ T7261] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 185.068790][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 185.078023][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 185.087636][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 185.122141][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 185.130734][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 185.154476][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 185.163807][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 185.181867][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 185.190418][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 185.245477][ T7372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 185.319254][ T7004] device veth0_macvtap entered promiscuous mode [ 185.327642][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 185.336657][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 185.345645][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 185.355319][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 185.378884][ T7142] device veth0_vlan entered promiscuous mode [ 185.386594][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 185.398638][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 185.407657][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 185.467754][ T7004] device veth1_macvtap entered promiscuous mode [ 185.489394][ T7142] device veth1_vlan entered promiscuous mode [ 185.520307][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 185.544238][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 185.565318][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 185.582087][ T2758] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 185.596881][ T7372] 8021q: adding VLAN 0 to HW filter on device batadv0 07:01:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/62, 0x3e}, {0x0}], 0x2}}], 0x2, 0x0, 0x0) [ 185.664371][ T2571] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 185.676402][ T2571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 185.695129][ T2571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 185.728170][ T7004] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 185.740885][ T7004] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 185.760472][ T7004] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 185.771171][ T7004] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 185.786553][ T7004] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 185.821469][ T7261] device veth0_vlan entered promiscuous mode [ 185.853267][ T2485] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 185.863613][ T2485] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 185.873238][ T2485] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 185.882699][ T2485] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 185.895899][ T7004] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 07:01:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/62, 0x3e}, {0x0}], 0x2}}], 0x2, 0x0, 0x0) [ 185.923088][ T7004] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 185.952636][ T7004] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 185.971616][ T7004] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 186.002752][ T7004] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 186.029115][ T7261] device veth1_vlan entered promiscuous mode [ 186.049260][ T2485] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 186.064477][ T2485] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 186.080183][ T2485] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 186.091827][ T2485] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 186.121841][ T7142] device veth0_macvtap entered promiscuous mode 07:01:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/62, 0x3e}, {0x0}], 0x2}}], 0x2, 0x0, 0x0) [ 186.167579][ T2485] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 186.181020][ T2485] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 186.194073][ T2485] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 186.240633][ T7142] device veth1_macvtap entered promiscuous mode 07:01:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/62, 0x3e}, {0x0}], 0x2}}], 0x2, 0x0, 0x0) [ 186.301964][ T2571] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 186.310130][ T2571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 186.334602][ T2571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 186.352948][ T2571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 186.370521][ T2571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 186.390700][ T7261] device veth0_macvtap entered promiscuous mode [ 186.469246][ T7142] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 186.481561][ T7142] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 186.495453][ T7142] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 186.506912][ T7142] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 186.516833][ T7142] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 186.528662][ T7142] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 186.540606][ T7142] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 186.556335][ T7261] device veth1_macvtap entered promiscuous mode [ 186.603390][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 186.612750][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 186.621127][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 186.631109][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 186.678532][ T7372] device veth0_vlan entered promiscuous mode [ 186.714180][ T7142] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 186.746061][ T7142] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 186.767703][ T7142] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 186.779913][ T7142] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 186.792168][ T7142] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 186.804954][ T7142] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 186.817691][ T7142] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 186.839202][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 186.849008][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 186.861431][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 186.872235][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 186.881457][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 186.892298][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 186.903543][ T7261] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 186.915604][ T7261] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 186.927980][ T7261] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 186.939158][ T7261] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 186.949789][ T7261] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 186.962572][ T7261] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 186.973039][ T7261] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 186.984124][ T7261] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 186.997120][ T7261] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 187.035890][ T7372] device veth1_vlan entered promiscuous mode [ 187.047431][ T2571] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 187.058562][ T2571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 187.068722][ C0] hrtimer: interrupt took 44552 ns [ 187.070600][ T7261] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 187.086230][ T7261] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 187.097043][ T7261] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 187.107829][ T7261] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 187.119687][ T7261] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 187.130577][ T7261] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 187.140829][ T7261] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 187.152067][ T7261] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 187.167984][ T7261] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 187.183345][ T2571] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready 07:01:13 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/62, 0x3e}, {0x0}], 0x2}}], 0x2, 0x0, 0x0) [ 187.193906][ T2571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 07:01:13 executing program 2: open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) msgget$private(0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x4002) io_setup(0xb, &(0x7f0000000040)=0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, 0xffffffffffffffff, 0x0) delete_module(0x0, 0x800) [ 187.486216][ T2571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 187.513309][ T29] audit: type=1800 audit(1590217273.468:2): pid=8146 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=15747 res=0 [ 187.534206][ T2571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 07:01:13 executing program 0: open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4002) io_setup(0xb, &(0x7f0000000040)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) delete_module(0x0, 0x800) 07:01:13 executing program 3: open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) msgget$private(0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x4002) io_setup(0xb, &(0x7f0000000040)=0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) r2 = open(&(0x7f0000000340)='./bus\x00', 0x80400, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r2, 0x0) delete_module(0x0, 0x800) [ 187.615837][ T7372] device veth0_macvtap entered promiscuous mode [ 187.686094][ T7372] device veth1_macvtap entered promiscuous mode 07:01:13 executing program 2: open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) msgget$private(0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x4002) io_setup(0xb, &(0x7f0000000040)=0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, 0xffffffffffffffff, 0x0) delete_module(0x0, 0x800) [ 187.776703][ T7372] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 187.819680][ T29] audit: type=1804 audit(1590217273.768:3): pid=8161 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir258797881/syzkaller.gvFppk/1/bus" dev="sda1" ino=15757 res=1 [ 187.885308][ T7372] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 187.898380][ T7372] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 187.912601][ T7372] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 187.923353][ T7372] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 187.948423][ T7372] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 187.964670][ T7372] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 187.976276][ T7372] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 187.988275][ T7372] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 188.004108][ T7372] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 188.023626][ T7372] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 188.038775][ T2571] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready 07:01:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/62, 0x3e}, {0x0}], 0x2}}], 0x2, 0x0, 0x0) [ 188.064668][ T2571] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 188.088427][ T2571] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 188.129201][ T29] audit: type=1800 audit(1590217274.078:4): pid=8165 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="bus" dev="sda1" ino=15761 res=0 [ 188.158228][ T2571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 188.180585][ T7372] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 188.195927][ T7372] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 188.206360][ T7372] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 188.217652][ T7372] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 188.231580][ T7372] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 188.281448][ T7372] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 188.313459][ T7372] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 188.337886][ T7372] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 188.362007][ T7372] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 188.382010][ T7372] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 188.410423][ T7372] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 188.434637][ T2571] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 188.448645][ T2571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 07:01:16 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000041c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r1, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) openat$cgroup_ro(r4, &(0x7f0000006040)='cgroup.stat\x00', 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getpeername$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) r7 = dup(r2) ioctl$SIOCSIFHWADDR(r7, 0x8937, &(0x7f0000000000)={'veth0_vlan\x00', @random="01003a1e2410"}) 07:01:16 executing program 3: open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) msgget$private(0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x4002) io_setup(0xb, &(0x7f0000000040)=0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, 0xffffffffffffffff, 0x0) delete_module(0x0, 0x800) 07:01:16 executing program 2: open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0xb, &(0x7f0000000040)=0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x98428d57a99b5f44) io_setup(0xd, &(0x7f0000000100)=0x0) io_submit(r2, 0x200002f1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) io_submit(r0, 0x1c, &(0x7f0000000540)) r3 = open(&(0x7f0000000340)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r3, 0x0) delete_module(0x0, 0x0) 07:01:16 executing program 0: open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4002) io_setup(0xb, &(0x7f0000000040)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) delete_module(0x0, 0x800) 07:01:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/62, 0x3e}, {0x0}], 0x2}}], 0x2, 0x0, 0x0) 07:01:16 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003b80)=[{{0x0, 0x0, &(0x7f00000003c0)=[{0x0}], 0x1}}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) syz_genetlink_get_family_id$batadv(0x0) 07:01:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/62, 0x3e}, {0x0}], 0x2}}], 0x2, 0x0, 0x0) 07:01:16 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) uname(&(0x7f0000000440)=""/150) 