bc7da288a8be5869230fae230de433ef97c499e4f5ed5636b0bd0000000086c970de845572766c4e1d09154cd322f1a8c8ebe5a9492e7d1486d702018c"], &(0x7f0000000100)='GPL\x00'}, 0x48) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r2, 0x8912, 0x400308) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00', r1}, 0x10) setsockopt$sock_attach_bpf(r0, 0x29, 0x3, 0x0, 0x4) 16:16:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000029c0)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x6c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x58, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}]}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x18, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xe2c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_MASK={0xcd, 0x5, "08c5df13e114f99e62c374e4e3c4e0836d16d92246c13f00a063c2c02986f983fddcac4097b91ec4a058fe8511c974def9aa558e898b253d8f8bfa9dde0907b5eb1d83116debf71577dc5d3c4f7f83f3f30671c27c188625c9cbf189d7449c07e6a5a66703c2982e47b3527d0fa8bf3ef3a87a25d9101803b64cc49549656eba19cc9ca7779df01a5bbf5fd2ad8b4cda36e0110e13114c6bb04349a395cf88837d39c3e80df814b454fc5fcb254f42ec2dcbe999870dfd2e951a88ea557371eb111f6f5e9be0170661"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0xd49, 0x5, "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"}]}]}, 0xec4}}, 0x0) 16:16:23 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x12, 0xfffff000, 0x0, 0x2}, 0x40) 16:16:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000000400)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/126, 0x7e}], 0x1}}], 0x1, 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000500), r0) 16:16:23 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000001e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r2, 0x8912, 0x400308) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00', r1}, 0x10) setsockopt$sock_attach_bpf(r0, 0x29, 0x49, 0x0, 0x4) 16:16:23 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x600, 0x0) 16:16:23 executing program 3: socket(0x1d, 0x0, 0x8000) 16:16:23 executing program 5: setsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, &(0x7f0000000000), 0xfffffffffffffec8) 16:16:23 executing program 1: r0 = socket$kcm(0xa, 0x3, 0x11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) setsockopt$sock_attach_bpf(r0, 0x29, 0x19, 0x0, 0x4) 16:16:23 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002540)={0x0, 0x0, &(0x7f0000002500)={0x0}}, 0x0) 16:16:23 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x80, 0x5, 0x7}, 0x40) 16:16:24 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000029c0)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x70, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x58, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}]}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x18, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xe20, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_MASK={0xcd, 0x5, "08c5df13e114f99e62c374e4e3c4e0836d16d92246c13f00a063c2c02986f983fddcac4097b91ec4a058fe8511c974def9aa558e898b253d8f8bfa9dde0907b5eb1d83116debf71577dc5d3c4f7f83f3f30671c27c188625c9cbf189d7449c07e6a5a66703c2982e47b3527d0fa8bf3ef3a87a25d9101803b64cc49549656eba19cc9ca7779df01a5bbf5fd2ad8b4cda36e0110e13114c6bb04349a395cf88837d39c3e80df814b454fc5fcb254f42ec2dcbe999870dfd2e951a88ea557371eb111f6f5e9be0170661"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0xd39, 0x5, "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"}, @ETHTOOL_A_BITSET_MASK={0x4}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}]}]}, 0xec4}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) 16:16:24 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FD_FRAMES(r0, 0x65, 0x5, &(0x7f0000000300), &(0x7f0000000340)=0xfffffffffffffedf) 16:16:24 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f00000003c0)={'ip6_vti0\x00', 0x0}) 16:16:24 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r2, 0x8912, 0x400308) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$nl_audit(0x10, 0x3, 0x9) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000300)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)={0x28, r5, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_MESH_CONFIG={0xc, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HT_OPMODE={0x6}]}]}, 0x28}}, 0x0) sendfile(r3, r1, 0x0, 0x100007000) 16:16:24 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000001e40)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c29184ff7f0000cef809606056fe5c34664c0af9360a1f7a5e6b607130c89f18c0c1089d8b8588d72ec29c48b45ef4adf634be763289d01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf6023cd8e5c39d325ebbc08dee510cb2364149215108333719acd97cfa107d40224edc5465a932b77e74e802a0d42bc6099ad2300000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c89112f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb076719237c8d0e60b0eea24492a660583eecdbf5bcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c9b081d6a08000000ea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec2fed44da4928b30142ba11de6c5d50b83bae616b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0eb97fca585ec6bf58351d564beb6d952aab9c70764b0a8a7583c90b3433b809bdb9fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000000000000010008bc0d9559711e6e8861c46495ba585a4b2d02edc3e28dd271c896249ed85b980680b6c4a00000000ff435ac15fc0288d9b2a169cdcacc413b48dafb7a2c8cb482bac0adb02d9ba96ffffff7f0000100000000000007d5ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff729433282830689da6b53b263339863297771429d120000003341bf4a00fca0493cf29b33dcc9ffffffffffffffd39fec2271ff01589646efd1cf870cd7bb2366fde41f94290c2a5ff870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d10a64c108285e71b5565b1768ee58969ced595229df17bcad70fb4021428ce970275d13b78249788f11f761038b75d4fe32b561d46ea3abe0fa4d30fa94ef241875f3b4b6ab7929a57affe7d7fa29822aea69a660e717a04becff09000000724f4fce1093b62d7e8c7123d8ecbbc55bf404e4e1f74b7eed82571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c7dfa2e5877050c91301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f665c4d75cf2458e3542c9062ece84c99a061887a20639b41c8c12ee86c50804042b3eac1f879b136345cf67ca378e676c3e08c1ed43ca8d3d10994c0b58645ac518a75fde7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af403269b4a39ce40293947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f54c2d34b5457acf37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f4df90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464b635197351a5ef0a0fb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd452277c3887d6116c6cc9d8046c216c1f895778cb25122a2a998de44aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f83100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99b355b72d538ba4958ea8e4aa370ac891e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250df98674152f94e32409e2a3bce109b60000000000000000d6d5210d7560eb92d6a97a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137abf9a404abde7750898b1bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294859323e7a45319f18101288a0268893373750d1a8fe64680b0a3fc22dd704e4214de5944912d6c98cd1a9fbe1e7d58c08acaf30235b928a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009756237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854356cbe7df000000000000000000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66418d169fc03aa188546b3ad2a182068e1e3a0e2505bc7f41019645466ac96e0d4b3bc13c334b47f067bbab40743b2a428f1da1f68df75cf43f8ecc8d3726602111b40e761fd21081920382f14d12ca3c3431ee97471c7868dcda7eaa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1762eb0b428ee751c47d8e89fc745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945e20fa26b8471d42645288d7226bbd9c9e9e1cc9eb4a541e407cc2dae5e690cd628ab84875f2c50ba891cea599b079b4b4ba686fcdf240430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7daac4be290159f6bcd75f0dda9de5532e71ae9e48b0ed1254a83186c1526af6fbb869604d51a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47d6b70ebc660309e1e245b0fdf9743af930cd6db49a47613808bad959719c0000000000378a921c7f7f8433c2e24c7e800003c9e8095e02985f28e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205aa00b6d713acebc5b014e61a543a5a194f9ac18d76b5440e3b1a569ed7aa287378c697f6cafa86966d7ba19e720413268e4770132618df552c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e0f2645d1cdfa9fa410632f95a5f622f851c66ee7e30393cd7a4d67ff2a49c4f9360984b5c2d4523497e4d64f95f0a093564a1df87111c9bf3194fef97dcecc467ace45feeb685c5870d05f88a0f463db88d377442e1349acaf596218b54a9d624778e1c4cba6e6390a9f302c6eb2df7766411bef0ebb5002512bcbf9b24accfecb0f477db103463af2847e6ade5b9e065ec0d0ba58fedae5f08818fea475b169469f9efd131925d98c34b3cb26fe26796dd43b87e1cdee39f5cf21d2e80a64ac97e71cafc29bfb78db090dd12225efeda2e93bf7f6ba7865e9c375a780929dfa5a7036f5858e2a4ff8e8d1e8c9cceed07c6312b734c72510d335acc94f76e7078ce4066f1e0ac9429f8013683301277a11e25b248b61180cb6207a0e26757f3f1bfc6c27f3720d1fb74afb17f3b5239bc2243853d5234afb05ed6024e94dee34666c5b5522b54cb433efa54b4e9022533e7c89bdee957dfa9ded9f16fdcd1b681e4c72f32fa3334313e334cc140daec7dcb22f463457a1a5ac230bbded86258206046f556589f5627ab2751eb34d940519f009412098398ad822a8509d2d32da656ac5935e4c7f9503ce4daf13300dfd611528049310544d3e8613926fbe2647e258932592c9123f1c74023144442d09ef90c64950176c666da6b658108ac54beb2379aa70501c42bd9c4e4f426ab5ff2a33767b408ed19e399c33b52abc4ac24da0d4cf07d93029583591c33f0f80513c541581977f2e9735e1edb66fdbbe22eb4b0b670ba74fdee2f1a3cf85777af5d8267acaa9d83c23a4b40d0f53dce003c03c5959e405fc4f2c05d3394f014a39caabbeff7c7cadbdc57def7f5f758aa46b6e2fddc779770d7e395c4ac2a136a30e7c0a301dffc5565d7244fb29cd302c36e76221a3c4e21559216c078f06b0b04fb236ea14f9998776a0ae88dfeccc9ad64d2fe3cfdeb9684b7b7e5c00f7323f8214ed0189539e0e3e34c8e542c82ddbd6a75c1adbedef4d5d69b246a5a36ab802b0161908e748ed9891678c228413bf51b18a25bf776b9d1f1fedf97cf5e7de4455ea359e5796bd60cc415066fc271a2bdb7db13e72d1a99b375f96c4b5aef874037faf6a1d1aacf46a57346d000000000000000040c1051e444ea35432e022889fde59f038db4f83ffa3191116c7ba9434a7f758890f27b3acb915a7e5db2149e18c51b6db3edfdeb2ac8fe038f7987c5b38f206084bc5e8243f73e152980c414558a1f9dd35691d7f51f182393a434ba11112d7b3bf20fb62dc263b68149d8c22eb700f1e3b6ada85d949ddba3afae71082931899d138a2865685cb0d7e231838d00d1f1f104ab37b2929017a1d08f60b2cee3a49ea82b54244bec41e289ae1d7d578eed068912e2e72ffb0ccdacb8f459162b1338f91f247a2520e08c880463af6733fb1eecf800b7d074b435f1eaf608f34ddc421dc910fc282cf71114e97e5e4ab11c12c81502fb679666626e0cabdd23e7e29b4070cc18c24cf77fd9cae782eb7956e80abbc7da288a8be5869230fae230de433ef97c499e4f5ed5636b0bd0000000086c970de845572766c4e1d09154cd322f1a8c8ebe5a9492e7d1486d702018c"], &(0x7f0000000100)='GPL\x00'}, 0x48) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r2, 0x8912, 0x400308) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00', r1}, 0x10) setsockopt$sock_attach_bpf(r0, 0x29, 0x35, 0x0, 0x0) 16:16:24 executing program 0: openat$ppp(0xffffffffffffff9c, 0x0, 0x494100, 0x0) 16:16:24 executing program 4: r0 = socket$kcm(0xa, 0x3, 0x11) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r2, 0x8912, 0x400308) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00', r1}, 0x10) setsockopt$sock_attach_bpf(r0, 0x29, 0x10, 0x0, 0x4) 16:16:24 executing program 3: pselect6(0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)={0x0, 0x3938700}, 0x0) 16:16:24 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x1406, 0x4}, 0x10}}, 0x0) 16:16:25 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000000c0), 0x10) 16:16:25 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10002, 0x0) 16:16:25 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername(r0, &(0x7f0000000100)=@rc, &(0x7f00000000c0)=0xfffffffffffffd8d) 16:16:25 executing program 4: syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) 16:16:25 executing program 3: pipe(&(0x7f0000000380)) socket$inet6_mptcp(0xa, 0x1, 0x106) 16:16:25 executing program 5: r0 = socket$kcm(0xa, 0x3, 0x11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000001e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) setsockopt$sock_attach_bpf(r0, 0x29, 0x18, 0x0, 0x4) 16:16:25 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000001e40)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c29184ff7f0000cef809606056fe5c34664c0af9360a1f7a5e6b607130c89f18c0c1089d8b8588d72ec29c48b45ef4adf634be763289d01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf6023cd8e5c39d325ebbc08dee510cb2364149215108333719acd97cfa107d40224edc5465a932b77e74e802a0d42bc6099ad2300000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c89112f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb076719237c8d0e60b0eea24492a660583eecdbf5bcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c9b081d6a08000000ea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec2fed44da4928b30142ba11de6c5d50b83bae616b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0eb97fca585ec6bf58351d564beb6d952aab9c70764b0a8a7583c90b3433b809bdb9fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000000000000010008bc0d9559711e6e8861c46495ba585a4b2d02edc3e28dd271c896249ed85b980680b6c4a00000000ff435ac15fc0288d9b2a169cdcacc413b48dafb7a2c8cb482bac0adb02d9ba96ffffff7f0000100000000000007d5ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff729433282830689da6b53b263339863297771429d120000003341bf4a00fca0493cf29b33dcc9ffffffffffffffd39fec2271ff01589646efd1cf870cd7bb2366fde41f94290c2a5ff870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d10a64c108285e71b5565b1768ee58969ced595229df17bcad70fb4021428ce970275d13b78249788f11f761038b75d4fe32b561d46ea3abe0fa4d30fa94ef241875f3b4b6ab7929a57affe7d7fa29822aea69a660e717a04becff09000000724f4fce1093b62d7e8c7123d8ecbbc55bf404e4e1f74b7eed82571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c7dfa2e5877050c91301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f665c4d75cf2458e3542c9062ece84c99a061887a20639b41c8c12ee86c50804042b3eac1f879b136345cf67ca378e676c3e08c1ed43ca8d3d10994c0b58645ac518a75fde7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af403269b4a39ce40293947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f54c2d34b5457acf37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f4df90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464b635197351a5ef0a0fb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd452277c3887d6116c6cc9d8046c216c1f895778cb25122a2a998de44aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f83100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99b355b72d538ba4958ea8e4aa370ac891e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250df98674152f94e32409e2a3bce109b60000000000000000d6d5210d7560eb92d6a97a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137abf9a404abde7750898b1bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294859323e7a45319f18101288a0268893373750d1a8fe64680b0a3fc22dd704e4214de5944912d6c98cd1a9fbe1e7d58c08acaf30235b928a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009756237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854356cbe7df000000000000000000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66418d169fc03aa188546b3ad2a182068e1e3a0e2505bc7f41019645466ac96e0d4b3bc13c334b47f067bbab40743b2a428f1da1f68df75cf43f8ecc8d3726602111b40e761fd21081920382f14d12ca3c3431ee97471c7868dcda7eaa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1762eb0b428ee751c47d8e89fc745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945e20fa26b8471d42645288d7226bbd9c9e9e1cc9eb4a541e407cc2dae5e690cd628ab84875f2c50ba891cea599b079b4b4ba686fcdf240430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7daac4be290159f6bcd75f0dda9de5532e71ae9e48b0ed1254a83186c1526af6fbb869604d51a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47d6b70ebc660309e1e245b0fdf9743af930cd6db49a47613808bad959719c0000000000378a921c7f7f8433c2e24c7e800003c9e8095e02985f28e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205aa00b6d713acebc5b014e61a543a5a194f9ac18d76b5440e3b1a569ed7aa287378c697f6cafa86966d7ba19e720413268e4770132618df552c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e0f2645d1cdfa9fa410632f95a5f622f851c66ee7e30393cd7a4d67ff2a49c4f9360984b5c2d4523497e4d64f95f0a093564a1df87111c9bf3194fef97dcecc467ace45feeb685c5870d05f88a0f463db88d377442e1349acaf596218b54a9d624778e1c4cba6e6390a9f302c6eb2df7766411bef0ebb5002512bcbf9b24accfecb0f477db103463af2847e6ade5b9e065ec0d0ba58fedae5f08818fea475b169469f9efd131925d98c34b3cb26fe26796dd43b87e1cdee39f5cf21d2e80a64ac97e71cafc29bfb78db090dd12225efeda2e93bf7f6ba7865e9c375a780929dfa5a7036f5858e2a4ff8e8d1e8c9cceed07c6312b734c72510d335acc94f76e7078ce4066f1e0ac9429f8013683301277a11e25b248b61180cb6207a0e26757f3f1bfc6c27f3720d1fb74afb17f3b5239bc2243853d5234afb05ed6024e94dee34666c5b5522b54cb433efa54b4e9022533e7c89bdee957dfa9ded9f16fdcd1b681e4c72f32fa3334313e334cc140daec7dcb22f463457a1a5ac230bbded86258206046f556589f5627ab2751eb34d940519f009412098398ad822a8509d2d32da656ac5935e4c7f9503ce4daf13300dfd611528049310544d3e8613926fbe2647e258932592c9123f1c74023144442d09ef90c64950176c666da6b658108ac54beb2379aa70501c42bd9c4e4f426ab5ff2a33767b408ed19e399c33b52abc4ac24da0d4cf07d93029583591c33f0f80513c541581977f2e9735e1edb66fdbbe22eb4b0b670ba74fdee2f1a3cf85777af5d8267acaa9d83c23a4b40d0f53dce003c03c5959e405fc4f2c05d3394f014a39caabbeff7c7cadbdc57def7f5f758aa46b6e2fddc779770d7e395c4ac2a136a30e7c0a301dffc5565d7244fb29cd302c36e76221a3c4e21559216c078f06b0b04fb236ea14f9998776a0ae88dfeccc9ad64d2fe3cfdeb9684b7b7e5c00f7323f8214ed0189539e0e3e34c8e542c82ddbd6a75c1adbedef4d5d69b246a5a36ab802b0161908e748ed9891678c228413bf51b18a25bf776b9d1f1fedf97cf5e7de4455ea359e5796bd60cc415066fc271a2bdb7db13e72d1a99b375f96c4b5aef874037faf6a1d1aacf46a57346d000000000000000040c1051e444ea35432e022889fde59f038db4f83ffa3191116c7ba9434a7f758890f27b3acb915a7e5db2149e18c51b6db3edfdeb2ac8fe038f7987c5b38f206084bc5e8243f73e152980c414558a1f9dd35691d7f51f182393a434ba11112d7b3bf20fb62dc263b68149d8c22eb700f1e3b6ada85d949ddba3afae71082931899d138a2865685cb0d7e231838d00d1f1f104ab37b2929017a1d08f60b2cee3a49ea82b54244bec41e289ae1d7d578eed068912e2e72ffb0ccdacb8f459162b1338f91f247a2520e08c880463af6733fb1eecf800b7d074b435f1eaf608f34ddc421dc910fc282cf71114e97e5e4ab11c12c81502fb679666626e0cabdd23e7e29b4070cc18c24cf77fd9cae782eb7956e80abbc7da288a8be5869230fae230de433ef97c499e4f5ed5636b0bd0000000086c970de845572766c4e1d09154cd322f1a8c8ebe5a9492e7d1486"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x4a, 0x0, 0x4) 16:16:25 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000000980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 16:16:25 executing program 2: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r0, 0x113, 0x3, &(0x7f0000000000)=0x101, 0x4) 16:16:25 executing program 5: pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000100), &(0x7f0000000140)={0x0, 0x3938700}, 0x0) 16:16:25 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000180)='sys_exit\x00', r0}, 0x10) r2 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r2, &(0x7f0000000040)={0x28, 0x0, 0x0, @hyper}, 0x10) 16:16:26 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$ppp(r0, 0x0, 0x0) 16:16:26 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000001e40)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c29184ff7f0000cef809606056fe5c34664c0af9360a1f7a5e6b607130c89f18c0c1089d8b8588d72ec29c48b45ef4adf634be763289d01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf6023cd8e5c39d325ebbc08dee510cb2364149215108333719acd97cfa107d40224edc5465a932b77e74e802a0d42bc6099ad2300000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c89112f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb076719237c8d0e60b0eea24492a660583eecdbf5bcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c9b081d6a08000000ea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec2fed44da4928b30142ba11de6c5d50b83bae616b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0eb97fca585ec6bf58351d564beb6d952aab9c70764b0a8a7583c90b3433b809bdb9fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000000000000010008bc0d9559711e6e8861c46495ba585a4b2d02edc3e28dd271c896249ed85b980680b6c4a00000000ff435ac15fc0288d9b2a169cdcacc413b48dafb7a2c8cb482bac0adb02d9ba96ffffff7f0000100000000000007d5ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff729433282830689da6b53b263339863297771429d120000003341bf4a00fca0493cf29b33dcc9ffffffffffffffd39fec2271ff01589646efd1cf870cd7bb2366fde41f94290c2a5ff870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d10a64c108285e71b5565b1768ee58969ced595229df17bcad70fb4021428ce970275d13b78249788f11f761038b75d4fe32b561d46ea3abe0fa4d30fa94ef241875f3b4b6ab7929a57affe7d7fa29822aea69a660e717a04becff09000000724f4fce1093b62d7e8c7123d8ecbbc55bf404e4e1f74b7eed82571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c7dfa2e5877050c91301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f665c4d75cf2458e3542c9062ece84c99a061887a20639b41c8c12ee86c50804042b3eac1f879b136345cf67ca378e676c3e08c1ed43ca8d3d10994c0b58645ac518a75fde7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af403269b4a39ce40293947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f54c2d34b5457acf37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f4df90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464b635197351a5ef0a0fb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd452277c3887d6116c6cc9d8046c216c1f895778cb25122a2a998de44aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f83100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99b355b72d538ba4958ea8e4aa370ac891e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250df98674152f94e32409e2a3bce109b60000000000000000d6d5210d7560eb92d6a97a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137abf9a404abde7750898b1bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294859323e7a45319f18101288a0268893373750d1a8fe64680b0a3fc22dd704e4214de5944912d6c98cd1a9fbe1e7d58c08acaf30235b928a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009756237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854356cbe7df000000000000000000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66418d169fc03aa188546b3ad2a182068e1e3a0e2505bc7f41019645466ac96e0d4b3bc13c334b47f067bbab40743b2a428f1da1f68df75cf43f8ecc8d3726602111b40e761fd21081920382f14d12ca3c3431ee97471c7868dcda7eaa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1762eb0b428ee751c47d8e89fc745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945e20fa26b8471d42645288d7226bbd9c9e9e1cc9eb4a541e407cc2dae5e690cd628ab84875f2c50ba891cea599b079b4b4ba686fcdf240430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7daac4be290159f6bcd75f0dda9de5532e71ae9e48b0ed1254a83186c1526af6fbb869604d51a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47d6b70ebc660309e1e245b0fdf9743af930cd6db49a47613808bad959719c0000000000378a921c7f7f8433c2e24c7e800003c9e8095e02985f28e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205aa00b6d713acebc5b014e61a543a5a194f9ac18d76b5440e3b1a569ed7aa287378c697f6cafa86966d7ba19e720413268e4770132618df552c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e0f2645d1cdfa9fa410632f95a5f622f851c66ee7e30393cd7a4d67ff2a49c4f9360984b5c2d4523497e4d64f95f0a093564a1df87111c9bf3194fef97dcecc467ace45feeb685c5870d05f88a0f463db88d377442e1349acaf596218b54a9d624778e1c4cba6e6390a9f302c6eb2df7766411bef0ebb5002512bcbf9b24accfecb0f477db103463af2847e6ade5b9e065ec0d0ba58fedae5f08818fea475b169469f9efd131925d98c34b3cb26fe26796dd43b87e1cdee39f5cf21d2e80a64ac97e71cafc29bfb78db090dd12225efeda2e93bf7f6ba7865e9c375a780929dfa5a7036f5858e2a4ff8e8d1e8c9cceed07c6312b734c72510d335acc94f76e7078ce4066f1e0ac9429f8013683301277a11e25b248b61180cb6207a0e26757f3f1bfc6c27f3720d1fb74afb17f3b5239bc2243853d5234afb05ed6024e94dee34666c5b5522b54cb433efa54b4e9022533e7c89bdee957dfa9ded9f16fdcd1b681e4c72f32fa3334313e334cc140daec7dcb22f463457a1a5ac230bbded86258206046f556589f5627ab2751eb34d940519f009412098398ad822a8509d2d32da656ac5935e4c7f9503ce4daf13300dfd611528049310544d3e8613926fbe2647e258932592c9123f1c74023144442d09ef90c64950176c666da6b658108ac54beb2379aa70501c42bd9c4e4f426ab5ff2a33767b408ed19e399c33b52abc4ac24da0d4cf07d93029583591c33f0f80513c541581977f2e9735e1edb66fdbbe22eb4b0b670ba74fdee2f1a3cf85777af5d8267acaa9d83c23a4b40d0f53dce003c03c5959e405fc4f2c05d3394f014a39caabbeff7c7cadbdc57def7f5f758aa46b6e2fddc779770d7e395c4ac2a136a30e7c0a301dffc5565d7244fb29cd302c36e76221a3c4e21559216c078f06b0b04fb236ea14f9998776a0ae88dfeccc9ad64d2fe3cfdeb9684b7b7e5c00f7323f8214ed0189539e0e3e34c8e542c82ddbd6a75c1adbedef4d5d69b246a5a36ab802b0161908e748ed9891678c228413bf51b18a25bf776b9d1f1fedf97cf5e7de4455ea359e5796bd60cc415066fc271a2bdb7db13e72d1a99b375f96c4b5aef874037faf6a1d1aacf46a57346d000000000000000040c1051e444ea35432e022889fde59f038db4f83ffa3191116c7ba9434a7f758890f27b3acb915a7e5db2149e18c51b6db3edfdeb2ac8fe038f7987c5b38f206084bc5e8243f73e152980c414558a1f9dd35691d7f51f182393a434ba11112d7b3bf20fb62dc263b68149d8c22eb700f1e3b6ada85d949ddba3afae71082931899d138a2865685cb0d7e231838d00d1f1f104ab37b2929017a1d08f60b2cee3a49ea82b54244bec41e289ae1d7d578eed068912e2e72ffb0ccdacb8f459162b1338f91f247a2520e08c880463af6733fb1eecf800b7d074b435f1eaf608f34ddc421dc910fc282cf71114e97e5e4ab11c12c81502fb679666626e0cabdd23e7e29b4070cc18c24cf77fd9cae782eb7956e80abbc7da288a8be5869230fae230de433ef97c499e4f5ed5636b0bd0000000086c970de845572766c4e1d09154cd322f1a8c8ebe5a9492e7d1486d702018c"], &(0x7f0000000100)='GPL\x00'}, 0x48) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r2, 0x8912, 0x400308) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00', r1}, 0x10) setsockopt$sock_attach_bpf(r0, 0x29, 0x18, 0x0, 0x0) 16:16:26 executing program 1: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00'}) 16:16:26 executing program 5: r0 = socket$kcm(0xa, 0x3, 0x11) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000001e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r2, 0x8912, 0x400308) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00', r1}, 0x10) setsockopt$sock_attach_bpf(r0, 0x29, 0x19, 0x0, 0x0) 16:16:26 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) recvfrom$l2tp(r0, 0x0, 0x0, 0x40000060, 0x0, 0x0) 16:16:26 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x10000, 0x0) 16:16:26 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x100) getsockopt$inet6_mtu(r0, 0x29, 0x1e, 0x0, &(0x7f0000000180)) 16:16:26 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)="96", 0x1}, 0x0) 16:16:27 executing program 4: sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) 16:16:27 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r0, &(0x7f0000000d00)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000cc0)={0x0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001280), 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(&(0x7f0000001780), 0xffffffffffffffff) 16:16:27 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0xa003, 0x0) 16:16:27 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000000)=""/214, &(0x7f0000000100)=0xd6) 16:16:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan1\x00'}) 16:16:27 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002540)={0x0, 0x0, 0x0}, 0x0) 16:16:27 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, 0x0) 16:16:27 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000001c0)={0x8}, 0x0, 0x0, &(0x7f0000000280)={0x0, 0x3938700}, 0x0) 16:16:27 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000500), r0) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) 16:16:27 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="65580000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00{'], 0x40}}, 0x0) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 16:16:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x30, 0x0, 0x4, 0x0, 0x0, {{}, {}, {0x14, 0x18, {0x0, @bearer=@udp='udp:syz1\x00'}}}}, 0x30}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000980), r0) 16:16:28 executing program 2: mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x30, 0xffffffffffffffff, 0x0) 16:16:28 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, 0x0) 16:16:28 executing program 3: socket(0xa, 0x0, 0x40000000) 16:16:28 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x82, &(0x7f00000000c0), 0x4) 16:16:28 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x40) 16:16:28 executing program 5: pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x0, 0x3938700}, &(0x7f00000001c0)={&(0x7f0000000180)={[0x5]}, 0x8}) 16:16:28 executing program 4: syz_emit_ethernet(0xfc0, &(0x7f0000000000)={@local, @link_local, @void, {@generic={0x0, "ac187c9725aa675dd0d588845d5150119a433561600dd917cee7b94d50b9fa73c91741ee873c1e47989a9cf5a53ae34feabd638ab129d52d1b190050714a54982747ba115fa458b99c719a732c4acea85cf42291c8625723353b49e7800a0ef1bac0cff84061d52659e8906da4fe638da9d76bd4bc926c3eb25dfa8b65a2648df1b44dce3d928d2189d249f9ba56afcc41be1ae323a1fd7ebb4970dfb3561df4f25e0442a885f3c2c2fd0af8b9aecba7c04ce22ad33c3070bc7b583b5a0c14b7206dbde9527cb71244d8230195f18483dcc7e43e8b68cbe8e1354726f99d0df23914c578ff04b5fa40de5cc670e40b79ff90a133c906b38c8344d3a060837fbb3725b073611bd05fb635f759a1e341de676a68a66d0831157d80873e0b35a68cb05e5fc4ede19137e2e0361ae009ac3811a2c50cc2411848e32b05d99d512dc1f037052ebdb894d8dab45b242f98fca21c51cdab2e9fe540117a0819cbaf7ec351deaf22875ee4c4c1726c3a6bf31df1419bda4eec4ab18c87afa055ab9464013ed1cbec2832abd52d00366dc9cdd1c3b209c547b5fe0728bc0ec26c84eb56a6a4d8c103e9ae2a76d042c5d417ac8c0c9a46459e475f66be848e741844d475fdab24ae56368d1d70fc78f6990c1a2fe44185e0efd376567b6b59bfab3dc8d1517206f603386389c2674b3083f060de4c579d860019e33ca825440df6e7fb38b69f8f62895ca25a8cd8576f6f386d3a7177c6a0a56eda059cce4285d53dbb7ee0b7945ce5109f4f99b0a3ec3ae63d41247a4aa8ba676e34dabd5f060e7e136f795541d92dff8d8757017dcbc5efdf132b42ad4667a6f67ab0a935343294e286a9bb99e8f35595fdb61699fe666a1bc1190687400f306076b3ab7abfbcf36666e609828a618b0a91492624a4468f8ee44fbea25b7c15fe5fc6ee2d51a8b71e65f80b6d1a25eb0db7a49a5681efb65294b39ac66a8a6641d15fb11a2945df269e47cd6a3f86001c86c0a614fb1916a7611fd417f96ae9a3cbd0cef7035b3b71a720998f531d816197e04eb5527901ec9413108dea1aa435e2450cd82ae4da0e55d1aa5be02f850ca5ffa52f3cc6a4b2a2f80282b935c58c1317073092c97c4c255ade35aff32125ec4974f2431ac6c23e5aa89cd3e84ddc8730cff8c9e5d7f4307a3840c3a8be1c6975b8192576f38a8d6e09f774a333b3190b9bd41e2b496f9a4b50f320a782775530e5a08ed616d5c1ee13233f55fb87aa7b369dd8099b11a77177664b2df1c1975893e195a0c5a09e7889ce8f4da2a35375752cfe4297bd50d586c4d11834a9d63a7b4a518040b4c08249d91849c5d14ec91ea36f4d9f3515e69149e9f1e84b0593d21d549539fc17dfe2a7b92cd0b2a90e6f476aa6ae7ba9a0f09f03229c9479f8d10564cd280c345a295ed6081c898a53ee1021d665589339ebd290d4c9ceacb387d2ac4190661af018f0fa278eebca298d1a48819a1aaf4e1db1d8f0c2e3fc108ffdc99fe4ab3067dfbf24836978a158a2349d81e29713b1619e9f0b4bd79fef7bff7bba46b6408718bf40dc8bfbc58eb9c50f0c722b412cfd6b80d0468e3ff2620a44569983e11211f1988e82871424726a75cc9194b67982700950f44b205b1e23d8be47dc3522bb2020b39c269b54b79af013b33519f4b963fb8eda2afb55f240f2ee21abe89382cc2b780fae597f70af7de663c75e7b1b32cc6edfc28764621d09da69604e1c6dd25919515efeb00d92da48fba0e220626d08443762fbd032138dfa3593ca67424c1b1820fc5a672522ad1ceb8e0440c74484c215d42d24a970ffd729f90b2dff555cf7159b2e5dceb1178b672eade75a5776fa4414ab713e88345e29fc398366171cc1948eb3cb07935905108ccccaf632dca6e50158ef0df5ad9f6e77aa243e4bb844402e1cabc7a6e455c89b87ebe3f8eec5e831fa6bbef68cb4bf152444aeb7a1455d59a64722f5d4c0a2bfddbf47c0e4bab46fd18916b6853c8ed0ef5e155558572c7c7bef53e808afb277576d637fc8dfcf059b546edd10e39e40a322eb2e062f42f4359629106c3b5dbcf63986a374aeef65df3f20ff8593bb24b5719f5b88c8f6893ebe023a27a4eb11d1c682b9ff4bdae8b79292a232a0e899186ceef1baabe88bd871fc305525b78568512c146550c2f637d6b277a2eed1ab104e19e08e4994639d4cc819be9f0d3fe09d77e94644421a2e007b234651887f0e908e148347acee231bb8a82fe2dad29c29236a39b9550d8784d06c60821145e7f629cc3bf92f705447002fcc12f801b096f6cf208212ece2a37d74e875bce38b9fdbdd207cb1b35b8886067827ce6e6342f587a763285a693645ec94b86cd326bc7f6c444e3256c774bdb43767d4a28150fdb560a42ecb6cf7efcea24f66f3ff6f2ca35b53db9594551a7dea830edf6da18e6cff4cbd81e698a16e6705be3fce072b1e32f636048a51aa96cb1727729d38e2a8ab7d1317e45de1daf96f8120338de6a36c9b71763d6f2c82b6e6d5028ed2cfea8094d5e4e0cbb1ee1f77d1a018eb1e578c75ff1b76a7852f5d05b52f272c81e64f6d0c1cc8006ad1f427ff5c5b4e6fd00298a340cb3b92556b41f16ba070fd9759baa9a8be552e46a26575a43adf763f8359b5b075ada67d894c101685af3bad8f50cd5c94feb80007f50c032eb0eb52c7351d414ab055950050a46acbe6f752d865915d249911ba65a12307f2ca5911493bf2dc2571c99ff1a445399d1cef5c12294f8b45d5696a54a5df7fc6c09cb6f9a1d24b76349dd4246beaeddee3671a694385d600524ba632a99832231c582fb15ca664c9098d752f09c49bff16c810d8e665078da1072fd259e717d0b28d3a00d7f98f073745ea8aace7d88e970caf833ca10dcbab4d3d66552778257901d619c2890b7a0adc1d2a7c33c8d99e8e93067bdade5a97a60bc2192a6ba1c68709ae45f74adacb3b9276e038d122de076f1cdd815bd25edec5f554db0ad78f62b8424245821aba86846c5aebdef666f3dc8f4550ec862724496b5af821659e8fc9f723b46aa85d18769f1434eda0a599329709504b41c5d39be688cfb2fa5afa7a998553b578dd42419c3f74c031163492cb9e487961f5dd2a2103e92c2fc6e92a554199a4d24505357d4ca69015bd8fbc380c8eb5eff4a88649e04e758dbac187971bf7e05e8658c4cd0118fc7419a30093dab7109a0ef5222e9cdceb587e820c5f0b3d2d7b4a563e97a7fc6867ce68eede2ea36686f706e839f0a0e747ba3a68035ed13563e52937c07434951ab3e50023d74370a31c784323e8bb02cf05bdc0893c80642f042d7122ea8bc7a3836f3286c25cdca7bca63401f7006c5e0981740a8e54becaffe194abca5669dca679e24d1826264dcba9a5fc3efa03c915be7f518f60c7940c57824f20891f4de684de36033f7d6a132e0c9d9e70903b10769cca3b4a1c86d41b3fddd8f37023f8f15435432e110aa724e5a612e4aea0a855b8ec804fbd260873677631196fdb6b74797b239e2ea38a460c2b8a50d540010f56f2554dd865448aa8d6ed4a1a5b840c9aec29791b7a7040be65f1090bc6ce2bec3b85b6dc8164ade6c674d57a0748da9536ae968303e5b5aae47626c32904846190b17a1a9a24cb2b5323de7ecaafd5a4ac8834d287af8c5ce158a758b172e3975dc93b0d793191a74ce784bb18981596a7ef430d053734ffcb0a015c7a31bd6f0a80516413eda730e1e9cf8f036bb904b1ac9b1f6a173c47e9d3437be3dd7d93a4d624a13029e9d3222f06d4a257a8c4fb2b6dbb5e3a181a9b7a8c2ae6d4ef33242d4e1a48a6a5a5ecd570936e437f93794c961d7a65991193b8e2caff85b034967bc548cc912c904091f1db149484e5fd3c6dd5e54b51dec16e527e0d6b346b9c308e478cbb00e5215f78f17bda34a76042a08f9e39e07030a6a0457456ffa61f40def2f8bdb1ddfdd9b23a21fb60f68b84fe17d25f8ecee9b0a00540f0732fd7d05368c9081a32f78b063c80b8c0bc6e1e66690e42aa140ba2996b398b376dbfa3689258e0735a5dfa541c725472767214d9d61b6e53c04329d2dc399ba475a1e41dbf575b75cba6c872692ae2209c9eade6d85b1ad5e02181d017493dd4bc6283e1ff05934ffcbc1e685e2fc9dea06ae846c8bda86c0cbcde32d5d9601731017b909dc08bac3a0527412fae560775f58109f6d6eedaa69ced41cf9defb78a21cd0a601c5cfa45dcea22bf717968fd4dbca11314763728ce3a95baf0d314d6745e0402e23dcda1ff4b8ea064924a6b6edcaef95abac89d8491efb301f176ffe2aa5f2764b979bd492316c33e66ab35e94e51e9991ca358f0e28852e376b34c77da42252045c70400031f7c70b469ef5375fff6f30f1545bd4860473e8f0fb212bbf7cbae98eb810256bcf5ef4525249638bfe303999ed84c66051aea9e41aefc28f15b3ac9551a3419a3da251330db23386720a40c065a41cd8b9c6dae43b04d19c780fc26452904ffff9ac71fe28044965569ae92f03054647719d112613b69a6f5c0f94f50b9f440994a6eeff6bf21448996d4f48b78440783bb606bc611f547e51de37d1fbb906c7c453b56f36836bded747858a4e4181f65069cee0c0cd4715dd13dfd495a58d50e381298970f01e119623dfa58691b8b76747454c66e98bdf6f69fff5fb573f4255ef68084ef4b78c8da8dfdca0c762bee1549ee9a41b0af961e7bc6ade3e9e1bd9de7685bb089e5b028707124887253822de7a4200620e1bd8bb2f3f436a53539db21723770f5b34b96058e091b27a29c314cefec4564752bb7a0b4779cb2fea126164b94cc33fb40c3bbc8983fcbd51ee4cb984308ab76a13029bf3ffee548090b542e6bb1cfb383d6c3a73a51cc9e6b3826fe8ca123ad29ae4921ec4d2aa981e96e4389d350437c112f4d0f93e3c71cd3e5126498a33f04e0f24abf3240b770ad9e800865bfdc1f4038b95e413c6084c6830f1356eb18bcf208c7546102817e94cf7a8f77f51b391a7aaa0905398aabe8982aca988b927fdaeeea355d905dbb24cb7ccabbf0a2b3cde579a6fca3b5c3c34dae0ba6bd56d9e4368743a6f699eb5f8eb1ece7fe52c3ab94b3ee7c1d7f9cad70fb3ecf0e8de793653d1323d300f3e7c0320f8ee3ceda17467a9178c895e93acd9871191a54dbaf507e4b523f3e65da97f724d694b55fc5d4430c677e3b51859cc9980ca77520600982cc9843eb518e993588967daa6d943f3e05fd46468f479b64e17d6dc77f316fae293ca889935b7e4c2223dae2902c47e8fa39b430c46c88aff286fc419fb6db856844ac87a142e616ed88d00b60a9edf9a50100cb53de5ce131557e875c1c667ee363413cfb4be6658f58ed41816a84f8f8a9c57a9a4fa730b6f91debdb326aca63fd46d3d419d78fe9ebdd142854ce7a627a6413191b90918ebf03d5c0974b053536681ffafe1a41174263aaca513dda6b5cc65c9f874e9bbec1595c2400a8de0e47512cb7af46080b3fb128f0248dbea62faf4975683b86a1a84cdac47917a62f056dedf3e0bb5288bd91e22e68ad1b8bc27e2d54aec93239d4852bd3da8b8226f6493cd838edf87a22f1589e91d22d0b3fecc5193932b93ca8783a351f883474aa337f22b1bad2d4d631b95d84bf78c951de44bae04a6a9286"}}}, 