07:01:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) poll(&(0x7f0000000000)=[{r1}], 0x1, 0x1) 07:01:17 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0xb, &(0x7f0000000040)=0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x98428d57a99b5f44) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r1, 0x0}]) io_submit(r0, 0x1c, &(0x7f0000000540)) 07:01:17 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f7e00a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$hwrng(0xffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x200000201, 0x0, 0x8000004c8]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000180)={0xc, 0x8001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:01:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/62, 0x3e}, {0x0}], 0x2}}], 0x2, 0x0, 0x0) [ 191.173544][ T8239] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 07:01:17 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000180)) recvmmsg(r2, &(0x7f0000000ac0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000}, 0xc, 0x0}, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaacf9, &(0x7f0000002340)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5e43296477c2079f73", 0x3a, 0x3fc}, {&(0x7f00000001c0)="7649fa8b60ea69449c40e6f532f2f76a940ce1e4a2cd7ae487e9b9fdaf858ff42499b1836e3ae7e885504ea2ec15b80119cc33d400d6f17b67a3aaa6255e57acc687bd9518ec5e83737238232e7f8c417aa344a31b0190f96371a18d80b0bf368906a96fa98fc3340c61906fc9e8525f8355247df926b7215c9dd2d8a9ecb8e8ea50cca36623263a2606ba03cd74924fac7b6a2b", 0x94, 0x9}, {&(0x7f00000023c0)="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", 0x1000}, {&(0x7f0000001280)="aa948f56e61adb364206e4f5f2ff790e931b6e1a765dad8c18867fa58d13eb440889e7382158721e0c411bba48d0077ec0e1fc34689c612d1c7581f3d2ffe896372a89f3fece301254047fa1f0c020f3b315b88eebe4f0226b221bfdc8861c842f58279d23c2f06111e53a16c4cacd37b8c3ff8101dabdbf71b3a3134c9e3f3dfce9b1aeb5d2adadd76d82371f53b1007dd5f629c12c1ba9da4f97c3b9d114f4701ff87cc1ba87df92289317e5d39554908a1d2ecc5e844d60326392bc", 0xbd, 0x5}, {&(0x7f0000001340)="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", 0x1000, 0x2}], 0x4801, 0x0) syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x20, 0x1) clock_gettime(0x0, &(0x7f0000000700)={0x0, 0x0}) recvmmsg(r4, &(0x7f0000000680)=[{{&(0x7f00000003c0)=@nfc_llcp, 0x80, &(0x7f0000000300)=[{&(0x7f0000000440)=""/87, 0x57}], 0x1, &(0x7f00000004c0)=""/198, 0xc6}, 0xfff}, {{&(0x7f00000005c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000640)=[{&(0x7f00000033c0)=""/4096, 0x1000}], 0x1}, 0x1000}], 0x2, 0x0, &(0x7f0000000740)={r5, r6+60000000}) [ 191.201255][ T29] audit: type=1804 audit(1590217277.148:5): pid=8227 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir988704528/syzkaller.p8bdwI/3/bus" dev="sda1" ino=15779 res=1 07:01:17 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) pselect6(0x40, &(0x7f0000000100), 0x0, &(0x7f0000000140)={0x5b3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0) 07:01:17 executing program 2: open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0xb, &(0x7f0000000040)=0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x98428d57a99b5f44) io_setup(0xd, &(0x7f0000000100)=0x0) io_submit(r2, 0x200002f1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) io_submit(r0, 0x1c, &(0x7f0000000540)) r3 = open(&(0x7f0000000340)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r3, 0x0) delete_module(0x0, 0x0) 07:01:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r1, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/62, 0x3e}, {0x0}], 0x2}}], 0x2, 0x0, 0x0) 07:01:17 executing program 0: io_setup(0xb, &(0x7f0000000040)=0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x98428d57a99b5f44) io_setup(0xd, &(0x7f0000000100)=0x0) io_submit(r2, 0x200002f1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) io_submit(r0, 0x1c, &(0x7f0000000540)) 07:01:17 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x100) syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 07:01:17 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigaction(0xc, 0x0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8, &(0x7f00000003c0)) 07:01:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/62, 0x3e}, {0x0}], 0x2}}], 0x2, 0x0, 0x0) 07:01:17 executing program 5: open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0xb, &(0x7f0000000040)=0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x98428d57a99b5f44) io_setup(0xd, &(0x7f0000000100)=0x0) io_submit(r2, 0x200002f1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) io_submit(r0, 0x1c, &(0x7f0000000540)) r3 = open(&(0x7f0000000340)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r3, 0x0) delete_module(0x0, 0x0) 07:01:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/62, 0x3e}, {0x0}], 0x2}}], 0x2, 0x0, 0x0) 07:01:17 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x100) syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 07:01:18 executing program 0: io_setup(0xb, &(0x7f0000000040)=0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x98428d57a99b5f44) io_setup(0xd, &(0x7f0000000100)=0x0) io_submit(r2, 0x200002f1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) io_submit(r0, 0x1c, &(0x7f0000000540)) 07:01:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/62, 0x3e}, {0x0}], 0x2}}], 0x2, 0x0, 0x0) 07:01:18 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EVIOCGSND(r0, 0x8040451a, 0x0) [ 192.299395][ T29] audit: type=1804 audit(1590217278.248:6): pid=8286 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir988704528/syzkaller.p8bdwI/4/bus" dev="sda1" ino=15783 res=1 07:01:18 executing program 2: open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0xb, &(0x7f0000000040)=0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x98428d57a99b5f44) io_setup(0xd, &(0x7f0000000100)=0x0) io_submit(r2, 0x200002f1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) io_submit(r0, 0x1c, &(0x7f0000000540)) r3 = open(&(0x7f0000000340)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r3, 0x0) delete_module(0x0, 0x0) 07:01:18 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x100) syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 07:01:18 executing program 3: msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000000)=""/143) 07:01:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:01:18 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x100) syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 192.782373][ T29] audit: type=1804 audit(1590217278.738:7): pid=8292 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir801913528/syzkaller.ikbajh/5/bus" dev="sda1" ino=15764 res=1 07:01:18 executing program 0: open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) msgget$private(0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x4002) io_setup(0xb, &(0x7f0000000040)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) open(&(0x7f0000000340)='./bus\x00', 0x80400, 0x0) delete_module(0x0, 0x800) 07:01:18 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="2e000000120081aee4520cecff0e00fa078b5bdb4cb904ff01730e55cff26d1b0e001d80040000005e510befccd7", 0x2e}], 0x1}, 0x0) 07:01:18 executing program 4: syz_emit_ethernet(0x22, &(0x7f0000000140)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @dev, @void, {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x0, 0x0, @dev, "", @remote}}}}, 0x0) 07:01:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) [ 193.073368][ T29] audit: type=1804 audit(1590217279.028:8): pid=8326 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir687380954/syzkaller.8rcHPb/6/bus" dev="sda1" ino=15754 res=1 07:01:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/62, 0x3e}, {0x0}], 0x2}}], 0x2, 0x0, 0x0) [ 193.152179][ T8333] netlink: 'syz-executor.5': attribute type 29 has an invalid length. 07:01:19 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet(0x2, 0x3, 0x7) setsockopt$inet_msfilter(r1, 0x0, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB='x'], 0x1) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000080)={0x0, @local, @local}, &(0x7f0000000000)=0x69) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=@newtfilter={0x24, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2}}, 0x24}}, 0x0) 07:01:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) [ 193.197338][ T8333] netlink: 'syz-executor.5': attribute type 29 has an invalid length. [ 193.245670][ T29] audit: type=1800 audit(1590217279.118:9): pid=8323 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="bus" dev="sda1" ino=15754 res=0 [ 193.318341][ T29] audit: type=1804 audit(1590217279.118:10): pid=8321 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir988704528/syzkaller.p8bdwI/5/bus" dev="sda1" ino=15740 res=1 [ 193.402767][ T29] audit: type=1804 audit(1590217279.178:11): pid=8326 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir687380954/syzkaller.8rcHPb/6/bus" dev="sda1" ino=15754 res=1 07:01:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0xfffffda9, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) writev(r2, &(0x7f0000001980)=[{&(0x7f0000000400)="be", 0x1}], 0x1) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r3 = gettid() recvfrom$inet(r2, &(0x7f0000000140)=""/219, 0xdb, 0x40000102, 0x0, 0x0) tkill(r3, 0x13) 07:01:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_256={{0x304}, "da365863c307c5c9", "5a1d841c2bdbae29939a010f9ae1977bbe8430e52ab6a8c408f865e1efe598ab", "5ac38502", "c8d6d7167315931e"}, 0x38) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 07:01:19 executing program 0: open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) msgget$private(0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x4002) io_setup(0xb, &(0x7f0000000040)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) open(&(0x7f0000000340)='./bus\x00', 0x80400, 0x0) delete_module(0x0, 0x800) 07:01:19 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:01:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) [ 193.545697][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:01:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) [ 193.644220][ T29] audit: type=1804 audit(1590217279.598:12): pid=8360 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir687380954/syzkaller.8rcHPb/7/bus" dev="sda1" ino=15785 res=1 07:01:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800c0001006d6163766c616e000400028008000500", @ANYRES32=r6], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x3f00, &(0x7f0000000200)={&(0x7f0000000640)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x5, 0x0, 0x0, r3}}, 0x20}}, 0x0) [ 193.735139][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:01:19 executing program 5: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[], 0x444}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="500000002800210400"/20, @ANYRES32, @ANYBLOB="ac"], 0x3}}, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x5, 0x0) 07:01:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x28, 0x2, 0x3, 0x101, 0x0, 0x0, {}, [@NFQA_CFG_CMD={0x8, 0x1, {0x1}}, @NFQA_CFG_PARAMS={0x9, 0x2, {0x0, 0x3}}]}, 0x28}}, 0x0) [ 193.809151][ T8370] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 193.872081][ T8372] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.5'. 07:01:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/62, 0x3e}, {0x0}], 0x2}}], 0x2, 0x0, 0x0) 07:01:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_256={{0x303}, "ca365863c307c5c9", "5a1d841c2bdbae29939a010f9ae1977bbe8430e52ab6a8c408f865e1efe598ab", "5ac38502", "c8d6d7167315931e"}, 0x38) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 07:01:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x28, 0x2, 0x3, 0x101, 0x0, 0x0, {}, [@NFQA_CFG_CMD={0x8, 0x1, {0x1}}, @NFQA_CFG_PARAMS={0x9, 0x2, {0x0, 0x3}}]}, 0x28}}, 0x0) [ 194.138493][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:01:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x14, 0x1, 0x8, 0x201}, 0x14}}, 0x0) [ 194.224255][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:01:20 executing program 5: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$SIOCPNGETOBJECT(r0, 0x89e0, &(0x7f0000000680)) 07:01:20 executing program 0: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000840)={0x28, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}]}]}, 0x28}}, 0x0) [ 194.818470][ T8374] bond0: (slave bond_slave_0): Releasing backup interface [ 194.861192][ T8394] tipc: Enabling of bearer rejected, failed to enable media [ 194.870378][ T8370] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 194.913877][ T8404] tipc: Enabling of bearer rejected, failed to enable media 07:01:22 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:01:22 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000440)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}, 0x20) 07:01:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:01:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=ANY=[@ANYBLOB="3c0000001000850d00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012000c0001006d616376746170000400020008000500", @ANYRES32=r3], 0x3c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r6}}, 0x20}}, 0x0) 07:01:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/62, 0x3e}, {0x0}], 0x2}}], 0x2, 0x0, 0x0) 07:01:22 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$tun(r0, &(0x7f0000000240)={@void, @val={0x3}, @mpls={[], @ipv4=@icmp={{0x5, 0x4, 0x0, 0x0, 0x224, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote}, @timestamp={0xd, 0x0, 0x0, 0x14, 0x2}}}}, 0x100c) 07:01:22 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000040)="1400000028000503d25a80868c63940d0b24fc60", 0x14}], 0x1}, 0x4000000) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x0, {0x2, 0x4e23, @remote}, {0x2, 0x4e24, @local}, {0x2, 0x4e24, @private=0xa010100}, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x5}) [ 196.577382][ T8429] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 196.915228][ T8429] batman_adv: batadv0: Interface deactivated: batadv_slave_1 07:01:23 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/62, 0x3e}, {0x0}], 0x2}}], 0x2, 0x0, 0x0) 07:01:23 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:01:23 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000040)="1400000028000503d25a80868c63940d0b24fc60", 0x14}], 0x1}, 