0x0) 16:16:28 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="c8000000", @ANYRES16=r1, @ANYBLOB="01002dbd7000fddbdf250100000008000100", @ANYRES32=0x0, @ANYBLOB='x\x00\b'], 0xc8}}, 0x0) 16:16:28 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_POWER_SAVE(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x14, 0x0, 0x4, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10040, 0x0) 16:16:29 executing program 2: socket$kcm(0xa, 0x3, 0x11) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000001e40)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) setsockopt$TIPC_MCAST_REPLICAST(r0, 0x10f, 0x86) 16:16:29 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/time_for_children\x00') ioctl$NS_GET_OWNER_UID(r0, 0xb704, 0x0) 16:16:29 executing program 5: syz_genetlink_get_family_id$nl80211(&(0x7f0000001180), 0xffffffffffffffff) 16:16:29 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r2, 0x8912, 0x400308) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$nl_audit(0x10, 0x3, 0x9) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000300)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)={0x28, r5, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_MESH_CONFIG={0xc, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_ELEMENT_TTL={0x5, 0xf, 0x1}]}]}, 0x28}}, 0x0) sendfile(r3, r1, 0x0, 0x100007000) 16:16:29 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, 0x0, 0x0) 16:16:29 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x814, 0xffffffffffffffff, 0x9}, 0x40) 16:16:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000011600)={0x0, 0x2c}}, 0x0) 16:16:29 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$tipc(r0, 0x0, 0x0, 0xc0800) 16:16:30 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000029c0)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x68, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x50, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}]}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x18, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xe30, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_MASK={0xcd, 0x5, "08c5df13e114f99e62c374e4e3c4e0836d16d92246c13f00a063c2c02986f983fddcac4097b91ec4a058fe8511c974def9aa558e898b253d8f8bfa9dde0907b5eb1d83116debf71577dc5d3c4f7f83f3f30671c27c188625c9cbf189d7449c07e6a5a66703c2982e47b3527d0fa8bf3ef3a87a25d9101803b64cc49549656eba19cc9ca7779df01a5bbf5fd2ad8b4cda36e0110e13114c6bb04349a395cf88837d39c3e80df814b454fc5fcb254f42ec2dcbe999870dfd2e951a88ea557371eb111f6f5e9be0170661"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0xd4d, 0x5, "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"}]}]}, 0xec4}}, 0x0) 16:16:30 executing program 4: process_vm_writev(0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=""/45, 0x26}, {&(0x7f0000000080)=""/53, 0x35}], 0x2, &(0x7f00000026c0)=[{&(0x7f00000001c0)=""/74, 0x4a}, {&(0x7f0000000340)=""/243, 0xffffffffffffffda}, {&(0x7f0000000240)=""/254, 0x36}, {&(0x7f0000002500)=""/176}, {&(0x7f0000005c80)=""/4096}, {&(0x7f0000002740)=""/240}], 0x2, 0x0) 16:16:30 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040), 0x3, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0585611, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0}) 16:16:30 executing program 1: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000000c0)=ANY=[@ANYBLOB="90030000", @ANYRES16=r1, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r4, @ANYBLOB="7103330080800000080211000001080211"], 0x390}}, 0x0) 16:16:30 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000140)='cpu.stat\x00', 0x275a, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r2, r1, 0x0, 0x2000000002a5) 16:16:30 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="c8000000", @ANYRES16=r1, @ANYBLOB="01002dbd7000fddbdf250100000008000100", @ANYRES32=0x0, @ANYBLOB="780008807400008024000100975c9d81c983c8209ee781254b899f8ed925ae9f0923c23c62f53c57cdbf691c060005000200000008000a000100000008000a0001000000060005003f00000024010200b3470da079efff4439efa55f8f2c27cf53d6ef4ffa674b5333b9daf4c8d4a2cd0600050009000000060006004e22000008000700fdffffff240003"], 0xc8}}, 0x0) 16:16:30 executing program 5: syz_genetlink_get_family_id$tipc(&(0x7f0000000c00), 0xffffffffffffffff) 16:16:30 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={0x0, 0x50}}, 0x0) 16:16:30 executing program 1: r0 = syz_open_dev$vivid(&(0x7f0000000000), 0x3, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0xff, 0x0, "9ba71e63318773f22c074252f32d589d1532afa16f928972"}) 16:16:30 executing program 3: r0 = syz_open_dev$video4linux(&(0x7f0000000000), 0x401, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585605, &(0x7f0000000440)={0x0, 0x0, {0x3a329383, 0x0, 0x2001, 0x4, 0x2}}) 16:16:30 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) recvmsg(r0, 0x0, 0x0) 16:16:31 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) accept(r0, 0x0, 0x0) 16:16:31 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f0000000000), 0x0, 0x0) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000140)={0x0, 0x0, "4da66fcf7828428e81d0ca618f63f891c847c0da413c133f"}) 16:16:31 executing program 1: r0 = syz_open_dev$video4linux(&(0x7f0000000000), 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f00000001c0)={0x1}) 16:16:31 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000002000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) write$qrtrtun(r0, 0x0, 0x0) 16:16:31 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x8}, 0x0, 0x0) 16:16:31 executing program 3: select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x77359400}) 16:16:31 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000040), 0x3, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0285629, &(0x7f00000000c0)={0x9e0000, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}) 16:16:31 executing program 5: syz_open_dev$dmmidi(&(0x7f0000000000), 0x2, 0x40002) 16:16:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="50000000100005070900000000000000d3cc0081", @ANYRES32=0x0, @ANYBLOB="7fff0002810d03001c0012000b0001006d616373656300e10b00020005000800010000000a0005403d"], 0x50}}, 0x0) 16:16:31 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000009c0)={'ip6gre0\x00', &(0x7f0000000940)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @ipv4={'\x00', '\xff\xff', @empty}}}) 16:16:32 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000040), 0x0, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0585609, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}) 16:16:32 executing program 2: r0 = syz_open_dev$vivid(&(0x7f0000000000), 0x3, 0x2) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000100)={0x0, 0x5, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "fc2b6494"}}) [ 323.220312][T10795] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 323.228721][T10795] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 323.249666][T10795] device macsec1 entered promiscuous mode 16:16:32 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0xcde20c1e56e640b2, 0x0) 16:16:32 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000040), 0x3, 0x0) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000000)=0x9) 16:16:32 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000002c00), 0x0, 0x0) mmap$usbmon(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) 16:16:32 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000040), 0x0, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0x541b, 0x0) 16:16:32 executing program 1: r0 = syz_open_dev$video4linux(&(0x7f0000000000), 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc0205649, &(0x7f0000000080)) 16:16:32 executing program 3: mmap$usbmon(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 16:16:33 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x700}}) 16:16:33 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x20, 0x80001) write$P9_RXATTRWALK(r0, 0x0, 0x0) 16:16:33 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f0000000000), 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r0, 0xc040564a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4f92ae5eb13e4e2}) 16:16:33 executing program 2: r0 = syz_open_dev$video4linux(&(0x7f0000000000), 0x2, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r0, 0xc040564a, &(0x7f0000000100)) 16:16:33 executing program 1: syz_open_dev$vcsa(&(0x7f0000000480), 0x0, 0xa00) 16:16:33 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) recvmsg(r0, &(0x7f0000001b00)={0x0, 0x0, 0x0}, 0x0) 16:16:33 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d", 0x7b}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:16:33 executing program 4: syz_open_dev$dmmidi(&(0x7f0000000000), 0x200, 0x26001) 16:16:33 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000140)={0x2020}, 0x2020) 16:16:34 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000040), 0x0, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0d05640, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}) 16:16:34 executing program 1: r0 = syz_open_dev$video4linux(&(0x7f0000000000), 0x0, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000140)={0x0, 0x0, '\x00', {0x0, @reserved}}) 16:16:34 executing program 5: r0 = gettid() process_vm_writev(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/181, 0xb5}], 0x1, &(0x7f00000006c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:16:34 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000040), 0x0, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0x40086602, &(0x7f00000000c0)={0xf64ffff, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}) [ 325.536427][ T3123] ieee802154 phy0 wpan0: encryption failed: -22 [ 325.543011][ T3123] ieee802154 phy1 wpan1: encryption failed: -22 16:16:34 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000002280), 0x40000, 0x0) 16:16:34 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'ip6_vti0\x00', 0x0}) 16:16:35 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x80001) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xf}, 0xf) 16:16:35 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000040), 0x3, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000080)}) 16:16:35 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000002c00), 0x0, 0x0) mmap$usbmon(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) 16:16:37 executing program 0: r0 = gettid() process_vm_writev(r0, &(0x7f0000000180)=[{&(0x7f0000000040)=""/38, 0x26}, {&(0x7f0000000000)=""/51, 0x3d}], 0x2, &(0x7f0000000440)=[{&(0x7f0000000240)=""/78, 0xffffff4d}, {0x0}], 0x2, 0x0) 16:16:37 executing program 2: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x8}, 0x0, 0x0) 16:16:37 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000040), 0x3, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc058565d, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0}) 16:16:37 executing program 3: r0 = syz_open_dev$video4linux(&(0x7f0000000000), 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc0285629, &(0x7f0000000080)) 16:16:37 executing program 4: r0 = gettid() syz_open_dev$vcsa(&(0x7f0000000480), 0x0, 0x0) process_vm_writev(r0, &(0x7f0000000180)=[{&(0x7f0000000040)=""/38, 0x26}, {&(0x7f0000000080)=""/53, 0x35}], 0x2, &(0x7f0000000440)=[{&(0x7f00000001c0)=""/74, 0x4a}, {0x0}], 0x2, 0x0) 16:16:37 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000400), 0x48}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000540), 0x2bf70) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x40c000000) 16:16:37 executing program 3: select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000100)={0x9}, &(0x7f0000000140)={0x77359400}) 16:16:37 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000640)={'ip6tnl0\x00', &(0x7f00000005c0)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @private2}}) 16:16:37 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000000), 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585605, &(0x7f0000000140)={0x1}) 16:16:37 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'sit0\x00', 0x0}) 16:16:38 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000140)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) 16:16:38 executing program 0: process_vm_writev(0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=""/38, 0x26}, {&(0x7f0000000000)=""/51, 0x3d}], 0x2, &(0x7f0000000440)=[{&(0x7f0000000240)=""/78, 0xffffff4d}, {0x0}], 0x2, 0x0) 16:16:38 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001a40)={0x18, 0x1, &(0x7f00000018c0)=@raw=[@ldst={0x0, 0x0, 0x0, 0x0, 0x4}], &(0x7f0000001900)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) write$qrtrtun(0xffffffffffffffff, &(0x7f0000002200), 0x0) 16:16:38 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1ab, &(0x7f00000003c0)='bdev!)-%+wlan\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;YE\xec\x8c;\xf7\xcc\xa7\x8b6\n\xbe\x01\x01\xae\xb6\f4\x87\xd9j\xd8\x0e\xc2\x10\xb1\x7f\x95\x01fE\xaea\x10\x8f\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xd6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d\xaa\b\xe4\"\x1c\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8by}/\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj,q[\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k\x8c\x1dTi\xafq\xde\x06/ \x93O.\xe5<0\xfa\b\x82\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\n\xb5\xb6\xffBQ\x80\xe6\xe6\xaf\xc8\x15_>\xe6\xfc\xb9R\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xdf5\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\xc5#\x92\xa32)2\xd3\xa02q\xdb\xe4\xe3\x97\x9d\xbc\xc9\xf8G'}, 0x30) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000280)='page_pool_update_nid\x00'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) 16:16:38 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) recvmsg(r0, &(0x7f0000002740)={0x0, 0x0, &(0x7f00000016c0)=[{0x0}, {0x0}], 0x2}, 0x0) 16:16:38 executing program 5: socket(0x22, 0x0, 0x6) 16:16:38 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) r3 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, r2, 0x923, 0x0, 0x40000000, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}]}, 0x3c}}, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r5, r4, 0x0, 0x10000a006) 16:16:38 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) r3 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, r2, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}]}, 0x3c}}, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r4, 0x8912, 0x400308) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r6, r5, 0x0, 0x10000a006) 16:16:38 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @private2, 0x78c0}}) 16:16:38 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:16:39 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x476, 0xffffffffffffffff, 0x3}, 0x40) 16:16:39 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000040), 0x0, 0x0) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000100)={0x0, 0xa, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "36c50749"}, 0x0, 0x0, @fd, 0x6}) 16:16:39 executing program 3: mq_open(&(0x7f0000000000)='}$!{\'\\^\x00', 0x40, 0x0, &(0x7f0000000040)={0xffff, 0x8, 0x80000000, 0xb8}) 16:16:39 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000002000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$qrtrtun(r0, &(0x7f0000002200)="17", 0x1) 16:16:39 executing program 5: mq_open(&(0x7f00000003c0)='\xff\xff', 0x0, 0x0, 0x0) 16:16:39 executing program 1: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x0, r0/1000+60000}) 16:16:39 executing program 0: set_mempolicy(0x1, &(0x7f0000000000)=0x40, 0xa8) 16:16:39 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000000), 0x0, 0x0) ioctl$VIDIOC_LOG_STATUS(r0, 0x5646, 0x0) 16:16:39 executing program 3: syz_open_dev$admmidi(&(0x7f0000000080), 0x4ef24a9e, 0x2301) 16:16:40 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f0000000000), 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc0305615, &(0x7f0000000080)) 16:16:40 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000040), 0x0, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0x5452, &(0x7f00000000c0)={0x9e0000, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}) [ 331.200366][T10938] Sensor A: ================= START STATUS ================= [ 331.208519][T10938] v4l2-ctrls: Sensor A: Test Pattern: 75% Colorbar [ 331.215496][T10938] v4l2-ctrls: Sensor A: Show Information: All [ 331.221708][T10938] v4l2-ctrls: Sensor A: Vertical Flip: false [ 331.228101][T10938] v4l2-ctrls: Sensor A: Horizontal Flip: false [ 331.234630][T10938] v4l2-ctrls: Sensor A: Brightness: 128 [ 331.240337][T10938] v4l2-ctrls: Sensor A: Contrast: 128 [ 331.246054][T10938] v4l2-ctrls: Sensor A: Hue: 0 [ 331.251039][T10938] v4l2-ctrls: Sensor A: Saturation: 128 [ 331.256951][T10938] Sensor A: ================== END STATUS ================== [ 332.732346][ T55] Bluetooth: hci0: command 0x0406 tx timeout 16:16:42 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:16:42 executing program 3: r0 = syz_open_dev$video4linux(&(0x7f0000000000), 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, &(0x7f0000000080)={0x3000000}) 16:16:42 executing program 5: r0 = syz_open_dev$vivid(&(0x7f00000003c0), 0x3, 0x2) ioctl$VIDIOC_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000400)) 16:16:42 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000002c80), 0x0, 0x0) read$FUSE(r0, &(0x7f0000009500)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f00000070c0)={0x2020}, 0x2020) 16:16:42 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000040), 0x0, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0x400448c9, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}) 16:16:42 executing program 1: process_vm_writev(0x0, &(0x7f0000000000)=[{0xfffffffffffffffc}], 0x1, 0x0, 0x0, 0x0) 16:16:42 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmsg(r0, &(0x7f0000002040)={0x0, 0x0, 0x0}, 0x40000160) 16:16:42 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x24, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_DPORT={0x6}, @L2TP_ATTR_ENCAP_TYPE={0x6}]}, 0x24}}, 0x0) 16:16:42 executing program 4: sched_setattr(0x0, &(0x7f0000000000)={0x38, 0x0, 0x10000008}, 0x0) 16:16:42 executing program 0: r0 = gettid() syz_open_dev$vcsa(&(0x7f0000000480), 0x0, 0x0) process_vm_writev(r0, &(0x7f0000000180)=[{&(0x7f0000000040)=""/38, 0x26}, {&(0x7f0000000080)=""/53, 0x35}], 0x2, &(0x7f0000000440)=[{&(0x7f00000001c0)=""/74, 0x4a}, {&(0x7f0000000240)=""/243, 0xf3}, {0x0}], 0x3, 0x0) 16:16:42 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x2, &(0x7f0000000100)={'ip6tnl0\x00', 0x0}) 16:16:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x28}}, 0x0) 16:16:45 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:16:45 executing program 3: socket(0xa, 0x0, 0x400) 16:16:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001a40)={0x0, 0x2, &(0x7f00000018c0)=@raw=[@initr0], &(0x7f0000001900)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:16:45 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x50}}, 0x0) 16:16:45 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000040), 0x0, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0x5421, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}) 16:16:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, 0x0, 0x821}, 0x14}}, 0x0) 16:16:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x8, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:16:45 executing program 5: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) select(0x40, &(0x7f0000000000)={0x1}, 0x0, &(0x7f0000000080)={0x5}, &(0x7f0000000100)={r0, r1/1000+60000}) 16:16:46 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0x7, [@int, @var, @ptr, @volatile]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x57}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:16:46 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040), 0x0, 0x0) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f0000000080)) 16:16:46 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000002c00), 0x0, 0x0) read$FUSE(r0, &(0x7f0000004c80)={0x2020}, 0xffffffe4) 16:16:46 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000040), 0x3, 0x0) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000000)) 16:16:48 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:16:48 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000000), 0x0, 0x0) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000040)={0x0, @reserved}) 16:16:48 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f0000000000), 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0x80405600, &(0x7f0000000080)) 16:16:48 executing program 3: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) write$P9_RWALK(r0, &(0x7f0000000080)={0x9}, 0x9) write$P9_RWRITE(r0, &(0x7f0000000140)={0xb}, 0xb) 16:16:48 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001a40)={0x18, 0x1, &(0x7f00000018c0)=@raw=[@ldst={0x0, 0x3, 0x0, 0x0, 0x4}], &(0x7f0000001900)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:16:48 executing program 0: mq_open(&(0x7f0000000000)='}$!{\'\\^\x00', 0x0, 0x0, 0x0) 16:16:49 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0x3, [@array, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @ptr]}, {0x0, [0x0]}}, 0x0, 0x53}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:16:49 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000002c80)={'ip6_vti0\x00', &(0x7f0000002c00)={'sit0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @private1}}) 16:16:49 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040), 0x3, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0285629, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}) 16:16:49 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) close(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305839, &(0x7f0000000000)) write$cgroup_subtree(r0, &(0x7f0000000740)=ANY=[], 0xb) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000000) 16:16:49 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001100)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x4}}, &(0x7f0000000040)='GPL\x00', 0x3, 0x1000, &(0x7f0000000080)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:16:49 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x5}]}) 16:16:52 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 16:16:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000700)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x6}]}]}}, &(0x7f0000000640)=""/149, 0x32, 0x95, 0x1}, 0x20) 16:16:52 executing program 1: syz_open_procfs(0x0, &(0x7f0000000340)='attr/sockcreate\x00') 16:16:52 executing program 3: eventfd(0x0) eventfd2(0x0, 0x0) 16:16:52 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x24, 0xf, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6}]}, 0x24}}, 0x0) 16:16:52 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000003600), 0x52c, 0x2641) write$evdev(r0, &(0x7f0000003740)=[{{0x0, 0x2710}}], 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 16:16:52 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x1, 0x3f, 0x40, 0x7ff}, {0x6, 0x1, 0x5c, 0x9772}]}) 16:16:52 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002100), 0x2, 0x0) write$FUSE_ENTRY(r0, 0x0, 0x0) 16:16:52 executing program 4: clock_gettime(0x0, &(0x7f0000003640)) 16:16:52 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x3}]}) 16:16:52 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x189, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00005c0000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}}, 0x0) r4 = memfd_create(&(0x7f00000003c0)='\xff\x00l\x1e\xa00xffffffffffffffff}, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000005c0), &(0x7f0000000600)={0x0, 0xfb, 0x15, 0x0, 0x0, "c77804ebec50221ece312c8094d1f3b9"}, 0x15, 0x0) 16:16:55 executing program 3: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000003580), 0x0, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000024c0), &(0x7f0000002500)={0x0, 0xfb, 0xfe1, 0x0, 0x0, "98214f76e488ebf3e51abd850bfa9293", "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"}, 0xfe1, 0x0) 16:16:55 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000600)={0x14, 0x4, 0x1, 0x401}, 0x14}}, 0x0) 16:16:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000003c0)={'tunl0\x00', &(0x7f0000000340)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @multicast2}}}}) 16:16:55 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000023c0)='/proc/slabinfo\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, 0x0) 16:16:55 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/cdc_ncm', 0x614180, 0x0) 16:16:55 executing program 0: setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3, 0xffffffffffffff67) 16:16:55 executing program 1: bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0xfffffffffffffd8d) 16:16:56 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @multicast1}}, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x9c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$INCFS_IOC_CREATE_FILE(r0, 0xc058671e, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x6, 0x0, 0x3f, 0x8, 0x0, 0xfb09, 0x100, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={0x0, 0xd}, 0x40100, 0x321, 0x200, 0x5, 0x7fff, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000140)=ANY=[@ANYRES32=0x0], &(0x7f0000000580)=0xb7) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={r2, @in6={{0xa, 0x4e20, 0x2000004, @private2={0xfc, 0x2, '\x00', 0x1}}}, 0x25, 0x20, 0x0, 0x20, 0xc4, 0x1, 0x4}, 0x0) shutdown(r0, 0x2) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000100), 0x10) 16:16:56 executing program 4: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)={0x55e3}, &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000140)={&(0x7f0000000100), 0x8}) [ 348.104596][ T8458] Bluetooth: hci1: command 0x0406 tx timeout 16:16:58 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 16:16:58 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/ipc\x00') 16:16:58 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x3, 0x1]}, 0x8) 16:16:58 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4008ae89, &(0x7f0000001a40)={"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"}) 16:16:58 executing program 4: pselect6(0x40, &(0x7f0000000200)={0x4}, &(0x7f0000000240)={0x4}, 0x0, &(0x7f0000000300), 0x0) 16:16:58 executing program 3: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x91, 0x91, 0x9, [@int, @var, @int, @ptr, @volatile, @datasec={0x0, 0x5, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}], '*'}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xb5}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:16:58 executing program 3: clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)='q') [ 349.921114][T11168] ptrace attach of "/root/syz-executor.3"[11166] was attempted by "/root/syz-executor.3"[11168] 16:16:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000700)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x6}]}]}}, &(0x7f0000000640)=""/149, 0x32, 0x95, 0x1}, 0x20) [ 350.201651][T11178] kvm [11169]: vcpu0, guest rIP: 0x0 disabled perfctr wrmsr: 0xc2 data 0x3ad6e37883b8e6ec 16:16:59 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x3, 0x1]}, 0x8) 16:16:59 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0}, 0x78) 16:16:59 executing program 5: pipe2$9p(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, 0x0) 16:16:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000700)={0x14, 0x1, 0x7, 0x101}, 0x14}}, 0x0) 16:17:02 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:17:02 executing program 0: clock_gettime(0x0, &(0x7f0000003640)) waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x4, &(0x7f0000000080)) 16:17:02 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x3, 0x1]}, 0x8) 16:17:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)={0x20, 0x2, 0x2, 0x101, 0x0, 0x0, {}, [@CTA_EXPECT_ZONE={0x6}, @CTA_EXPECT_TUPLE={0x4}]}, 0x20}}, 0x0) 16:17:02 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) 16:17:02 executing program 3: wait4(0x0, 0x0, 0xd, 0x0) 16:17:02 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x0) 16:17:02 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x3, 0x1]}, 0x8) 16:17:02 executing program 5: getgroups(0x1, &(0x7f0000000000)=[0xee00]) 16:17:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x20fffff) 16:17:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_DYING(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x300}, 0x0) 16:17:03 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0xa, 0x0, 0x0) 16:17:05 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:17:05 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x3, 0x1]}, 0x8) 16:17:05 executing program 4: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x9, [@int, @var, @const]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x4d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:17:05 executing program 0: socket$packet(0x2, 0x0, 0x300) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0xf, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000300000000000000060000008500000035000000182e0000", @ANYRES32, @ANYBLOB="00000000080000007926fcfffcffffff18250000", @ANYRES32, @ANYRESHEX, @ANYRES64, @ANYBLOB="0000000000000000d6c5cbe0a2f559b43181bcd1c911369cb2cbc377acab105b4735ea9065f18580e12a7a67674cfc6621f76846a43252d2c4d9fb5c1806eba36659580c1730eb"], &(0x7f00000000c0)='GPL\x00', 0x7, 0x90, &(0x7f0000000100)=""/144, 0x41100, 0xe, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x9, 0xfffffffc}, 0x10}, 0x78) 16:17:05 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TYPE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0xd, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 16:17:05 executing program 3: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)={0x55e3}, &(0x7f00000000c0)={0x0, 0x989680}, 0x0) [ 356.539512][T11259] ptrace attach of "/root/syz-executor.4"[11257] was attempted by "/root/syz-executor.4"[11259] 16:17:05 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:17:05 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x23, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:17:05 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/cgroups\x00', 0xf6ffffff, 0x0) 16:17:05 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001100)={0x1a, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x3, 0x1000, &(0x7f0000000080)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:17:05 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x3, 0x1]}, 0x8) 16:17:06 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4008ae89, &(0x7f0000001a40)={"06000000dd245c8488040000c9c8dc19643272a96fa42b76f50000402bec0ba41f0100003a40c8a4b70000403b00041f04000000003c5ca2c2000000ee377abaece6b88378e3d63a84000040361d264ffa8b46485f02baee450300004252066178868d1ef4b5365c5dc26ca097ddda7c21a9845c0c1dbc75d7ea4df10000174a3ac8694525a72f44500a1f0db500800000000000008f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa006a832d309fcda5bb5a6baa41d614f6c8941bee805954a62d196a4e8d4bf6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478fbe65449b404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5eddec2d1cc39035caef10dcd2c569319d6e9bb2058d023f669a64fc7d9684364673dcfa9235ea5a2ff23c4bb5c5acb2e8976dcac779ff000000000000003d4e185afe28b774b99d38c90937428617de4cdd6f53c419ce31054182fd898af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e9605ab8c3c43840abd17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba16f70f558b2246ad95ccf7d3f80cc0f768f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3efb254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f47692613e28387e955722908dd88b56163be8312ff47c5b6f070072975af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047666843badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffb7e7603970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d819164300"}) [ 357.491903][T11281] kvm [11280]: vcpu0, guest rIP: 0x0 disabled perfctr wrmsr: 0xc2 data 0x3ad6e37883b8e6ec 16:17:08 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:17:08 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x15, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:17:08 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x2, &(0x7f0000000180)=@raw=[@jmp, @call], &(0x7f0000000200)='syzkaller\x00', 0x4, 0x8c, &(0x7f0000000240)=""/140, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:17:08 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1a, 0x0, 0x0, 0x0, 0x14, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x1}, 0x40) 16:17:08 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x3, 0x1]}, 0x8) 16:17:08 executing program 4: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x55e3}, &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000140)={&(0x7f0000000100), 0x8}) 16:17:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000600)={0x14}, 0x14}}, 0x0) 16:17:09 executing program 5: socket$packet(0x2, 0x0, 0x300) 16:17:09 executing program 4: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x131, 0x131, 0x9, [@volatile, @array, @var, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '\x00'}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x155}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:17:09 executing program 3: splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffff8, 0x0) 16:17:09 executing program 1: setsockopt(0xffffffffffffffff, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x3, 0x1]}, 0x8) [ 360.410287][T11325] ptrace attach of "/root/syz-executor.4"[11322] was attempted by "/root/syz-executor.4"[11325] 16:17:09 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x1, &(0x7f0000000180)=@raw=[@jmp], &(0x7f0000000200)='syzkaller\x00', 0x4, 0x8c, &(0x7f0000000240)=""/140, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:17:12 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:17:12 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000002100), 0x107140, 0x0) 16:17:12 executing program 1: setsockopt(0xffffffffffffffff, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x3, 0x1]}, 0x8) 16:17:12 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_DYING(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xffffff1f}, 0x0) 16:17:12 executing program 5: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x189, 0x189, 0x9, [@volatile, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '\x00'}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x1ad}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:17:12 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000002200)='cmdline\x00') read$FUSE(r0, &(0x7f0000002240)={0x2020}, 0x2020) 16:17:12 executing program 1: setsockopt(0xffffffffffffffff, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x3, 0x1]}, 0x8) [ 363.200817][T11353] ptrace attach of "/root/syz-executor.5"[11351] was attempted by "/root/syz-executor.5"[11353] 16:17:12 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001100)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xa}}, &(0x7f0000000040)='GPL\x00', 0x3, 0x1000, &(0x7f0000000080)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:17:12 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x7ffff000) 16:17:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4008ae89, &(0x7f0000001a40)={"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"}) 16:17:12 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4008ae89, &(0x7f0000001a40)={"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"}) [ 363.462527][T10433] Bluetooth: hci2: command 0x0406 tx timeout 16:17:12 executing program 1: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x3, 