0x4000000) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x0, {0x2, 0x4e23, @remote}, {0x2, 0x4e24, @local}, {0x2, 0x4e24, @private=0xa010100}, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x5}) [ 197.483501][ T8429] batman_adv: batadv0: Removing interface: batadv_slave_1 07:01:23 executing program 5: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x5, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000200), 0x10efe10675dec16, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x28, r4, 0x4, 0x70bd29, 0x25dfdbfe, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", "", "", ""]}, 0x28}}, 0x4000) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8001}, 0x0) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000003c0)=@in={0x2, 0x0, @multicast2}, 0x80, &(0x7f0000001900)=[{&(0x7f0000000440)=""/249, 0xf9}, {&(0x7f0000000300)=""/7, 0x7}, {&(0x7f0000000580)=""/26, 0x1a}, {&(0x7f00000005c0)=""/98, 0x62}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001b00)=""/184, 0xb8}, {&(0x7f0000001700)=""/153, 0x99}, {&(0x7f00000017c0)=""/52, 0x34}, {&(0x7f0000001800)=""/198, 0xc6}], 0x9, &(0x7f00000019c0)=""/241, 0xf1}, 0x121) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000003940)={&(0x7f0000003600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000380), 0x0, &(0x7f0000003840)=""/224, 0xe0}, 0x10141) sendmsg$NLBL_CALIPSO_C_LIST(r7, &(0x7f0000003a40)={&(0x7f0000003980)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000003a00)={&(0x7f00000039c0)={0x14, 0x0, 0x100, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001b00050700"/20, @ANYRES32=r6, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="1000b20000000000"], 0x48}}, 0x0) getsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000), &(0x7f0000000040)=0x4) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r8, 0x401c5820, &(0x7f0000000140)={0x28}) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 07:01:23 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=ANY=[@ANYBLOB="3c0000001000850d00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012000c0001006d616376746170000400020008000500", @ANYRES32], 0x3c}}, 0x0) 07:01:25 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:01:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:01:25 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @random="8a192187f675", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x14, 0x6, 0x0, @remote, @ipv4={[], [], @multicast1}, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:01:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000100)=@req3={0x1, 0x9, 0x8000, 0x10000, 0x200, 0xfffffffd, 0x8000}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_256={{0x304}, "da365863c307c5c9", "5a1d841c2bdbae29939a010f9ae1977bbe8430e52ab6a8c408f865e1efe598ab", "5ac38502", "c8d6d7167315931e"}, 0x38) r2 = accept(r1, &(0x7f0000000180)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000200)=0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r2, 0x400443c8, &(0x7f0000000240)={r3, 0x8000}) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 07:01:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/62, 0x3e}, {0x0}], 0x2}}], 0x2, 0x0, 0x0) 07:01:25 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) [ 199.620798][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:01:25 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:01:25 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x95f29, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000025000511d25a80648c63940d0524fc6004000e000a0011000200008037153e370a0f0c8000000000d1bd", 0x2e}], 0x1}, 0x0) 07:01:25 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) [ 199.749892][ T8514] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 07:01:25 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r1, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:01:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x40, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0xb}}, [@filter_kind_options=@f_matchall={{0xd, 0x1, 'matchall\x00'}, {0xc, 0x2, [@TCA_MATCHALL_CLASSID={0x8}]}}]}, 0x40}}, 0x0) 07:01:25 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r1, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:01:28 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:01:28 executing program 2: 07:01:28 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r1, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:01:28 executing program 5: 07:01:28 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/62, 0x3e}, {0x0}], 0x2}}], 0x2, 0x0, 0x0) 07:01:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:01:28 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x8, 0x3, 0x270, 0x108, 0xa, 0xd8, 0x108, 0xd8, 0x1d8, 0x1a8, 0x1a8, 0x1d8, 0x1a8, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'macvtap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@inet=@set2={{0x28, 'set\x00'}, {{0x64}}}, @common=@inet=@set1={{0x28, 'set\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00'}}}, {{@uncond, 0x0, 0x70, 0xd0, 0xd001}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 07:01:28 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000380)=0x8, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 07:01:28 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) [ 202.802200][ T8549] Cannot find set identified by id 100 to match 07:01:28 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x80000000000004) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000b80)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c1030000030000002004000000000000800200000000000000000000000000005003000050030000500300005003000050030000030000000000000000000000fe8000000000000000000000000000bbff020000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000076657468315f746f5f626f6e640000006e657470636930000000000f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500280020000000000000000000000000000000000000000000000005001686173686c696d69740000000000000000000000000000000000000000027465a16d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000fe18b61a000800000000000000000000000000005800686173686c696d697400000000000000000000000000000000000000000173797a6b616c6c657231000000000000000000000000000004000000000000000000000005000000a60000000000000000000000000000003000434f4e4e4d41524b00000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800434c4153534946590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x0, "00000100000000000800449420eba71a4976e252922cb18f6e2e2aba000100012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000049740000000000000025ad8e5ecc326d3a09ffc2c65400"}, 0x80) syz_emit_ethernet(0x56, &(0x7f0000000100)={@link_local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "289200", 0x20, 0x6, 0x0, @dev, @mcast2, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x10, 0x0, 0x0, 0x0, {[@exp_fastopen={0xfe, 0x9, 0xf989, "fef40d9d4d"}]}}}}}}}}, 0x0) 07:01:28 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4000, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 07:01:28 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) [ 202.930871][ T8559] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING 07:01:31 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$cont(0x7, r0, 0x0, 0x0) 07:01:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:01:31 executing program 2: 07:01:31 executing program 5: 07:01:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:01:31 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/62, 0x3e}, {0x0}], 0x2}}], 0x2, 0x0, 0x0) 07:01:31 executing program 3: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r1, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:01:31 executing program 2: 07:01:31 executing program 5: 07:01:31 executing program 2: 07:01:31 executing program 3: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r1, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:01:32 executing program 5: 07:01:34 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$cont(0x7, r0, 0x0, 0x0) 07:01:34 executing program 3: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r1, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:01:34 executing program 2: 07:01:34 executing program 5: 07:01:34 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/62, 0x3e}, {0x0}], 0x2}}], 0x2, 0x0, 0x0) 07:01:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:01:34 executing program 5: 07:01:34 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:01:34 executing program 2: 07:01:35 executing program 5: 07:01:35 executing program 2: 07:01:35 executing program 5: [ 209.594728][ T0] NOHZ: local_softirq_pending 08 [ 210.234469][ T0] NOHZ: local_softirq_pending 08 07:01:37 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$cont(0x7, r0, 0x0, 0x0) 07:01:37 executing program 2: 07:01:37 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:01:37 executing program 5: 07:01:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:01:37 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/62, 0x3e}, {0x0}], 0x2}}], 0x2, 0x0, 0x0) 07:01:38 executing program 5: 07:01:38 executing program 2: 07:01:38 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:01:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:01:38 executing program 5: 07:01:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:01:41 executing program 2: 07:01:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:01:41 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r1, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:01:41 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:01:41 executing program 5: 07:01:41 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/62, 0x3e}, {0x0}], 0x2}}], 0x2, 0x0, 0x0) 07:01:41 executing program 5: 07:01:41 executing program 2: 07:01:41 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r1, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:01:41 executing program 2: 07:01:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:01:41 executing program 2: 07:01:41 executing program 5: 07:01:41 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r1, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:01:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:01:44 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:01:44 executing program 2: 07:01:44 executing program 5: 07:01:44 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r1, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:01:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(0xffffffffffffffff, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:01:44 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/62, 0x3e}, {0x0}], 0x2}}], 0x2, 0x0, 0x0) 07:01:44 executing program 5: 07:01:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(0xffffffffffffffff, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:01:44 executing program 2: 07:01:44 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r1, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:01:44 executing program 5: 07:01:44 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r1, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:01:47 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:01:47 executing program 2: 07:01:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(0xffffffffffffffff, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:01:47 executing program 5: 07:01:47 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r1, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:01:47 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[], 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/62, 0x3e}, {0x0}], 0x2}}], 0x2, 0x0, 0x0) 07:01:47 executing program 2: 07:01:47 executing program 5: 07:01:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:01:47 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r1, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:01:47 executing program 2: 07:01:47 executing program 5: 07:01:50 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:01:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:01:50 executing program 2: 07:01:50 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r1, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:01:50 executing program 5: 07:01:50 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[], 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/62, 0x3e}, {0x0}], 0x2}}], 0x2, 0x0, 0x0) 07:01:50 executing program 5: 07:01:50 executing program 2: 07:01:50 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:01:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:01:50 executing program 5: 07:01:50 executing program 2: 07:01:53 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:01:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:01:53 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r0, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r0, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:01:53 executing program 5: 07:01:53 executing program 2: 07:01:53 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[], 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/62, 0x3e}, {0x0}], 0x2}}], 0x2, 0x0, 0x0) 07:01:53 executing program 2: 07:01:53 executing program 5: 07:01:53 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r0, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r0, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:01:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:01:53 executing program 2: 07:01:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:01:56 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:01:56 executing program 5: 07:01:56 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r0, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r0, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:01:56 executing program 2: 07:01:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB], 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/62, 0x3e}, {0x0}], 0x2}}], 0x2, 0x0, 0x0) 07:01:56 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:01:56 executing program 2: 07:01:56 executing program 5: 07:01:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:01:56 executing program 5: 07:01:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:01:56 executing program 2: 07:01:59 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:01:59 executing program 