0x1]}, 0x8) [ 363.835798][T11372] kvm [11364]: vcpu0, guest rIP: 0x0 disabled perfctr wrmsr: 0xc2 data 0x3ad6e37883b8e6ec 16:17:15 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:17:15 executing program 5: syz_open_dev$evdev(&(0x7f0000003600), 0x52c, 0x0) 16:17:15 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, &(0x7f0000000040)) 16:17:15 executing program 4: syz_open_dev$evdev(&(0x7f0000000000), 0xfff, 0x0) 16:17:15 executing program 1: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x3, 0x1]}, 0x8) 16:17:15 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='uid_map\x00') write$FUSE_DIRENT(r0, 0x0, 0x0) 16:17:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_DYING(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14}, 0xfffffdef}}, 0x0) 16:17:15 executing program 0: wait4(0x0, 0x0, 0x0, &(0x7f0000002040)) 16:17:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_DYING(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14}, 0x33fe0}}, 0x0) 16:17:15 executing program 5: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x165, 0x165, 0x9, [@volatile, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '\x00'}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x189}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:17:16 executing program 1: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x3, 0x1]}, 0x8) [ 367.221134][T11429] ptrace attach of "/root/syz-executor.5"[11428] was attempted by "/root/syz-executor.5"[11429] 16:17:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000700)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{}]}]}}, &(0x7f0000000640)=""/149, 0x32, 0x95, 0x1}, 0x20) 16:17:18 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:17:18 executing program 4: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/nvme', 0x0, 0x0) 16:17:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x550, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x80000000080601, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000200)) r4 = syz_open_pts(r3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r4}, 0x0) io_uring_enter(r0, 0x450e, 0x0, 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000140), &(0x7f0000000380)) r5 = socket$unix(0x1, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r5, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x92) 16:17:18 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(0xffffffffffffffff, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x3, 0x1]}, 0x8) 16:17:18 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000003600), 0x0, 0x2641) write$evdev(r0, &(0x7f0000003740)=[{}], 0x18) 16:17:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', 0x0}) 16:17:19 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(0xffffffffffffffff, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x3, 0x1]}, 0x8) 16:17:19 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @multicast1}}, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x9c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$INCFS_IOC_CREATE_FILE(r0, 0xc058671e, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x6, 0x0, 0x3f, 0x8, 0x0, 0xfb09, 0x100, 0xa, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000400), 0xd}, 0x40100, 0x321, 0x200, 0x5, 0x7fff, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x8001}, 0xffffffffffffffff, 0x6, r1, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000140)=ANY=[@ANYRES32=0x0, @ANYBLOB="af0000008828371e898b324387be07766deac879507bda9dd63b50d783401dc5a2603fc5670bd8a44d897022a961ea26a76fea943973336994200f649f402361a8d3105d531752841ca16b18edec24eaa070e0f93f105a4f36cc1b3c3607ae0317cebb53310ac8299bf8a88b278db5eee9fa9e76caa2a94220e06903bf665de929d3095f560a580fa7a1613ee5fe65"], &(0x7f0000000580)=0xb7) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={r2, @in6={{0xa, 0x4e20, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}}}, 0x25, 0x20, 0x0, 0x20, 0xc4, 0x1, 0x4}, 0x0) shutdown(r0, 0x2) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100), 0x10) 16:17:19 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x8, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:17:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TYPE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x30, 0xd, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x1}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}]}, 0x30}}, 0x0) 16:17:19 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(0xffffffffffffffff, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x3, 0x1]}, 0x8) 16:17:19 executing program 4: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x0, 0x20}, 0xc) 16:17:21 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:17:21 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000200)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 16:17:21 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x0, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x3, 0x1]}, 0x8) 16:17:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x550, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x80000000080601, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000200)) r4 = syz_open_pts(r3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r4}, 0x0) io_uring_enter(r0, 0x450e, 0x0, 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000140), &(0x7f0000000380)) r5 = socket$unix(0x1, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r5, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x92) 16:17:21 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000003600), 0x0, 0x2641) write$evdev(r0, &(0x7f0000003740)=[{{0x0, 0x2710}, 0x14}, {{0x77359400}, 0x1, 0x1000}, {}], 0x48) 16:17:21 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_vlan\x00'}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 373.089497][T11501] team0: Device veth1_vlan is up. Set it down before adding it as a team port 16:17:22 executing program 4: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000003580), 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r0, 0x0, 0x0) 16:17:22 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x0, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x3, 0x1]}, 0x8) 16:17:22 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:17:22 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000900)=@newtaction={0xe68, 0x30, 0x25, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{0x0, 0x0, 0x60000000}, 0x2}}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0) 16:17:22 executing program 5: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x105e00, 0x0) 16:17:22 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:17:22 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020}, 0x2020) 16:17:22 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:17:22 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x0, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x3, 0x1]}, 0x8) 16:17:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x550, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x80000000080601, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000200)) r4 = syz_open_pts(r3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r4}, 0x0) io_uring_enter(r0, 0x450e, 0x0, 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000140), &(0x7f0000000380)) r5 = socket$unix(0x1, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r5, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x92) 16:17:23 executing program 5: pipe2$9p(&(0x7f00000034c0), 0x84800) 16:17:23 executing program 3: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000003580), 0x0, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000001240), 0x0, 0x59, 0x0) 16:17:23 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000003900)={0x0}, 0x10) 16:17:23 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x0, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x3, 0x1]}, 0x8) 16:17:23 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x9, 0x0, 0x0) 16:17:23 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x40) 16:17:23 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_ext={0x1c, 0x4, &(0x7f0000000180)=@raw=[@map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xb43}, @alu={0x7, 0x1, 0x6, 0x1, 0x4, 0x100, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x7, 0x1, 0x6, 0x18, 0x8}], &(0x7f00000001c0)='GPL\x00', 0x16ad, 0x65, &(0x7f0000000200)=""/101, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x7, 0x5, 0x7}, 0x10, 0x21529}, 0x78) 16:17:23 executing program 4: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_setup(0xfffffffe, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000900)=@newtaction={0xe68, 0x30, 0x25, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0x2}, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x8000}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}], [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x2}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) 16:17:24 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x0, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x3, 0x1]}, 0x8) 16:17:26 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:17:26 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000023c0)='/proc/slabinfo\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000005600)={0x2020}, 0x2020) 16:17:26 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001100)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x63}}, &(0x7f0000000040)='GPL\x00', 0x3, 0x1000, &(0x7f0000000080)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:17:26 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) accept4$unix(r1, 0x0, 0x0, 0x0) 16:17:26 executing program 0: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000003580), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0xf, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000300000000000000060000008500000035000000182e0000", @ANYRES32, @ANYBLOB="00000000080000007926fcfffcffffff18250000", @ANYRES32, @ANYRESHEX=r0, @ANYRES64, @ANYBLOB="0000000000000000d6c5cbe0a2f559b43181bcd1c911369cb2cbc377acab105b4735ea9065f18580e12a7a67674cfc6621f76846a43252d2c4d9fb5c1806eba36659580c1730eb"], &(0x7f00000000c0)='GPL\x00', 0x7, 0x90, &(0x7f0000000100)=""/144, 0x41100, 0xe, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x9, 0xfffffffc}, 0x10}, 0x78) 16:17:26 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x0, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x3, 0x1]}, 0x8) 16:17:26 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x3, 0x1]}, 0x8) 16:17:26 executing program 5: syz_open_procfs(0x0, &(0x7f0000001100)='mountinfo\x00') 16:17:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_PROTOCOL(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x14, 0x1, 0x6, 0x401}, 0x14}}, 0x0) 16:17:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_DYING(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14}, 0xfffffffffffffe2e}}, 0x0) 16:17:26 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={0x0, 0x1, 0x6, @link_local}, 0x10) 16:17:26 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x3, 0x1]}, 0x8) 16:17:29 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:17:29 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000140), 0x0, 0x0, 0x0, 0xfffffffffffffffe) 16:17:29 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000040)="492fbcb882a5cf0535", 0x9) 16:17:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) flock(r0, 0xbdff67a566301a70) 16:17:29 executing program 0: r0 = openat$rtc(0xffffff9c, &(0x7f00000011c0), 0x0, 0x0) ioctl$RTC_UIE_OFF(r0, 0x7004) 16:17:29 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x3, 0x1]}, 0x8) 16:17:29 executing program 4: r0 = openat$ptmx(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSPGRP(r0, 0x5410, 0x0) 16:17:29 executing program 0: ioctl$EVIOCSFF(0xffffffffffffffff, 0x402c4580, &(0x7f0000000000)={0x0, 0x0, 0x0, {}, {}, @ramp}) pipe2$9p(&(0x7f00000012c0), 0x80800) 16:17:29 executing program 3: r0 = openat$pfkey(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) pread64(r0, 0x0, 0xffffffffffffff85, 0xfffbfffa) 16:17:29 executing program 5: r0 = openat$urandom(0xffffff9c, &(0x7f0000000140), 0x2407, 0x0) pread64(r0, 0x0, 0x0, 0x0) 16:17:29 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0), 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x3, 0x1]}, 0x8) 16:17:30 executing program 0: r0 = openat$rtc(0xffffff9c, &(0x7f0000000400), 0x0, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 16:17:32 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:17:32 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x0, 0x0, 0x0) 16:17:32 executing program 4: socketpair(0x26, 0x5, 0x7, 0x0) 16:17:32 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:17:32 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0), 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x3, 0x1]}, 0x8) 16:17:32 executing program 0: openat$procfs(0xffffff9c, &(0x7f0000000240)='/proc/meminfo\x00', 0x0, 0x0) 16:17:32 executing program 4: r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) signalfd4(r0, &(0x7f0000000000), 0x8, 0x0) 16:17:32 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:17:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000004f00)='lp\x00', 0x3) 16:17:33 executing program 5: epoll_create(0xffff) 16:17:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000001c0)={'batadv_slave_0\x00'}) 16:17:33 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0), 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x3, 0x1]}, 0x8) 16:17:33 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:17:33 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x38) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:17:33 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, 0x0) 16:17:33 executing program 5: syz_open_dev$evdev(&(0x7f0000000140), 0x0, 0x60042) 16:17:33 executing program 4: r0 = openat$ptmx(0xffffff9c, &(0x7f0000001300), 0x0, 0x0) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x0) 16:17:33 executing program 3: r0 = openat$bsg(0xffffff9c, &(0x7f0000000640), 0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000140), 0x24, 0x0) 16:17:33 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a000000", 0x4) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x3, 0x1]}, 0x8) 16:17:33 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x38) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:17:33 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x38) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:17:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(r0, &(0x7f0000002a00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2001, 0x0) 16:17:34 executing program 4: r0 = openat$pfkey(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/132, 0x84, 0x0) 16:17:34 executing program 5: poll(&(0x7f0000000080)=[{}, {}], 0x2, 0x4) 16:17:34 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 16:17:34 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a000000", 0x4) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x3, 0x1]}, 0x8) 16:17:34 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:17:34 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/pid\x00') 16:17:34 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/uts\x00') 16:17:34 executing program 5: mmap$perf(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x30, 0xffffffffffffffff, 0x0) 16:17:34 executing program 3: r0 = openat$ptmx(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) syz_open_pts(r0, 0x0) 16:17:34 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a000000", 0x4) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x3, 0x1]}, 0x8) 16:17:34 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:17:34 executing program 0: r0 = openat$urandom(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) 16:17:35 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x4c, 0x0, 0x2, 0x801, 0x0, 0x0, {}, [@CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}, @CTA_EXPECT_TUPLE={0x30, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1}, {0x14, 0x4, @mcast2}}}]}]}, 0x4c}}, 0x0) 16:17:35 executing program 4: r0 = openat$zero(0xffffff9c, &(0x7f0000002240), 0x0, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020}, 0xfffffffffffffcde) 16:17:35 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:17:35 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a0000000200", 0x6) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x3, 0x1]}, 0x8) 16:17:35 executing program 3: r0 = openat$rtc(0xffffff9c, &(0x7f00000011c0), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, 0x0) 16:17:35 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/pid\x00') fsetxattr$system_posix_acl(r0, 0x0, 0x0, 0x0, 0x0) 16:17:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='hybla\x00', 0x6) 16:17:35 executing program 4: syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x600400) 16:17:35 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a0000000200", 0x6) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x3, 0x1]}, 0x8) 16:17:35 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 16:17:35 executing program 0: r0 = openat$pfkey(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) pread64(r0, 0x0, 0xffffffffffffff85, 0x0) 16:17:35 executing program 3: openat$dir(0xffffff9c, &(0x7f0000000040)='./file0\x00', 0x840, 0x0) [ 386.977158][ T3123] ieee802154 phy0 wpan0: encryption failed: -22 [ 386.983954][ T3123] ieee802154 phy1 wpan1: encryption failed: -22 16:17:36 executing program 4: openat$ipvs(0xffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) 16:17:36 executing program 5: r0 = openat$ptmx(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "d29a88d25b4ba456"}) 16:17:36 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a0000000200", 0x6) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x3, 0x1]}, 0x8) 16:17:36 executing program 3: openat$bsg(0xffffff9c, &(0x7f0000000640), 0x0, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 16:17:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x18, 0x0, &(0x7f0000000100)) 16:17:36 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f0000000040)) 16:17:36 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001200)) 16:17:36 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a000000020000", 0x7) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x3, 0x1]}, 0x8) 16:17:36 executing program 3: pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) write$P9_RREAD(r0, &(0x7f0000001300)={0xb}, 0xb) write$9p(r0, &(0x7f0000000040)="94", 0x1) 16:17:39 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 16:17:39 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x47a06, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000340)={0x0, 0x7}) 16:17:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f0000007f00)) 16:17:39 executing program 4: openat$rtc(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) 16:17:39 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a000000020000", 0x7) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x3, 0x1]}, 0x8) 16:17:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x31, 0x0, &(0x7f00000000c0)) 16:17:39 executing program 3: openat$bsg(0xffffff9c, &(0x7f0000000640), 0x0, 0x0) r0 = openat$bsg(0xffffff9c, &(0x7f0000000640), 0x0, 0x0) ftruncate(r0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f00000019c0)=ANY=[@ANYBLOB="9feb01001800000000000000000009000006040000000a000000f8ffffff0e0000000f38000003000000040000000d000000fcffffff05000000030000000e0000000002000009000000071e1f7df7316f858f03000009000000adae00fe0200000007000005010000800b00000000000000001000000000000003000000000000000500000000000000000000000d00000004000000d00b00000c00000005000000ff07000000000000030000001f0000000700000002000000080000000b0000090000000900000000001c00002ace1f00"], &(0x7f0000000680)=""/4096, 0x10c, 0x1000, 0x1}, 0x20) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000100)=""/167) openat$pfkey(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000001680)={0x20, 0x3, 0x1, 0x5, 0x70bd2a, 0x25dfdbfb, {0xa, 0x0, 0x1}, [@nested={0x4, 0x92}, @generic="b2", @nested={0x4}]}, 0x20}}, 0x0) 16:17:39 executing program 4: r0 = openat$pfkey(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) lseek(r0, 0x7, 0x0) pread64(r0, 0x0, 0x0, 0x0) 16:17:39 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a000000020000", 0x7) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x3, 0x1]}, 0x8) 16:17:39 executing program 5: pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffe00, 0x0) 16:17:39 executing program 0: openat$procfs(0xffffff9c, &(0x7f0000000000)='/proc/crypto\x00', 0x0, 0x0) [ 390.610217][T11806] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 390.699995][T11806] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 16:17:39 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x3, 0x1]}, 0x8) 16:17:42 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 16:17:42 executing program 5: openat$zero(0xffffff9c, &(0x7f0000000480), 0x0, 0x0) 16:17:42 executing program 4: pipe2(&(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmmsg$unix(r0, 0x0, 0x0, 0x0) 16:17:42 executing program 3: semget(0x2, 0x4, 0x106) 16:17:42 executing program 0: semctl$SEM_STAT_ANY(0x0, 0x3, 0x14, &(0x7f00000000c0)=""/162) 16:17:42 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x3, 0x1]}, 0x8) 16:17:42 executing program 5: semget(0x2, 0x0, 0x106) 16:17:42 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x3, 0x1]}, 0x8) 16:17:42 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000001d80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r1}, 0x10) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x43, &(0x7f0000000280), 0xa8) 16:17:42 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000001d80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) r1 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x15, &(0x7f0000000280), 0xa8) 16:17:42 executing program 3: openat$random(0xffffffffffffff9c, &(0x7f0000000100), 0x40, 0x0) 16:17:43 executing program 5: semctl$SEM_STAT_ANY(0x0, 0x4, 0x14, &(0x7f0000000000)=""/120) 16:17:45 executing program 2: r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:17:45 executing program 4: r0 = semget(0x0, 0x0, 0x0) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000180)=""/130) 16:17:45 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, 0x0, 0x0) 16:17:45 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001700)) 16:17:45 executing program 3: readlinkat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=""/89, 0x59) 16:17:45 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x3, 0x0) 16:17:45 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) fstat(r2, &(0x7f0000000080)) 16:17:45 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x1ff) 16:17:45 executing program 0: pipe2(&(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) openat$cgroup_procs(r0, &(0x7f0000000b00)='tasks\x00', 0x2, 0x0) [ 396.858475][T11879] ptrace attach of "/root/syz-executor.2"[11878] was attempted by "/root/syz-executor.2"[11879] 16:17:45 executing program 2: r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:17:45 executing program 5: r0 = semget(0x0, 0x0, 0x0) semtimedop(r0, &(0x7f0000000500)=[{0x3}], 0x1, 0x0) 16:17:46 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, 0x0, 0x0) 16:17:46 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x40000, 0x0) 16:17:46 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x107a01, 0x0) 16:17:46 executing program 2: r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:17:46 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000001480), 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000005b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000005a80)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18}, 0x801) 16:17:46 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000000c0)={0x2c, r1, 0x1, 0x0, 0x0, {0x9}, [@TIPC_NLA_LINK={0x18, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x2c}}, 0x0) 16:17:46 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, 0x0, 0x0) [ 397.696810][T11905] ptrace attach of "/root/syz-executor.2"[11901] was attempted by "/root/syz-executor.2"[11905] 16:17:46 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:17:46 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000840), 0x3, 0x161002) pwritev(r0, &(0x7f00000001c0)=[{&(0x7f0000000100)="1b", 0x1}], 0x1, 0x0, 0x0) 16:17:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000005b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000005a80)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) 16:17:46 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r0, 0xc00864c0, &(0x7f00000001c0)) 16:17:47 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/block/ram3', 0x1e3b02, 0x0) 16:17:47 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x1, [0x3]}, 0x6) 16:17:47 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_opts(r0, 0x0, 0xc, &(0x7f00000005c0)="b9", 0x1) 16:17:47 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000007b80)=[{{&(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x6}, 0x1c, &(0x7f0000000a00)=[{&(0x7f0000000340)='g', 0x1}], 0x1}}], 0x1, 0x4c890) 16:17:47 executing program 4: r0 = socket$inet6_udp(0x11, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000000)={'syztnl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback}}) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x8b00, &(0x7f0000000080)) 16:17:47 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:17:47 executing program 3: futex(&(0x7f0000000000), 0x8b, 0x0, &(0x7f0000000040), &(0x7f0000000340), 0x0) 16:17:47 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x1, [0x3]}, 0x6) 16:17:47 executing program 0: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000000c0)={0xfffff800}, 0x8) 16:17:48 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000840), 0x3, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f0000000980)={0x6, @raw_data="00e2b16c6ba409781a771ab4801b239d4d5e6fe872168652321e6e03b1af01952a656fe704d9bd82242e7bae4736fae2a6fb3e4dd497da21daa2f3b177251c8308f6a127c1cc2824ccd314989b4931c68374accbe5a7f7461150af82fff7fd223e4e8181b569b4dec59bcd0cb970024d30ff679bd69823cb22521d625d9b075203d5aa98ee3d015d455ee3f431dbc8eb0a88e6a44440dee06dc5eaa6a3c3c49d729219200038898ff307fd1cfb58a83bd8f6e163958ed94c31196ea5ae42ab159fbc1f4308cc9ffd"}) 16:17:48 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)="1aeacaa4aadf2e40618ffd372f6fa3be0c51027c694e435b602f4fdb9a57efbea507122bd1d9003b67", 0x29) 16:17:48 executing program 3: futex(0x0, 0x8b, 0x0, &(0x7f0000000040), &(0x7f0000000340), 0x0) 16:17:48 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:17:48 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x1, [0x3]}, 0x6) 16:17:48 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_opts(r0, 0x0, 0xf, 0x0, 0x0) 16:17:48 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_opts(r0, 0x0, 0x30, 0x0, 0x0) 16:17:48 executing program 4: r0 = socket(0x2, 0x802, 0x0) recvmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) 16:17:48 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f0000000000)="ae", 0x1) 16:17:48 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x3, 0x0]}, 0x8) 16:17:48 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:17:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@ipv4_delrule={0x1c, 0x21, 0x5}, 0x1c}}, 0x0) 16:17:49 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000840), 0x0, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc058560f, &(0x7f0000000980)={0x0, @raw_data="00e2b16c6ba409781a771ab4801b239d4d5e6fe872168652321e6e03b1af01952a656fe704d9bd82242e7bae4736fae2a6fb3e4dd497da21daa2f3b177251c8308f6a127c1cc2824ccd314989b4931c68374accbe5a7f7461150af82fff7fd223e4e8181b569b4dec59bcd0cb970024d30ff679bd69823cb22521d625d9b075203d5aa98ee3d015d455ee3f431dbc8eb0a88e6a44440dee06dc5eaa6a3c3c49d729219200038898ff307fd1cfb58a83bd8f6e163958ed94c31196ea5ae42ab159fbc1f4308cc9ffd"}) 16:17:49 executing program 4: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000080)='./file1/file0\x00'}, 0x10) 16:17:49 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:17:49 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000006200)={0x2020}, 0x2020) write$FUSE_LSEEK(r0, &(0x7f0000004180)={0x18, 0x0, r1}, 0x18) 16:17:49 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x3, 0x0]}, 0x8) 16:17:49 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:17:49 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_opts(r0, 0x84, 0x0, 0x0, 0x2) 16:17:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_newaddr={0x18, 0x1d, 0x1}, 0x18}}, 0x0) 16:17:49 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_opts(r0, 0x0, 0x6, &(0x7f00000005c0)="b9", 0x1) 16:17:49 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x3, 0x0]}, 0x8) 16:17:49 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:17:50 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000006880), 0x10) 16:17:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000740)={0x0, @l2tp={0x2, 0x0, @remote}, @nl, @qipcrtr, 0x4, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000700)='team0\x00'}) 16:17:50 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8918, &(0x7f0000000580)={'ip6gre0\x00', 0x0}) 16:17:50 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000001480), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0x5451, 0x0) 16:17:50 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x1, [0x1]}, 0x6) 16:17:50 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002740)=[{{&(0x7f0000000100)={0xa, 0x4e22, 0x0, @loopback, 0xe12}, 0x1c, 0x0}}], 0x1, 0x0) 16:17:50 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_opts(r0, 0x0, 0x12, &(0x7f00000005c0)="b9", 0x1) 16:17:50 executing program 4: r0 = syz_open_dev$vim2m(&(0x7f00000000c0), 0x0, 0x2) ioctl$vim2m_VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000140)={0x0, 0x3, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "df661d0d"}, 0x0, 0x0, @fd}) 16:17:50 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000001480), 0x0) read$FUSE(r0, 0x0, 0x0) 16:17:50 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x1, [0x1]}, 0x6) 16:17:50 executing program 0: r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000040), 0x0, 0x0, 0x1) 16:17:53 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:17:53 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x20000040, 0x20000070, 0x200000a0], 0x0, 0x0, &(0x7f0000000040)=[{}, {}, {}]}, 0x108) 16:17:53 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002740)=[{{&(0x7f0000000100)={0xa, 0x4e22, 0x0, @loopback, 0xe12}, 0x1c, 0x0}}, {{&(0x7f0000001700)={0xa, 0x4e23, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000001880)=[@dstopts={{0x18}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x400}}], 0x30}}], 0x2, 0x0) 16:17:53 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x1, [0x1]}, 0x6) 16:17:53 executing program 5: r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000), 0x103802, 0x0) r1 = socket$l2tp6(0xa, 0x2, 0x73) dup3(r1, r0, 0x0) 16:17:53 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_opts(r0, 0x84, 0x65, 0x0, 0x0) 16:17:53 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000840), 0x0, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc058565d, &(0x7f0000000980)={0x0, @raw_data="00e2b16c6ba409781a771ab4801b239d4d5e6fe872168652321e6e03b1af01952a656fe704d9bd82242e7bae4736fae2a6fb3e4dd497da21daa2f3b177251c8308f6a127c1cc2824ccd314989b4931c68374accbe5a7f7461150af82fff7fd223e4e8181b569b4dec59bcd0cb970024d30ff679bd69823cb22521d625d9b075203d5aa98ee3d015d455ee3f431dbc8eb0a88e6a44440dee06dc5eaa6a3c3c49d729219200038898ff307fd1cfb58a83bd8f6e163958ed94c31196ea5ae42ab159fbc1f4308cc9ffd"}) 16:17:53 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000840), 0x3, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0d05604, &(0x7f0000000980)={0x1, @raw_data="00e2b16c6ba409781a771ab4801b239d4d5e6fe872168652321e6e03b1af01952a656fe704d9bd82242e7bae4736fae2a6fb3e4dd497da21daa2f3b177251c8308f6a127c1cc2824ccd314989b4931c68374accbe5a7f7461150af82fff7fd223e4e8181b569b4dec59bcd0cb970024d30ff679bd69823cb22521d625d9b075203d5aa98ee3d015d455ee3f431dbc8eb0a88e6a44440dee06dc5eaa6a3c3c49d729219200038898ff307fd1cfb58a83bd8f6e163958ed94c31196ea5ae42ab159fbc1f4308cc9ffd"}) 16:17:53 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x0, 0x1]}, 0x8) 16:17:53 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8923, &(0x7f0000000600)={'syztnl0\x00', 0x0}) 16:17:53 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_newaddr={0x18, 0x2e, 0x1}, 0x18}}, 0x0) 16:17:53 executing program 0: r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000002540)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) dup3(r1, r0, 0x0) 16:17:56 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:17:56 executing program 5: socket(0x23, 0x0, 0x800) 16:17:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_newaddr={0x18, 0x2e, 0x1}, 0x18}}, 0x0) 16:17:56 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_opts(r0, 0x0, 0x2b, 0x0, 0x0) 16:17:56 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x0, 0x1]}, 0x8) 16:17:56 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000840), 0x0, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0d05605, &(0x7f0000000980)={0x1, @raw_data="00e2b16c6ba409781a771ab4801b239d4d5e6fe872168652321e6e03b1af01952a656fe704d9bd82242e7bae4736fae2a6fb3e4dd497da21daa2f3b177251c8308f6a127c1cc2824ccd314989b4931c68374accbe5a7f7461150af82fff7fd223e4e8181b569b4dec59bcd0cb970024d30ff679bd69823cb22521d625d9b075203d5aa98ee3d015d455ee3f431dbc8eb0a88e6a44440dee06dc5eaa6a3c3c49d729219200038898ff307fd1cfb58a83bd8f6e163958ed94c31196ea5ae42ab159fbc1f4308cc9ffd"}) 16:17:56 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) 16:17:56 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_opts(r0, 0x0, 0x11, &(0x7f00000005c0)="b9", 0x1) 16:17:56 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x0, 0x1]}, 0x8) 16:17:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000080)={0x24, r1, 0x1, 0x0, 0x0, {0x9}, [@TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x4, 0x1, 'syz1\x00'}]}]}, 0x24}}, 0x0) 16:17:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xd, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x7c}, [@ldst={0x4}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3e0, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x76}, 0x48) 16:17:57 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000840), 0x3, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f0000000980)={0x1, @output}) 16:17:59 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:17:59 executing program 4: add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) 16:17:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0, 0x7ffff000}}, 0x0) 16:17:59 executing program 3: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000000)={&(0x7f0000001800)='./file0\x00'}, 0xffffff17) 16:17:59 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_opts(r0, 0x84, 0xd, &(0x7f00000005c0)="b9", 0x1) 16:17:59 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000024c0), 0x2, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000002500)={0x18}, 0xffffffffffffff2d) 16:17:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=@mpls_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_DST={0x8, 0x1, {0x400}}]}, 0x24}}, 0x0) 16:17:59 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000840), 0x3, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000000)={0xffff, 0x32314247, 0x0, @stepwise}) 16:17:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000023c0)={0x0, 0x0, &(0x7f0000002380)={&(0x7f00000001c0)=@delchain={0xec4, 0x65, 0x0, 0x0, 0x0, {}, [@TCA_RATE={0x6}, @TCA_CHAIN={0x8, 0xb, 0xd1}, @filter_kind_options=@f_route={{0xa}, {0xe84, 0x2, [@TCA_ROUTE4_TO={0x8, 0x2, 0xa8}, @TCA_ROUTE4_CLASSID={0x8, 0x1, {0xfff2, 0x5}}, @TCA_ROUTE4_IIF={0x8}, @TCA_ROUTE4_POLICE={0x408, 0x5, [@TCA_POLICE_RATE={0x404, 0x2, [0x3, 0x800, 0x8, 0xfaa3, 0x7, 0x9, 0xffff, 0x200, 0x0, 0x4, 0xa95, 0x2, 0x1000, 0x5, 0x2, 0x3, 0x7, 0xffff, 0x4, 0x7, 0x3000000, 0x20, 0x5, 0x46f9, 0x10001, 0x0, 0x80000000, 0x9, 0x2e, 0x9, 0x0, 0x2, 0x7ee, 0x2, 0x6, 0x6, 0x1ff, 0x4, 0x10001, 0x100, 0x81, 0xaa, 0x8, 0x81, 0x1, 0x6, 0xa2f, 0x7, 0x0, 0x6, 0x5, 0x10000, 0x7, 0x8c, 0x277e, 0x3f, 0x3f, 0x7f, 0x50ac, 0xfffff5b6, 0x305f, 0x5, 0x5, 0x6, 0x6, 0xfffffff9, 0x102000, 0xa, 0x6, 0x6, 0x2, 0x3, 0x5, 0x5, 0xfffffffb, 0x8000, 0x10000, 0x20, 0x3bf6a8f9, 0x4, 0x3, 0xe5, 0x1ff, 0xd557, 0x0, 0xfff, 0x5, 0x40, 0x7ff, 0x3, 0x80, 0x4, 0x4, 0x7, 0x9, 0x1, 0x800, 0x8, 0x3000000, 0x1, 0x9, 0x5, 0x7, 0xa78, 0x0, 0x3, 0x7, 0x9, 0x2b, 0x0, 0xc00000, 0x6, 0x3, 0x9, 0x7fffffff, 0x1ff, 0x1, 0x2, 0x5, 0x7, 0x0, 0x86b, 0x2, 0xfff, 0x5, 0x800, 0x3, 0x200, 0x0, 0xfffffffa, 0x1bf, 0x5, 0x9, 0x7, 0x8, 0x3, 0x3ff, 0x4, 0x3, 0x200, 0x6, 0x80000000, 0xb3, 0x3, 0x9, 0xb0ad, 0x0, 0x1, 0x0, 0x6, 0x3, 0x4b3d, 0x80, 0x74, 0x0, 0x401, 0x9, 0x1, 0xffffffff, 0x0, 0x2, 0x7, 0x3, 0x7fffffff, 0x0, 0x2, 0xf6da, 0x1e1f691e, 0xa1, 0xc0000000, 0x3, 0x8462, 0x30000, 0x6c, 0x2, 0x7f, 0x5, 0x3, 0xfffffffa, 0x203, 0x6, 0x100, 0x734, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}]}, @TCA_ROUTE4_ACT={0x560, 0x6, [@m_nat={0x2a8, 0x0, 0x0, 0x0, {{0x8}, {0x194, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{}, @broadcast, @broadcast}}, @TCA_NAT_PARMS={0x28, 0x1, {{}, @broadcast, @broadcast}}, @TCA_NAT_PARMS={0x28, 0x1, {{}, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @TCA_NAT_PARMS={0x28, 0x1, {{}, @broadcast, @empty}}, @TCA_NAT_PARMS={0x28}, @TCA_NAT_PARMS={0x28, 0x1, {{}, @empty, @private}}, @TCA_NAT_PARMS={0x28, 0x1, {{}, @dev, @broadcast}}, @TCA_NAT_PARMS={0x28, 0x1, {{}, @dev, @multicast2}}, @TCA_NAT_PARMS={0x28, 0x1, {{}, @multicast2, @multicast2}}, @TCA_NAT_PARMS={0x28, 0x1, {{}, @empty, @multicast2}}]}, {0xed, 0x6, "0b9879267d887a6deb3211f40ccafeb2344e774664605bc93b7cdfafd7481a745d2e0146901bde7378faa5810736a18340c74d8cb342587bf27a5f4f9984502143e78db2e2cda57fa5e5a2e7991af5640afdc0947240d0f91432eb0beec7566e559a3c97ef0191a0b952d7b19f1d0e59a5fc29befbb6d6652c66ff55ce9224c7299badcd9c3d85f4ed04856960eb4cef3b9d40c6a8c4a30e78cd59b7ca955a29b5d37c570891cdaf84d888c0adae5d61d102257869cc0b281f72f130125a3bb3c53674d8f5c8d59418d6143c4207a7e4c4a6aa96cd347092ffe0972f4202246ef3858df847019a6d3f"}, {0xc}, {0xc}}}, @m_xt={0x2b4, 0x0, 0x0, 0x0, {{0x7}, {0x208, 0x2, 0x0, 0x1, [@TCA_IPT_INDEX={0x8}, @TCA_IPT_TABLE={0x24, 0x1, 'security\x00'}, @TCA_IPT_TABLE={0x24, 0x1, 'mangle\x00'}, @TCA_IPT_HOOK={0x8}, @TCA_IPT_TARG={0x6d, 0x6, {0x0, 'raw\x00', 0x0, 0x0, "05838b92b3c6cc4741da3efec69191700a76e48199eea0d4eca6b46bf0a566fa559d07b3603365eb7c13bad3c86d7e13476580d22c35955865aa784be9ebc62150bba8"}}, @TCA_IPT_TABLE={0x24, 0x1, 'mangle\x00'}, @TCA_IPT_INDEX={0x8}, @TCA_IPT_TABLE={0x24, 0x1, 'raw\x00'}, @TCA_IPT_TARG={0x35, 0x6, {0x0, 'raw\x00', 0x0, 0x0, "a89c7127128bd01471938d"}}, @TCA_IPT_TARG={0xb1, 0x6, {0x0, 'filter\x00', 0x0, 0x0, "2e4c41616261ebf3cdef832522f6206ecb3223268206d84539037548c03fb333c8b7220f6e2f884768971581e2c09e92829ae500ff95247bfc2b82d0aeea3f5eef6ed7263a96b9398b3f5098875d736baac34cb89c1c0bb0a384f5e6e3afd6ed99ec5e71df2548c5a4a25590f282cdfe9ad0e1d185379102ce4dbd1242b1220a346461563ba5d4"}}]}, {0x85, 0x6, "7dfbc06c284f5991e77de4b131f908d1562ba697c547464e37b27744c72ebcc2aed373c5b037d92272f16af3fdc2d4fb6fab76b372aa58230ed22c4964d056de1b85e6837b5e60ccccea520e9be86042ed0f6892312c27e4b2016b713d6317f20b63a97ad2a6124cdfc9af476b58700fadcb1ac02552facb59ca30408869f78123"}, {0xc}, {0xc}}}]}, @TCA_ROUTE4_IIF={0x8}, @TCA_ROUTE4_CLASSID={0x8}, @TCA_ROUTE4_ACT={0x4f0, 0x6, [@m_sample={0xb8, 0x0, 0x0, 0x0, {{0xb}, {0x14, 0x2, 0x0, 0x1, [@TCA_SAMPLE_TRUNC_SIZE={0x8}, @TCA_SAMPLE_PSAMPLE_GROUP={0x8}]}, {0x79, 0x6, "4315e24a11427f096dfeee2e0d9383e5174aa6c7e9a14007bb6d051c01d54ce1255fd59a50eece175dd033490a0ad29734956f758fa525e537f937d58f3a816a352810b19cb01c6211a7e8a2a19a61adf9804d66af3677bdf54de956e9a0649d53dbb4d7770a25ba6f2113ccbd71514d6439f014a2"}, {0xc}, {0xc}}}, @m_police={0x434, 0x0, 0x0, 0x0, {{0xb}, {0x408, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6e0a8b28]}]]}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0xec4}, 0x1, 0x0, 0x0, 0x81}, 0x44000) 16:17:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000000c0)={0x38, r1, 0x1, 0x0, 0x0, {0x9}, [@TIPC_NLA_LINK={0x24, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x38}}, 0x0) 16:17:59 executing program 0: r0 = socket(0x11, 0x803, 0x0) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={0x0}}, 0x0) 16:18:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@ipv4_delrule={0x24, 0x21, 0x5, 0x0, 0x0, {0x2, 0x0, 0x14}, [@FRA_DST={0x8, 0x1, @loopback}]}, 0x24}}, 0x0) 16:18:02 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:18:02 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) sendto$packet(r0, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) 16:18:02 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind(r0, 0x0, 0x0) 16:18:02 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_opts(r0, 0x84, 0x7b, 0x0, 0x0) 16:18:02 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_opts(r0, 0x84, 0x64, 0x0, 0x0) 16:18:02 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8983, &(0x7f0000000580)={'ip6gre0\x00', 0x0}) 16:18:03 executing program 3: add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffd) 16:18:03 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_opts(r0, 0x84, 0x76, 0x0, 0x0) 16:18:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x3c, r1, 0x611, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}}]}, 0x3c}}, 0x0) 16:18:03 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000002640)='/sys/power/wakeup_count', 0x109201, 0x0) 16:18:03 executing program 1: r0 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x1}, 0x18}}, 0x0) 16:18:03 executing program 3: syz_open_dev$hidraw(&(0x7f0000000000), 0x0, 0x300) 16:18:05 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:18:05 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, 0x0, 0x0) 16:18:05 executing program 5: sched_setattr(0x0, &(0x7f00000002c0)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) 16:18:05 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000840), 0x0, 0x161002) pwritev(r0, &(0x7f00000001c0)=[{&(0x7f0000000100)="1b", 0x1}], 0x1, 0x0, 0x0) 16:18:05 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000001480), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0x4b47, 0x0) 16:18:05 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8914, &(0x7f0000000600)={'syztnl0\x00', 0x0}) 16:18:06 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000040), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, r0) 16:18:06 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002740)=[{{&(0x7f0000000100)={0xa, 0x4e22, 0x0, @loopback}, 0x1c, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 16:18:06 executing program 5: r0 = socket(0x10, 0x803, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000007c0)={'ip6tnl0\x00', 0x0}) 16:18:06 executing program 0: socket(0x1d, 0x0, 0x5) 16:18:06 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8913, &(0x7f0000000600)={'syztnl0\x00', 0x0}) 16:18:06 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000840), 0x3, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f0000000980)={0xe, @raw_data="00e2b16c6ba409781a771ab4801b239d4d5e6fe872168652321e6e03b1af01952a656fe704d9bd82242e7bae4736fae2a6fb3e4dd497da21daa2f3b177251c8308f6a127c1cc2824ccd314989b4931c68374accbe5a7f7461150af82fff7fd223e4e8181b569b4dec59bcd0cb970024d30ff679bd69823cb22521d625d9b075203d5aa98ee3d015d455ee3f431dbc8eb0a88e6a44440dee06dc5eaa6a3c3c49d729219200038898ff307fd1cfb58a83bd8f6e163958ed94c31196ea5ae42ab159fbc1f4308cc9ffd"}) [ 417.710603][T12219] can: request_module (can-proto-5) failed. [ 417.778893][T12219] can: request_module (can-proto-5) failed. 16:18:09 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:18:09 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_opts(r0, 0x0, 0x13, &(0x7f00000005c0)="b9", 0x1) 16:18:09 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f00000000c0)={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, 0xc) 16:18:09 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_DIRENTPLUS(r0, 0x0, 0x330) 16:18:09 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_opts(r0, 0x84, 0x22, 0x0, 0x0) 16:18:09 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @remote}}) 16:18:09 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LSEEK(r0, &(0x7f0000004180)={0x18, 0xffffffffffffffda, r1}, 0x18) 16:18:09 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x3c, r1, 0x611, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}}, 0x0) 16:18:09 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r0, &(0x7f000000c640)=ANY=[@ANYBLOB="30030000", @ANYRES64=r2], 0x330) 16:18:09 executing program 1: futex(&(0x7f0000000000), 0x8b, 0x2, &(0x7f0000000040), 0x0, 0x0) 16:18:09 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000001980)={0x2020}, 0x2020) write$P9_RATTACH(r0, 0x0, 0x0) 16:18:09 executing program 5: r0 = socket(0x2, 0x803, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000140), r0) 16:18:12 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:18:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_newaddr={0x18, 0x68, 0x1, 0x0, 0x0, {0x2, 0x2}}, 0x18}}, 0x0) 16:18:12 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_opts(r0, 0x0, 0x31, 0x0, 0x0) 16:18:12 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000000)=ANY=[], 0x390) 16:18:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) 16:18:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000003c0)={'batadv0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x0, 0x9, &(0x7f0000000340)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:18:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c0000001100010000000000000000000200b40441"], 0x2c}}, 0x0) 16:18:12 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'nat\x00'}, &(0x7f0000000340)=0x54) 16:18:12 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000180), 0x80, 0x0) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f00000001c0)) 16:18:12 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f00000000c0)) 16:18:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000700)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x0, 0xd0, 0x1e0, 0x2b0, 0xd0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CONNSECMARK={0x28}}, {{@uncond, 0x0, 0xd0, 0x110, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @inet=@TPROXY1={0x2b, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@private2}}}, {{@ipv6={@loopback, @mcast1, [], [], 'nr0\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xd8, 0x120, 0x0, {}, [@common=@ah={{0x30}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@loopback, @ipv6=@empty}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, [], [], 'bridge0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) [ 423.981270][T12294] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 424.081735][T12302] xt_CONNSECMARK: invalid mode: 0 16:18:13 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x2d080, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x40, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000140)=0x2) ioctl$PPPIOCGIDLE(r0, 0x8010743f, 0x0) [ 424.752678][T12294] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 424.892748][ T18] Bluetooth: hci3: command 0x0406 tx timeout [ 424.899290][ T18] Bluetooth: hci4: command 0x0406 tx timeout [ 424.919286][ T18] Bluetooth: hci5: command 0x0406 tx timeout 16:18:15 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:18:15 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0xce20, 0x0, @loopback}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) preadv(r0, &(0x7f0000001380)=[{&(0x7f0000001280)=""/213, 0xd5}], 0x1, 0x0, 0x0) 16:18:15 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000140)="390000001300090468fe0700000000000000ff3f04000000480100100000000004002b000a00010014a4ee1ee438d2fd000000000000007200", 0x39}], 0x1) 16:18:15 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000000), 0x5}, 0x200, 0x80000, 0x0, 0x0, 0x1000000008000}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x19) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x103382) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b1", 0x14}], 0x1, 0x81805, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) inotify_init1(0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000400)='cpu<0xa||!\x00\x03~\x01\x9c\xd3\x0e5\xa0\x1d=\x04\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xf8.- \x00\x00\x00(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4#\xc5]Y;\xc16v\xf9\x89\t\x06\xbe*\xaa&\xbd\x16xQ\x8e\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dX5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\a\x01\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x01\x00\x00\x00\x01\x00\x00\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xfe\x1f\xe5\x86\xb1xu&\xfb\xf2\xbf\xe8\x7f\x91\x93\xab\x05\x004\x85\x86l\x8d\x00'/289) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x80, 0xfc, 0x81, 0xa, 0x0, 0x0, 0x7, 0xd0018, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000200), 0xa}, 0xa510, 0x6, 0x4c95, 0x5, 0x0, 0x9, 0x7f, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) 16:18:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c0000001100010000000000000000000200b40441"], 0x2c}}, 0x0) 16:18:15 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x2d080, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x40, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000140)=0x2) ioctl$PPPIOCGIDLE(r0, 0x8010743f, 0x0) [ 426.826230][T12336] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.3'. [ 426.860148][T12337] loop0: detected capacity change from 0 to 1036 [ 426.863003][T12336] device gretap0 entered promiscuous mode 16:18:16 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0xf2, 0x0, 0x1007ff}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:18:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000680)={0x0, 0x3ff0000000000000}) [ 427.642745][T12339] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 16:18:16 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x37cb1133) socket$inet(0x2, 0x3, 0x33) perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x19410, 0x0) 16:18:16 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x2d080, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x40, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000140)=0x2) ioctl$PPPIOCGIDLE(r0, 0x8010743f, 0x0) 16:18:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c0000001100010000000000000000000200b40441"], 0x2c}}, 0x0) 16:18:17 executing program 3: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000140)={0x24, r0, 0x1, 0x0, 0x0, {{}, {@void, @val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8}]}, 0x24}}, 0x0) [ 428.321574][T12376] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 16:18:18 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:18:18 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000000), 0x5}, 0x200, 0x80000, 0x0, 0x0, 0x1000000008000}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x19) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) inotify_init1(0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000300)=""/147, 0x93}, {&(0x7f00000003c0)=""/76, 0x4c}], 0x2, 0x6, 0xfff) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x80, 0xfc, 0x81, 0xa, 0x20, 0x0, 0x7, 0xd0018, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0xa510, 0x6, 0x4c95, 0x5, 0x0, 0x9, 0x7f, 0x0, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0xb) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x7) 16:18:18 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000), 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f00000000c0)={'syz0\x00'}, 0x45c) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000080)) 16:18:18 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0x4, 0x3, 0x6}, 0x40) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 16:18:18 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x2d080, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x40, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000140)=0x2) ioctl$PPPIOCGIDLE(r0, 0x8010743f, 0x0) 16:18:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(r0, &(0x7f0000000080)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40012063, 0x0) 16:18:19 executing program 3: setpriority(0x0, 0x0, 0x7) 16:18:19 executing program 1: pselect6(0x40, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000240), 0x0) 16:18:19 executing program 0: syz_genetlink_get_family_id$batadv(&(0x7f0000002840), 0xffffffffffffffff) 16:18:19 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0x4008ae48, 0x0) 16:18:19 executing program 4: socketpair(0x2c, 0x3, 0x8001, &(0x7f0000001780)) 16:18:19 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 16:18:22 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:18:22 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x8941, 0x0) 16:18:22 executing program 4: socket$nl_audit(0x10, 0x3, 0x9) socket$nl_audit(0x10, 0x3, 0x9) openat$vcs(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) select(0x40, &(0x7f0000000540)={0x20}, &(0x7f00000005c0)={0x1}, 0x0, 0x0) 16:18:22 executing program 3: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000007e80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 16:18:22 executing program 5: pselect6(0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000002c0)={0x0}) 16:18:22 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) 16:18:22 executing program 0: r0 = fork() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r0, r1, 0x0, 0x0, 0x0}, 0x30) 16:18:22 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000000c0)) ioctl$PPPIOCGDEBUG(r0, 0x80047441, &(0x7f0000000000)) 16:18:22 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_VERDICT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x14, 0x1, 0x3, 0x101}, 0x14}}, 0x0) 16:18:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f0000000100)=0x10) 16:18:22 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xc008ae67, 0x0) 16:18:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x15, 0x0, 0x0) 16:18:25 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:18:25 executing program 4: syz_usb_connect(0x0, 0x24, &(0x7f0000000540)={{0x12, 0x1, 0x0, 0x3, 0x77, 0x22, 0x10, 0x413c, 0x8117, 0xd938, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xdb, 0xf4, 0xfd}}]}}]}}, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x1, [{0x0, 0x0}]}) 16:18:25 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000c80)=ANY=[], 0x420}}, 0x0) clone(0x8080000, 0x0, 0x0, 0x0, 0x0) 16:18:25 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0x0) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x0) 16:18:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x3, 0x0, 0x4) 16:18:25 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) setxattr$incfs_metadata(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000040)="0c6cd3118782180c3895f84ecb1795d3f109d93e2f9715a4d505bd827c09c81300d4e53dfbef5203c5ff9d06e2a7f81ac95a2fb17a5eea50b9", 0x39, 0x0) setxattr$incfs_metadata(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, 0x0, 0x0) 16:18:25 executing program 1: socket(0x10, 0x0, 0x3) 16:18:25 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002d40)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000180)={'batadv_slave_0\x00'}) 16:18:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) mlock2(&(0x7f0000009000/0x2000)=nil, 0x2000, 0x0) mlock(&(0x7f0000004000/0x4000)=nil, 0x4000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mlock2(&(0x7f0000007000/0x2000)=nil, 0x2000, 0x0) [ 436.852322][T10433] usb 5-1: new high-speed USB device number 2 using dummy_hcd 16:18:26 executing program 3: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x10f, 0x23, 0x0, 0x0) [ 437.115358][T10433] usb 5-1: Using ep0 maxpacket: 16 16:18:26 executing program 1: sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, 0x0, 0x4040) syz_open_dev$mouse(0x0, 0x0, 0x0) syz_usb_connect(0x0, 0x48, &(0x7f0000000540)={{0x12, 0x1, 0x250, 0x3, 0x77, 0x22, 0x10, 0x413c, 0x8117, 0xd938, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x36, 0x1, 0x0, 0x3, 0x50, 0x0, [{{0x9, 0x4, 0xc0, 0x0, 0x4, 0xdb, 0xf4, 0xfd, 0x2, [], [{{0x9, 0x5, 0x0, 0x0, 0x200, 0x81, 0x6, 0x6}}, {{0x9, 0x5, 0xd}}, {{0x9, 0x5, 0x0, 0x0, 0x0, 0xed, 0x5, 0x8}}, {{0x9, 0x5, 0x0, 0x2, 0x20, 0x4, 0xb0}}]}}]}}]}}, &(0x7f0000000900)={0x0, 0x0, 0x1b, &(0x7f0000000800)={0x5, 0xf, 0x1b, 0x2, [@ssp_cap={0xc, 0x10, 0xa, 0x49, 0x0, 0x0, 0xf00f, 0x8}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x1, 0x0, 0x9c, 0x4}]}}) 16:18:26 executing program 0: syz_usb_connect(0x0, 0x2d, &(0x7f0000000540)={{0x12, 0x1, 0x0, 0x3, 0x77, 0x22, 0x10, 0x413c, 0x8117, 0xd938, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0xdb, 0xf4, 0xfd, 0x0, [], [{}]}}]}}]}}, 0x0) [ 437.473999][T10433] usb 5-1: string descriptor 0 read error: -22 [ 437.480441][T10433] usb 5-1: New USB device found, idVendor=413c, idProduct=8117, bcdDevice=d9.38 [ 437.489998][T10433] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 437.596881][T10433] usb 5-1: config 0 descriptor?? [ 437.647420][T10433] option 5-1:0.0: GSM modem (1-port) converter detected [ 437.852357][T10403] usb 2-1: new high-speed USB device number 20 using dummy_hcd [ 437.976206][T10433] usb 5-1: USB disconnect, device number 2 [ 437.983967][T10433] option 5-1:0.0: device disconnected [ 438.012852][ T18] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 438.093143][T10403] usb 2-1: Using ep0 maxpacket: 16 [ 438.272723][ T18] usb 1-1: Using ep0 maxpacket: 16 [ 438.296732][T10403] usb 2-1: config 0 has an invalid interface number: 192 but max is 0 [ 438.305465][T10403] usb 2-1: config 0 has no interface number 0 [ 438.311765][T10403] usb 2-1: config 0 interface 192 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 438.322833][T10403] usb 2-1: config 0 interface 192 altsetting 0 endpoint 0xD has invalid wMaxPacketSize 0 [ 438.333013][T10403] usb 2-1: config 0 interface 192 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 438.343968][T10403] usb 2-1: config 0 interface 192 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 438.423287][ T18] usb 1-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 438.513197][T10403] usb 2-1: New USB device found, idVendor=413c, idProduct=8117, bcdDevice=d9.38 [ 438.522652][T10403] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 438.530793][T10403] usb 2-1: Product: syz [ 438.535361][T10403] usb 2-1: Manufacturer: syz [ 438.540056][T10403] usb 2-1: SerialNumber: syz [ 438.552014][T10403] usb 2-1: config 0 descriptor?? [ 438.575493][T12538] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 438.613482][ T18] usb 1-1: New USB device found, idVendor=413c, idProduct=8117, bcdDevice=d9.38 [ 438.622832][ T18] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 438.630990][ T18] usb 1-1: Product: syz [ 438.635467][ T18] usb 1-1: Manufacturer: syz [ 438.640184][ T18] usb 1-1: SerialNumber: syz [ 438.735807][ T18] usb 1-1: config 0 descriptor?? [ 438.786885][ T18] option 1-1:0.0: GSM modem (1-port) converter detected [ 439.029870][T10403] option 2-1:0.192: GSM modem (1-port) converter detected [ 439.069255][ T8458] usb 1-1: USB disconnect, device number 6 [ 439.076187][T10403] usb 2-1: USB disconnect, device number 20 [ 439.085055][T10403] option 2-1:0.192: device disconnected [ 439.099813][ T8458] option 1-1:0.0: device disconnected 16:18:28 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac", 0x49}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:18:28 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/ram7', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 16:18:28 executing program 3: bpf$OBJ_PIN_PROG(0x2, 0x0, 0x10) 16:18:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x3c, 0x0, 0x0) 16:18:28 executing program 1: bpf$BPF_TASK_FD_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 16:18:28 executing program 0: socketpair(0x11, 0x2, 0x0, &(0x7f00000000c0)) 16:18:29 executing program 3: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240), &(0x7f00000002c0)={0x0}) 16:18:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={0x0}}, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000a40), 0xffffffffffffffff) 16:18:29 executing program 1: clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ppoll(&(0x7f0000000000)=[{}], 0x1, &(0x7f0000000080)={0x0, r0+10000000}, &(0x7f00000000c0)={[0x1]}, 0x8) 16:18:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) 16:18:29 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0xb) 16:18:29 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x8907, 0x0) 16:18:32 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac", 0x49}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:18:32 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0x8010aebb, 0x0) 16:18:32 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xae03, 0x0) 16:18:32 executing program 1: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000000)) 16:18:32 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x10}, 0x33fe0}}, 0x6b46) 16:18:32 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002d40)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000005840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2142, 0x0) 16:18:32 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000), 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f00000000c0)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$UI_GET_VERSION(r0, 0x4008556c, 0x0) 16:18:32 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x0, 0x0, 0xd180, 0x0, 0x0, 0x3}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket(0x0, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)) r3 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x401ffc000) 16:18:32 executing program 0: syz_usb_connect(0x0, 0x36, &(0x7f0000000540)={{0x12, 0x1, 0x0, 0x3, 0x77, 0x22, 0x10, 0x413c, 0x8117, 0xd938, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0xff, 0xff, 0xff, 0x0, [], [{{0x9, 0x5, 0x0, 0x3, 0x20}}, {{0x9, 0x5, 0x0, 0x0, 0x20}}]}}]}}]}}, 0x0) 16:18:32 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x7, 0x9, 0x6, 0x0, 0x1, 0x0, '\x00', 0x0, r0, 0x0, 0x3}, 0x40) 16:18:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0x2}}}, 0x1c}}, 0x0) [ 443.838153][T12657] input: syz0 as /devices/virtual/input/input12 [ 443.911100][T12669] input: syz0 as /devices/virtual/input/input13 [ 444.102812][ T8458] usb 1-1: new high-speed USB device number 7 using dummy_hcd 16:18:33 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0x4020ae46, 0x0) [ 444.362647][ T8458] usb 1-1: Using ep0 maxpacket: 16 [ 444.514371][ T8458] usb 1-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 444.525453][ T8458] usb 1-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 444.702378][ T8458] usb 1-1: New USB device found, idVendor=413c, idProduct=8117, bcdDevice=d9.38 [ 444.711626][ T8458] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 444.720046][ T8458] usb 1-1: Product: syz [ 444.724805][ T8458] usb 1-1: Manufacturer: syz [ 444.729533][ T8458] usb 1-1: SerialNumber: syz [ 444.859840][ T8458] usb 1-1: config 0 descriptor?? [ 444.916099][ T8458] option 1-1:0.0: GSM modem (1-port) converter detected [ 445.048498][T12673] not chained 10000 origins [ 445.053039][T12673] CPU: 1 PID: 12673 Comm: syz-executor.3 Not tainted 5.12.0-rc6-syzkaller #0 [ 445.061823][T12673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 445.071892][T12673] Call Trace: [ 445.075183][T12673] dump_stack+0x24c/0x2e0 [ 445.079698][T12673] kmsan_internal_chain_origin+0x6f/0x130 [ 445.085477][T12673] ? kmsan_get_metadata+0x116/0x180 [ 445.090686][T12673] ? kmsan_internal_check_memory+0xb3/0x500 [ 445.096597][T12673] ? kmsan_get_metadata+0x116/0x180 [ 445.101813][T12673] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 445.107646][T12673] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 445.113735][T12673] ? kmsan_get_metadata+0x116/0x180 [ 445.118947][T12673] ? kmsan_set_origin_checked+0xa2/0x100 [ 445.124592][T12673] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 445.130678][T12673] ? kmsan_unpoison_shadow+0x74/0xa0 [ 445.135998][T12673] ? _copy_from_user+0x1fd/0x300 [ 445.141027][T12673] ? kmsan_get_metadata+0x116/0x180 [ 445.146250][T12673] __msan_chain_origin+0x54/0xa0 [ 445.151204][T12673] do_recvmmsg+0x17fc/0x22d0 [ 445.155891][T12673] ? kmsan_internal_set_origin+0x82/0xc0 [ 445.161545][T12673] ? __msan_poison_alloca+0xec/0x110 [ 445.166851][T12673] ? kmsan_get_metadata+0x116/0x180 [ 445.172064][T12673] ? __se_sys_recvmmsg+0xd6/0x410 [ 445.177121][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 445.182176][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 445.187064][T12673] do_syscall_64+0x9f/0x140 [ 445.187271][ T8458] usb 1-1: USB disconnect, device number 7 [ 445.191659][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 445.191734][T12673] RIP: 0033:0x4665d9 [ 445.191755][T12673] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 445.198988][ T8458] option 1-1:0.0: device disconnected [ 445.203421][T12673] RSP: 002b:00007fb944339188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 445.203457][T12673] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 445.203475][T12673] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003 [ 445.203493][T12673] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 445.203510][T12673] R10: 0000000000000002 R11: 0000000000000246 R12: 000000000056c038 [ 445.203527][T12673] R13: 0000000000a9fb1f R14: 00007fb944339300 R15: 0000000000022000 [ 445.203552][T12673] Uninit was stored to memory at: [ 445.203560][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 445.203591][T12673] __msan_chain_origin+0x54/0xa0 [ 445.203614][T12673] do_recvmmsg+0x17fc/0x22d0 [ 445.203644][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 445.203674][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 445.203700][T12673] do_syscall_64+0x9f/0x140 [ 445.203725][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 445.203754][T12673] [ 445.203759][T12673] Uninit was stored to memory at: [ 445.203766][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 445.203793][T12673] __msan_chain_origin+0x54/0xa0 [ 445.203819][T12673] do_recvmmsg+0x17fc/0x22d0 [ 445.203848][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 445.203878][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 445.203906][T12673] do_syscall_64+0x9f/0x140 [ 445.203934][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 445.203962][T12673] [ 445.203966][T12673] Uninit was stored to memory at: [ 445.203973][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 445.203999][T12673] __msan_chain_origin+0x54/0xa0 [ 445.204025][T12673] do_recvmmsg+0x17fc/0x22d0 [ 445.204054][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 445.204081][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 445.204110][T12673] do_syscall_64+0x9f/0x140 [ 445.204140][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 445.204168][T12673] [ 445.204172][T12673] Uninit was stored to memory at: [ 445.204179][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 445.204207][T12673] __msan_chain_origin+0x54/0xa0 [ 445.204233][T12673] do_recvmmsg+0x17fc/0x22d0 [ 445.204261][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 445.204291][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 445.204321][T12673] do_syscall_64+0x9f/0x140 [ 445.204349][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 445.204379][T12673] [ 445.204383][T12673] Uninit was stored to memory at: [ 445.204390][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 445.204416][T12673] __msan_chain_origin+0x54/0xa0 [ 445.204448][T12673] do_recvmmsg+0x17fc/0x22d0 [ 445.204476][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 445.204506][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 445.204536][T12673] do_syscall_64+0x9f/0x140 [ 445.204565][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 445.204593][T12673] [ 445.204597][T12673] Uninit was stored to memory at: [ 445.204604][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 445.204632][T12673] __msan_chain_origin+0x54/0xa0 [ 445.204658][T12673] do_recvmmsg+0x17fc/0x22d0 [ 445.204687][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 445.204726][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 445.204755][T12673] do_syscall_64+0x9f/0x140 [ 445.204782][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 445.204809][T12673] [ 445.204813][T12673] Uninit was stored to memory at: [ 445.204819][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 445.204846][T12673] __msan_chain_origin+0x54/0xa0 [ 445.204872][T12673] do_recvmmsg+0x17fc/0x22d0 [ 445.204900][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 445.204930][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 445.204957][T12673] do_syscall_64+0x9f/0x140 [ 445.204984][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 445.205012][T12673] [ 445.205017][T12673] Local variable ----msg_sys@do_recvmmsg created at: [ 445.205027][T12673] do_recvmmsg+0xbf/0x22d0 [ 445.205052][T12673] do_recvmmsg+0xbf/0x22d0 [ 445.722678][T12673] not chained 20000 origins [ 445.727215][T12673] CPU: 0 PID: 12673 Comm: syz-executor.3 Not tainted 5.12.0-rc6-syzkaller #0 [ 445.735990][T12673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 445.746057][T12673] Call Trace: [ 445.749349][T12673] dump_stack+0x24c/0x2e0 [ 445.753707][T12673] kmsan_internal_chain_origin+0x6f/0x130 [ 445.759449][T12673] ? kmsan_get_metadata+0x116/0x180 [ 445.764667][T12673] ? kmsan_internal_check_memory+0xb3/0x500 [ 445.770578][T12673] ? kmsan_get_metadata+0x116/0x180 [ 445.775802][T12673] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 445.781630][T12673] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 445.787718][T12673] ? kmsan_get_metadata+0x116/0x180 [ 445.792927][T12673] ? kmsan_set_origin_checked+0xa2/0x100 [ 445.798580][T12673] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 445.804660][T12673] ? kmsan_unpoison_shadow+0x74/0xa0 [ 445.809958][T12673] ? _copy_from_user+0x1fd/0x300 [ 445.814906][T12673] ? kmsan_get_metadata+0x116/0x180 [ 445.820125][T12673] __msan_chain_origin+0x54/0xa0 [ 445.825087][T12673] do_recvmmsg+0x17fc/0x22d0 [ 445.829703][T12673] ? kmsan_internal_set_origin+0x82/0xc0 [ 445.835463][T12673] ? __msan_poison_alloca+0xec/0x110 [ 445.840848][T12673] ? kmsan_get_metadata+0x116/0x180 [ 445.846064][T12673] ? __se_sys_recvmmsg+0xd6/0x410 [ 445.851117][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 445.856095][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 445.861090][T12673] do_syscall_64+0x9f/0x140 [ 445.865616][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 445.871567][T12673] RIP: 0033:0x4665d9 [ 445.875480][T12673] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 445.895110][T12673] RSP: 002b:00007fb944339188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 445.903548][T12673] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 445.911536][T12673] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003 [ 445.919521][T12673] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 445.927509][T12673] R10: 0000000000000002 R11: 0000000000000246 R12: 000000000056c038 [ 445.935505][T12673] R13: 0000000000a9fb1f R14: 00007fb944339300 R15: 0000000000022000 [ 445.943504][T12673] Uninit was stored to memory at: [ 445.948527][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 445.954269][T12673] __msan_chain_origin+0x54/0xa0 [ 445.959226][T12673] do_recvmmsg+0x17fc/0x22d0 [ 445.963840][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 445.968829][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 