2: 07:01:59 executing program 5: 07:01:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:01:59 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:01:59 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB], 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/62, 0x3e}, {0x0}], 0x2}}], 0x2, 0x0, 0x0) 07:01:59 executing program 2: 07:01:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:01:59 executing program 5: 07:01:59 executing program 2: 07:01:59 executing program 5: 07:01:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:02:02 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:02:02 executing program 2: 07:02:02 executing program 5: 07:02:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:02:02 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, 0x0, 0x0) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:02:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB], 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/62, 0x3e}, {0x0}], 0x2}}], 0x2, 0x0, 0x0) 07:02:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:02:03 executing program 2: 07:02:03 executing program 5: 07:02:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:02:03 executing program 2: 07:02:03 executing program 5: 07:02:06 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:02:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:02:06 executing program 2: 07:02:06 executing program 5: 07:02:06 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000"], 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/62, 0x3e}, {0x0}], 0x2}}], 0x2, 0x0, 0x0) 07:02:06 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, 0x0, 0x0) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:02:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:02:06 executing program 5: 07:02:06 executing program 2: 07:02:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:02:06 executing program 2: 07:02:06 executing program 5: 07:02:09 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:02:09 executing program 2: 07:02:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:02:09 executing program 5: 07:02:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, 0x0, 0x0) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:02:09 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000"], 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/62, 0x3e}, {0x0}], 0x2}}], 0x2, 0x0, 0x0) 07:02:09 executing program 2: 07:02:09 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:02:09 executing program 5: 07:02:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:02:09 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:02:09 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:02:09 executing program 2: 07:02:09 executing program 5: 07:02:09 executing program 5: 07:02:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:02:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:02:09 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000"], 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/62, 0x3e}, {0x0}], 0x2}}], 0x2, 0x0, 0x0) 07:02:09 executing program 2: 07:02:09 executing program 5: 07:02:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:02:10 executing program 5: 07:02:10 executing program 2: 07:02:12 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:02:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000), 0x0) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:02:12 executing program 5: 07:02:12 executing program 2: 07:02:12 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401"], 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/62, 0x3e}, {0x0}], 0x2}}], 0x2, 0x0, 0x0) 07:02:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:02:12 executing program 2: 07:02:12 executing program 5: 07:02:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000), 0x0) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:02:12 executing program 2: 07:02:12 executing program 5: 07:02:12 executing program 2: 07:02:15 executing program 5: 07:02:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000), 0x0) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:02:15 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:02:15 executing program 2: 07:02:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:02:15 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401"], 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/62, 0x3e}, {0x0}], 0x2}}], 0x2, 0x0, 0x0) 07:02:15 executing program 5: 07:02:15 executing program 2: 07:02:15 executing program 5: 07:02:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292", 0xc) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:02:15 executing program 2: 07:02:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292", 0xc) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:02:15 executing program 2: 07:02:15 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) getsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000280), &(0x7f00000002c0)=0x4) socket$alg(0x26, 0x5, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) 07:02:18 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:02:18 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b70200000f000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x19, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) 07:02:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292", 0xc) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:02:18 executing program 5: clone(0x40000b1085d7d, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:02:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:02:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401"], 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/62, 0x3e}, {0x0}], 0x2}}], 0x2, 0x0, 0x0) 07:02:18 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:02:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x1d7) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="4800000010000506070000e9f300000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="20000000140001040000000000e2fe5a23000000", @ANYRES32=r4, @ANYBLOB="080002"], 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=@newlink={0x20, 0x11, 0xa2b, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) 07:02:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef91", 0x12) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:02:18 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8, 0x2, r5}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 07:02:18 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 252.735150][ T9071] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 252.788588][ T9071] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 07:02:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef91", 0x12) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:02:18 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) [ 252.880431][ T9083] (unnamed net_device) (uninitialized): (slave sit0): Device is not bonding slave [ 252.895531][ T9083] (unnamed net_device) (uninitialized): option active_slave: invalid value (sit0) 07:02:18 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 07:02:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef91", 0x12) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:02:18 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) [ 253.027270][ T9071] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 253.095978][ T9103] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 07:02:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:02:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ff"], 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/62, 0x3e}, {0x0}], 0x2}}], 0x2, 0x0, 0x0) 07:02:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) connect(r0, &(0x7f0000000000)=@pppol2tpv3={0x2}, 0x80) sendmmsg(r0, &(0x7f0000001540), 0x553, 0x0) 07:02:19 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:02:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c", 0x15) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:02:19 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) exit(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000140)) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x40, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20048000}, 0x200080c1) open(0x0, 0x0, 0x0) creat(0x0, 0x0) pipe(0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x480840, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) 07:02:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c", 0x15) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:02:19 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:02:19 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) exit(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000140)) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x40, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20048000}, 0x200080c1) open(0x0, 0x0, 0x0) creat(0x0, 0x0) pipe(0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x480840, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) 07:02:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c", 0x15) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:02:19 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:02:19 executing program 4: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 254.081669][ T9150] ptrace attach of "/root/syz-executor.4"[9149] was attempted by "/root/syz-executor.4"[9150] 07:02:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:02:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) readv(r0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="4800000010000506070000e9f300000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="20000000140001040000000000e2fe5a23000000", @ANYRES32, @ANYBLOB="080002"], 0x20}}, 0x0) 07:02:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) connect(r0, &(0x7f0000000000)=@pppol2tpv3={0x2}, 0x80) sendmmsg(r0, &(0x7f0000001540), 0x553, 0x0) 07:02:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c2", 0x17) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:02:20 executing program 4: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:02:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ff"], 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/62, 0x3e}, {0x0}], 0x2}}], 0x2, 0x0, 0x0) 07:02:20 executing program 4: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 254.461502][ T9164] ptrace attach of "/root/syz-executor.4"[9161] was attempted by "/root/syz-executor.4"[9164] [ 254.465680][ T9162] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 07:02:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c2", 0x17) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) [ 254.581391][ T9156] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 254.589319][ T9178] ptrace attach of "/root/syz-executor.4"[9175] was attempted by "/root/syz-executor.4"[9178] 07:02:20 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 254.622990][ T9162] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 07:02:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c2", 0x17) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) [ 254.731056][ T9181] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 07:02:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) readv(r0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="4800000010000506070000e9f300000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="20000000140001040000000000e2fe5a23000000", @ANYRES32, @ANYBLOB="080002"], 0x20}}, 0x0) 07:02:20 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 255.061852][ T9199] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 255.251361][ T9202] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 07:02:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[], 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:02:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(0xffffffffffffffff, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:02:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) connect(r0, &(0x7f0000000000)=@pppol2tpv3={0x2}, 0x80) sendmmsg(r0, &(0x7f0000001540), 0x553, 0x0) 07:02:21 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:02:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ff"], 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/62, 0x3e}, {0x0}], 0x2}}], 0x2, 0x0, 0x0) 07:02:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) connect(r0, &(0x7f0000000000)=@pppol2tpv3={0x2}, 0x80) sendmmsg(r0, &(0x7f0000001540), 0x553, 0x0) 07:02:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(0xffffffffffffffff, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:02:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(0xffffffffffffffff, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:02:21 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:02:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:02:22 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:02:22 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:02:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[], 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:02:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:02:22 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@rand_addr=' \x01\x00', 0x800, 0x0, 0x103, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}, 0x800, 0x0, 0x3, 0xa}, 0x20) 07:02:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/62, 0x3e}, {0x0}], 0x2}}], 0x2, 0x0, 0x0) 07:02:22 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:02:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7}}], 0x48}, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 07:02:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:02:22 executing program 2: r0 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:02:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/62, 0x3e}, {0x0}], 0x2}}], 0x2, 0x0, 0x0) 07:02:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:02:23 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/62, 0x3e}, {0x0}], 0x2}}], 0x2, 0x0, 0x0) [ 256.976638][ T9266] rdma_op 00000000d16da38a conn xmit_rdma 0000000000000000 [ 257.006404][ T9266] rdma_op 00000000b2360819 conn xmit_rdma 0000000000000000 07:02:23 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r0, 0xffffc000) 07:02:23 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[], 