445.973786][T12673] do_syscall_64+0x9f/0x140 [ 445.978306][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 445.984207][T12673] [ 445.986528][T12673] Uninit was stored to memory at: [ 445.991548][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 445.997286][T12673] __msan_chain_origin+0x54/0xa0 [ 446.002244][T12673] do_recvmmsg+0x17fc/0x22d0 [ 446.007028][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 446.011988][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 446.016856][T12673] do_syscall_64+0x9f/0x140 [ 446.021391][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 446.027327][T12673] [ 446.029649][T12673] Uninit was stored to memory at: [ 446.034662][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 446.040395][T12673] __msan_chain_origin+0x54/0xa0 [ 446.045346][T12673] do_recvmmsg+0x17fc/0x22d0 [ 446.049955][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 446.054907][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 446.059774][T12673] do_syscall_64+0x9f/0x140 [ 446.064295][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 446.070210][T12673] [ 446.072537][T12673] Uninit was stored to memory at: [ 446.077557][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 446.083299][T12673] __msan_chain_origin+0x54/0xa0 [ 446.088264][T12673] do_recvmmsg+0x17fc/0x22d0 [ 446.092868][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 446.097821][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 446.102705][T12673] do_syscall_64+0x9f/0x140 [ 446.107228][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 446.113141][T12673] [ 446.115463][T12673] Uninit was stored to memory at: [ 446.120480][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 446.126217][T12673] __msan_chain_origin+0x54/0xa0 [ 446.131176][T12673] do_recvmmsg+0x17fc/0x22d0 [ 446.135788][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 446.140745][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 446.145706][T12673] do_syscall_64+0x9f/0x140 [ 446.150230][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 446.156138][T12673] [ 446.158491][T12673] Uninit was stored to memory at: [ 446.163502][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 446.169248][T12673] __msan_chain_origin+0x54/0xa0 [ 446.174200][T12673] do_recvmmsg+0x17fc/0x22d0 [ 446.178809][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 446.183869][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 446.188736][T12673] do_syscall_64+0x9f/0x140 [ 446.193352][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 446.199277][T12673] [ 446.201599][T12673] Uninit was stored to memory at: [ 446.206611][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 446.212346][T12673] __msan_chain_origin+0x54/0xa0 [ 446.214768][T12680] not chained 30000 origins [ 446.217310][T12673] do_recvmmsg+0x17fc/0x22d0 [ 446.221801][T12680] CPU: 1 PID: 12680 Comm: syz-executor.3 Not tainted 5.12.0-rc6-syzkaller #0 [ 446.226364][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 446.235116][T12680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 446.240065][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 446.250284][T12680] Call Trace: [ 446.250298][T12680] dump_stack+0x24c/0x2e0 [ 446.255122][T12673] do_syscall_64+0x9f/0x140 [ 446.258385][T12680] kmsan_internal_chain_origin+0x6f/0x130 [ 446.262685][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 446.267162][T12680] ? kmsan_get_metadata+0x116/0x180 [ 446.272938][T12673] [ 446.272944][T12673] Local variable ----msg_sys@do_recvmmsg created at: [ 446.278800][T12680] ? kmsan_internal_check_memory+0xb3/0x500 [ 446.283967][T12673] do_recvmmsg+0xbf/0x22d0 [ 446.286361][T12680] ? kmsan_get_metadata+0x116/0x180 [ 446.293021][T12673] do_recvmmsg+0xbf/0x22d0 [ 446.298889][T12680] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 446.318984][T12680] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 446.325141][T12680] ? kmsan_get_metadata+0x116/0x180 [ 446.330422][T12680] ? kmsan_set_origin_checked+0xa2/0x100 [ 446.336069][T12680] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 446.342150][T12680] ? kmsan_unpoison_shadow+0x74/0xa0 [ 446.347444][T12680] ? _copy_from_user+0x1fd/0x300 [ 446.352399][T12680] ? kmsan_get_metadata+0x116/0x180 [ 446.357609][T12680] __msan_chain_origin+0x54/0xa0 [ 446.362603][T12680] do_recvmmsg+0x17fc/0x22d0 [ 446.367233][T12680] ? __msan_metadata_ptr_for_store_n+0x10/0x10 [ 446.373403][T12680] ? kmsan_internal_set_origin+0x82/0xc0 [ 446.379046][T12680] ? __msan_poison_alloca+0xec/0x110 [ 446.384337][T12680] ? __msan_instrument_asm_store+0x104/0x130 [ 446.390323][T12680] ? __se_sys_recvmmsg+0xd6/0x410 [ 446.395360][T12680] __se_sys_recvmmsg+0x24a/0x410 [ 446.400318][T12680] __x64_sys_recvmmsg+0x62/0x80 [ 446.405181][T12680] do_syscall_64+0x9f/0x140 [ 446.409697][T12680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 446.415604][T12680] RIP: 0033:0x4665d9 [ 446.419499][T12680] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 446.439116][T12680] RSP: 002b:00007fb9442f7188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 446.447544][T12680] RAX: ffffffffffffffda RBX: 000000000056c1a8 RCX: 00000000004665d9 [ 446.455528][T12680] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003 [ 446.463510][T12680] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 446.471486][T12680] R10: 0000000000000002 R11: 0000000000000246 R12: 000000000056c1a8 [ 446.479479][T12680] R13: 0000000000a9fb1f R14: 00007fb9442f7300 R15: 0000000000022000 [ 446.487459][T12680] Uninit was stored to memory at: [ 446.492468][T12680] kmsan_internal_chain_origin+0xad/0x130 [ 446.498196][T12680] __msan_chain_origin+0x54/0xa0 [ 446.503137][T12680] do_recvmmsg+0x17fc/0x22d0 [ 446.507759][T12680] __se_sys_recvmmsg+0x24a/0x410 [ 446.512705][T12680] __x64_sys_recvmmsg+0x62/0x80 [ 446.517567][T12680] do_syscall_64+0x9f/0x140 [ 446.522078][T12680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 446.527979][T12680] [ 446.530299][T12680] Uninit was stored to memory at: [ 446.535310][T12680] kmsan_internal_chain_origin+0xad/0x130 [ 446.541039][T12680] __msan_chain_origin+0x54/0xa0 [ 446.545981][T12680] do_recvmmsg+0x17fc/0x22d0 [ 446.550581][T12680] __se_sys_recvmmsg+0x24a/0x410 [ 446.555524][T12680] __x64_sys_recvmmsg+0x62/0x80 [ 446.560396][T12680] do_syscall_64+0x9f/0x140 [ 446.564913][T12680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 446.570812][T12680] [ 446.573123][T12680] Uninit was stored to memory at: [ 446.578218][T12680] kmsan_internal_chain_origin+0xad/0x130 [ 446.584115][T12680] __msan_chain_origin+0x54/0xa0 [ 446.589068][T12680] do_recvmmsg+0x17fc/0x22d0 [ 446.593677][T12680] __se_sys_recvmmsg+0x24a/0x410 [ 446.596005][T12673] not chained 40000 origins [ 446.598717][T12680] __x64_sys_recvmmsg+0x62/0x80 [ 446.603204][T12673] CPU: 0 PID: 12673 Comm: syz-executor.3 Not tainted 5.12.0-rc6-syzkaller #0 [ 446.608021][T12680] do_syscall_64+0x9f/0x140 [ 446.616766][T12673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 446.621239][T12680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 446.631272][T12673] Call Trace: [ 446.631285][T12673] dump_stack+0x24c/0x2e0 [ 446.637144][T12680] [ 446.637150][T12680] Uninit was stored to memory at: [ 446.640412][T12673] kmsan_internal_chain_origin+0x6f/0x130 [ 446.644710][T12680] kmsan_internal_chain_origin+0xad/0x130 [ 446.647013][T12673] ? kmsan_get_metadata+0x116/0x180 [ 446.652003][T12680] __msan_chain_origin+0x54/0xa0 [ 446.657694][T12673] ? kmsan_internal_check_memory+0xb3/0x500 [ 446.663670][T12680] do_recvmmsg+0x17fc/0x22d0 [ 446.668853][T12673] ? kmsan_get_metadata+0x116/0x180 [ 446.673757][T12680] __se_sys_recvmmsg+0x24a/0x410 [ 446.679626][T12673] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 446.684194][T12680] __x64_sys_recvmmsg+0x62/0x80 [ 446.689364][T12673] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 446.694271][T12680] do_syscall_64+0x9f/0x140 [ 446.700051][T12673] ? kmsan_get_metadata+0x116/0x180 [ 446.704882][T12680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 446.710939][T12673] ? kmsan_set_origin_checked+0xa2/0x100 [ 446.715413][T12680] [ 446.715418][T12680] Uninit was stored to memory at: [ 446.720581][T12673] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 446.726449][T12680] kmsan_internal_chain_origin+0xad/0x130 [ 446.732057][T12673] ? kmsan_unpoison_shadow+0x74/0xa0 [ 446.734363][T12680] __msan_chain_origin+0x54/0xa0 [ 446.739372][T12673] ? _copy_from_user+0x1fd/0x300 [ 446.745406][T12680] do_recvmmsg+0x17fc/0x22d0 [ 446.751096][T12673] ? kmsan_get_metadata+0x116/0x180 [ 446.756351][T12680] __se_sys_recvmmsg+0x24a/0x410 [ 446.761261][T12673] __msan_chain_origin+0x54/0xa0 [ 446.766181][T12680] __x64_sys_recvmmsg+0x62/0x80 [ 446.770754][T12673] do_recvmmsg+0x17fc/0x22d0 [ 446.775921][T12680] do_syscall_64+0x9f/0x140 [ 446.780845][T12673] ? kmsan_internal_set_origin+0x82/0xc0 [ 446.785751][T12680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 446.790574][T12673] ? __msan_poison_alloca+0xec/0x110 [ 446.795132][T12680] [ 446.795137][T12680] Uninit was stored to memory at: [ 446.799604][T12673] ? kmsan_get_metadata+0x116/0x180 [ 446.805220][T12680] kmsan_internal_chain_origin+0xad/0x130 [ 446.811082][T12673] ? __se_sys_recvmmsg+0xd6/0x410 [ 446.816349][T12680] __msan_chain_origin+0x54/0xa0 [ 446.818655][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 446.823647][T12680] do_recvmmsg+0x17fc/0x22d0 [ 446.828830][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 446.834527][T12680] __se_sys_recvmmsg+0x24a/0x410 [ 446.839532][T12673] do_syscall_64+0x9f/0x140 [ 446.844450][T12680] __x64_sys_recvmmsg+0x62/0x80 [ 446.849364][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 446.853923][T12680] do_syscall_64+0x9f/0x140 [ 446.858747][T12673] RIP: 0033:0x4665d9 [ 446.863655][T12680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 446.868140][T12673] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 446.872976][T12680] [ 446.872982][T12680] Uninit was stored to memory at: [ 446.878836][T12673] RSP: 002b:00007fb944339188 EFLAGS: 00000246 [ 446.883313][T12680] kmsan_internal_chain_origin+0xad/0x130 [ 446.887176][T12673] ORIG_RAX: 000000000000012b [ 446.893040][T12680] __msan_chain_origin+0x54/0xa0 [ 446.912646][T12673] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 446.914962][T12680] do_recvmmsg+0x17fc/0x22d0 [ 446.920141][T12673] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003 [ 446.926178][T12680] __se_sys_recvmmsg+0x24a/0x410 [ 446.931871][T12673] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 446.936523][T12680] __x64_sys_recvmmsg+0x62/0x80 [ 446.941443][T12673] R10: 0000000000000002 R11: 0000000000000246 R12: 000000000056c038 [ 446.949492][T12680] do_syscall_64+0x9f/0x140 [ 446.954051][T12673] R13: 0000000000a9fb1f R14: 00007fb944339300 R15: 0000000000022000 [ 446.962036][T12680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 446.966983][T12673] Uninit was stored to memory at: [ 446.974925][T12680] [ 446.974932][T12680] Local variable ----msg_sys@do_recvmmsg created at: [ 446.979753][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 446.987709][T12680] do_recvmmsg+0xbf/0x22d0 [ 446.992187][T12673] __msan_chain_origin+0x54/0xa0 [ 447.000148][T12680] do_recvmmsg+0xbf/0x22d0 [ 447.006139][T12673] do_recvmmsg+0x17fc/0x22d0 [ 447.044072][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 447.049029][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 447.053897][T12673] do_syscall_64+0x9f/0x140 [ 447.058424][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 447.064350][T12673] [ 447.066673][T12673] Uninit was stored to memory at: [ 447.071688][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 447.077462][T12673] __msan_chain_origin+0x54/0xa0 [ 447.082420][T12673] do_recvmmsg+0x17fc/0x22d0 [ 447.087030][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 447.091974][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 447.096843][T12673] do_syscall_64+0x9f/0x140 [ 447.101361][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 447.107273][T12673] [ 447.109595][T12673] Uninit was stored to memory at: [ 447.114610][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 447.120346][T12673] __msan_chain_origin+0x54/0xa0 [ 447.125304][T12673] do_recvmmsg+0x17fc/0x22d0 [ 447.129917][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 447.134872][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 447.139736][T12673] do_syscall_64+0x9f/0x140 [ 447.144255][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 447.150179][T12673] [ 447.152510][T12673] Uninit was stored to memory at: [ 447.157528][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 447.163264][T12673] __msan_chain_origin+0x54/0xa0 [ 447.168224][T12673] do_recvmmsg+0x17fc/0x22d0 [ 447.173094][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 447.178052][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 447.182917][T12673] do_syscall_64+0x9f/0x140 [ 447.187475][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 447.193384][T12673] [ 447.195709][T12673] Uninit was stored to memory at: [ 447.200807][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 447.206540][T12673] __msan_chain_origin+0x54/0xa0 [ 447.211496][T12673] do_recvmmsg+0x17fc/0x22d0 [ 447.216104][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 447.221059][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 447.225946][T12673] do_syscall_64+0x9f/0x140 [ 447.230471][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 447.236387][T12673] [ 447.238700][T12673] Uninit was stored to memory at: [ 447.243805][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 447.249611][T12673] __msan_chain_origin+0x54/0xa0 [ 447.254549][T12673] do_recvmmsg+0x17fc/0x22d0 [ 447.259137][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 447.264244][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 447.269090][T12673] do_syscall_64+0x9f/0x140 [ 447.273591][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 447.279482][T12673] [ 447.281788][T12673] Uninit was stored to memory at: [ 447.286875][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 447.292597][T12673] __msan_chain_origin+0x54/0xa0 [ 447.297528][T12673] do_recvmmsg+0x17fc/0x22d0 [ 447.302117][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 447.307061][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 447.311906][T12673] do_syscall_64+0x9f/0x140 [ 447.316434][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 447.322512][T12673] [ 447.324818][T12673] Local variable ----msg_sys@do_recvmmsg created at: [ 447.331468][T12673] do_recvmmsg+0xbf/0x22d0 [ 447.335879][T12673] do_recvmmsg+0xbf/0x22d0 16:18:36 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac", 0x49}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:18:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2d, 0x0, 0x0) 16:18:36 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/ram7', 0x40000, 0x0) 16:18:36 executing program 4: pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ppoll(&(0x7f0000000100)=[{r0}], 0x1, &(0x7f0000000140)={0x0, 0x3938700}, 0x0, 0x0) 16:18:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0xc, 0x0, &(0x7f0000001340)) 16:18:36 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xc208ae62, 0x0) 16:18:36 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x9, 0x0, 0x0, 0x0, 0x10b5}, 0x40) [ 448.419192][ T3123] ieee802154 phy0 wpan0: encryption failed: -22 [ 448.425765][ T3123] ieee802154 phy1 wpan1: encryption failed: -22 [ 449.137684][T12673] not chained 50000 origins [ 449.142217][T12673] CPU: 1 PID: 12673 Comm: syz-executor.3 Not tainted 5.12.0-rc6-syzkaller #0 [ 449.151018][T12673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 449.161075][T12673] Call Trace: [ 449.164356][T12673] dump_stack+0x24c/0x2e0 [ 449.168705][T12673] kmsan_internal_chain_origin+0x6f/0x130 [ 449.174444][T12673] ? kmsan_get_metadata+0x116/0x180 [ 449.179649][T12673] ? kmsan_internal_check_memory+0xb3/0x500 [ 449.185553][T12673] ? kmsan_get_metadata+0x116/0x180 [ 449.190766][T12673] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 449.196580][T12673] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 449.202656][T12673] ? kmsan_get_metadata+0x116/0x180 [ 449.207866][T12673] ? kmsan_set_origin_checked+0xa2/0x100 [ 449.213504][T12673] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 449.219593][T12673] ? kmsan_unpoison_shadow+0x74/0xa0 [ 449.224972][T12673] ? _copy_from_user+0x1fd/0x300 [ 449.229926][T12673] ? kmsan_get_metadata+0x116/0x180 [ 449.235137][T12673] __msan_chain_origin+0x54/0xa0 [ 449.240086][T12673] do_recvmmsg+0x17fc/0x22d0 [ 449.244700][T12673] ? kmsan_internal_set_origin+0x82/0xc0 [ 449.250334][T12673] ? __msan_poison_alloca+0xec/0x110 [ 449.255626][T12673] ? kmsan_get_metadata+0x116/0x180 [ 449.260834][T12673] ? __se_sys_recvmmsg+0xd6/0x410 [ 449.265867][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 449.270832][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 449.275777][T12673] do_syscall_64+0x9f/0x140 [ 449.280297][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 449.286216][T12673] RIP: 0033:0x4665d9 [ 449.290137][T12673] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 449.309756][T12673] RSP: 002b:00007fb944339188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 449.318183][T12673] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 449.326163][T12673] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003 [ 449.334317][T12673] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 449.342304][T12673] R10: 0000000000000002 R11: 0000000000000246 R12: 000000000056c038 [ 449.350288][T12673] R13: 0000000000a9fb1f R14: 00007fb944339300 R15: 0000000000022000 [ 449.358267][T12673] Uninit was stored to memory at: [ 449.363278][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 449.369097][T12673] __msan_chain_origin+0x54/0xa0 [ 449.374040][T12673] do_recvmmsg+0x17fc/0x22d0 [ 449.378659][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 449.383620][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 449.388475][T12673] do_syscall_64+0x9f/0x140 [ 449.392991][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 449.398977][T12673] [ 449.401299][T12673] Uninit was stored to memory at: [ 449.406310][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 449.412035][T12673] __msan_chain_origin+0x54/0xa0 [ 449.416974][T12673] do_recvmmsg+0x17fc/0x22d0 [ 449.421570][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 449.426782][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 449.431637][T12673] do_syscall_64+0x9f/0x140 [ 449.436150][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 449.442055][T12673] [ 449.444369][T12673] Uninit was stored to memory at: [ 449.449373][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 449.455102][T12673] __msan_chain_origin+0x54/0xa0 [ 449.460098][T12673] do_recvmmsg+0x17fc/0x22d0 [ 449.464697][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 449.469645][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 449.474500][T12673] do_syscall_64+0x9f/0x140 [ 449.479015][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 449.484914][T12673] [ 449.487229][T12673] Uninit was stored to memory at: [ 449.492321][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 449.498063][T12673] __msan_chain_origin+0x54/0xa0 [ 449.503012][T12673] do_recvmmsg+0x17fc/0x22d0 [ 449.507700][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 449.512654][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 449.517520][T12673] do_syscall_64+0x9f/0x140 [ 449.522038][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 449.527941][T12673] [ 449.530260][T12673] Uninit was stored to memory at: [ 449.535269][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 449.541002][T12673] __msan_chain_origin+0x54/0xa0 [ 449.545965][T12673] do_recvmmsg+0x17fc/0x22d0 [ 449.550573][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 449.555517][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 449.560382][T12673] do_syscall_64+0x9f/0x140 [ 449.564902][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 449.570806][T12673] [ 449.573138][T12673] Uninit was stored to memory at: [ 449.578152][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 449.579974][T12680] not chained 60000 origins [ 449.583874][T12673] __msan_chain_origin+0x54/0xa0 [ 449.588363][T12680] CPU: 0 PID: 12680 Comm: syz-executor.3 Not tainted 5.12.0-rc6-syzkaller #0 [ 449.593270][T12673] do_recvmmsg+0x17fc/0x22d0 [ 449.602000][T12680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 449.606562][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 449.616599][T12680] Call Trace: [ 449.616612][T12680] dump_stack+0x24c/0x2e0 [ 449.621511][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 449.624776][T12680] kmsan_internal_chain_origin+0x6f/0x130 [ 449.629096][T12673] do_syscall_64+0x9f/0x140 [ 449.633935][T12680] ? kmsan_get_metadata+0x116/0x180 [ 449.639625][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 449.644114][T12680] ? kmsan_internal_check_memory+0xb3/0x500 [ 449.649285][T12673] [ 449.649291][T12673] Uninit was stored to memory at: [ 449.655149][T12680] ? kmsan_get_metadata+0x116/0x180 [ 449.661014][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 449.663320][T12680] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 449.668317][T12673] __msan_chain_origin+0x54/0xa0 [ 449.673488][T12680] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 449.679191][T12673] do_recvmmsg+0x17fc/0x22d0 [ 449.684971][T12680] ? kmsan_get_metadata+0x116/0x180 [ 449.689877][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 449.695922][T12680] ? kmsan_set_origin_checked+0xa2/0x100 [ 449.700484][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 449.705658][T12680] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 449.710566][T12673] do_syscall_64+0x9f/0x140 [ 449.716194][T12680] ? kmsan_unpoison_shadow+0x74/0xa0 [ 449.721031][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 449.727167][T12680] ? _copy_from_user+0x1fd/0x300 [ 449.731641][T12673] [ 449.731647][T12673] Local variable ----msg_sys@do_recvmmsg created at: [ 449.736900][T12680] ? kmsan_get_metadata+0x116/0x180 [ 449.742763][T12673] do_recvmmsg+0xbf/0x22d0 [ 449.747684][T12680] __msan_chain_origin+0x54/0xa0 [ 449.749987][T12673] do_recvmmsg+0xbf/0x22d0 [ 449.756634][T12680] do_recvmmsg+0x17fc/0x22d0 [ 449.780103][T12680] ? __msan_metadata_ptr_for_store_n+0x10/0x10 [ 449.786283][T12680] ? kmsan_internal_set_origin+0x82/0xc0 [ 449.792032][T12680] ? __msan_poison_alloca+0xec/0x110 [ 449.797333][T12680] ? __msan_instrument_asm_store+0x104/0x130 [ 449.803333][T12680] ? __se_sys_recvmmsg+0xd6/0x410 [ 449.808378][T12680] __se_sys_recvmmsg+0x24a/0x410 [ 449.813335][T12680] __x64_sys_recvmmsg+0x62/0x80 [ 449.818215][T12680] do_syscall_64+0x9f/0x140 [ 449.822739][T12680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 449.828650][T12680] RIP: 0033:0x4665d9 [ 449.832555][T12680] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 449.852179][T12680] RSP: 002b:00007fb9442f7188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 449.860639][T12680] RAX: ffffffffffffffda RBX: 000000000056c1a8 RCX: 00000000004665d9 [ 449.868626][T12680] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003 [ 449.876607][T12680] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 449.884593][T12680] R10: 0000000000000002 R11: 0000000000000246 R12: 000000000056c1a8 [ 449.892575][T12680] R13: 0000000000a9fb1f R14: 00007fb9442f7300 R15: 0000000000022000 [ 449.900568][T12680] Uninit was stored to memory at: [ 449.905679][T12680] kmsan_internal_chain_origin+0xad/0x130 [ 449.911534][T12680] __msan_chain_origin+0x54/0xa0 [ 449.916490][T12680] do_recvmmsg+0x17fc/0x22d0 [ 449.921090][T12680] __se_sys_recvmmsg+0x24a/0x410 [ 449.926067][T12680] __x64_sys_recvmmsg+0x62/0x80 [ 449.930938][T12680] do_syscall_64+0x9f/0x140 [ 449.935542][T12680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 449.941534][T12680] [ 449.943858][T12680] Uninit was stored to memory at: [ 449.948963][T12680] kmsan_internal_chain_origin+0xad/0x130 [ 449.954702][T12680] __msan_chain_origin+0x54/0xa0 [ 449.959652][T12680] do_recvmmsg+0x17fc/0x22d0 [ 449.964261][T12680] __se_sys_recvmmsg+0x24a/0x410 [ 449.969235][T12680] __x64_sys_recvmmsg+0x62/0x80 [ 449.974116][T12680] do_syscall_64+0x9f/0x140 [ 449.978644][T12680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 449.984549][T12680] [ 449.986868][T12680] Uninit was stored to memory at: [ 449.991883][T12680] kmsan_internal_chain_origin+0xad/0x130 [ 449.997627][T12680] __msan_chain_origin+0x54/0xa0 [ 450.002582][T12680] do_recvmmsg+0x17fc/0x22d0 [ 450.007189][T12680] __se_sys_recvmmsg+0x24a/0x410 [ 450.012137][T12680] __x64_sys_recvmmsg+0x62/0x80 [ 450.017005][T12680] do_syscall_64+0x9f/0x140 [ 450.021529][T12680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 450.027436][T12680] [ 450.029759][T12680] Uninit was stored to memory at: [ 450.034774][T12680] kmsan_internal_chain_origin+0xad/0x130 [ 450.040516][T12680] __msan_chain_origin+0x54/0xa0 [ 450.045476][T12680] do_recvmmsg+0x17fc/0x22d0 [ 450.050192][T12680] __se_sys_recvmmsg+0x24a/0x410 [ 450.055166][T12680] __x64_sys_recvmmsg+0x62/0x80 [ 450.060037][T12680] do_syscall_64+0x9f/0x140 [ 450.064557][T12680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 450.070462][T12680] [ 450.072788][T12680] Uninit was stored to memory at: [ 450.077805][T12680] kmsan_internal_chain_origin+0xad/0x130 [ 450.083541][T12680] __msan_chain_origin+0x54/0xa0 [ 450.088589][T12680] do_recvmmsg+0x17fc/0x22d0 [ 450.093200][T12680] __se_sys_recvmmsg+0x24a/0x410 [ 450.098152][T12680] __x64_sys_recvmmsg+0x62/0x80 [ 450.103012][T12680] do_syscall_64+0x9f/0x140 [ 450.107529][T12680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 450.113439][T12680] [ 450.115757][T12680] Uninit was stored to memory at: [ 450.120886][T12680] kmsan_internal_chain_origin+0xad/0x130 [ 450.126624][T12680] __msan_chain_origin+0x54/0xa0 [ 450.131580][T12680] do_recvmmsg+0x17fc/0x22d0 [ 450.136192][T12680] __se_sys_recvmmsg+0x24a/0x410 [ 450.141145][T12680] __x64_sys_recvmmsg+0x62/0x80 [ 450.146013][T12680] do_syscall_64+0x9f/0x140 [ 450.150622][T12680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 450.156532][T12680] [ 450.158854][T12680] Uninit was stored to memory at: [ 450.163867][T12680] kmsan_internal_chain_origin+0xad/0x130 [ 450.169619][T12680] __msan_chain_origin+0x54/0xa0 [ 450.174581][T12680] do_recvmmsg+0x17fc/0x22d0 [ 450.179218][T12680] __se_sys_recvmmsg+0x24a/0x410 [ 450.184167][T12680] __x64_sys_recvmmsg+0x62/0x80 [ 450.189033][T12680] do_syscall_64+0x9f/0x140 [ 450.193556][T12680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 450.199463][T12680] [ 450.201781][T12680] Local variable ----msg_sys@do_recvmmsg created at: [ 450.208454][T12680] do_recvmmsg+0xbf/0x22d0 [ 450.212881][T12680] do_recvmmsg+0xbf/0x22d0 [ 450.377099][T12673] not chained 70000 origins [ 450.381726][T12673] CPU: 1 PID: 12673 Comm: syz-executor.3 Not tainted 5.12.0-rc6-syzkaller #0 [ 450.390486][T12673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 450.400533][T12673] Call Trace: [ 450.403832][T12673] dump_stack+0x24c/0x2e0 [ 450.408284][T12673] kmsan_internal_chain_origin+0x6f/0x130 [ 450.414005][T12673] ? kmsan_get_metadata+0x116/0x180 [ 450.419206][T12673] ? kmsan_internal_check_memory+0xb3/0x500 [ 450.425097][T12673] ? kmsan_get_metadata+0x116/0x180 [ 450.430293][T12673] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 450.436096][T12673] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 450.442240][T12673] ? kmsan_get_metadata+0x116/0x180 [ 450.447437][T12673] ? kmsan_set_origin_checked+0xa2/0x100 [ 450.453063][T12673] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 450.459128][T12673] ? kmsan_unpoison_shadow+0x74/0xa0 [ 450.464408][T12673] ? _copy_from_user+0x1fd/0x300 [ 450.469348][T12673] ? kmsan_get_metadata+0x116/0x180 [ 450.474552][T12673] __msan_chain_origin+0x54/0xa0 [ 450.479488][T12673] do_recvmmsg+0x17fc/0x22d0 [ 450.484087][T12673] ? kmsan_internal_set_origin+0x82/0xc0 [ 450.489711][T12673] ? __msan_poison_alloca+0xec/0x110 [ 450.494998][T12673] ? kmsan_get_metadata+0x116/0x180 [ 450.500190][T12673] ? __se_sys_recvmmsg+0xd6/0x410 [ 450.505469][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 450.510420][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 450.515269][T12673] do_syscall_64+0x9f/0x140 [ 450.519765][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 450.525648][T12673] RIP: 0033:0x4665d9 [ 450.529528][T12673] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 450.549131][T12673] RSP: 002b:00007fb944339188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 450.557544][T12673] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 450.565510][T12673] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003 [ 450.573473][T12673] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 450.581518][T12673] R10: 0000000000000002 R11: 0000000000000246 R12: 000000000056c038 [ 450.589501][T12673] R13: 0000000000a9fb1f R14: 00007fb944339300 R15: 0000000000022000 [ 450.597472][T12673] Uninit was stored to memory at: [ 450.602474][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 450.608194][T12673] __msan_chain_origin+0x54/0xa0 [ 450.613143][T12673] do_recvmmsg+0x17fc/0x22d0 [ 450.617727][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 450.622654][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 450.627499][T12673] do_syscall_64+0x9f/0x140 [ 450.632083][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 450.637971][T12673] [ 450.640293][T12673] Uninit was stored to memory at: [ 450.645291][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 450.651001][T12673] __msan_chain_origin+0x54/0xa0 [ 450.655930][T12673] do_recvmmsg+0x17fc/0x22d0 [ 450.660519][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 450.665463][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 450.670305][T12673] do_syscall_64+0x9f/0x140 [ 450.674801][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 450.680732][T12673] [ 450.683039][T12673] Uninit was stored to memory at: [ 450.688037][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 450.693749][T12673] __msan_chain_origin+0x54/0xa0 [ 450.698678][T12673] do_recvmmsg+0x17fc/0x22d0 [ 450.703275][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 450.708209][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 450.713077][T12673] do_syscall_64+0x9f/0x140 [ 450.717578][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 450.723462][T12673] [ 450.725770][T12673] Uninit was stored to memory at: [ 450.730771][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 450.736486][T12673] __msan_chain_origin+0x54/0xa0 [ 450.741419][T12673] do_recvmmsg+0x17fc/0x22d0 [ 450.746007][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 450.751025][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 450.755872][T12673] do_syscall_64+0x9f/0x140 [ 450.760365][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 450.766335][T12673] [ 450.768642][T12673] Uninit was stored to memory at: [ 450.773649][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 450.779358][T12673] __msan_chain_origin+0x54/0xa0 [ 450.784303][T12673] do_recvmmsg+0x17fc/0x22d0 [ 450.788890][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 450.793823][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 450.798664][T12673] do_syscall_64+0x9f/0x140 [ 450.803159][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 450.809048][T12673] [ 450.811357][T12673] Uninit was stored to memory at: [ 450.816358][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 450.822074][T12673] __msan_chain_origin+0x54/0xa0 [ 450.827004][T12673] do_recvmmsg+0x17fc/0x22d0 [ 450.831588][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 450.836515][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 450.841367][T12673] do_syscall_64+0x9f/0x140 [ 450.845862][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 450.851743][T12673] [ 450.854073][T12673] Uninit was stored to memory at: [ 450.859071][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 450.864795][T12673] __msan_chain_origin+0x54/0xa0 [ 450.869725][T12673] do_recvmmsg+0x17fc/0x22d0 [ 450.874308][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 450.879240][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 450.884186][T12673] do_syscall_64+0x9f/0x140 [ 450.888681][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 450.894569][T12673] [ 450.896873][T12673] Local variable ----msg_sys@do_recvmmsg created at: [ 450.903529][T12673] do_recvmmsg+0xbf/0x22d0 [ 450.907932][T12673] do_recvmmsg+0xbf/0x22d0 [ 451.511564][T12680] not chained 80000 origins [ 451.516097][T12680] CPU: 0 PID: 12680 Comm: syz-executor.3 Not tainted 5.12.0-rc6-syzkaller #0 [ 451.524873][T12680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 451.534981][T12680] Call Trace: [ 451.538359][T12680] dump_stack+0x24c/0x2e0 [ 451.542717][T12680] kmsan_internal_chain_origin+0x6f/0x130 [ 451.548549][T12680] ? kmsan_get_metadata+0x116/0x180 [ 451.553762][T12680] ? kmsan_internal_check_memory+0xb3/0x500 [ 451.559667][T12680] ? kmsan_get_metadata+0x116/0x180 [ 451.564886][T12680] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 451.570972][T12680] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 451.577145][T12680] ? kmsan_get_metadata+0x116/0x180 [ 451.582361][T12680] ? kmsan_set_origin_checked+0xa2/0x100 [ 451.588012][T12680] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 451.594095][T12680] ? kmsan_unpoison_shadow+0x74/0xa0 [ 451.599414][T12680] ? _copy_from_user+0x1fd/0x300 [ 451.604367][T12680] ? kmsan_get_metadata+0x116/0x180 [ 451.609582][T12680] __msan_chain_origin+0x54/0xa0 [ 451.614533][T12680] do_recvmmsg+0x17fc/0x22d0 [ 451.619157][T12680] ? __msan_metadata_ptr_for_store_n+0x10/0x10 [ 451.625339][T12680] ? kmsan_internal_set_origin+0x82/0xc0 [ 451.630986][T12680] ? __msan_poison_alloca+0xec/0x110 [ 451.636289][T12680] ? __msan_instrument_asm_store+0x104/0x130 [ 451.642286][T12680] ? __se_sys_recvmmsg+0xd6/0x410 [ 451.647335][T12680] __se_sys_recvmmsg+0x24a/0x410 [ 451.652294][T12680] __x64_sys_recvmmsg+0x62/0x80 [ 451.657165][T12680] do_syscall_64+0x9f/0x140 [ 451.661687][T12680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 451.667595][T12680] RIP: 0033:0x4665d9 [ 451.671495][T12680] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 451.691211][T12680] RSP: 002b:00007fb9442f7188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 451.699651][T12680] RAX: ffffffffffffffda RBX: 000000000056c1a8 RCX: 00000000004665d9 [ 451.707640][T12680] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003 [ 451.715627][T12680] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 451.723619][T12680] R10: 0000000000000002 R11: 0000000000000246 R12: 000000000056c1a8 [ 451.731606][T12680] R13: 0000000000a9fb1f R14: 00007fb9442f7300 R15: 0000000000022000 [ 451.739599][T12680] Uninit was stored to memory at: [ 451.744623][T12680] kmsan_internal_chain_origin+0xad/0x130 [ 451.750365][T12680] __msan_chain_origin+0x54/0xa0 [ 451.755317][T12680] do_recvmmsg+0x17fc/0x22d0 [ 451.759930][T12680] __se_sys_recvmmsg+0x24a/0x410 [ 451.764883][T12680] __x64_sys_recvmmsg+0x62/0x80 [ 451.769755][T12680] do_syscall_64+0x9f/0x140 [ 451.774296][T12680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 451.780207][T12680] [ 451.782550][T12680] Uninit was stored to memory at: [ 451.787568][T12680] kmsan_internal_chain_origin+0xad/0x130 [ 451.793302][T12680] __msan_chain_origin+0x54/0xa0 [ 451.798253][T12680] do_recvmmsg+0x17fc/0x22d0 [ 451.802859][T12680] __se_sys_recvmmsg+0x24a/0x410 [ 451.807814][T12680] __x64_sys_recvmmsg+0x62/0x80 [ 451.812681][T12680] do_syscall_64+0x9f/0x140 [ 451.817210][T12680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 451.823117][T12680] [ 451.825438][T12680] Uninit was stored to memory at: [ 451.830482][T12680] kmsan_internal_chain_origin+0xad/0x130 [ 451.836219][T12680] __msan_chain_origin+0x54/0xa0 [ 451.841179][T12680] do_recvmmsg+0x17fc/0x22d0 [ 451.845824][T12680] __se_sys_recvmmsg+0x24a/0x410 [ 451.850785][T12680] __x64_sys_recvmmsg+0x62/0x80 [ 451.855654][T12680] do_syscall_64+0x9f/0x140 [ 451.860185][T12680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 451.866096][T12680] [ 451.868414][T12680] Uninit was stored to memory at: [ 451.873426][T12680] kmsan_internal_chain_origin+0xad/0x130 [ 451.879215][T12680] __msan_chain_origin+0x54/0xa0 [ 451.884163][T12680] do_recvmmsg+0x17fc/0x22d0 [ 451.888773][T12680] __se_sys_recvmmsg+0x24a/0x410 [ 451.893736][T12680] __x64_sys_recvmmsg+0x62/0x80 [ 451.898623][T12680] do_syscall_64+0x9f/0x140 [ 451.903146][T12680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 451.909055][T12680] [ 451.911380][T12680] Uninit was stored to memory at: [ 451.916395][T12680] kmsan_internal_chain_origin+0xad/0x130 [ 451.922134][T12680] __msan_chain_origin+0x54/0xa0 [ 451.927085][T12680] do_recvmmsg+0x17fc/0x22d0 [ 451.931713][T12680] __se_sys_recvmmsg+0x24a/0x410 [ 451.936663][T12680] __x64_sys_recvmmsg+0x62/0x80 [ 451.941566][T12680] do_syscall_64+0x9f/0x140 [ 451.946089][T12680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 451.951996][T12680] [ 451.954318][T12680] Uninit was stored to memory at: [ 451.959333][T12680] kmsan_internal_chain_origin+0xad/0x130 [ 451.965082][T12680] __msan_chain_origin+0x54/0xa0 [ 451.970035][T12680] do_recvmmsg+0x17fc/0x22d0 [ 451.974639][T12680] __se_sys_recvmmsg+0x24a/0x410 [ 451.979587][T12680] __x64_sys_recvmmsg+0x62/0x80 [ 451.984449][T12680] do_syscall_64+0x9f/0x140 [ 451.988962][T12680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 451.994879][T12680] [ 451.997216][T12680] Uninit was stored to memory at: [ 452.002232][T12680] kmsan_internal_chain_origin+0xad/0x130 [ 452.007967][T12680] __msan_chain_origin+0x54/0xa0 [ 452.012920][T12680] do_recvmmsg+0x17fc/0x22d0 [ 452.017527][T12680] __se_sys_recvmmsg+0x24a/0x410 [ 452.022479][T12680] __x64_sys_recvmmsg+0x62/0x80 [ 452.027351][T12680] do_syscall_64+0x9f/0x140 [ 452.031870][T12680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 452.037778][T12680] [ 452.040112][T12680] Local variable ----msg_sys@do_recvmmsg created at: [ 452.046778][T12680] do_recvmmsg+0xbf/0x22d0 [ 452.051211][T12680] do_recvmmsg+0xbf/0x22d0 [ 452.355295][T12680] not chained 90000 origins [ 452.359836][T12680] CPU: 1 PID: 12680 Comm: syz-executor.3 Not tainted 5.12.0-rc6-syzkaller #0 [ 452.368790][T12680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 452.378870][T12680] Call Trace: [ 452.382164][T12680] dump_stack+0x24c/0x2e0 [ 452.386526][T12680] kmsan_internal_chain_origin+0x6f/0x130 [ 452.392353][T12680] ? kmsan_get_metadata+0x116/0x180 [ 452.397596][T12680] ? kmsan_internal_check_memory+0xb3/0x500 [ 452.403529][T12680] ? kmsan_get_metadata+0x116/0x180 [ 452.408847][T12680] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 452.414677][T12680] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 452.420763][T12680] ? kmsan_get_metadata+0x116/0x180 [ 452.425977][T12680] ? kmsan_set_origin_checked+0xa2/0x100 [ 452.431628][T12680] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 452.437717][T12680] ? kmsan_unpoison_shadow+0x74/0xa0 [ 452.443022][T12680] ? _copy_from_user+0x1fd/0x300 [ 452.447995][T12680] ? kmsan_get_metadata+0x116/0x180 [ 452.453206][T12680] __msan_chain_origin+0x54/0xa0 [ 452.458165][T12680] do_recvmmsg+0x17fc/0x22d0 [ 452.462781][T12680] ? __msan_metadata_ptr_for_store_n+0x10/0x10 [ 452.468961][T12680] ? kmsan_internal_set_origin+0x82/0xc0 [ 452.474611][T12680] ? __msan_poison_alloca+0xec/0x110 [ 452.479911][T12680] ? __msan_instrument_asm_store+0x104/0x130 [ 452.485911][T12680] ? __se_sys_recvmmsg+0xd6/0x410 [ 452.490960][T12680] __se_sys_recvmmsg+0x24a/0x410 [ 452.495918][T12680] __x64_sys_recvmmsg+0x62/0x80 [ 452.500786][T12680] do_syscall_64+0x9f/0x140 [ 452.505308][T12680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 452.511214][T12680] RIP: 0033:0x4665d9 [ 452.515117][T12680] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 452.534737][T12680] RSP: 002b:00007fb9442f7188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 452.543176][T12680] RAX: ffffffffffffffda RBX: 000000000056c1a8 RCX: 00000000004665d9 [ 452.551168][T12680] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003 [ 452.559151][T12680] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 452.567148][T12680] R10: 0000000000000002 R11: 0000000000000246 R12: 000000000056c1a8 [ 452.575134][T12680] R13: 0000000000a9fb1f R14: 00007fb9442f7300 R15: 0000000000022000 [ 452.583140][T12680] Uninit was stored to memory at: [ 452.588163][T12680] kmsan_internal_chain_origin+0xad/0x130 [ 452.593929][T12680] __msan_chain_origin+0x54/0xa0 [ 452.598884][T12680] do_recvmmsg+0x17fc/0x22d0 [ 452.603492][T12680] __se_sys_recvmmsg+0x24a/0x410 [ 452.608455][T12680] __x64_sys_recvmmsg+0x62/0x80 [ 452.613328][T12680] do_syscall_64+0x9f/0x140 [ 452.617849][T12680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 452.623756][T12680] [ 452.626075][T12680] Uninit was stored to memory at: [ 452.631089][T12680] kmsan_internal_chain_origin+0xad/0x130 [ 452.636820][T12680] __msan_chain_origin+0x54/0xa0 [ 452.641768][T12680] do_recvmmsg+0x17fc/0x22d0 [ 452.646364][T12680] __se_sys_recvmmsg+0x24a/0x410 [ 452.651314][T12680] __x64_sys_recvmmsg+0x62/0x80 [ 452.656176][T12680] do_syscall_64+0x9f/0x140 [ 452.660694][T12680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 452.666597][T12680] [ 452.668919][T12680] Uninit was stored to memory at: [ 452.673938][T12680] kmsan_internal_chain_origin+0xad/0x130 [ 452.679677][T12680] __msan_chain_origin+0x54/0xa0 [ 452.684625][T12680] do_recvmmsg+0x17fc/0x22d0 [ 452.689232][T12680] __se_sys_recvmmsg+0x24a/0x410 [ 452.694222][T12680] __x64_sys_recvmmsg+0x62/0x80 [ 452.699089][T12680] do_syscall_64+0x9f/0x140 [ 452.703603][T12680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 452.709510][T12680] [ 452.711909][T12680] Uninit was stored to memory at: [ 452.716919][T12680] kmsan_internal_chain_origin+0xad/0x130 [ 452.722646][T12680] __msan_chain_origin+0x54/0xa0 [ 452.727591][T12680] do_recvmmsg+0x17fc/0x22d0 [ 452.732195][T12680] __se_sys_recvmmsg+0x24a/0x410 [ 452.737144][T12680] __x64_sys_recvmmsg+0x62/0x80 [ 452.742007][T12680] do_syscall_64+0x9f/0x140 [ 452.746537][T12680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 452.752436][T12680] [ 452.754751][T12680] Uninit was stored to memory at: [ 452.759756][T12680] kmsan_internal_chain_origin+0xad/0x130 [ 452.765558][T12680] __msan_chain_origin+0x54/0xa0 [ 452.770512][T12680] do_recvmmsg+0x17fc/0x22d0 [ 452.775124][T12680] __se_sys_recvmmsg+0x24a/0x410 [ 452.780069][T12680] __x64_sys_recvmmsg+0x62/0x80 [ 452.784928][T12680] do_syscall_64+0x9f/0x140 [ 452.789468][T12680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 452.795371][T12680] [ 452.797686][T12680] Uninit was stored to memory at: [ 452.802709][T12680] kmsan_internal_chain_origin+0xad/0x130 [ 452.808430][T12680] __msan_chain_origin+0x54/0xa0 [ 452.813369][T12680] do_recvmmsg+0x17fc/0x22d0 [ 452.817960][T12680] __se_sys_recvmmsg+0x24a/0x410 [ 452.822897][T12680] __x64_sys_recvmmsg+0x62/0x80 [ 452.827756][T12680] do_syscall_64+0x9f/0x140 [ 452.832265][T12680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 452.838155][T12680] [ 452.840471][T12680] Uninit was stored to memory at: [ 452.845471][T12680] kmsan_internal_chain_origin+0xad/0x130 [ 452.851191][T12680] __msan_chain_origin+0x54/0xa0 [ 452.856118][T12680] do_recvmmsg+0x17fc/0x22d0 [ 452.860704][T12680] __se_sys_recvmmsg+0x24a/0x410 [ 452.865634][T12680] __x64_sys_recvmmsg+0x62/0x80 [ 452.870481][T12680] do_syscall_64+0x9f/0x140 [ 452.874992][T12680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 452.880880][T12680] [ 452.883236][T12680] Local variable ----msg_sys@do_recvmmsg created at: [ 452.889900][T12680] do_recvmmsg+0xbf/0x22d0 [ 452.894308][T12680] do_recvmmsg+0xbf/0x22d0 [ 453.033229][T12673] not chained 100000 origins [ 453.037842][T12673] CPU: 1 PID: 12673 Comm: syz-executor.3 Not tainted 5.12.0-rc6-syzkaller #0 [ 453.046608][T12673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 453.056663][T12673] Call Trace: [ 453.059939][T12673] dump_stack+0x24c/0x2e0 [ 453.064284][T12673] kmsan_internal_chain_origin+0x6f/0x130 [ 453.070011][T12673] ? kmsan_get_metadata+0x116/0x180 [ 453.075217][T12673] ? kmsan_internal_check_memory+0xb3/0x500 [ 453.081236][T12673] ? kmsan_get_metadata+0x116/0x180 [ 453.086437][T12673] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 453.092254][T12673] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 453.098340][T12673] ? kmsan_get_metadata+0x116/0x180 [ 453.103537][T12673] ? kmsan_set_origin_checked+0xa2/0x100 [ 453.109171][T12673] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 453.115246][T12673] ? kmsan_unpoison_shadow+0x74/0xa0 [ 453.120523][T12673] ? _copy_from_user+0x1fd/0x300 [ 453.125547][T12673] ? kmsan_get_metadata+0x116/0x180 [ 453.130828][T12673] __msan_chain_origin+0x54/0xa0 [ 453.135929][T12673] do_recvmmsg+0x17fc/0x22d0 [ 453.140519][T12673] ? kmsan_internal_set_origin+0x82/0xc0 [ 453.146147][T12673] ? __msan_poison_alloca+0xec/0x110 [ 453.151429][T12673] ? kmsan_get_metadata+0x116/0x180 [ 453.156637][T12673] ? __se_sys_recvmmsg+0xd6/0x410 [ 453.161659][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 453.166591][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 453.171444][T12673] do_syscall_64+0x9f/0x140 [ 453.175946][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 453.181832][T12673] RIP: 0033:0x4665d9 [ 453.185714][T12673] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 453.205396][T12673] RSP: 002b:00007fb944339188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 453.213807][T12673] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 453.221770][T12673] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003 [ 453.229730][T12673] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 453.237689][T12673] R10: 0000000000000002 R11: 0000000000000246 R12: 000000000056c038 [ 453.245738][T12673] R13: 0000000000a9fb1f R14: 00007fb944339300 R15: 0000000000022000 [ 453.253792][T12673] Uninit was stored to memory at: [ 453.258792][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 453.264524][T12673] __msan_chain_origin+0x54/0xa0 [ 453.269456][T12673] do_recvmmsg+0x17fc/0x22d0 [ 453.274039][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 453.278966][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 453.283899][T12673] do_syscall_64+0x9f/0x140 [ 453.288497][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 453.294384][T12673] [ 453.296690][T12673] Uninit was stored to memory at: [ 453.301808][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 453.307522][T12673] __msan_chain_origin+0x54/0xa0 [ 453.312454][T12673] do_recvmmsg+0x17fc/0x22d0 [ 453.317126][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 453.322061][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 453.326906][T12673] do_syscall_64+0x9f/0x140 [ 453.331403][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 453.337291][T12673] [ 453.339681][T12673] Uninit was stored to memory at: [ 453.344679][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 453.350562][T12673] __msan_chain_origin+0x54/0xa0 [ 453.355493][T12673] do_recvmmsg+0x17fc/0x22d0 [ 453.360162][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 453.365181][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 453.370037][T12673] do_syscall_64+0x9f/0x140 [ 453.374536][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 453.380424][T12673] [ 453.382737][T12673] Uninit was stored to memory at: [ 453.387740][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 453.393455][T12673] __msan_chain_origin+0x54/0xa0 [ 453.398402][T12673] do_recvmmsg+0x17fc/0x22d0 [ 453.402991][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 453.407926][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 453.412772][T12673] do_syscall_64+0x9f/0x140 [ 453.417273][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 453.423336][T12673] [ 453.425645][T12673] Uninit was stored to memory at: [ 453.430645][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 453.436361][T12673] __msan_chain_origin+0x54/0xa0 [ 453.441297][T12673] do_recvmmsg+0x17fc/0x22d0 [ 453.445887][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 453.450821][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 453.455666][T12673] do_syscall_64+0x9f/0x140 [ 453.460165][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 453.466054][T12673] [ 453.468361][T12673] Uninit was stored to memory at: [ 453.473363][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 453.479081][T12673] __msan_chain_origin+0x54/0xa0 [ 453.484012][T12673] do_recvmmsg+0x17fc/0x22d0 [ 453.488600][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 453.493535][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 453.498506][T12673] do_syscall_64+0x9f/0x140 [ 453.503007][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 453.508897][T12673] [ 453.511207][T12673] Uninit was stored to memory at: [ 453.516208][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 453.521923][T12673] __msan_chain_origin+0x54/0xa0 [ 453.526941][T12673] do_recvmmsg+0x17fc/0x22d0 [ 453.531526][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 453.536459][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 453.541307][T12673] do_syscall_64+0x9f/0x140 [ 453.545818][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 453.551707][T12673] [ 453.554019][T12673] Local variable ----msg_sys@do_recvmmsg created at: [ 453.560673][T12673] do_recvmmsg+0xbf/0x22d0 [ 453.565085][T12673] do_recvmmsg+0xbf/0x22d0 [ 453.800787][T12673] not chained 110000 origins [ 453.805408][T12673] CPU: 0 PID: 12673 Comm: syz-executor.3 Not tainted 5.12.0-rc6-syzkaller #0 [ 453.814191][T12673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 453.824294][T12673] Call Trace: [ 453.827573][T12673] dump_stack+0x24c/0x2e0 [ 453.831924][T12673] kmsan_internal_chain_origin+0x6f/0x130 [ 453.837661][T12673] ? kmsan_get_metadata+0x116/0x180 [ 453.842874][T12673] ? kmsan_internal_check_memory+0xb3/0x500 [ 453.848785][T12673] ? kmsan_get_metadata+0x116/0x180 [ 453.853996][T12673] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 453.859859][T12673] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 453.865940][T12673] ? kmsan_get_metadata+0x116/0x180 [ 453.871162][T12673] ? kmsan_set_origin_checked+0xa2/0x100 [ 453.876818][T12673] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 453.882917][T12673] ? kmsan_unpoison_shadow+0x74/0xa0 [ 453.888262][T12673] ? _copy_from_user+0x1fd/0x300 [ 453.893253][T12673] ? kmsan_get_metadata+0x116/0x180 [ 453.898478][T12673] __msan_chain_origin+0x54/0xa0 [ 453.903433][T12673] do_recvmmsg+0x17fc/0x22d0 [ 453.908077][T12673] ? kmsan_internal_set_origin+0x82/0xc0 [ 453.913731][T12673] ? __msan_poison_alloca+0xec/0x110 [ 453.919030][T12673] ? kmsan_get_metadata+0x116/0x180 [ 453.924239][T12673] ? __se_sys_recvmmsg+0xd6/0x410 [ 453.929291][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 453.934262][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 453.939117][T12673] do_syscall_64+0x9f/0x140 [ 453.943717][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 453.949634][T12673] RIP: 0033:0x4665d9 [ 453.953520][T12673] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 453.973141][T12673] RSP: 002b:00007fb944339188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 453.981560][T12673] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 453.989525][T12673] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003 [ 453.997584][T12673] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 454.005562][T12673] R10: 0000000000000002 R11: 0000000000000246 R12: 000000000056c038 [ 454.013542][T12673] R13: 0000000000a9fb1f R14: 00007fb944339300 R15: 0000000000022000 [ 454.021610][T12673] Uninit was stored to memory at: [ 454.026615][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 454.032338][T12673] __msan_chain_origin+0x54/0xa0 [ 454.037271][T12673] do_recvmmsg+0x17fc/0x22d0 [ 454.041951][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 454.046885][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 454.051729][T12673] do_syscall_64+0x9f/0x140 [ 454.056223][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 454.062138][T12673] [ 454.064459][T12673] Uninit was stored to memory at: [ 454.069469][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 454.075222][T12673] __msan_chain_origin+0x54/0xa0 [ 454.080182][T12673] do_recvmmsg+0x17fc/0x22d0 [ 454.084778][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 454.089714][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 454.094568][T12673] do_syscall_64+0x9f/0x140 [ 454.099068][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 454.104961][T12673] [ 454.107279][T12673] Uninit was stored to memory at: [ 454.112283][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 454.118012][T12673] __msan_chain_origin+0x54/0xa0 [ 454.122952][T12673] do_recvmmsg+0x17fc/0x22d0 [ 454.127752][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 454.132698][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 454.137550][T12673] do_syscall_64+0x9f/0x140 [ 454.142051][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 454.147957][T12673] [ 454.150274][T12673] Uninit was stored to memory at: [ 454.155279][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 454.161000][T12673] __msan_chain_origin+0x54/0xa0 [ 454.165934][T12673] do_recvmmsg+0x17fc/0x22d0 [ 454.170526][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 454.175463][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 454.180310][T12673] do_syscall_64+0x9f/0x140 [ 454.184808][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 454.190694][T12673] [ 454.193019][T12673] Uninit was stored to memory at: [ 454.198023][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 454.203909][T12673] __msan_chain_origin+0x54/0xa0 [ 454.208927][T12673] do_recvmmsg+0x17fc/0x22d0 [ 454.213519][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 454.218452][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 454.223307][T12673] do_syscall_64+0x9f/0x140 [ 454.227808][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 454.233692][T12673] [ 454.235996][T12673] Uninit was stored to memory at: [ 454.240993][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 454.246728][T12673] __msan_chain_origin+0x54/0xa0 [ 454.251655][T12673] do_recvmmsg+0x17fc/0x22d0 [ 454.256238][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 454.261174][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 454.266021][T12673] do_syscall_64+0x9f/0x140 [ 454.270521][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 454.276408][T12673] [ 454.278718][T12673] Uninit was stored to memory at: [ 454.283721][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 454.289450][T12673] __msan_chain_origin+0x54/0xa0 [ 454.294379][T12673] do_recvmmsg+0x17fc/0x22d0 [ 454.298966][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 454.303897][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 454.308748][T12673] do_syscall_64+0x9f/0x140 [ 454.313249][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 454.319150][T12673] [ 454.321459][T12673] Local variable ----msg_sys@do_recvmmsg created at: [ 454.328112][T12673] do_recvmmsg+0xbf/0x22d0 [ 454.332525][T12673] do_recvmmsg+0xbf/0x22d0 [ 454.447485][T12680] not chained 120000 origins [ 454.452118][T12680] CPU: 0 PID: 12680 Comm: syz-executor.3 Not tainted 5.12.0-rc6-syzkaller #0 [ 454.460897][T12680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 454.471052][T12680] Call Trace: [ 454.474338][T12680] dump_stack+0x24c/0x2e0 [ 454.478696][T12680] kmsan_internal_chain_origin+0x6f/0x130 [ 454.484439][T12680] ? kmsan_get_metadata+0x116/0x180 [ 454.489653][T12680] ? kmsan_internal_check_memory+0xb3/0x500 [ 454.495564][T12680] ? kmsan_get_metadata+0x116/0x180 [ 454.500774][T12680] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 454.506596][T12680] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 454.512770][T12680] ? kmsan_get_metadata+0x116/0x180 [ 454.517986][T12680] ? kmsan_set_origin_checked+0xa2/0x100 [ 454.523648][T12680] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 454.529750][T12680] ? kmsan_unpoison_shadow+0x74/0xa0 [ 454.535050][T12680] ? _copy_from_user+0x1fd/0x300 [ 454.539983][T12680] ? kmsan_get_metadata+0x116/0x180 [ 454.545179][T12680] __msan_chain_origin+0x54/0xa0 [ 454.550114][T12680] do_recvmmsg+0x17fc/0x22d0 [ 454.554737][T12680] ? __msan_metadata_ptr_for_store_n+0x10/0x10 [ 454.560885][T12680] ? kmsan_internal_set_origin+0x82/0xc0 [ 454.566509][T12680] ? __msan_poison_alloca+0xec/0x110 [ 454.571787][T12680] ? __msan_instrument_asm_store+0x104/0x130 [ 454.577765][T12680] ? __se_sys_recvmmsg+0xd6/0x410 [ 454.582786][T12680] __se_sys_recvmmsg+0x24a/0x410 [ 454.587737][T12680] __x64_sys_recvmmsg+0x62/0x80 [ 454.592610][T12680] do_syscall_64+0x9f/0x140 [ 454.597116][T12680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 454.603009][T12680] RIP: 0033:0x4665d9 [ 454.606896][T12680] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 454.626497][T12680] RSP: 002b:00007fb9442f7188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 454.634908][T12680] RAX: ffffffffffffffda RBX: 000000000056c1a8 RCX: 00000000004665d9 [ 454.642891][T12680] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003 [ 454.650856][T12680] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 454.658817][T12680] R10: 0000000000000002 R11: 0000000000000246 R12: 000000000056c1a8 [ 454.666776][T12680] R13: 0000000000a9fb1f R14: 00007fb9442f7300 R15: 0000000000022000 [ 454.674745][T12680] Uninit was stored to memory at: [ 454.679746][T12680] kmsan_internal_chain_origin+0xad/0x130 [ 454.685459][T12680] __msan_chain_origin+0x54/0xa0 [ 454.690387][T12680] do_recvmmsg+0x17fc/0x22d0 [ 454.694976][T12680] __se_sys_recvmmsg+0x24a/0x410 [ 454.699910][T12680] __x64_sys_recvmmsg+0x62/0x80 [ 454.704758][T12680] do_syscall_64+0x9f/0x140 [ 454.709257][T12680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 454.715175][T12680] [ 454.717484][T12680] Uninit was stored to memory at: [ 454.722486][T12680] kmsan_internal_chain_origin+0xad/0x130 [ 454.728200][T12680] __msan_chain_origin+0x54/0xa0 [ 454.733169][T12680] do_recvmmsg+0x17fc/0x22d0 [ 454.737756][T12680] __se_sys_recvmmsg+0x24a/0x410 [ 454.742690][T12680] __x64_sys_recvmmsg+0x62/0x80 [ 454.747624][T12680] do_syscall_64+0x9f/0x140 [ 454.752208][T12680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 454.758112][T12680] [ 454.760419][T12680] Uninit was stored to memory at: [ 454.765504][T12680] kmsan_internal_chain_origin+0xad/0x130 [ 454.771212][T12680] __msan_chain_origin+0x54/0xa0 [ 454.776140][T12680] do_recvmmsg+0x17fc/0x22d0 [ 454.780724][T12680] __se_sys_recvmmsg+0x24a/0x410 [ 454.785655][T12680] __x64_sys_recvmmsg+0x62/0x80 [ 454.790500][T12680] do_syscall_64+0x9f/0x140 [ 454.794995][T12680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 454.800880][T12680] [ 454.803189][T12680] Uninit was stored to memory at: [ 454.808189][T12680] kmsan_internal_chain_origin+0xad/0x130 [ 454.813919][T12680] __msan_chain_origin+0x54/0xa0 [ 454.818852][T12680] do_recvmmsg+0x17fc/0x22d0 [ 454.823464][T12680] __se_sys_recvmmsg+0x24a/0x410 [ 454.828484][T12680] __x64_sys_recvmmsg+0x62/0x80 [ 454.833332][T12680] do_syscall_64+0x9f/0x140 [ 454.837839][T12680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 454.843725][T12680] [ 454.846031][T12680] Uninit was stored to memory at: [ 454.851028][T12680] kmsan_internal_chain_origin+0xad/0x130 [ 454.856736][T12680] __msan_chain_origin+0x54/0xa0 [ 454.861661][T12680] do_recvmmsg+0x17fc/0x22d0 [ 454.866255][T12680] __se_sys_recvmmsg+0x24a/0x410 [ 454.871182][T12680] __x64_sys_recvmmsg+0x62/0x80 [ 454.876111][T12680] do_syscall_64+0x9f/0x140 [ 454.880609][T12680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 454.886492][T12680] [ 454.888799][T12680] Uninit was stored to memory at: [ 454.893803][T12680] kmsan_internal_chain_origin+0xad/0x130 [ 454.899523][T12680] __msan_chain_origin+0x54/0xa0 [ 454.904454][T12680] do_recvmmsg+0x17fc/0x22d0 [ 454.909054][T12680] __se_sys_recvmmsg+0x24a/0x410 [ 454.913998][T12680] __x64_sys_recvmmsg+0x62/0x80 [ 454.918857][T12680] do_syscall_64+0x9f/0x140 [ 454.923356][T12680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 454.929420][T12680] [ 454.931727][T12680] Uninit was stored to memory at: [ 454.936726][T12680] kmsan_internal_chain_origin+0xad/0x130 [ 454.942439][T12680] __msan_chain_origin+0x54/0xa0 [ 454.947373][T12680] do_recvmmsg+0x17fc/0x22d0 [ 454.951967][T12680] __se_sys_recvmmsg+0x24a/0x410 [ 454.956902][T12680] __x64_sys_recvmmsg+0x62/0x80 [ 454.961753][T12680] do_syscall_64+0x9f/0x140 [ 454.966249][T12680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 454.972135][T12680] [ 454.974445][T12680] Local variable ----msg_sys@do_recvmmsg created at: [ 454.981535][T12680] do_recvmmsg+0xbf/0x22d0 [ 454.986054][T12680] do_recvmmsg+0xbf/0x22d0 [ 455.161801][T12673] not chained 130000 origins [ 455.166418][T12673] CPU: 1 PID: 12673 Comm: syz-executor.3 Not tainted 5.12.0-rc6-syzkaller #0 [ 455.175277][T12673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 455.185331][T12673] Call Trace: [ 455.188622][T12673] dump_stack+0x24c/0x2e0 [ 455.192973][T12673] kmsan_internal_chain_origin+0x6f/0x130 [ 455.198708][T12673] ? kmsan_get_metadata+0x116/0x180 [ 455.203926][T12673] ? kmsan_internal_check_memory+0xb3/0x500 [ 455.209812][T12673] ? kmsan_get_metadata+0x116/0x180 [ 455.215012][T12673] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 455.220892][T12673] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 455.226946][T12673] ? kmsan_get_metadata+0x116/0x180 [ 455.232239][T12673] ? kmsan_set_origin_checked+0xa2/0x100 [ 455.237882][T12673] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 455.244306][T12673] ? kmsan_unpoison_shadow+0x74/0xa0 [ 455.249578][T12673] ? _copy_from_user+0x1fd/0x300 [ 455.254503][T12673] ? kmsan_get_metadata+0x116/0x180 [ 455.259829][T12673] __msan_chain_origin+0x54/0xa0 [ 455.264762][T12673] do_recvmmsg+0x17fc/0x22d0 [ 455.269352][T12673] ? kmsan_internal_set_origin+0x82/0xc0 [ 455.274972][T12673] ? __msan_poison_alloca+0xec/0x110 [ 455.280286][T12673] ? kmsan_get_metadata+0x116/0x180 [ 455.285558][T12673] ? __se_sys_recvmmsg+0xd6/0x410 [ 455.290571][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 455.295560][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 455.300405][T12673] do_syscall_64+0x9f/0x140 [ 455.304902][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 455.310953][T12673] RIP: 0033:0x4665d9 [ 455.314837][T12673] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 455.334576][T12673] RSP: 002b:00007fb944339188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 455.343001][T12673] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 455.350962][T12673] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003 [ 455.358918][T12673] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 455.366876][T12673] R10: 0000000000000002 R11: 0000000000000246 R12: 000000000056c038 [ 455.374847][T12673] R13: 0000000000a9fb1f R14: 00007fb944339300 R15: 0000000000022000 [ 455.382828][T12673] Uninit was stored to memory at: [ 455.387932][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 455.393649][T12673] __msan_chain_origin+0x54/0xa0 [ 455.398656][T12673] do_recvmmsg+0x17fc/0x22d0 [ 455.403253][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 455.408183][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 455.413036][T12673] do_syscall_64+0x9f/0x140 [ 455.417524][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 455.423490][T12673] [ 455.425815][T12673] Uninit was stored to memory at: [ 455.430820][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 455.436655][T12673] __msan_chain_origin+0x54/0xa0 [ 455.441575][T12673] do_recvmmsg+0x17fc/0x22d0 [ 455.446164][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 455.451084][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 455.455913][T12673] do_syscall_64+0x9f/0x140 [ 455.460397][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 455.466280][T12673] [ 455.468591][T12673] Uninit was stored to memory at: [ 455.473592][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 455.479392][T12673] __msan_chain_origin+0x54/0xa0 [ 455.484308][T12673] do_recvmmsg+0x17fc/0x22d0 [ 455.488900][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 455.493905][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 455.498747][T12673] do_syscall_64+0x9f/0x140 [ 455.503234][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 455.509123][T12673] [ 455.511423][T12673] Uninit was stored to memory at: [ 455.516431][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 455.522180][T12673] __msan_chain_origin+0x54/0xa0 [ 455.527102][T12673] do_recvmmsg+0x17fc/0x22d0 [ 455.531677][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 455.536597][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 455.541434][T12673] do_syscall_64+0x9f/0x140 [ 455.546114][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 455.551992][T12673] [ 455.554295][T12673] Uninit was stored to memory at: [ 455.559314][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 455.565050][T12673] __msan_chain_origin+0x54/0xa0 [ 455.569986][T12673] do_recvmmsg+0x17fc/0x22d0 [ 455.574569][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 455.579517][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 455.584363][T12673] do_syscall_64+0x9f/0x140 [ 455.588864][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 455.594737][T12673] [ 455.597055][T12673] Uninit was stored to memory at: [ 455.602067][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 455.607787][T12673] __msan_chain_origin+0x54/0xa0 [ 455.612725][T12673] do_recvmmsg+0x17fc/0x22d0 [ 455.617299][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 455.622232][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 455.627067][T12673] do_syscall_64+0x9f/0x140 [ 455.631557][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 455.637437][T12673] [ 455.639750][T12673] Uninit was stored to memory at: [ 455.644751][T12673] kmsan_internal_chain_origin+0xad/0x130 [ 455.650482][T12673] __msan_chain_origin+0x54/0xa0 [ 455.655425][T12673] do_recvmmsg+0x17fc/0x22d0 [ 455.660028][T12673] __se_sys_recvmmsg+0x24a/0x410 [ 455.664976][T12673] __x64_sys_recvmmsg+0x62/0x80 [ 455.669817][T12673] do_syscall_64+0x9f/0x140 [ 455.674310][T12673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 455.680182][T12673] [ 455.682479][T12673] Local variable ----msg_sys@do_recvmmsg created at: [ 455.689124][T12673] do_recvmmsg+0xbf/0x22d0 [ 455.693539][T12673] do_recvmmsg+0xbf/0x22d0 16:18:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 16:18:44 executing program 5: r0 = socket(0x2, 0xa, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2, 0x0, 0x0) 16:18:44 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x5450, 0x0) 16:18:44 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x10, 0x0, 0x0, 0x6}, 0x40) 16:18:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0xb, 0x0, 0x0) 16:18:44 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 455.887260][T12754] syz-executor.5 uses obsolete (PF_INET,SOCK_PACKET) 16:18:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(r0, &(0x7f0000003fc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x400001c2, 0x0) 16:18:45 executing program 5: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) 16:18:45 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x80108906, 0x0) 16:18:45 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0x2, 0x0) 16:18:45 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), r0) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x10}, 0x33fe0}}, 0x0) 16:18:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2e, 0x0, 0x0) 16:18:45 executing program 1: pselect6(0x40, &(0x7f0000000100), &(0x7f0000000140), &(0x7f00000001c0)={0x9}, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={[0x6]}, 0x8}) 16:18:45 executing program 0: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) ioctl$UI_GET_VERSION(r0, 0x4020940d, &(0x7f00000000c0)) 16:18:45 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x8904, 0x0) 16:18:45 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000000c0)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000080)=0x4) 16:18:46 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000000c0)) ioctl$PPPIOCGFLAGS1(r0, 0x8004745a, &(0x7f0000000000)) 16:18:47 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:18:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2e, 0x0, 0x0) 16:18:47 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_DEV_CREATE(r0, 0x5501) 16:18:47 executing program 0: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x40089416, 0x0) 16:18:47 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)=ANY=[], 0x18, 0xfffffffffffffffe) 16:18:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={@private1, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @remote}) 16:18:48 executing program 0: select(0x0, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0xea60}) 16:18:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2e, 0x0, 0x0) 16:18:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(r0, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f0000000740)=[{0x0, 0x7ffffffff000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x0, 0x0) 16:18:48 executing program 3: socket$inet6(0xa, 0x1, 0x6) 16:18:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0xd, 0x0, &(0x7f0000000040)) 16:18:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x2e, 0x0, 0x0) 16:18:51 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:18:51 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) 16:18:51 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xa, 0x7, 0x6, 0x6}, 0x40) 16:18:51 executing program 0: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000040), 0x10380, 0x0) 16:18:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x6, 0x0, 0x0) 16:18:51 executing program 5: bpf$MAP_CREATE(0x14, &(0x7f0000000140), 0x40) 16:18:51 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)={0x1c}, 0x1c}}, 0x0) 16:18:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x7ffffffffffffffe, 0x4) 16:18:51 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x200000, 0x0) 16:18:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x39, 0x0, 0x0) 16:18:51 executing program 4: pipe(0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000002840), 0xffffffffffffffff) 16:18:51 executing program 1: socket(0x11, 0x3, 0x3) 16:18:54 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:18:54 executing program 0: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) 16:18:54 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) close(r0) 16:18:54 executing program 5: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff}, 0xc) 16:18:54 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) mmap$usbmon(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) 16:18:54 executing program 1: clock_gettime(0x70fd978e8c4b33e6, 0x0) 16:18:54 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000140)) 16:18:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x10}, 0x0) 16:18:54 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0x7, 0x6, 0x3e0}, 0x40) 16:18:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0x5}}}, 0x1c}}, 0x0) 16:18:54 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$UI_GET_VERSION(r0, 0xc06855c8, &(0x7f0000000080)) 16:18:55 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 16:18:57 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:18:57 