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:02:23 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ns\x00') statx(r0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) 07:02:23 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) 07:02:23 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) 07:02:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) 07:02:25 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ns\x00') statx(r0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) 07:02:25 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:02:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:02:25 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = dup3(r0, r1, 0x0) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) 07:02:25 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB], 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) [ 259.878030][ T9310] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 07:02:25 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ns\x00') statx(r0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) 07:02:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 07:02:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000000fc0), 0x0, 0x0, 0x0) 07:02:26 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ns\x00') statx(r0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) 07:02:26 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000000fc0), 0x0, 0x0, 0x0) 07:02:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) r1 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) 07:02:26 executing program 5: statx(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) 07:02:28 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:02:28 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000000fc0), 0x0, 0x0, 0x0) 07:02:28 executing program 5: statx(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) 07:02:28 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB], 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:02:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000001900)=""/4098, 0x1022, 0x0, 0x0, 0x0) 07:02:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) r1 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) 07:02:28 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) r1 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) 07:02:29 executing program 5: statx(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) 07:02:29 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) statx(r0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) 07:02:29 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) statx(r0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) 07:02:29 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) statx(r0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) 07:02:29 executing program 5: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ns\x00') statx(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) 07:02:31 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:02:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB], 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:02:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 07:02:31 executing program 5: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ns\x00') statx(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) 07:02:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) r1 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) 07:02:31 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) 07:02:32 executing program 5: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ns\x00') statx(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) 07:02:32 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ns\x00') statx(r0, 0x0, 0x0, 0x0, 0x0) 07:02:32 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ns\x00') statx(r0, 0x0, 0x0, 0x0, 0x0) 07:02:32 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ns\x00') statx(r0, 0x0, 0x0, 0x0, 0x0) 07:02:32 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') 07:02:32 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000"], 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) [ 268.460062][ T0] NOHZ: local_softirq_pending 08 07:02:35 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:02:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 07:02:35 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') 07:02:35 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) r1 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) 07:02:35 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10, 0x0}, 0x200008c1) 07:02:35 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000"], 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:02:35 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x11, &(0x7f0000000100)) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x1e34a95995e) 07:02:35 executing program 5: clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @restrict, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 07:02:35 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x11, &(0x7f0000000100)) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x1e34a95995e) [ 269.414412][ T9442] BPF: (anon) type_id=2 bits_offset=0 [ 269.438880][ T9442] BPF: [ 269.450280][ T9442] BPF:Invalid member [ 269.464632][ T9442] BPF: [ 269.464632][ T9442] 07:02:35 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@multicast, @link_local, @void, {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x2, @local, @private=0xa010101, @dev, @local}}}}, 0x0) 07:02:35 executing program 1: r0 = msgget$private(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) msgrcv(r0, &(0x7f0000000000)={0x0, ""/113}, 0x79, 0x0, 0x0) msgsnd(r0, &(0x7f0000000140)={0x3}, 0x8, 0x0) msgctl$IPC_RMID(r0, 0x0) 07:02:35 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@multicast, @link_local, @void, {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x2, @local, @private=0xa010101, @dev, @local}}}}, 0x0) [ 270.380439][ T0] NOHZ: local_softirq_pending 08 07:02:38 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:02:38 executing program 1: r0 = msgget$private(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) msgrcv(r0, &(0x7f0000000000)={0x0, ""/113}, 0x79, 0x0, 0x0) msgsnd(r0, &(0x7f0000000140)={0x3}, 0x8, 0x0) msgctl$IPC_RMID(r0, 0x0) 07:02:38 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@multicast, @link_local, @void, {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x2, @local, @private=0xa010101, @dev, @local}}}}, 0x0) 07:02:38 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000"], 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:02:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000180), 0xfffffffffffffd17, 0x0, 0x0, 0x0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 07:02:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) r1 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x0) sendfile(r0, r1, 0x0, 0xeefffdef) 07:02:38 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@multicast, @link_local, @void, {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x2, @local, @private=0xa010101, @dev, @local}}}}, 0x0) 07:02:38 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) 07:02:38 executing program 1: r0 = msgget$private(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) msgrcv(r0, &(0x7f0000000000)={0x0, ""/113}, 0x79, 0x0, 0x0) msgsnd(r0, &(0x7f0000000140)={0x3}, 0x8, 0x0) msgctl$IPC_RMID(r0, 0x0) 07:02:38 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) 07:02:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) r1 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x0) sendfile(r0, r1, 0x0, 0xeefffdef) 07:02:38 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) 07:02:41 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@multicast, @link_local, @void, {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x0, @local, @private=0xa010101, @dev, @local}}}}, 0x0) 07:02:41 executing program 1: r0 = msgget$private(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) msgrcv(r0, &(0x7f0000000000)={0x0, ""/113}, 0x79, 0x0, 0x0) msgsnd(r0, &(0x7f0000000140)={0x3}, 0x8, 0x0) msgctl$IPC_RMID(r0, 0x0) 07:02:41 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:02:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) r1 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x0) sendfile(r0, r1, 0x0, 0xeefffdef) 07:02:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507003734000000c40000000000", @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 07:02:41 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401"], 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:02:41 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@multicast, @link_local, @void, {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x0, @local, @private, @dev, @local}}}}, 0x0) [ 275.356348][ T9505] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 275.417077][ T9515] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 07:02:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) ftruncate(0xffffffffffffffff, 0x1000000) sendfile(r0, 0xffffffffffffffff, 0x0, 0xeefffdef) 07:02:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) 07:02:41 executing program 1: r0 = msgget$private(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) msgrcv(r0, &(0x7f0000000000)={0x0, ""/113}, 0x79, 0x0, 0x0) msgsnd(r0, &(0x7f0000000140)={0x3}, 0x8, 0x0) 07:02:41 executing program 5: clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @restrict={0x0, 0x0, 0x0, 0xb, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) socket(0x0, 0x0, 0x0) 07:02:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) [ 275.589745][ T9525] rdma_op 00000000855e1b66 conn xmit_rdma 0000000000000000 [ 275.622236][ T9528] BPF: (anon) type_id=1 bitfield_size=0 bits_offset=0 07:02:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) 07:02:41 executing program 1: r0 = msgget$private(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) msgsnd(r0, &(0x7f0000000140)={0x3}, 0x8, 0x0) [ 275.650347][ T9535] rdma_op 0000000028e6e52a conn xmit_rdma 0000000000000000 [ 275.661010][ T9528] BPF: [ 275.674781][ T9528] BPF:Member exceeds struct_size [ 275.691698][ T9528] BPF: [ 275.691698][ T9528] [ 275.730165][ T9528] BPF: (anon) type_id=1 bitfield_size=0 bits_offset=0 [ 275.749468][ T9528] BPF: [ 275.761825][ T9528] BPF:Member exceeds struct_size [ 275.804038][ T9528] BPF: [ 275.804038][ T9528] [ 275.818102][ T9545] rdma_op 00000000679cb1c1 conn xmit_rdma 0000000000000000 07:02:44 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:02:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) ftruncate(0xffffffffffffffff, 0x1000000) sendfile(r0, 0xffffffffffffffff, 0x0, 0xeefffdef) 07:02:44 executing program 1: r0 = msgget$private(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) msgsnd(r0, &(0x7f0000000140)={0x3}, 0x8, 0x0) 07:02:44 executing program 5: clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @restrict={0x0, 0x0, 0x0, 0xb, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) socket(0x0, 0x0, 0x0) 07:02:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) 07:02:44 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401"], 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) [ 278.424901][ T9561] BPF: (anon) type_id=1 bitfield_size=0 bits_offset=0 [ 278.435407][ T9561] BPF: [ 278.439537][ T9561] BPF:Member exceeds struct_size [ 278.449363][ T9561] BPF: [ 278.449363][ T9561] [ 278.456363][ T9565] rdma_op 000000000d3927c1 conn xmit_rdma 0000000000000000 07:02:44 executing program 5: clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @restrict={0x0, 0x0, 0x0, 0xb, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) socket(0x0, 0x0, 0x0) 07:02:44 executing program 1: r0 = msgget$private(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) msgsnd(r0, &(0x7f0000000140)={0x3}, 0x8, 0x0) 07:02:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) 07:02:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) ftruncate(0xffffffffffffffff, 0x1000000) sendfile(r0, 0xffffffffffffffff, 0x0, 0xeefffdef) 07:02:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) [ 278.586707][ T9573] BPF: (anon) type_id=1 bitfield_size=0 bits_offset=0 [ 278.605943][ T9573] BPF: [ 278.616762][ T9573] BPF:Member exceeds struct_size 07:02:44 executing program 1: r0 = msgget$private(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) msgsnd(r0, &(0x7f0000000140)={0x3}, 0x8, 0x0) [ 278.641213][ T9573] BPF: [ 278.641213][ T9573] 07:02:47 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:02:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) 07:02:47 executing program 5: clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @restrict={0x0, 0x0, 0x0, 0xb, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) socket(0x0, 0x0, 0x0) 07:02:47 executing program 1: r0 = msgget$private(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) msgsnd(r0, &(0x7f0000000140)={0x3}, 0x8, 0x0) 07:02:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x0) ftruncate(r0, 0x1000000) sendfile(0xffffffffffffffff, r0, 0x0, 0xeefffdef) 07:02:47 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401"], 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:02:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$rds(0xffffffffffffffff, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) 07:02:47 executing program 1: r0 = msgget$private(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) msgsnd(r0, &(0x7f0000000140)={0x3}, 0x8, 0x0) [ 281.470120][ T9604] BPF: (anon) type_id=1 bitfield_size=0 bits_offset=0 [ 281.492937][ T9604] BPF: [ 281.500768][ T9604] BPF:Member exceeds struct_size [ 281.511566][ T9604] BPF: [ 281.511566][ T9604] 07:02:47 executing program 5: clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @restrict={0x0, 0x0, 0x0, 0xb, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 07:02:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x0) ftruncate(r0, 0x1000000) sendfile(0xffffffffffffffff, r0, 0x0, 0xeefffdef) 07:02:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$rds(0xffffffffffffffff, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) 07:02:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$rds(0xffffffffffffffff, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) [ 281.690970][ T9623] BPF: (anon) type_id=1 bitfield_size=0 bits_offset=0 [ 281.726418][ T9623] BPF: [ 281.751052][ T9623] BPF:Member exceeds struct_size [ 281.775302][ T9623] BPF: [ 281.775302][ T9623] 07:02:50 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:02:50 executing program 1: r0 = msgget$private(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) msgsnd(r0, &(0x7f0000000140)={0x3}, 0x8, 0x0) 07:02:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x0) ftruncate(r0, 0x1000000) sendfile(0xffffffffffffffff, r0, 0x0, 0xeefffdef) 07:02:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) 07:02:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @restrict={0x0, 0x0, 0x0, 0xb, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 07:02:50 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ff"], 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) [ 284.530789][ T9643] BPF: (anon) type_id=1 bitfield_size=0 bits_offset=0 [ 284.548014][ T9643] BPF: [ 284.556806][ T9643] BPF:Member exceeds struct_size [ 284.564138][ T9643] BPF: [ 284.564138][ T9643] [ 284.574337][ T9650] rdma_op 0000000060af3e3d conn xmit_rdma 0000000000000000 07:02:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) 07:02:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) r1 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) 07:02:50 executing program 1: r0 = msgget$private(0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgsnd(r0, &(0x7f0000000140)={0x3}, 0x8, 0x0) 07:02:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 07:02:50 executing program 1: r0 = msgget$private(0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgsnd(r0, &(0x7f0000000140)={0x3}, 0x8, 0x0) 07:02:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) r1 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) [ 284.751373][ T9659] rdma_op 0000000003d6129a conn xmit_rdma 0000000000000000 07:02:53 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:02:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 07:02:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) 07:02:53 executing program 1: r0 = msgget$private(0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgsnd(r0, &(0x7f0000000140)={0x3}, 0x8, 0x0) 07:02:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) r1 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) 07:02:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ff"], 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:02:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 07:02:53 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgsnd(0x0, &(0x7f0000000140)={0x3}, 0x8, 0x0) [ 287.598541][ T9680] rdma_op 00000000e7bc4529 conn xmit_rdma 0000000000000000 07:02:53 executing program 2: syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) r1 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) 07:02:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) 07:02:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000004600)=""/210, 0x0, 0xd2, 0x8}, 0x20) 07:02:53 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgsnd(0x0, &(0x7f0000000140)={0x3}, 0x8, 0x0) [ 287.802050][ T9695] rdma_op 000000003f916826 conn xmit_rdma 0000000000000000 [ 287.877411][ T9699] BPF:hdr_len not found 07:02:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000004600)=""/210, 0x0, 0xd2, 0x8}, 0x20) 07:02:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) 07:02:56 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:02:56 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgsnd(0x0, &(0x7f0000000140)={0x3}, 0x8, 0x0) 07:02:56 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ff"], 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:02:56 executing program 2: syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) r1 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) 07:02:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) [ 290.672968][ T9714] rdma_op 00000000d16da38a conn xmit_rdma 0000000000000000 [ 290.681773][ T9715] BPF:hdr_len not found 07:02:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000004600)=""/210, 0x0, 0xd2, 0x8}, 0x20) 07:02:56 executing program 1: r0 = msgget$private(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) msgsnd(r0, &(0x7f0000000140)={0x3}, 0x8, 0x0) 07:02:56 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) [ 290.803148][ T9725] rdma_op 00000000b2360819 conn xmit_rdma 0000000000000000 [ 290.818464][ T9727] BPF:hdr_len not found 07:02:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@enum, @restrict={0x0, 0x0, 0x0, 0xb, 0x1}]}}, &(0x7f0000004600)=""/210, 0x32, 0xd2, 0x8}, 0x20) 07:02:56 executing program 1: r0 = msgget$private(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) msgsnd(r0, &(0x7f0000000140)={0x3}, 0x8, 0x0) 07:02:56 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) [ 290.925982][ T9734] rdma_op 00000000ecbeb725 conn xmit_rdma 0000000000000000 07:02:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@enum, @restrict={0x0, 0x0, 0x0, 0xb, 0x1}]}}, &(0x7f0000004600)=""/210, 0x32, 0xd2, 0x8}, 0x20) [ 291.039201][ T9740] rdma_op 000000006e6d95b8 conn xmit_rdma 0000000000000000 07:02:59 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:02:59 executing program 1: r0 = msgget$private(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) msgsnd(r0, &(0x7f0000000140)={0x3}, 0x8, 0x0) 07:02:59 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) 07:02:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@enum, @restrict={0x0, 0x0, 0x0, 0xb, 0x1}]}}, &(0x7f0000004600)=""/210, 0x32, 0xd2, 0x8}, 0x20) 07:02:59 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:02:59 executing program 2: syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) r1 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) 07:02:59 executing program 1: r0 = msgget$private(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgsnd(r0, &(0x7f0000000140)={0x3}, 0x8, 0x0) [ 293.782115][ T9760] rdma_op 000000005760381f conn xmit_rdma 0000000000000000 07:02:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @restrict={0x0, 0x0, 0x0, 0xb, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 07:02:59 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:02:59 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) [ 293.963453][ T9771] BPF: (anon) type_id=1 bits_offset=0 [ 293.983228][ T9771] BPF: [ 293.995916][ T9771] BPF:Member exceeds struct_size 07:03:00 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)=@generic, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 07:03:00 executing program 1: r0 = msgget$private(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgsnd(r0, &(0x7f0000000140)={0x3}, 0x8, 0x0) [ 294.012536][ T9771] BPF: [ 294.012536][ T9771] [ 294.066378][ T9775] rdma_op 000000004c3f7b6f conn xmit_rdma 0000000000000000 07:03:02 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:03:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @restrict={0x0, 0x0, 0x0, 0xb, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 07:03:02 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) 07:03:02 executing program 1: r0 = msgget$private(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgsnd(r0, &(0x7f0000000140)={0x3}, 0x8, 0x0) 07:03:02 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) 07:03:02 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) r1 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) 07:03:02 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) 07:03:02 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) [ 296.876632][ T9797] rdma_op 00000000dd5a07e5 conn xmit_rdma 0000000000000000 [ 296.887962][ T9798] BPF: (anon) type_id=1 bits_offset=0 [ 296.903663][ T9798] BPF: 07:03:02 executing program 1: r0 = msgget$private(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgsnd(r0, &(0x7f0000000140)={0x3}, 0x8, 0x0) [ 296.924501][ T9798] BPF:Member exceeds struct_size [ 296.957030][ T9798] BPF: [ 296.957030][ T9798] 07:03:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @restrict={0x0, 0x0, 0x0, 0xb, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 07:03:03 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) [ 297.019048][ T9806] rdma_op 00000000da20974c conn xmit_rdma 0000000000000000 07:03:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) [ 297.131156][ T9813] BPF: (anon) type_id=1 bits_offset=0 [ 297.145048][ T9813] BPF: [ 297.150571][ T9813] BPF:Member exceeds struct_size [ 297.157569][ T9815] rdma_op 000000008e774fcd conn xmit_rdma 0000000000000000 [ 297.167341][ T9813] BPF: [ 297.167341][ T9813] 07:03:05 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:03:05 executing program 1: r0 = msgget$private(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgsnd(r0, &(0x7f0000000140)={0x3}, 0x8, 0x0) 07:03:05 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) 07:03:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@enum, @restrict={0x0, 0x0, 0x0, 0xb, 0x1}, @struct={0x0, 0x0, 0x0, 0x4, 0x1}]}}, &(0x7f0000004600)=""/210, 0x3e, 0xd2, 0x8}, 0x20) 07:03:05 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 07:03:05 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) r1 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) 07:03:05 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) [ 299.914438][ T9831] rdma_op 000000000d3927c1 conn xmit_rdma 0000000000000000 07:03:05 executing program 1: r0 = msgget$private(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgsnd(r0, &(0x7f0000000140)={0x3}, 0x8, 0x0) 07:03:05 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000000fc0), 0x0, 0x0, 0x0) 07:03:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@enum, @restrict={0x0, 0x0, 0x0, 0xb, 0x1}, @struct={0x0, 0x0, 0x0, 0x4, 0x1}]}}, &(0x7f0000004600)=""/210, 0x3e, 0xd2, 0x8}, 0x20) 07:03:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) [ 300.069112][ T9842] rdma_op 00000000679cb1c1 conn xmit_rdma 0000000000000000 07:03:06 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000000fc0), 0x0, 0x0, 0x0) [ 300.209510][ T9852] rdma_op 00000000855e1b66 conn xmit_rdma 0000000000000000 07:03:08 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:03:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@enum, @restrict={0x0, 0x0, 0x0, 0xb, 0x1}, @struct={0x0, 0x0, 0x0, 0x4, 0x1}]}}, &(0x7f0000004600)=""/210, 0x3e, 0xd2, 0x8}, 0x20) 07:03:08 executing program 1: r0 = msgget$private(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) msgsnd(r0, &(0x7f0000000140)={0x3}, 0x8, 0x0) 07:03:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) 07:03:08 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000401ffff"], 0x14}}, 0x0) recvmmsg(r2, &(0x7f0000000fc0), 0x0, 0x0, 0x0) 07:03:08 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) r1 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) 07:03:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) [ 302.990691][ T9867] rdma_op 0000000028e6e52a conn xmit_rdma 0000000000000000 07:03:09 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000200)={@multicast1, @local, @remote}, 0xc) setsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000100)={@rand_addr=0x11, @private}, 0xc) 07:03:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @restrict={0x0, 0x0, 0x0, 0xb, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 07:03:09 executing program 1: r0 = msgget$private(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) msgsnd(r0, &(0x7f0000000140)={0x3}, 0x8, 0x0) 07:03:09 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:03:09 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) r1 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) 07:03:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) [ 303.118750][ T9876] rdma_op 00000000d64d098c conn xmit_rdma 0000000000000000 07:03:09 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 303.189036][ T9888] BPF: (anon) type_id=0 bitfield_size=0 bits_offset=0 [ 303.216871][ T9891] rdma_op 000000002d439dbd conn xmit_rdma 0000000000000000 [ 303.235158][ T9888] BPF: 07:03:09 executing program 1: r0 = msgget$private(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) msgsnd(r0, &(0x7f0000000140)={0x3}, 0x8, 0x0) [ 303.252758][ T9888] BPF:Invalid type_id 07:03:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) 07:03:09 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) r1 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) [ 303.275887][ T9888] BPF: [ 303.275887][ T9888] 07:03:09 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:03:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @restrict={0x0, 0x0, 0x0, 0xb, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 07:03:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000680)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) 07:03:09 executing program 1: r0 = msgget$private(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) msgsnd(r0, &(0x7f0000000140)={0x3}, 0x8, 0x0) 07:03:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) [ 303.391069][ T9904] rdma_op 0000000082efee65 conn xmit_rdma 0000000000000000 07:03:09 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:03:09 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) r1 = memfd_create(0x0, 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) [ 303.470830][ T9913] BPF: (anon) type_id=0 bitfield_size=0 bits_offset=0 [ 303.510017][ T9917] rdma_op 00000000795b1c41 conn xmit_rdma 0000000000000000 [ 303.510937][ T9913] BPF: 07:03:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) 07:03:09 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 303.561243][ T9913] BPF:Invalid type_id [ 303.585216][ T9913] BPF: [ 303.585216][ T9913] 07:03:09 executing program 1: r0 = msgget$private(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) msgsnd(r0, &(0x7f0000000140)={0x3}, 0x8, 0x0) 07:03:09 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) 07:03:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @restrict={0x0, 0x0, 0x0, 0xb, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 07:03:09 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) r1 = memfd_create(0x0, 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) 07:03:09 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 303.678761][ T9932] rdma_op 000000008a8883c4 conn xmit_rdma 0000000000000000 07:03:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) 07:03:09 executing program 1: r0 = msgget$private(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) msgsnd(r0, &(0x7f0000000140)={0x3}, 0x8, 0x0) [ 303.776728][ T9943] BPF: (anon) type_id=0 bitfield_size=0 bits_offset=0 [ 303.800701][ T9943] BPF: [ 303.813573][ T9943] BPF:Invalid type_id [ 303.826931][ T9943] BPF: [ 303.826931][ T9943] 07:03:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@enum, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x3e, 0xd2, 0x8}, 0x20) [ 303.886225][ T9951] rdma_op 00000000ac6b815d conn xmit_rdma 0000000000000000 07:03:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) 07:03:09 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) r1 = memfd_create(0x0, 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) 07:03:09 executing program 1: msgget$private(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgsnd(0x0, &(0x7f0000000140)={0x3}, 0x8, 0x0) 07:03:09 executing program 3: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) dup2(r1, r0) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000080)={0x28, 0x2, 0x0, {0x1}}, 0x28) [ 303.991019][ T9957] BPF:[2] STRUCT (anon) [ 304.021766][ T9957] BPF:size=0 vlen=1 [ 304.034878][ T9957] BPF: [ 304.041274][ T9957] BPF:Loop detected [ 304.056506][ T9957] BPF: [ 304.056506][ T9957] 07:03:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(0xffffffffffffffff, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) [ 304.067624][ T9963] rdma_op 00000000c70f6255 conn xmit_rdma 0000000000000000 07:03:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@enum, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x3e, 0xd2, 0x8}, 0x20) 07:03:10 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) creat(0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000680)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) 07:03:10 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) r1 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x0) ftruncate(0xffffffffffffffff, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) [ 304.244438][ T9979] BPF:[2] STRUCT (anon) [ 304.253228][ T9979] BPF:size=0 vlen=1 [ 304.264677][ T9979] BPF: [ 304.267650][ T9979] BPF:Loop detected [ 304.274012][ T9979] BPF: [ 304.274012][ T9979] 07:03:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(0xffffffffffffffff, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) 07:03:12 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:03:12 executing program 1: msgget$private(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgsnd(0x0, &(0x7f0000000140)={0x3}, 0x8, 0x0) 07:03:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@enum, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x3e, 0xd2, 0x8}, 0x20) 07:03:12 executing program 3: io_setup(0x2c, &(0x7f0000000100)=0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) io_submit(r0, 0x1, &(0x7f0000000880)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) 07:03:12 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) r1 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x0) ftruncate(0xffffffffffffffff, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) [ 306.834184][T10004] BPF:[2] STRUCT (anon) [ 306.845799][T10004] BPF:size=0 vlen=1 [ 306.860564][T10004] BPF: [ 306.868748][T10004] BPF:Loop detected [ 306.880448][T10004] BPF: 07:03:12 executing program 1: msgget$private(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgsnd(0x0, &(0x7f0000000140)={0x3}, 0x8, 0x0) [ 306.880448][T10004] 07:03:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(0xffffffffffffffff, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) 07:03:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @restrict, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 07:03:12 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) r1 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x0) ftruncate(0xffffffffffffffff, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) 07:03:13 executing program 3: io_setup(0x2c, &(0x7f0000000100)=0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) io_submit(r0, 0x1, &(0x7f0000000880)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) 07:03:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, 0x0, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) [ 307.082973][T10018] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=0 [ 307.089798][T10018] BPF: 07:03:13 executing program 1: r0 = msgget$private(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) msgsnd(r0, 0x0, 0x0, 0x0) [ 307.130110][T10018] BPF:Invalid member [ 307.148012][T10018] BPF: [ 307.148012][T10018] [ 309.421874][ T0] NOHZ: local_softirq_pending 08 07:03:15 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:03:15 executing program 3: io_setup(0x2c, &(0x7f0000000100)=0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) io_submit(r0, 0x1, &(0x7f0000000880)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) 07:03:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, 0x0, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) 07:03:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @restrict, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 07:03:15 executing program 1: r0 = msgget$private(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) msgsnd(r0, 0x0, 0x0, 0x0) 07:03:15 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) r1 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x0) ftruncate(r1, 0x0) sendfile(r0, r1, 0x0, 0xeefffdef) 07:03:15 executing program 1: r0 = msgget$private(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) msgsnd(r0, 0x0, 0x0, 0x0) [ 309.883410][T10039] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=0 [ 309.897307][T10039] BPF: [ 309.906293][T10039] BPF:Invalid member [ 309.917682][T10039] BPF: [ 309.917682][T10039] 07:03:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, 0x0, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) 07:03:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @restrict, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 07:03:16 executing program 1: r0 = msgget$private(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) msgsnd(r0, &(0x7f0000000140), 0x8, 0x0) 07:03:16 executing program 3: io_setup(0x2c, &(0x7f0000000100)=0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) io_submit(r0, 0x1, &(0x7f0000000880)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) 07:03:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) [ 310.115622][T10056] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=0 [ 310.138064][T10056] BPF: [ 310.150885][T10056] BPF:Invalid member [ 310.168316][T10056] BPF: [ 310.168316][T10056] [ 310.702181][ T0] NOHZ: local_softirq_pending 08 [ 311.991641][ T0] NOHZ: local_softirq_pending 08 07:03:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) 07:03:18 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) r1 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x0) ftruncate(r1, 0x0) sendfile(r0, r1, 0x0, 0xeefffdef) 07:03:18 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:03:18 executing program 1: r0 = msgget$private(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) msgsnd(r0, &(0x7f0000000140), 0x8, 0x0) 07:03:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@restrict={0x0, 0x0, 0x0, 0xb, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x3e, 0xd2, 0x8}, 0x20) 07:03:18 executing program 3: io_setup(0x2c, &(0x7f0000000100)=0x0) io_submit(r0, 0x1, &(0x7f0000000880)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0}]) 07:03:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) [ 313.033821][T10083] BPF:[1] RESTRICT (anon) [ 313.053262][T10083] BPF:type_id=1 [ 313.070158][T10083] BPF: 07:03:19 executing program 1: r0 = msgget$private(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) msgsnd(r0, &(0x7f0000000140), 0x8, 0x0) 07:03:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, 0x0, 0x0) [ 313.083853][T10083] BPF:Loop detected [ 313.094826][T10083] BPF: [ 313.094826][T10083] 07:03:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@restrict={0x0, 0x0, 0x0, 0xb, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x3e, 0xd2, 0x8}, 0x20) 07:03:19 executing program 3: io_setup(0x2c, &(0x7f0000000100)=0x0) io_submit(r0, 0x1, &(0x7f0000000880)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0}]) 07:03:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, 0x0, 0x0) 07:03:19 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) r1 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x0) ftruncate(r1, 0x0) sendfile(r0, r1, 0x0, 0xeefffdef) 07:03:19 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@multicast, @link_local, @void, {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @local, @private=0xa010101, @dev, @local}}}}, 0x0) [ 313.308896][T10102] BPF:[1] RESTRICT (anon) [ 313.319323][T10102] BPF:type_id=1 [ 313.328912][T10102] BPF: [ 313.333799][T10102] BPF:Loop detected [ 313.337749][T10102] BPF: [ 313.337749][T10102] 07:03:22 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:03:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, 0x0, 0x0) 07:03:22 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@restrict={0x0, 0x0, 0x0, 0xb, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x3e, 0xd2, 0x8}, 0x20) 07:03:22 executing program 1: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000002c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x458, 0x5013, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x49, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1dc}}}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000140)={0x2c, &(0x7f0000000200)=ANY=[@ANYBLOB="0010b803"], 0x0, 0x0, 0x0, 0x0}, 0x0) syz_open_dev$hiddev(&(0x7f00000000c0)='/dev/usb/hiddev#\x00', 0x0, 0x0) r1 = syz_open_dev$hiddev(0x0, 0x0, 0x0) ioctl$HIDIOCGUSAGE(r1, 0xc018480b, &(0x7f0000000000)={0x1, 0x100}) 07:03:22 executing program 3: io_setup(0x2c, &(0x7f0000000100)=0x0) io_submit(r0, 0x1, &(0x7f0000000880)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0}]) 07:03:22 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) syz_open_dev$vbi(0x0, 0x1, 0x2) r0 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x0) ftruncate(r0, 0x1000000) sendfile(0xffffffffffffffff, r0, 0x0, 0xeefffdef) [ 316.077260][T10118] BPF:[1] RESTRICT (anon) 07:03:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x9c}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x36}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x9, 0x60}}], 0x48}, 0x0) [ 316.097733][T10118] BPF:type_id=1 [ 316.107162][T10118] BPF: [ 316.122437][T10118] BPF:Loop detected [ 316.139083][T10118] BPF: [ 316.139083][T10118] 07:03:22 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @restrict={0x0, 0x0, 0x0, 0xb, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, 0x0, 0x4a, 0x0, 0x8}, 0x20) 07:03:22 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) io_submit(0x0, 0x1, &(0x7f0000000880)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 07:03:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x9c}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x36}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x9, 0x60}}], 0x48}, 0x0) 07:03:22 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) syz_open_dev$vbi(0x0, 0x1, 0x2) r0 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x0) ftruncate(r0, 0x1000000) sendfile(0xffffffffffffffff, r0, 0x0, 0xeefffdef) 07:03:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x9c}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x36}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x9, 0x60}}], 0x48}, 0x0) [ 316.360300][ T2758] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 316.627123][ T2758] usb 2-1: Using ep0 maxpacket: 16 [ 316.752084][ T2758] usb 2-1: too many endpoints for config 0 interface 0 altsetting 0: 73, using maximum allowed: 30 [ 316.763158][ T2758] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 316.774622][ T2758] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 316.784813][ T2758] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 73 [ 316.798111][ T2758] usb 2-1: New USB device found, idVendor=0458, idProduct=5013, bcdDevice= 0.00 [ 316.807299][ T2758] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 316.824080][ T2758] usb 2-1: config 0 descriptor?? [ 317.309458][ T2758] input: HID 0458:5013 as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/0003:0458:5013.0001/input/input5 [ 317.327854][ T2758] input: HID 0458:5013 as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/0003:0458:5013.0001/input/input6 [ 317.435171][ T2758] kye 0003:0458:5013.0001: input,hiddev96,hidraw0: USB HID v0.00 Device [HID 0458:5013] on usb-dummy_hcd.1-1/input0 [ 318.450776][ C0] kye 0003:0458:5013.0001: usb_submit_urb(ctrl) failed: -1 07:03:25 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe2, &(0x7f0000000140)="f7f258480aa4ce20e779e70076cc036a2a160500000032a56f7259e480249950f34c6aa172903acab906712ebb70cef20d94de765aa586d65a3d7f022e4c14f1bdd7d464e9931470000000002f997905d398eef68310ec46b654cd8f9c032f1078c135c760ca5232f285d288f2fb01819502f5fa6fa2e945e156919190b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2fda6843d93182dc9d22a4396a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f751ed71062b9de9545b43450c488bc9dead25"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:03:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @restrict={0x0, 0x0, 0x0, 0xb, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, 0x0, 0x4a, 0x0, 0x8}, 0x20) 07:03:25 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) io_submit(0x0, 0x1, &(0x7f0000000880)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) [ 319.349957][ T2758] usb 2-1: reset high-speed USB device number 2 using dummy_hcd [ 319.589858][ T2758] usb 2-1: Using ep0 maxpacket: 16 07:03:25 executing program 1: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000002c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x458, 0x5013, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x49, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1dc}}}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000140)={0x2c, &(0x7f0000000200)=ANY=[@ANYBLOB="0010b803"], 0x0, 0x0, 0x0, 0x0}, 0x0) syz_open_dev$hiddev(&(0x7f00000000c0)='/dev/usb/hiddev#\x00', 0x0, 0x0) r1 = syz_open_dev$hiddev(0x0, 0x0, 0x0) ioctl$HIDIOCGUSAGE(r1, 0xc018480b, &(0x7f0000000000)={0x1, 0x100}) 07:03:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x9c}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x36}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x9, 0x60}}], 0x48}, 0x0) 07:03:25 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) syz_open_dev$vbi(0x0, 0x1, 0x2) r0 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x0) ftruncate(r0, 0x1000000) sendfile(0xffffffffffffffff, r0, 0x0, 0xeefffdef) 07:03:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @restrict={0x0, 0x0, 0x0, 0xb, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, 0x0, 0x4a, 0x0, 0x8}, 0x20) 07:03:25 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) io_submit(0x0, 0x1, &(0x7f0000000880)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) [ 319.877218][ T3099] usb 2-1: USB disconnect, device number 2 [ 319.894916][ T2758] ================================================================== [ 319.903379][ T2758] BUG: KASAN: use-after-free in __mutex_lock+0x1033/0x13c0 [ 319.910716][ T2758] Read of size 8 at addr ffff8880965a3150 by task kworker/0:4/2758 [ 319.918604][ T2758] 07:03:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x9c}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x36}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x9, 0x60}}], 0x48}, 0x0) [ 319.920942][ T2758] CPU: 0 PID: 2758 Comm: kworker/0:4 Not tainted 5.7.0-rc6-next-20200522-syzkaller #0 [ 319.930567][ T2758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.940761][ T2758] Workqueue: events __usb_queue_reset_device [ 319.946747][ T2758] Call Trace: [ 319.950149][ T2758] dump_stack+0x18f/0x20d [ 319.954496][ T2758] ? __mutex_lock+0x1033/0x13c0 [ 319.959352][ T2758] ? __mutex_lock+0x1033/0x13c0 [ 319.964299][ T2758] print_address_description.constprop.0.cold+0xd3/0x413 [ 319.971436][ T2758] ? cdev_device_del+0x69/0x80 07:03:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x9c}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x36}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x9, 0x60}}], 0x48}, 0x0) [ 319.976293][ T2758] ? mousedev_destroy+0x20/0xa0 [ 319.981216][ T2758] ? __input_unregister_device+0x1b0/0x430 [ 319.987038][ T2758] ? input_unregister_device+0xb4/0xf0 [ 319.992637][ T2758] ? hidinput_disconnect+0x15e/0x3d0 [ 319.998022][ T2758] ? vprintk_func+0x97/0x1a6 [ 320.002633][ T2758] ? __mutex_lock+0x1033/0x13c0 [ 320.007495][ T2758] kasan_report.cold+0x1f/0x37 [ 320.012271][ T2758] ? __mutex_lock+0x1033/0x13c0 [ 320.017149][ T2758] __mutex_lock+0x1033/0x13c0 [ 320.021833][ T2758] ? mousedev_cleanup+0x21/0x180 07:03:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100)}, 0x0) [ 320.026809][ T2758] ? print_usage_bug+0x240/0x240 [ 320.031924][ T2758] ? trace_hardirqs_off+0x50/0x220 [ 320.037046][ T2758] ? mutex_trylock+0x2c0/0x2c0 [ 320.041826][ T2758] ? mark_held_locks+0x9f/0xe0 [ 320.046617][ T2758] ? kfree+0x1eb/0x2b0 [ 320.050696][ T2758] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 320.056782][ T2758] ? kfree_const+0x51/0x60 [ 320.061229][ T2758] ? mousedev_cleanup+0x21/0x180 [ 320.066170][ T2758] mousedev_cleanup+0x21/0x180 [ 320.070950][ T2758] mousedev_destroy+0x28/0xa0 07:03:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100)}, 0x0) [ 320.075636][ T2758] __input_unregister_device+0x1b0/0x430 [ 320.081288][ T2758] input_unregister_device+0xb4/0xf0 [ 320.086583][ T2758] hidinput_disconnect+0x15e/0x3d0 [ 320.092015][ T2758] ? kernfs_remove_by_name_ns+0x62/0xb0 [ 320.097579][ T2758] hid_disconnect+0x13f/0x1a0 [ 320.102265][ T2758] hid_device_remove+0x186/0x240 [ 320.107216][ T2758] ? hid_compare_device_paths+0xc0/0xc0 [ 320.112856][ T2758] device_release_driver_internal+0x231/0x500 [ 320.118931][ T2758] bus_remove_device+0x2dc/0x4a0 [ 320.123947][ T2758] device_del+0x481/0xd30 [ 320.128289][ T2758] ? device_link_add_missing_supplier_links+0x370/0x370 [ 320.135528][ T2758] ? mark_held_locks+0x9f/0xe0 [ 320.140309][ T2758] ? _raw_spin_unlock_irq+0x1f/0x80 [ 320.145523][ T2758] hid_destroy_device+0xe1/0x150 [ 320.150552][ T2758] usbhid_disconnect+0x9f/0xe0 [ 320.155323][ T2758] usb_unbind_interface+0x1bd/0x8a0 [ 320.160614][ T2758] ? __pm_runtime_idle+0xd1/0x320 [ 320.165645][ T2758] ? usb_autoresume_device+0x60/0x60 [ 320.171055][ T2758] device_release_driver_internal+0x432/0x500 [ 320.177130][ T2758] usb_driver_release_interface+0x102/0x180 [ 320.183028][ T2758] unbind_marked_interfaces.isra.0+0x170/0x1f0 [ 320.189201][ T2758] usb_unbind_and_rebind_marked_interfaces+0x34/0x70 [ 320.195889][ T2758] usb_reset_device+0x739/0x8d0 [ 320.200763][ T2758] __usb_queue_reset_device+0x68/0x90 [ 320.207314][ T2758] process_one_work+0x965/0x16a0 [ 320.212271][ T2758] ? lock_release+0x800/0x800 [ 320.217047][ T2758] ? pwq_dec_nr_in_flight+0x310/0x310 [ 320.222432][ T2758] ? rwlock_bug.part.0+0x90/0x90 [ 320.227389][ T2758] worker_thread+0x96/0xe20 [ 320.231912][ T2758] ? process_one_work+0x16a0/0x16a0 [ 320.237176][ T2758] kthread+0x3b5/0x4a0 [ 320.241252][ T2758] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 320.246973][ T2758] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 320.252708][ T2758] ret_from_fork+0x24/0x30 [ 320.257134][ T2758] [ 320.259494][ T2758] Allocated by task 2758: [ 320.263831][ T2758] save_stack+0x1b/0x40 [ 320.267989][ T2758] __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 320.273625][ T2758] kmem_cache_alloc_trace+0x153/0x7d0 [ 320.279002][ T2758] mousedev_create+0x90/0xa20 [ 320.283682][ T2758] mousedev_connect+0x20/0x280 [ 320.288456][ T2758] input_attach_handler+0x194/0x200 [ 320.293655][ T2758] input_register_device.cold+0xf5/0x246 [ 320.299290][ T2758] hidinput_connect+0x4f8f/0xdb30 [ 320.304317][ T2758] hid_connect+0x96b/0xbc0 [ 320.308735][ T2758] hid_hw_start+0xa2/0x130 [ 320.313152][ T2758] kye_probe+0x44/0x536 [ 320.317308][ T2758] hid_device_probe+0x2be/0x3f0 [ 320.322154][ T2758] really_probe+0x281/0x6d0 [ 320.326654][ T2758] driver_probe_device+0xfe/0x1d0 [ 320.331685][ T2758] __device_attach_driver+0x1c2/0x220 [ 320.337067][ T2758] bus_for_each_drv+0x162/0x1e0 [ 320.341920][ T2758] __device_attach+0x21a/0x360 [ 320.346685][ T2758] bus_probe_device+0x1e4/0x290 [ 320.351555][ T2758] device_add+0xaf1/0x1900 [ 320.355978][ T2758] hid_add_device+0x33c/0x9a0 [ 320.360674][ T2758] usbhid_probe+0xac8/0xff0 [ 320.365189][ T2758] usb_probe_interface+0x305/0x7a0 [ 320.370295][ T2758] really_probe+0x281/0x6d0 [ 320.374817][ T2758] driver_probe_device+0xfe/0x1d0 [ 320.379829][ T2758] __device_attach_driver+0x1c2/0x220 [ 320.385181][ T2758] bus_for_each_drv+0x162/0x1e0 [ 320.390052][ T2758] __device_attach+0x21a/0x360 [ 320.394797][ T2758] bus_probe_device+0x1e4/0x290 [ 320.399642][ T2758] device_add+0xaf1/0x1900 [ 320.404042][ T2758] usb_set_configuration+0xec5/0x1740 [ 320.409431][ T2758] usb_generic_driver_probe+0x9d/0xe0 [ 320.414786][ T2758] usb_probe_device+0xc6/0x1f0 [ 320.419535][ T2758] really_probe+0x281/0x6d0 [ 320.424090][ T2758] driver_probe_device+0xfe/0x1d0 [ 320.429099][ T2758] __device_attach_driver+0x1c2/0x220 [ 320.434497][ T2758] bus_for_each_drv+0x162/0x1e0 [ 320.439348][ T2758] __device_attach+0x21a/0x360 [ 320.444096][ T2758] bus_probe_device+0x1e4/0x290 [ 320.448925][ T2758] device_add+0xaf1/0x1900 [ 320.453325][ T2758] usb_new_device.cold+0x753/0x103d [ 320.458503][ T2758] hub_event+0x1eca/0x38f0 [ 320.462906][ T2758] process_one_work+0x965/0x16a0 [ 320.467821][ T2758] worker_thread+0x96/0xe20 [ 320.472301][ T2758] kthread+0x3b5/0x4a0 [ 320.476430][ T2758] ret_from_fork+0x24/0x30 [ 320.480816][ T2758] [ 320.483122][ T2758] Freed by task 2758: [ 320.487082][ T2758] save_stack+0x1b/0x40 [ 320.491215][ T2758] __kasan_slab_free+0xf7/0x140 [ 320.496169][ T2758] kfree+0x109/0x2b0 [ 320.500056][ T2758] device_release+0x71/0x200 [ 320.504635][ T2758] kobject_put+0x1c8/0x2f0 [ 320.509159][ T2758] cdev_device_del+0x69/0x80 [ 320.513730][ T2758] mousedev_destroy+0x20/0xa0 [ 320.518498][ T2758] __input_unregister_device+0x1b0/0x430 [ 320.524917][ T2758] input_unregister_device+0xb4/0xf0 [ 320.530197][ T2758] hidinput_disconnect+0x15e/0x3d0 [ 320.535300][ T2758] hid_disconnect+0x13f/0x1a0 [ 320.539956][ T2758] hid_device_remove+0x186/0x240 [ 320.544894][ T2758] device_release_driver_internal+0x231/0x500 [ 320.550954][ T2758] bus_remove_device+0x2dc/0x4a0 [ 320.555880][ T2758] device_del+0x481/0xd30 [ 320.560204][ T2758] hid_destroy_device+0xe1/0x150 [ 320.565131][ T2758] usbhid_disconnect+0x9f/0xe0 [ 320.569881][ T2758] usb_unbind_interface+0x1bd/0x8a0 [ 320.575057][ T2758] device_release_driver_internal+0x432/0x500 [ 320.581103][ T2758] usb_driver_release_interface+0x102/0x180 [ 320.586988][ T2758] unbind_marked_interfaces.isra.0+0x170/0x1f0 [ 320.593138][ T2758] usb_unbind_and_rebind_marked_interfaces+0x34/0x70 [ 320.599796][ T2758] usb_reset_device+0x739/0x8d0 [ 320.604626][ T2758] __usb_queue_reset_device+0x68/0x90 [ 320.609996][ T2758] process_one_work+0x965/0x16a0 [ 320.614911][ T2758] worker_thread+0x96/0xe20 [ 320.619402][ T2758] kthread+0x3b5/0x4a0 [ 320.623451][ T2758] ret_from_fork+0x24/0x30 [ 320.627838][ T2758] [ 320.630164][ T2758] The buggy address belongs to the object at ffff8880965a3000 [ 320.630164][ T2758] which belongs to the cache kmalloc-2k of size 2048 [ 320.644202][ T2758] The buggy address is located 336 bytes inside of [ 320.644202][ T2758] 2048-byte region [ffff8880965a3000, ffff8880965a3800) [ 320.657536][ T2758] The buggy address belongs to the page: [ 320.663151][ T2758] page:ffffea00025968c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 [ 320.672253][ T2758] flags: 0xfffe0000000200(slab) [ 320.677087][ T2758] raw: 00fffe0000000200 ffffea0002583148 ffffea00025ee288 ffff8880aa000e00 [ 320.685664][ T2758] raw: 0000000000000000 ffff8880965a3000 0000000100000001 0000000000000000 [ 320.694222][ T2758] page dumped because: kasan: bad access detected [ 320.700623][ T2758] [ 320.702932][ T2758] Memory state around the buggy address: [ 320.708557][ T2758] ffff8880965a3000: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 320.716633][ T2758] ffff8880965a3080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 320.724685][ T2758] >ffff8880965a3100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 320.732736][ T2758] ^ [ 320.739388][ T2758] ffff8880965a3180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 320.747435][ T2758] ffff8880965a3200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 320.755481][ T2758] ================================================================== [ 320.763538][ T2758] Disabling lock debugging due to kernel taint [ 320.779665][ T2758] Kernel panic - not syncing: panic_on_warn set ... [ 320.786290][ T2758] CPU: 0 PID: 2758 Comm: kworker/0:4 Tainted: G B 5.7.0-rc6-next-20200522-syzkaller #0 [ 320.797230][ T2758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.807382][ T2758] Workqueue: events __usb_queue_reset_device [ 320.813356][ T2758] Call Trace: [ 320.816658][ T2758] dump_stack+0x18f/0x20d [ 320.820988][ T2758] ? __mutex_lock+0xf50/0x13c0 [ 320.825928][ T2758] panic+0x2e3/0x75c [ 320.829830][ T2758] ? __warn_printk+0xf3/0xf3 [ 320.834493][ T2758] ? preempt_schedule_common+0x5e/0xc0 [ 320.839951][ T2758] ? __mutex_lock+0x1033/0x13c0 [ 320.844797][ T2758] ? __mutex_lock+0x1033/0x13c0 [ 320.849685][ T2758] ? preempt_schedule_thunk+0x16/0x18 [ 320.855036][ T2758] ? trace_hardirqs_on+0x55/0x230 [ 320.860037][ T2758] ? __mutex_lock+0x1033/0x13c0 [ 320.864862][ T2758] ? __mutex_lock+0x1033/0x13c0 [ 320.869692][ T2758] end_report+0x4d/0x53 [ 320.873823][ T2758] kasan_report.cold+0xd/0x37 [ 320.878476][ T2758] ? __mutex_lock+0x1033/0x13c0 [ 320.883388][ T2758] __mutex_lock+0x1033/0x13c0 [ 320.888047][ T2758] ? mousedev_cleanup+0x21/0x180 [ 320.892961][ T2758] ? print_usage_bug+0x240/0x240 [ 320.897899][ T2758] ? trace_hardirqs_off+0x50/0x220 [ 320.902985][ T2758] ? mutex_trylock+0x2c0/0x2c0 [ 320.907740][ T2758] ? mark_held_locks+0x9f/0xe0 [ 320.912491][ T2758] ? kfree+0x1eb/0x2b0 [ 320.916563][ T2758] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 320.922533][ T2758] ? kfree_const+0x51/0x60 [ 320.926946][ T2758] ? mousedev_cleanup+0x21/0x180 [ 320.931863][ T2758] mousedev_cleanup+0x21/0x180 [ 320.936603][ T2758] mousedev_destroy+0x28/0xa0 [ 320.941367][ T2758] __input_unregister_device+0x1b0/0x430 [ 320.946992][ T2758] input_unregister_device+0xb4/0xf0 [ 320.952317][ T2758] hidinput_disconnect+0x15e/0x3d0 [ 320.957436][ T2758] ? kernfs_remove_by_name_ns+0x62/0xb0 [ 320.962961][ T2758] hid_disconnect+0x13f/0x1a0 [ 320.967716][ T2758] hid_device_remove+0x186/0x240 [ 320.972643][ T2758] ? hid_compare_device_paths+0xc0/0xc0 [ 320.978168][ T2758] device_release_driver_internal+0x231/0x500 [ 320.984227][ T2758] bus_remove_device+0x2dc/0x4a0 [ 320.989144][ T2758] device_del+0x481/0xd30 [ 320.993480][ T2758] ? device_link_add_missing_supplier_links+0x370/0x370 [ 321.000403][ T2758] ? mark_held_locks+0x9f/0xe0 [ 321.005188][ T2758] ? _raw_spin_unlock_irq+0x1f/0x80 [ 321.010362][ T2758] hid_destroy_device+0xe1/0x150 [ 321.015277][ T2758] usbhid_disconnect+0x9f/0xe0 [ 321.020029][ T2758] usb_unbind_interface+0x1bd/0x8a0 [ 321.025210][ T2758] ? __pm_runtime_idle+0xd1/0x320 [ 321.030209][ T2758] ? usb_autoresume_device+0x60/0x60 [ 321.035495][ T2758] device_release_driver_internal+0x432/0x500 [ 321.041587][ T2758] usb_driver_release_interface+0x102/0x180 [ 321.047497][ T2758] unbind_marked_interfaces.isra.0+0x170/0x1f0 [ 321.053634][ T2758] usb_unbind_and_rebind_marked_interfaces+0x34/0x70 [ 321.060308][ T2758] usb_reset_device+0x739/0x8d0 [ 321.065155][ T2758] __usb_queue_reset_device+0x68/0x90 [ 321.070509][ T2758] process_one_work+0x965/0x16a0 [ 321.075444][ T2758] ? lock_release+0x800/0x800 [ 321.080097][ T2758] ? pwq_dec_nr_in_flight+0x310/0x310 [ 321.085456][ T2758] ? rwlock_bug.part.0+0x90/0x90 [ 321.090370][ T2758] worker_thread+0x96/0xe20 [ 321.094863][ T2758] ? process_one_work+0x16a0/0x16a0 [ 321.100034][ T2758] kthread+0x3b5/0x4a0 [ 321.104075][ T2758] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 321.109766][ T2758] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 321.115475][ T2758] ret_from_fork+0x24/0x30 [ 321.121169][ T2758] Kernel Offset: disabled [ 321.125489][ T2758] Rebooting in 86400 seconds..