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x0, 0x0, 0xd180, 0x4, 0x0, 0x3}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000100)='./bus\x00', 0x2100, 0xa6) socket(0x0, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)={0x0, 0x0}) sched_setattr(r0, &(0x7f0000000300)={0x38, 0x1, 0x18000068, 0x6, 0xd1, 0xd0b0, 0x7, 0x0, 0x9, 0x5}, 0x0) sched_setattr(r3, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x1000, 0x10000, 0x8000, 0x0, 0x400, 0x200, 0x4}, 0x0) r4 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) sched_setattr(r0, &(0x7f00000002c0)={0x38, 0x5, 0x1000006a, 0x8001, 0x509, 0x3, 0x2, 0x7, 0xfffffffd, 0x5}, 0x0) sched_setattr(0x0, 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x401ffc000) 16:18:57 executing program 4: syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) 16:18:57 executing program 1: bpf$MAP_CREATE(0x9, &(0x7f0000000140), 0x40) 16:18:57 executing program 3: r0 = socket(0x11, 0x3, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={0x0}}, 0x0) 16:18:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x10, 0x0, &(0x7f0000000040)) 16:18:58 executing program 5: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, 0x0) 16:18:58 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001a80), 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001b00), r0) 16:18:58 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000000c0)) ioctl$PPPIOCSMRU1(r0, 0x40047452, 0x0) 16:18:58 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002d40)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000005840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x163, 0x0) 16:18:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {}, {0x10, 0x13, @l2={'ib', 0x3a, 'ip_vti0\x00'}}}}, 0x2c}}, 0x0) 16:18:58 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x17, 0x0, 0x1, 0x8, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x40) [ 470.255778][T12959] not chained 140000 origins [ 470.260409][T12959] CPU: 1 PID: 12959 Comm: syz-executor.0 Not tainted 5.12.0-rc6-syzkaller #0 [ 470.269186][T12959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 470.279259][T12959] Call Trace: [ 470.282552][T12959] dump_stack+0x24c/0x2e0 [ 470.286909][T12959] kmsan_internal_chain_origin+0x6f/0x130 [ 470.292657][T12959] ? kmsan_get_metadata+0x116/0x180 [ 470.297877][T12959] ? kmsan_internal_check_memory+0xb3/0x500 [ 470.303793][T12959] ? kmsan_get_metadata+0x116/0x180 [ 470.309012][T12959] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 470.314841][T12959] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 470.320930][T12959] ? kmsan_get_metadata+0x116/0x180 [ 470.326174][T12959] ? kmsan_set_origin_checked+0xa2/0x100 [ 470.331827][T12959] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 470.337910][T12959] ? kmsan_unpoison_shadow+0x74/0xa0 [ 470.343248][T12959] ? _copy_from_user+0x1fd/0x300 [ 470.348239][T12959] ? kmsan_get_metadata+0x116/0x180 [ 470.353454][T12959] __msan_chain_origin+0x54/0xa0 [ 470.358407][T12959] do_recvmmsg+0x17fc/0x22d0 [ 470.363021][T12959] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 470.368851][T12959] ? kmsan_internal_set_origin+0x82/0xc0 [ 470.374509][T12959] ? __msan_poison_alloca+0xec/0x110 [ 470.379811][T12959] ? __msan_instrument_asm_store+0x104/0x130 [ 470.385812][T12959] ? __se_sys_recvmmsg+0xd6/0x410 [ 470.390863][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 470.395825][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 470.400696][T12959] do_syscall_64+0x9f/0x140 [ 470.405218][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 470.411125][T12959] RIP: 0033:0x4665d9 [ 470.415029][T12959] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 470.434654][T12959] RSP: 002b:00007f3b9434c188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 470.443185][T12959] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 470.451175][T12959] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003 [ 470.459244][T12959] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 470.467242][T12959] R10: 0000000000000002 R11: 0000000000000246 R12: 000000000056c038 [ 470.475231][T12959] R13: 0000000000a9fb1f R14: 00007f3b9434c300 R15: 0000000000022000 [ 470.483229][T12959] Uninit was stored to memory at: [ 470.488371][T12959] kmsan_internal_chain_origin+0xad/0x130 [ 470.494114][T12959] __msan_chain_origin+0x54/0xa0 [ 470.499070][T12959] do_recvmmsg+0x17fc/0x22d0 [ 470.503674][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 470.508628][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 470.513494][T12959] do_syscall_64+0x9f/0x140 [ 470.518013][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 470.523917][T12959] [ 470.526245][T12959] Uninit was stored to memory at: [ 470.531255][T12959] kmsan_internal_chain_origin+0xad/0x130 [ 470.536995][T12959] __msan_chain_origin+0x54/0xa0 [ 470.541943][T12959] do_recvmmsg+0x17fc/0x22d0 [ 470.546550][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 470.551499][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 470.556372][T12959] do_syscall_64+0x9f/0x140 [ 470.560890][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 470.566827][T12959] [ 470.569156][T12959] Uninit was stored to memory at: [ 470.574169][T12959] kmsan_internal_chain_origin+0xad/0x130 [ 470.579902][T12959] __msan_chain_origin+0x54/0xa0 [ 470.584853][T12959] do_recvmmsg+0x17fc/0x22d0 [ 470.589461][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 470.594412][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 470.599365][T12959] do_syscall_64+0x9f/0x140 [ 470.603905][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 470.609813][T12959] [ 470.612132][T12959] Uninit was stored to memory at: [ 470.617233][T12959] kmsan_internal_chain_origin+0xad/0x130 [ 470.622974][T12959] __msan_chain_origin+0x54/0xa0 [ 470.627924][T12959] do_recvmmsg+0x17fc/0x22d0 [ 470.632536][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 470.637486][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 470.642352][T12959] do_syscall_64+0x9f/0x140 [ 470.646883][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 470.652784][T12959] [ 470.655103][T12959] Uninit was stored to memory at: [ 470.660117][T12959] kmsan_internal_chain_origin+0xad/0x130 [ 470.665940][T12959] __msan_chain_origin+0x54/0xa0 [ 470.670893][T12959] do_recvmmsg+0x17fc/0x22d0 [ 470.675525][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 470.680480][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 470.685353][T12959] do_syscall_64+0x9f/0x140 [ 470.689871][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 470.695867][T12959] [ 470.698186][T12959] Uninit was stored to memory at: [ 470.703201][T12959] kmsan_internal_chain_origin+0xad/0x130 [ 470.708936][T12959] __msan_chain_origin+0x54/0xa0 [ 470.713885][T12959] do_recvmmsg+0x17fc/0x22d0 [ 470.718492][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 470.723451][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 470.728318][T12959] do_syscall_64+0x9f/0x140 [ 470.732835][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 470.738825][T12959] [ 470.741143][T12959] Uninit was stored to memory at: [ 470.746154][T12959] kmsan_internal_chain_origin+0xad/0x130 [ 470.751884][T12959] __msan_chain_origin+0x54/0xa0 [ 470.756844][T12959] do_recvmmsg+0x17fc/0x22d0 [ 470.761451][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 470.766419][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 470.771295][T12959] do_syscall_64+0x9f/0x140 [ 470.775807][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 470.781711][T12959] [ 470.784029][T12959] Local variable ----msg_sys@do_recvmmsg created at: [ 470.790695][T12959] do_recvmmsg+0xbf/0x22d0 [ 470.795131][T12959] do_recvmmsg+0xbf/0x22d0 [ 471.191567][T12959] not chained 150000 origins [ 471.196228][T12959] CPU: 0 PID: 12959 Comm: syz-executor.0 Not tainted 5.12.0-rc6-syzkaller #0 [ 471.204991][T12959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 471.215051][T12959] Call Trace: [ 471.218323][T12959] dump_stack+0x24c/0x2e0 [ 471.222675][T12959] kmsan_internal_chain_origin+0x6f/0x130 [ 471.228416][T12959] ? kmsan_get_metadata+0x116/0x180 [ 471.233605][T12959] ? kmsan_internal_check_memory+0xb3/0x500 [ 471.239607][T12959] ? kmsan_get_metadata+0x116/0x180 [ 471.244888][T12959] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 471.250708][T12959] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 471.256797][T12959] ? kmsan_get_metadata+0x116/0x180 [ 471.262033][T12959] ? kmsan_set_origin_checked+0xa2/0x100 [ 471.267677][T12959] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 471.273730][T12959] ? kmsan_unpoison_shadow+0x74/0xa0 [ 471.279001][T12959] ? _copy_from_user+0x1fd/0x300 [ 471.283922][T12959] ? kmsan_get_metadata+0x116/0x180 [ 471.289139][T12959] __msan_chain_origin+0x54/0xa0 [ 471.294119][T12959] do_recvmmsg+0x17fc/0x22d0 [ 471.298699][T12959] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 471.304583][T12959] ? kmsan_internal_set_origin+0x82/0xc0 [ 471.310247][T12959] ? __msan_poison_alloca+0xec/0x110 [ 471.315538][T12959] ? __msan_instrument_asm_store+0x104/0x130 [ 471.321517][T12959] ? __se_sys_recvmmsg+0xd6/0x410 [ 471.326539][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 471.331514][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 471.336387][T12959] do_syscall_64+0x9f/0x140 [ 471.340899][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 471.346783][T12959] RIP: 0033:0x4665d9 [ 471.350688][T12959] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 471.370282][T12959] RSP: 002b:00007f3b9434c188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 471.378704][T12959] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 471.386669][T12959] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003 [ 471.394655][T12959] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 471.402638][T12959] R10: 0000000000000002 R11: 0000000000000246 R12: 000000000056c038 [ 471.410613][T12959] R13: 0000000000a9fb1f R14: 00007f3b9434c300 R15: 0000000000022000 [ 471.418576][T12959] Uninit was stored to memory at: [ 471.423579][T12959] kmsan_internal_chain_origin+0xad/0x130 [ 471.429327][T12959] __msan_chain_origin+0x54/0xa0 [ 471.434274][T12959] do_recvmmsg+0x17fc/0x22d0 [ 471.438889][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 471.443814][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 471.448674][T12959] do_syscall_64+0x9f/0x140 [ 471.453170][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 471.459072][T12959] [ 471.461382][T12959] Uninit was stored to memory at: [ 471.466406][T12959] kmsan_internal_chain_origin+0xad/0x130 [ 471.472143][T12959] __msan_chain_origin+0x54/0xa0 [ 471.477083][T12959] do_recvmmsg+0x17fc/0x22d0 [ 471.481655][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 471.486577][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 471.491412][T12959] do_syscall_64+0x9f/0x140 [ 471.495929][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 471.501830][T12959] [ 471.504138][T12959] Uninit was stored to memory at: [ 471.509147][T12959] kmsan_internal_chain_origin+0xad/0x130 [ 471.514860][T12959] __msan_chain_origin+0x54/0xa0 [ 471.519801][T12959] do_recvmmsg+0x17fc/0x22d0 [ 471.524383][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 471.529434][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 471.534306][T12959] do_syscall_64+0x9f/0x140 [ 471.538818][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 471.544721][T12959] [ 471.547041][T12959] Uninit was stored to memory at: [ 471.552049][T12959] kmsan_internal_chain_origin+0xad/0x130 [ 471.557791][T12959] __msan_chain_origin+0x54/0xa0 [ 471.562719][T12959] do_recvmmsg+0x17fc/0x22d0 [ 471.567330][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 471.572259][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 471.577113][T12959] do_syscall_64+0x9f/0x140 [ 471.581596][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 471.587476][T12959] [ 471.589792][T12959] Uninit was stored to memory at: [ 471.594826][T12959] kmsan_internal_chain_origin+0xad/0x130 [ 471.600567][T12959] __msan_chain_origin+0x54/0xa0 [ 471.605486][T12959] do_recvmmsg+0x17fc/0x22d0 [ 471.610058][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 471.614975][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 471.619900][T12959] do_syscall_64+0x9f/0x140 [ 471.624410][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 471.630360][T12959] [ 471.632674][T12959] Uninit was stored to memory at: [ 471.637674][T12959] kmsan_internal_chain_origin+0xad/0x130 [ 471.643417][T12959] __msan_chain_origin+0x54/0xa0 [ 471.648360][T12959] do_recvmmsg+0x17fc/0x22d0 [ 471.653041][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 471.657982][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 471.662819][T12959] do_syscall_64+0x9f/0x140 [ 471.667336][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 471.673268][T12959] [ 471.675576][T12959] Uninit was stored to memory at: [ 471.680573][T12959] kmsan_internal_chain_origin+0xad/0x130 [ 471.686311][T12959] __msan_chain_origin+0x54/0xa0 [ 471.691263][T12959] do_recvmmsg+0x17fc/0x22d0 [ 471.695853][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 471.700813][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 471.705655][T12959] do_syscall_64+0x9f/0x140 [ 471.710146][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 471.716023][T12959] [ 471.718327][T12959] Local variable ----msg_sys@do_recvmmsg created at: [ 471.725152][T12959] do_recvmmsg+0xbf/0x22d0 [ 471.729684][T12959] do_recvmmsg+0xbf/0x22d0 [ 471.917207][T12959] not chained 160000 origins [ 471.921812][T12959] CPU: 0 PID: 12959 Comm: syz-executor.0 Not tainted 5.12.0-rc6-syzkaller #0 [ 471.930565][T12959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 471.940634][T12959] Call Trace: [ 471.943921][T12959] dump_stack+0x24c/0x2e0 [ 471.948285][T12959] kmsan_internal_chain_origin+0x6f/0x130 [ 471.954022][T12959] ? kmsan_get_metadata+0x116/0x180 [ 471.959249][T12959] ? kmsan_internal_check_memory+0xb3/0x500 16:19:00 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd", 0x7f}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 471.965159][T12959] ? kmsan_get_metadata+0x116/0x180 [ 471.970374][T12959] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 471.976204][T12959] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 471.982285][T12959] ? kmsan_get_metadata+0x116/0x180 [ 471.987582][T12959] ? kmsan_set_origin_checked+0xa2/0x100 [ 471.993220][T12959] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 471.999285][T12959] ? kmsan_unpoison_shadow+0x74/0xa0 [ 472.004568][T12959] ? _copy_from_user+0x1fd/0x300 [ 472.009503][T12959] ? kmsan_get_metadata+0x116/0x180 [ 472.014695][T12959] __msan_chain_origin+0x54/0xa0 [ 472.019631][T12959] do_recvmmsg+0x17fc/0x22d0 [ 472.024218][T12959] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 472.030038][T12959] ? kmsan_internal_set_origin+0x82/0xc0 [ 472.035664][T12959] ? __msan_poison_alloca+0xec/0x110 [ 472.041025][T12959] ? __msan_instrument_asm_store+0x104/0x130 [ 472.047010][T12959] ? __se_sys_recvmmsg+0xd6/0x410 [ 472.052037][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 472.056976][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 472.061820][T12959] do_syscall_64+0x9f/0x140 [ 472.066342][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 472.072235][T12959] RIP: 0033:0x4665d9 [ 472.076124][T12959] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 472.095728][T12959] RSP: 002b:00007f3b9434c188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 472.104136][T12959] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 472.112109][T12959] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003 [ 472.120080][T12959] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 472.128045][T12959] R10: 0000000000000002 R11: 0000000000000246 R12: 000000000056c038 [ 472.136026][T12959] R13: 0000000000a9fb1f R14: 00007f3b9434c300 R15: 0000000000022000 [ 472.144002][T12959] Uninit was stored to memory at: [ 472.149010][T12959] kmsan_internal_chain_origin+0xad/0x130 [ 472.154818][T12959] __msan_chain_origin+0x54/0xa0 [ 472.159749][T12959] do_recvmmsg+0x17fc/0x22d0 [ 472.164335][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 472.169280][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 472.174137][T12959] do_syscall_64+0x9f/0x140 [ 472.178639][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 472.184526][T12959] [ 472.186834][T12959] Uninit was stored to memory at: [ 472.191830][T12959] kmsan_internal_chain_origin+0xad/0x130 [ 472.197542][T12959] __msan_chain_origin+0x54/0xa0 [ 472.202471][T12959] do_recvmmsg+0x17fc/0x22d0 [ 472.207055][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 472.211985][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 472.216827][T12959] do_syscall_64+0x9f/0x140 [ 472.221346][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 472.227229][T12959] [ 472.229538][T12959] Uninit was stored to memory at: [ 472.234716][T12959] kmsan_internal_chain_origin+0xad/0x130 [ 472.240430][T12959] __msan_chain_origin+0x54/0xa0 [ 472.245361][T12959] do_recvmmsg+0x17fc/0x22d0 [ 472.249950][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 472.254881][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 472.259728][T12959] do_syscall_64+0x9f/0x140 [ 472.264225][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 472.270114][T12959] [ 472.272422][T12959] Uninit was stored to memory at: [ 472.277422][T12959] kmsan_internal_chain_origin+0xad/0x130 [ 472.283136][T12959] __msan_chain_origin+0x54/0xa0 [ 472.288066][T12959] do_recvmmsg+0x17fc/0x22d0 [ 472.292653][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 472.297637][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 472.302483][T12959] do_syscall_64+0x9f/0x140 [ 472.306984][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 472.312872][T12959] [ 472.315185][T12959] Uninit was stored to memory at: [ 472.320194][T12959] kmsan_internal_chain_origin+0xad/0x130 [ 472.325902][T12959] __msan_chain_origin+0x54/0xa0 [ 472.330847][T12959] do_recvmmsg+0x17fc/0x22d0 [ 472.335431][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 472.340363][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 472.345243][T12959] do_syscall_64+0x9f/0x140 [ 472.349742][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 472.355719][T12959] [ 472.358025][T12959] Uninit was stored to memory at: [ 472.363028][T12959] kmsan_internal_chain_origin+0xad/0x130 [ 472.368743][T12959] __msan_chain_origin+0x54/0xa0 [ 472.373676][T12959] do_recvmmsg+0x17fc/0x22d0 [ 472.378258][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 472.383192][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 472.388037][T12959] do_syscall_64+0x9f/0x140 [ 472.392538][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 472.398519][T12959] [ 472.400825][T12959] Uninit was stored to memory at: [ 472.405825][T12959] kmsan_internal_chain_origin+0xad/0x130 [ 472.411552][T12959] __msan_chain_origin+0x54/0xa0 [ 472.416481][T12959] do_recvmmsg+0x17fc/0x22d0 [ 472.421090][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 472.426025][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 472.430869][T12959] do_syscall_64+0x9f/0x140 [ 472.435364][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 472.441267][T12959] [ 472.443586][T12959] Local variable ----msg_sys@do_recvmmsg created at: [ 472.450239][T12959] do_recvmmsg+0xbf/0x22d0 [ 472.454648][T12959] do_recvmmsg+0xbf/0x22d0 [ 472.837763][T12959] not chained 170000 origins [ 472.842387][T12959] CPU: 0 PID: 12959 Comm: syz-executor.0 Not tainted 5.12.0-rc6-syzkaller #0 [ 472.851139][T12959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 472.861216][T12959] Call Trace: [ 472.864570][T12959] dump_stack+0x24c/0x2e0 [ 472.868901][T12959] kmsan_internal_chain_origin+0x6f/0x130 [ 472.874638][T12959] ? kmsan_get_metadata+0x116/0x180 [ 472.879874][T12959] ? kmsan_internal_check_memory+0xb3/0x500 [ 472.885746][T12959] ? kmsan_get_metadata+0x116/0x180 [ 472.890923][T12959] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 472.896709][T12959] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 472.902878][T12959] ? kmsan_get_metadata+0x116/0x180 [ 472.908079][T12959] ? kmsan_set_origin_checked+0xa2/0x100 [ 472.913699][T12959] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 472.919760][T12959] ? kmsan_unpoison_shadow+0x74/0xa0 [ 472.925037][T12959] ? _copy_from_user+0x1fd/0x300 [ 472.929958][T12959] ? kmsan_get_metadata+0x116/0x180 [ 472.935134][T12959] __msan_chain_origin+0x54/0xa0 [ 472.940089][T12959] do_recvmmsg+0x17fc/0x22d0 [ 472.944672][T12959] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 472.950557][T12959] ? kmsan_internal_set_origin+0x82/0xc0 [ 472.956279][T12959] ? __msan_poison_alloca+0xec/0x110 [ 472.961545][T12959] ? __msan_instrument_asm_store+0x104/0x130 [ 472.967636][T12959] ? __se_sys_recvmmsg+0xd6/0x410 [ 472.972661][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 472.977649][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 472.982493][T12959] do_syscall_64+0x9f/0x140 [ 472.987010][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 472.992914][T12959] RIP: 0033:0x4665d9 [ 472.996807][T12959] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 473.016418][T12959] RSP: 002b:00007f3b9434c188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 473.024834][T12959] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 473.032797][T12959] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003 [ 473.040779][T12959] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 473.048744][T12959] R10: 0000000000000002 R11: 0000000000000246 R12: 000000000056c038 [ 473.056709][T12959] R13: 0000000000a9fb1f R14: 00007f3b9434c300 R15: 0000000000022000 [ 473.064690][T12959] Uninit was stored to memory at: [ 473.069689][T12959] kmsan_internal_chain_origin+0xad/0x130 [ 473.075397][T12959] __msan_chain_origin+0x54/0xa0 [ 473.080336][T12959] do_recvmmsg+0x17fc/0x22d0 [ 473.084910][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 473.089848][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 473.094955][T12959] do_syscall_64+0x9f/0x140 [ 473.099458][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 473.105346][T12959] [ 473.107649][T12959] Uninit was stored to memory at: [ 473.112661][T12959] kmsan_internal_chain_origin+0xad/0x130 [ 473.118407][T12959] __msan_chain_origin+0x54/0xa0 [ 473.123328][T12959] do_recvmmsg+0x17fc/0x22d0 [ 473.128013][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 473.132976][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 473.137812][T12959] do_syscall_64+0x9f/0x140 [ 473.142388][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 473.148264][T12959] [ 473.150565][T12959] Uninit was stored to memory at: [ 473.155561][T12959] kmsan_internal_chain_origin+0xad/0x130 [ 473.161286][T12959] __msan_chain_origin+0x54/0xa0 [ 473.166208][T12959] do_recvmmsg+0x17fc/0x22d0 [ 473.170784][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 473.175704][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 473.180557][T12959] do_syscall_64+0x9f/0x140 [ 473.185061][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 473.190975][T12959] [ 473.193288][T12959] Uninit was stored to memory at: [ 473.198407][T12959] kmsan_internal_chain_origin+0xad/0x130 [ 473.204210][T12959] __msan_chain_origin+0x54/0xa0 [ 473.209132][T12959] do_recvmmsg+0x17fc/0x22d0 [ 473.213715][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 473.218647][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 473.223572][T12959] do_syscall_64+0x9f/0x140 [ 473.228101][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 473.233986][T12959] [ 473.236302][T12959] Uninit was stored to memory at: [ 473.241294][T12959] kmsan_internal_chain_origin+0xad/0x130 [ 473.247000][T12959] __msan_chain_origin+0x54/0xa0 [ 473.251983][T12959] do_recvmmsg+0x17fc/0x22d0 [ 473.256583][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 473.261506][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 473.266379][T12959] do_syscall_64+0x9f/0x140 [ 473.270872][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 473.276787][T12959] [ 473.279107][T12959] Uninit was stored to memory at: [ 473.284115][T12959] kmsan_internal_chain_origin+0xad/0x130 [ 473.289829][T12959] __msan_chain_origin+0x54/0xa0 [ 473.294762][T12959] do_recvmmsg+0x17fc/0x22d0 [ 473.299350][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 473.304271][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 473.309112][T12959] do_syscall_64+0x9f/0x140 [ 473.313607][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 473.319506][T12959] [ 473.321978][T12959] Uninit was stored to memory at: [ 473.326976][T12959] kmsan_internal_chain_origin+0xad/0x130 [ 473.332786][T12959] __msan_chain_origin+0x54/0xa0 [ 473.337720][T12959] do_recvmmsg+0x17fc/0x22d0 [ 473.342297][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 473.347329][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 473.352164][T12959] do_syscall_64+0x9f/0x140 [ 473.356667][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 473.362542][T12959] [ 473.364867][T12959] Local variable ----msg_sys@do_recvmmsg created at: [ 473.371524][T12959] do_recvmmsg+0xbf/0x22d0 [ 473.375945][T12959] do_recvmmsg+0xbf/0x22d0 [ 473.624518][T12959] not chained 180000 origins [ 473.629125][T12959] CPU: 0 PID: 12959 Comm: syz-executor.0 Not tainted 5.12.0-rc6-syzkaller #0 [ 473.637879][T12959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 473.647979][T12959] Call Trace: [ 473.651264][T12959] dump_stack+0x24c/0x2e0 [ 473.655613][T12959] kmsan_internal_chain_origin+0x6f/0x130 [ 473.661343][T12959] ? kmsan_get_metadata+0x116/0x180 [ 473.666617][T12959] ? kmsan_internal_check_memory+0xb3/0x500 [ 473.672510][T12959] ? kmsan_get_metadata+0x116/0x180 [ 473.677740][T12959] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 473.683548][T12959] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 473.689725][T12959] ? kmsan_get_metadata+0x116/0x180 [ 473.695009][T12959] ? kmsan_set_origin_checked+0xa2/0x100 [ 473.700716][T12959] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 473.706791][T12959] ? kmsan_unpoison_shadow+0x74/0xa0 [ 473.712068][T12959] ? _copy_from_user+0x1fd/0x300 [ 473.717020][T12959] ? kmsan_get_metadata+0x116/0x180 [ 473.722219][T12959] __msan_chain_origin+0x54/0xa0 [ 473.727171][T12959] do_recvmmsg+0x17fc/0x22d0 [ 473.731752][T12959] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 473.737545][T12959] ? kmsan_internal_set_origin+0x82/0xc0 [ 473.743172][T12959] ? __msan_poison_alloca+0xec/0x110 [ 473.748465][T12959] ? __msan_instrument_asm_store+0x104/0x130 [ 473.754453][T12959] ? __se_sys_recvmmsg+0xd6/0x410 [ 473.759469][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 473.764398][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 473.769460][T12959] do_syscall_64+0x9f/0x140 [ 473.773994][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 473.779901][T12959] RIP: 0033:0x4665d9 [ 473.783778][T12959] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 473.803396][T12959] RSP: 002b:00007f3b9434c188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 473.811825][T12959] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 473.819783][T12959] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003 [ 473.827740][T12959] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 473.835711][T12959] R10: 0000000000000002 R11: 0000000000000246 R12: 000000000056c038 [ 473.843669][T12959] R13: 0000000000a9fb1f R14: 00007f3b9434c300 R15: 0000000000022000 [ 473.851726][T12959] Uninit was stored to memory at: [ 473.856750][T12959] kmsan_internal_chain_origin+0xad/0x130 [ 473.862489][T12959] __msan_chain_origin+0x54/0xa0 [ 473.867440][T12959] do_recvmmsg+0x17fc/0x22d0 [ 473.872044][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 473.877000][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 473.881865][T12959] do_syscall_64+0x9f/0x140 [ 473.886358][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 473.892329][T12959] [ 473.894645][T12959] Uninit was stored to memory at: [ 473.899668][T12959] kmsan_internal_chain_origin+0xad/0x130 [ 473.905464][T12959] __msan_chain_origin+0x54/0xa0 [ 473.910402][T12959] do_recvmmsg+0x17fc/0x22d0 [ 473.915008][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 473.919982][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 473.924839][T12959] do_syscall_64+0x9f/0x140 [ 473.929332][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 473.935222][T12959] [ 473.937530][T12959] Uninit was stored to memory at: [ 473.942531][T12959] kmsan_internal_chain_origin+0xad/0x130 [ 473.948266][T12959] __msan_chain_origin+0x54/0xa0 [ 473.953195][T12959] do_recvmmsg+0x17fc/0x22d0 [ 473.957796][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 473.962720][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 473.967590][T12959] do_syscall_64+0x9f/0x140 [ 473.972084][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 473.977995][T12959] [ 473.980305][T12959] Uninit was stored to memory at: [ 473.985306][T12959] kmsan_internal_chain_origin+0xad/0x130 [ 473.991020][T12959] __msan_chain_origin+0x54/0xa0 [ 473.995970][T12959] do_recvmmsg+0x17fc/0x22d0 [ 474.000584][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 474.005516][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 474.010392][T12959] do_syscall_64+0x9f/0x140 [ 474.015024][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 474.020931][T12959] [ 474.023254][T12959] Uninit was stored to memory at: [ 474.028335][T12959] kmsan_internal_chain_origin+0xad/0x130 [ 474.034081][T12959] __msan_chain_origin+0x54/0xa0 [ 474.039073][T12959] do_recvmmsg+0x17fc/0x22d0 [ 474.043661][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 474.048672][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 474.053519][T12959] do_syscall_64+0x9f/0x140 [ 474.058032][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 474.063949][T12959] [ 474.066268][T12959] Uninit was stored to memory at: [ 474.071270][T12959] kmsan_internal_chain_origin+0xad/0x130 [ 474.076997][T12959] __msan_chain_origin+0x54/0xa0 [ 474.081974][T12959] do_recvmmsg+0x17fc/0x22d0 [ 474.086642][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 474.091591][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 474.096437][T12959] do_syscall_64+0x9f/0x140 [ 474.100955][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 474.106849][T12959] [ 474.109156][T12959] Uninit was stored to memory at: [ 474.114161][T12959] kmsan_internal_chain_origin+0xad/0x130 [ 474.119908][T12959] __msan_chain_origin+0x54/0xa0 [ 474.124834][T12959] do_recvmmsg+0x17fc/0x22d0 [ 474.129419][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 474.134348][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 474.139211][T12959] do_syscall_64+0x9f/0x140 [ 474.143706][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 474.149697][T12959] [ 474.152020][T12959] Local variable ----msg_sys@do_recvmmsg created at: [ 474.158685][T12959] do_recvmmsg+0xbf/0x22d0 [ 474.163101][T12959] do_recvmmsg+0xbf/0x22d0 [ 474.402986][T12959] not chained 190000 origins [ 474.407612][T12959] CPU: 0 PID: 12959 Comm: syz-executor.0 Not tainted 5.12.0-rc6-syzkaller #0 [ 474.416389][T12959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 474.426448][T12959] Call Trace: [ 474.429727][T12959] dump_stack+0x24c/0x2e0 [ 474.434058][T12959] kmsan_internal_chain_origin+0x6f/0x130 [ 474.439782][T12959] ? kmsan_get_metadata+0x116/0x180 [ 474.444972][T12959] ? kmsan_internal_check_memory+0xb3/0x500 [ 474.450880][T12959] ? kmsan_get_metadata+0x116/0x180 [ 474.456069][T12959] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 474.461896][T12959] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 474.468044][T12959] ? kmsan_get_metadata+0x116/0x180 [ 474.473249][T12959] ? kmsan_set_origin_checked+0xa2/0x100 [ 474.478895][T12959] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 474.484955][T12959] ? kmsan_unpoison_shadow+0x74/0xa0 [ 474.490266][T12959] ? _copy_from_user+0x1fd/0x300 [ 474.495197][T12959] ? kmsan_get_metadata+0x116/0x180 [ 474.500478][T12959] __msan_chain_origin+0x54/0xa0 [ 474.505498][T12959] do_recvmmsg+0x17fc/0x22d0 [ 474.510107][T12959] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 474.515905][T12959] ? kmsan_internal_set_origin+0x82/0xc0 [ 474.521525][T12959] ? __msan_poison_alloca+0xec/0x110 [ 474.526798][T12959] ? __msan_instrument_asm_store+0x104/0x130 [ 474.532773][T12959] ? __se_sys_recvmmsg+0xd6/0x410 [ 474.537814][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 474.542780][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 474.547636][T12959] do_syscall_64+0x9f/0x140 [ 474.552147][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 474.558042][T12959] RIP: 0033:0x4665d9 [ 474.561920][T12959] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 474.581536][T12959] RSP: 002b:00007f3b9434c188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 474.590036][T12959] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 474.598023][T12959] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003 [ 474.606084][T12959] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 474.614054][T12959] R10: 0000000000000002 R11: 0000000000000246 R12: 000000000056c038 [ 474.622034][T12959] R13: 0000000000a9fb1f R14: 00007f3b9434c300 R15: 0000000000022000 [ 474.630032][T12959] Uninit was stored to memory at: [ 474.635037][T12959] kmsan_internal_chain_origin+0xad/0x130 [ 474.640749][T12959] __msan_chain_origin+0x54/0xa0 [ 474.645677][T12959] do_recvmmsg+0x17fc/0x22d0 [ 474.650283][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 474.655233][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 474.660094][T12959] do_syscall_64+0x9f/0x140 [ 474.664605][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 474.670510][T12959] [ 474.672856][T12959] Uninit was stored to memory at: [ 474.677859][T12959] kmsan_internal_chain_origin+0xad/0x130 [ 474.683588][T12959] __msan_chain_origin+0x54/0xa0 [ 474.688532][T12959] do_recvmmsg+0x17fc/0x22d0 [ 474.693142][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 474.698091][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 474.702950][T12959] do_syscall_64+0x9f/0x140 [ 474.707467][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 474.713381][T12959] [ 474.715688][T12959] Uninit was stored to memory at: [ 474.720690][T12959] kmsan_internal_chain_origin+0xad/0x130 [ 474.726430][T12959] __msan_chain_origin+0x54/0xa0 [ 474.731366][T12959] do_recvmmsg+0x17fc/0x22d0 [ 474.735951][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 474.740877][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 474.745727][T12959] do_syscall_64+0x9f/0x140 [ 474.750331][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 474.756317][T12959] [ 474.758623][T12959] Uninit was stored to memory at: [ 474.763625][T12959] kmsan_internal_chain_origin+0xad/0x130 [ 474.769357][T12959] __msan_chain_origin+0x54/0xa0 [ 474.774294][T12959] do_recvmmsg+0x17fc/0x22d0 [ 474.778869][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 474.783795][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 474.788675][T12959] do_syscall_64+0x9f/0x140 [ 474.793170][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 474.799069][T12959] [ 474.801374][T12959] Uninit was stored to memory at: [ 474.806377][T12959] kmsan_internal_chain_origin+0xad/0x130 [ 474.812107][T12959] __msan_chain_origin+0x54/0xa0 [ 474.817305][T12959] do_recvmmsg+0x17fc/0x22d0 [ 474.821882][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 474.826805][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 474.831667][T12959] do_syscall_64+0x9f/0x140 [ 474.836163][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 474.842064][T12959] [ 474.844385][T12959] Uninit was stored to memory at: [ 474.849444][T12959] kmsan_internal_chain_origin+0xad/0x130 [ 474.855150][T12959] __msan_chain_origin+0x54/0xa0 [ 474.860092][T12959] do_recvmmsg+0x17fc/0x22d0 [ 474.864672][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 474.869625][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 474.874485][T12959] do_syscall_64+0x9f/0x140 [ 474.878991][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 474.884874][T12959] [ 474.887198][T12959] Uninit was stored to memory at: [ 474.892210][T12959] kmsan_internal_chain_origin+0xad/0x130 [ 474.897938][T12959] __msan_chain_origin+0x54/0xa0 [ 474.902893][T12959] do_recvmmsg+0x17fc/0x22d0 [ 474.907506][T12959] __se_sys_recvmmsg+0x24a/0x410 [ 474.912435][T12959] __x64_sys_recvmmsg+0x62/0x80 [ 474.917305][T12959] do_syscall_64+0x9f/0x140 [ 474.921819][T12959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 474.927712][T12959] [ 474.930020][T12959] Local variable ----msg_sys@do_recvmmsg created at: [ 474.936671][T12959] do_recvmmsg+0xbf/0x22d0 [ 474.941083][T12959] do_recvmmsg+0xbf/0x22d0 16:19:04 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x894c, 0x0) 16:19:04 executing program 1: bpf$BPF_TASK_FD_QUERY(0x12, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 16:19:04 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000000c0)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTACH(r1, 0x4004743d, &(0x7f0000000140)) 16:19:04 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 16:19:04 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x18, 0xfffffffffffffffe) 16:19:04 executing program 1: syz_usb_connect(0x0, 0x24, &(0x7f0000000540)={{0x12, 0x1, 0x250, 0x3, 0x77, 0x22, 0x10, 0x413c, 0x8117, 0xd938, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xdb, 0xf4, 0xfd}}]}}]}}, 0x0) 16:19:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x1c, 0x0, 0x0) 16:19:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x37, 0x0, 0x0) 16:19:04 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0x4020aeb2, 0x0) 16:19:04 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42a", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:19:04 executing program 3: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x0) [ 476.142579][ T8458] usb 2-1: new high-speed USB device number 21 using dummy_hcd 16:19:05 executing program 5: bpf$BPF_TASK_FD_QUERY(0x6, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 16:19:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x30, 0x0, 0x0) 16:19:05 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0x7, 0x6, 0x6, 0x11, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x40) 16:19:05 executing program 3: pipe(&(0x7f0000000000)) syz_genetlink_get_family_id$batadv(&(0x7f0000002840), 0xffffffffffffffff) [ 476.406578][ T8458] usb 2-1: Using ep0 maxpacket: 16 16:19:05 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x9, 0x7, 0x6, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x40) 16:19:05 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz1\x00'}) 16:19:05 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_DEV_CREATE(r0, 0x40045564) 16:19:05 executing program 4: socketpair(0x10, 0x0, 0xa, &(0x7f0000000180)) [ 476.762634][ T8458] usb 2-1: unable to get BOS descriptor or descriptor too short 16:19:05 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0x8001) [ 476.844720][ T8458] usb 2-1: unable to read config index 0 descriptor/start: -71 [ 476.852648][ T8458] usb 2-1: can't read configurations, error -71 16:19:06 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xa, 0x7, 0x6, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x40) 16:19:08 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42a", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:19:08 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000), 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f00000000c0)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) write$input_event(r0, &(0x7f0000000040)={{0x77359400}}, 0x18) 16:19:08 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x17, 0x0, 0x1, 0x8, 0x0, 0x1}, 0x40) 16:19:08 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x8982, 0x0) 16:19:08 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x202200) write$binfmt_aout(r0, 0x0, 0x0) 16:19:08 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0x7, 0x6, 0x6, 0x9}, 0x40) [ 479.371269][T13111] input: syz0 as /devices/virtual/input/input19 16:19:08 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000011c0)={&(0x7f0000001180)={0x14}, 0x14}}, 0x0) 16:19:08 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002d40)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, 0x0) 16:19:08 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0x5450, 0x0) 16:19:08 executing program 4: syz_open_dev$tty20(0xc, 0x4, 0x0) creat(0x0, 0x0) 16:19:08 executing program 3: socketpair(0xf, 0x3, 0x0, &(0x7f0000000800)) 16:19:09 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, 0x0) 16:19:11 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42a", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:19:11 executing program 4: prctl$PR_SET_MM_AUXV(0x35, 0xc, 0x0, 0x7) 16:19:11 executing program 5: pselect6(0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), &(0x7f0000000300)={&(0x7f00000002c0)={[0x7]}, 0x8}) 16:19:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8980, 0x0) 16:19:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000300)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x1c, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}]}, @ETHTOOL_A_STRSET_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0x40}}, 0x0) 16:19:11 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "487059d29ec0d0505fc891fdd08f7cdb184015e9701f9b26e61259361e32da2a8f9601db14dfe5b855f0ca839466344f1bb730ad17e4d1afc0c38757907ab19a"}, 0x48, 0xfffffffffffffffb) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) 16:19:11 executing program 4: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000cc0), 0x145000, 0x0) 16:19:11 executing program 1: add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000080)={0x0, "487059d29ec0d0505fc891fdd08f7cdb184015e9701f9b26e61259361e32da2a8f9601db14dfe5b855f0ca839466344f1bb730ad17e4d1afc0c38757907ab19a"}, 0x48, 0xfffffffffffffffb) set_mempolicy(0x0, &(0x7f0000000040), 0xfff) 16:19:11 executing program 5: futex(0x0, 0x85, 0x0, 0x0, 0x0, 0x0) 16:19:11 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @broadcast}, {0x2, 0x0, @remote}}) 16:19:11 executing program 3: socketpair(0x10, 0x0, 0xb, &(0x7f0000000180)) 16:19:12 executing program 3: pkey_mprotect(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) waitid(0x0, 0x0, &(0x7f00000019c0), 0x0, 0x0) 16:19:14 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf8", 0x8d}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:19:14 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000080)='pkcs7_test\x00', &(0x7f00000000c0)=@chain) 16:19:14 executing program 0: prctl$PR_SET_MM_AUXV(0x24, 0xc, 0x0, 0x0) 16:19:14 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000006740), 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH(r0, 0x5, &(0x7f0000000340)='(}\x00', 0x0, 0xffffffffffffff9c) 16:19:14 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000006740), 0xffffffff, 0x48802) read$FUSE(r0, &(0x7f0000000280)={0x2020}, 0x2020) write$FUSE_ENTRY(r0, 0x0, 0x0) 16:19:14 executing program 4: r0 = socket$inet(0x2, 0x3, 0xfe) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x4020940d, 0x0) 16:19:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x4020940d, &(0x7f0000000040)={'macvlan1\x00', @ifru_map}) 16:19:15 executing program 0: clone3(&(0x7f0000000300)={0x20100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 16:19:15 executing program 1: futex(&(0x7f0000000100), 0xa, 0x0, 0x0, 0x0, 0x1) 16:19:15 executing program 5: fsopen(&(0x7f00000002c0)='tmpfs\x00', 0x0) 16:19:15 executing program 3: clone3(&(0x7f00000003c0)={0x8022000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 16:19:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = gettid() sendmsg$netlink(r0, &(0x7f0000004680)={0x0, 0x0, &(0x7f0000004580)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000004640)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee00}}}], 0x20}, 0x0) 16:19:17 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf8", 0x8d}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:19:17 executing program 5: syz_open_dev$vcsa(&(0x7f0000000140), 0x0, 0x20300) 16:19:17 executing program 4: prctl$PR_SET_MM_AUXV(0x19, 0x544000, 0x0, 0x0) 16:19:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800002, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) bind$alg(r1, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes-aesni)\x00'}, 0x58) 16:19:17 executing program 0: r0 = socket$inet(0x2, 0x3, 0xfe) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x5460, 0x0) 16:19:17 executing program 3: r0 = socket$inet(0x2, 0x3, 0xfe) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x4e23, @local}, {0x2, 0x4e20, @remote}, {0x2, 0x4e24, @broadcast}, 0x152, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x40, 0x1}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x5451, 0x0) 16:19:18 executing program 0: r0 = socket$inet(0x2, 0x3, 0xfe) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={0x0, {0x2, 0x0, @local}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xc3, 0xffff}) 16:19:18 executing program 3: ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000002c0)={0x0, [], 0x0, "0814a399ed7060"}) pkey_mprotect(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 16:19:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8920, &(0x7f0000000000)={'veth0_macvtap\x00', @ifru_names}) 16:19:18 executing program 5: r0 = socket$inet(0x2, 0x3, 0xfe) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000200)={@multicast1, @initdev}, &(0x7f0000000240)=0xc) 16:19:18 executing program 0: prctl$PR_SET_MM_AUXV(0x2, 0x544000, 0x0, 0x0) 16:19:18 executing program 3: socketpair(0x10, 0x3, 0x2, &(0x7f0000000000)) 16:19:21 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf8", 0x8d}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:19:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@getchain={0x24, 0x10, 0x5a1}, 0x24}}, 0x0) 16:19:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x14, 0x1a, 0x0, 0x1, [@AF_INET={0xa, 0x2, 0x0, 0x1, {0x4, 0x1, 0x0, 0x1, [{0x8}]}}]}]}, 0x34}}, 0x0) 16:19:21 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f00000001c0)=""/177, 0x36, 0xb1, 0x1}, 0x20) 16:19:21 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000000)={'wg0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001300)=@setlink={0x28, 0x13, 0xb4472abbaa044357, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_PROTO_DOWN={0x5}]}, 0x28}}, 0x0) 16:19:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ipip={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x8, 0x3, @private}, @IFLA_IPTUN_LOCAL={0x8, 0x2, @multicast1}, @IFLA_IPTUN_PMTUDISC={0x5}]}}}]}, 0x4c}}, 0x0) [ 492.329463][T13294] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.5'. [ 492.339299][T13296] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 16:19:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ipip={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x8, 0x3, @private}, @IFLA_IPTUN_LOCAL={0x8, 0x2, @multicast1}, @IFLA_IPTUN_PMTUDISC={0x5}]}}}]}, 0x4c}}, 0x0) 16:19:21 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@getchain={0x24, 0x1c, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x4}, {0x4}}}, 0x24}}, 0x0) 16:19:21 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x4001, 0x3, 0x208, 0x0, 0x0, 0x148, 0x0, 0x148, 0x170, 0x240, 0x240, 0x170, 0x240, 0x3, 0x0, {[{{@ip={@multicast2, @empty, 0x0, 0x0, 'vlan1\x00', 'vlan0\x00', {}, {}, 0x89}, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE1={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x268) 16:19:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8902, 0x0) 16:19:21 executing program 1: r0 = syz_open_dev$vcsu(&(0x7f0000000040), 0x0, 0x0) execveat(r0, &(0x7f0000000a80)='./file1\x00', 0x0, 0x0, 0x0) 16:19:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ipip={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x8, 0x3, @private}, @IFLA_IPTUN_LOCAL={0x8, 0x2, @multicast1}, @IFLA_IPTUN_PMTUDISC={0x5}]}}}]}, 0x4c}}, 0x0) [ 493.046623][T13309] xt_CT: No such helper "netbios-ns" [ 493.114787][T13314] xt_CT: No such helper "netbios-ns" 16:19:24 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf85893", 0x8f}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:19:24 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f0000000200)={0x0, "cda94da9d784a2e86883317923a6dc6bf7cb474d1fdf18ed0152a6e15f91aaf00cfa776a8d45f55cc3da28ed32579fde1a86c6d65166315f079465b3838578cc"}, 0x48, 0xfffffffffffffffb) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='@-/\x00', r0) 16:19:24 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f000000de00), 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x40010, r0, 0x8000000) 16:19:24 executing program 1: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000, 0x7, &(0x7f0000ffd000/0x1000)=nil) 16:19:24 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@getchain={0x24, 0x1d, 0x1}, 0x24}}, 0x0) 16:19:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ipip={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x8, 0x3, @private}, @IFLA_IPTUN_LOCAL={0x8, 0x2, @multicast1}, @IFLA_IPTUN_PMTUDISC={0x5}]}}}]}, 0x4c}}, 0x0) 16:19:24 executing program 4: prctl$PR_SET_THP_DISABLE(0x34, 0x1) 16:19:24 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x15, &(0x7f0000000380)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0x390, 0x390, 0x0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@mcast1, @private1, [], [], 'netdevsim0\x00', 'vlan1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@MARK={0x28}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "7764ed7a2e0a89dca8f1aa57396f1a36d5611495e7b557bffb45977071b4"}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 16:19:24 executing program 5: io_setup(0x2, &(0x7f0000000040)) munmap(&(0x7f0000ffe000/0x1000)=nil, 0x1d328000) 16:19:24 executing program 3: r0 = epoll_create(0x3) r1 = socket$packet(0x11, 0x2, 0x300) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x4}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000200)={0x300}) 16:19:25 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x40) 16:19:25 executing program 1: r0 = socket(0x2, 0x3, 0xa) setsockopt$sock_attach_bpf(r0, 0x1, 0x29, &(0x7f0000000040), 0x4) 16:19:27 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf85893", 0x8f}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:19:27 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000001700)={@mcast1, 0x0, 0x1, 0x0, 0x6}, 0x20) 16:19:27 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) 16:19:27 executing program 5: pselect6(0x48f, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x0, 0x3938700}, &(0x7f0000000280)={&(0x7f0000000240), 0x8}) 16:19:27 executing program 3: mlock2(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffe000/0x2000)=nil) 16:19:27 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x9, 0x0, 0x3144c7eaacf18058, 0x4, 0x0, 0x0, 0x0, [@sadb_spirange={0x2}]}, 0x20}}, 0x0) 16:19:28 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x1, 0x0, 0x0, 0x2}, {0x6}]}) 16:19:28 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x3, 0x0, 0x0) 16:19:28 executing program 0: request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='\x00', 0xfffffffffffffffe) 16:19:28 executing program 4: r0 = socket(0x2, 0xa, 0x0) ioctl$sock_ifreq(r0, 0x8918, 0x0) 16:19:28 executing program 5: syz_io_uring_setup(0x0, &(0x7f0000000fc0), &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000001040), &(0x7f0000001080)) [ 499.438928][ T35] audit: type=1326 audit(1625847568.445:3): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13384 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 16:19:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@getchain={0x10, 0x66, 0x0, 0x0, 0x0, {0x10, 0x0, 0x0, 0x0, {}, {}, {0x10}}, [{0x8}, {0x8}]}, 0x34}}, 0x0) 16:19:30 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf85893", 0x8f}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:19:30 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x16, 0x0, 0x0) 16:19:30 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000040), 0x40) madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2) mlock2(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x0) 16:19:30 executing program 3: mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x1dc20000, 0x0, 0x4000072, 0xffffffffffffffff, 0x8000000) 16:19:30 executing program 1: add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) 16:19:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x14, 0x1a, 0x0, 0x1, [@AF_INET={0x10, 0x2, 0x0, 0x1, {0xc, 0x1, 0x0, 0x1, [{0x8}]}}]}]}, 0x34}}, 0x0) 16:19:31 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f000000de00), 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000007, 0x10, r0, 0x8000000) 16:19:31 executing program 0: r0 = socket(0x2, 0x3, 0xa) setsockopt$sock_attach_bpf(r0, 0x1, 0x12, &(0x7f0000000040), 0x4) 16:19:31 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x39, 0x0, 0x0) 16:19:31 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x2, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4}]}, 0x20000070}}, 0x0) 16:19:31 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x31, &(0x7f0000000380)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0x390, 0x390, 0x0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@mcast1, @private1, [], [], 'netdevsim0\x00', 'vlan1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@MARK={0x28}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "7764ed7a2e0a89dca8f1aa57396f1a36d5611495e7b557bffb45977071b4"}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 16:19:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@getchain={0x24, 0x21, 0x1}, 0x24}}, 0x0) 16:19:34 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf8589312", 0x90}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:19:34 executing program 0: socketpair(0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000004dc0), 0xffffffffffffffff) 16:19:34 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'erspan0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB='A']}) 16:19:34 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x19, 0x0, 0x0) 16:19:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x1d, 0x0, &(0x7f0000000200)) 16:19:34 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x8, 0x0, 0x0) 16:19:34 executing program 1: socketpair(0xa, 0x3, 0x0, &(0x7f0000000140)) 16:19:34 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg$inet(r0, &(0x7f0000004140)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="2b457aeb60705d8f3fbdd1b2416d608e", 0x10}], 0x1, &(0x7f0000000100)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}], 0x30}}], 0x1, 0x0) 16:19:34 executing program 0: r0 = socket(0x2, 0x3, 0xa) setsockopt$sock_attach_bpf(r0, 0x1, 0xf, &(0x7f0000000040), 0x4) 16:19:34 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1d, 0x0, 0x0) 16:19:34 executing program 4: pselect6(0x0, 0xfffffffffffffffd, 0x0, 0x0, &(0x7f0000000200)={0x0, 0x3938700}, 0x0) 16:19:34 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x94}]}) 16:19:37 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf8589312", 0x90}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:19:37 executing program 3: mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4, 0x4000072, 0xffffffffffffffff, 0x8000000) 16:19:37 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x38, 0x0, 0x0) 16:19:37 executing program 1: r0 = socket(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x4001, 0x3, 0x208, 0x0, 0x0, 0x148, 0x0, 0x148, 0x170, 0x240, 0x240, 0x170, 0x240, 0x3, 0x0, {[{{@ip={@multicast2, @empty, 0x0, 0x0, 'vlan1\x00', 'vlan0\x00', {}, {}, 0x89, 0x0, 0xb}, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE1={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x268) 16:19:37 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1b, &(0x7f0000000380)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0x390, 0x390, 0x0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@mcast1, @private1, [], [], 'netdevsim0\x00', 'vlan1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@MARK={0x28}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "7764ed7a2e0a89dca8f1aa57396f1a36d5611495e7b557bffb45977071b4"}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 16:19:37 executing program 0: rt_sigqueueinfo(0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xfffffff8}) [ 508.628567][T13496] xt_CT: No such helper "netbios-ns" 16:19:37 executing program 0: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x8) prctl$PR_GET_TSC(0x19, &(0x7f0000000000)) 16:19:37 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x61, 0x0, 0x0, 0xffffff55}]}) 16:19:37 executing program 4: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='\x00'}, 0x10) 16:19:37 executing program 5: renameat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 16:19:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000002e0001"], 0x34}}, 0x0) 16:19:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x891e, &(0x7f0000000000)={'veth1_to_hsr\x00', @ifru_addrs=@l2tp={0x2, 0x0, @remote}}) [ 509.167900][T13514] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 509.856923][ T3123] ieee802154 phy0 wpan0: encryption failed: -22 [ 509.863680][ T3123] ieee802154 phy1 wpan1: encryption failed: -22 16:19:40 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf8589312", 0x90}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:19:40 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x378, 0xffffffff, 0x0, 0x0, 0x110, 0xffffffff, 0xffffffff, 0x318, 0x318, 0x318, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "a90e785fd6b06b9fc062f1bb7104dda32efbfb94138cf5a1f2f0f9869f3d"}}, {{@ipv6={@mcast2, @private2, [], [], 'ip6_vti0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xf0}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev, 'macvtap0\x00'}}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @private}, @loopback, [], [], 'ipvlan0\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d8) 16:19:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8919, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_addrs=@hci}) 16:19:40 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) 16:19:40 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x35, 0x0, 0x0) 16:19:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet(r0, &(0x7f0000000000)="2145087fe6d29c61bfd457d71be623ef0d8e71c333620027d73b6f803d663b802e5b4dc0a6f8f7213bcfee0a0ec5bf8c8deffce9920e1d2d26062d0dcd5d3da287f079b9220099", 0x47, 0x0, &(0x7f0000001000)={0x2, 0x4e22, @loopback}, 0x10) 16:19:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@deltfilter={0x30, 0x2d, 0x1, 0x0, 0x0, {}, [@filter_kind_options=@f_fw={{0x7}, {0x4}}]}, 0x30}}, 0x0) 16:19:40 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) 16:19:40 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000ffb000/0x2000)=nil, 0x7fffffffffffffff, 0x0, 0x10, r0, 0x0) 16:19:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bridge0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB='3']}) 16:19:41 executing program 0: setrlimit(0xe, &(0x7f0000000180)={0x0, 0x111}) 16:19:41 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 512.215698][ T35] audit: type=1326 audit(1625847581.225:4): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13544 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 16:19:41 executing program 5: syz_open_dev$evdev(&(0x7f0000000f80), 0x0, 0x6000) 16:19:41 executing program 4: r0 = socket(0x2, 0x3, 0xa) setsockopt$sock_attach_bpf(r0, 0x1, 0x21, &(0x7f0000000040), 0x4) 16:19:41 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x22, 0x0, 0x0) 16:19:41 executing program 1: socketpair(0x10, 0x0, 0x6, &(0x7f0000000080)) 16:19:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8954, 0x0) 16:19:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8918, &(0x7f0000000040)={'ipvlan1\x00', @ifru_addrs=@hci}) 16:19:41 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xc) 16:19:41 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x1}, {0x6}]}) 16:19:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@getchain={0x24, 0x32, 0x1}, 0x24}}, 0x0) 16:19:42 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x21, &(0x7f0000000380)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0x390, 0x390, 0x0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@mcast1, @private1, [], [], 'netdevsim0\x00', 'vlan1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@MARK={0x28}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "7764ed7a2e0a89dca8f1aa57396f1a36d5611495e7b557bffb45977071b4"}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) [ 513.260115][ T35] audit: type=1326 audit(1625847582.265:5): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13572 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 16:19:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x890b, &(0x7f0000000040)={'ipvlan1\x00', @ifru_addrs=@hci}) [ 513.356818][T13577] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 16:19:44 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:19:44 executing program 4: r0 = socket(0x2, 0x3, 0xa) setsockopt$sock_attach_bpf(r0, 0x1, 0x6, &(0x7f0000000040), 0x4) 16:19:44 executing program 5: getgroups(0x1, &(0x7f0000000400)=[0xee00]) getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) 16:19:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8927, &(0x7f0000000180)={'caif0\x00', @ifru_flags}) 16:19:44 executing program 0: madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2) r0 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) 16:19:44 executing program 3: madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 16:19:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}]}}, &(0x7f00000001c0)=""/177, 0x3e, 0xb1, 0x1}, 0x20) 16:19:44 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1b, 0x0, 0x0) 16:19:44 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/ram2', 0x20000, 0x0) 16:19:44 executing program 3: madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2) mremap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 16:19:44 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x8970, &(0x7f0000000180)={'veth1_macvtap\x00', @ifru_data=0x0}) 16:19:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x541b, &(0x7f0000000040)={'ipvlan1\x00', @ifru_addrs=@hci}) 16:19:47 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:19:47 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x39, &(0x7f0000000380)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0x390, 0x390, 0x0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@mcast1, @private1, [], [], 'netdevsim0\x00', 'vlan1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@MARK={0x28}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "7764ed7a2e0a89dca8f1aa57396f1a36d5611495e7b557bffb45977071b4"}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 16:19:47 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) 16:19:47 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f0000000200)={0x0, "cda94da9d784a2e86883317923a6dc6bf7cb474d1fdf18ed0152a6e15f91aaf00cfa776a8d45f55cc3da28ed32579fde1a86c6d65166315f079465b3838578cc"}, 0x48, 0xfffffffffffffffb) keyctl$search(0xa, r0, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0) 16:19:47 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000200)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_METRICS={0x8, 0x8, 0x0, 0x1, "c3753ca3"}]}, 0x24}}, 0x0) 16:19:47 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)=@mpls_newroute={0x1c, 0x18, 0x409}, 0x1c}}, 0x0) 16:19:47 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x49, 0x0, 0x0) 16:19:47 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x23, &(0x7f0000000380)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0x390, 0x390, 0x0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@mcast1, @private1, [], [], 'netdevsim0\x00', 'vlan1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@MARK={0x28}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "7764ed7a2e0a89dca8f1aa57396f1a36d5611495e7b557bffb45977071b4"}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 16:19:48 executing program 3: clock_gettime(0x0, &(0x7f0000000000)) madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2) mlock2(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 16:19:48 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc90000000000, 0x0, 0x0) 16:19:48 executing program 1: r0 = socket(0x2, 0x3, 0xa) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000001c40)={'batadv_slave_0\x00'}) 16:19:48 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x6, 0x0, 0x0) [ 519.382924][ T35] audit: type=1326 audit(1625847588.385:6): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13650 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 [ 520.220196][ T35] audit: type=1326 audit(1625847589.225:7): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13650 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 16:19:50 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:19:50 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4b, 0x0, 0x0) 16:19:50 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0x390, 0x390, 0x0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@mcast1, @private1, [], [], 'netdevsim0\x00', 'vlan1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xffffffffffffffff}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@MARK={0x28}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x21, 'ERROR\x00', 0x0, "7764ed7a2e0a89dca8f1aa57396f1a36d5611495e7b557bffb45977071b4"}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 16:19:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000040), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)) 16:19:50 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@getchain={0x24, 0x66, 0x1}, 0x24}}, 0x0) 16:19:50 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000180)={0x3, &(0x7f0000000140)=[{}, {0x5}, {}]}) 16:19:51 executing program 5: io_setup(0x8, &(0x7f0000000080)=0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) io_submit(r0, 0x2, &(0x7f0000000480)=[&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x8, 0x0, r2, 0x0}]) 16:19:51 executing program 1: r0 = socket(0x2, 0x3, 0xa) ioctl$sock_ifreq(r0, 0x891c, &(0x7f0000000000)={'veth1\x00', @ifru_names}) 16:19:51 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x37, &(0x7f0000000380)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0x390, 0x390, 0x0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@mcast1, @private1, [], [], 'netdevsim0\x00', 'vlan1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@MARK={0x28}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "7764ed7a2e0a89dca8f1aa57396f1a36d5611495e7b557bffb45977071b4"}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 16:19:51 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x16, &(0x7f0000000380)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0x390, 0x390, 0x0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@mcast1, @private1, [], [], 'netdevsim0\x00', 'vlan1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@MARK={0x28}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "7764ed7a2e0a89dca8f1aa57396f1a36d5611495e7b557bffb45977071b4"}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 16:19:51 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_io_uring_complete(0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, 0x0) [ 522.734537][ T35] audit: type=1326 audit(1625847591.745:8): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13696 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 16:19:51 executing program 1: madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x2000000, 0xffffffffffffffff) [ 523.531946][ T35] audit: type=1326 audit(1625847592.535:9): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13696 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 16:19:54 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:19:54 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000180)={0x3, &(0x7f0000000140)=[{0x5}, {}, {0x16}]}) 16:19:54 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@getchain={0x24, 0x68, 0x1}, 0x24}}, 0x0) 16:19:54 executing program 4: mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x7fffdf003000, 0x0, 0x4000072, 0xffffffffffffffff, 0x8000000) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) 16:19:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=@ipv6_getroute={0x1c, 0x1a, 0x111}, 0x1c}}, 0x0) 16:19:54 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4e, 0x0, 0x0) [ 525.365952][ T35] audit: type=1326 audit(1625847594.375:10): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13718 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 525.416163][T13719] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 16:19:54 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000001cc0)=[{{&(0x7f0000000080)={0x2, 0x4e21}, 0x10, 0x0, 0x0, &(0x7f0000001240)=[@ip_tos_u8={{0x11}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @loopback}}}, @ip_tos_int={{0x14}}], 0x50}}], 0x1, 0x0) 16:19:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {&(0x7f0000000000)=""/21, 0x15}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@getchain={0x24, 0x66, 0x1}, 0x24}}, 0x0) 16:19:54 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) recvmmsg(r0, &(0x7f0000004940), 0x7, 0x40000103, 0x0) 16:19:54 executing program 0: r0 = socket(0x2, 0x3, 0xa) ioctl$sock_ifreq(r0, 0x8931, &(0x7f0000000000)={'veth0_to_bridge\x00', @ifru_names}) 16:19:54 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0x390, 0x390, 0x0, 0xffffffff, 0xffffffff, 0x4d0, 0x4d0, 0x4d0, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@mcast1, @private1, [], [], 'netdevsim0\x00', 'vlan1\x00', {}, {}, 0x0, 0x0, 0x8}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@MARK={0x28}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "7764ed7a2e0a89dca8f1aa57396f1a36d5611495e7b557bffb45977071b4"}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 16:19:55 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000180)={0x3, &(0x7f0000000140)=[{0x5}, {}, {0x6}]}) [ 526.277819][ T35] audit: type=1326 audit(1625847595.285:11): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13740 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 16:19:57 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:19:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@getchain={0x24, 0x5a, 0x1}, 0x24}}, 0x0) 16:19:57 executing program 0: waitid(0x3, 0xffffffffffffffff, 0x0, 0x20000004, 0x0) 16:19:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f00000001c0)={'wg2\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000200)=@ipv6_getroute={0x2c, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_METRICS={0x8, 0x8, 0x0, 0x1, "c3753ca3"}, @RTA_IIF={0x8, 0x3, r1}]}, 0x2c}}, 0x0) 16:19:57 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x14, 0x0, 0x0) 16:19:57 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x3a0, 0xffffffff, 0xf8, 0xf8, 0x0, 0xffffffff, 0xffffffff, 0x388, 0x388, 0x388, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@dev, @local, [], [], 'veth0_to_bond\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE3={0x28}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "61ff71ff0b1b54f4877fab4be2e8312d1100b33c19a6edd11de8af55dee6"}}, {{@uncond, 0x0, 0xa8, 0x118}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "69296914c31f7476add06ba26cf9e245dbab79401fb833422e0ee74033b01555d3e792cf6d89d942ed5b1ba8de4030ba974e8b3db357453ba50b9ca68effd2d9"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x400) [ 528.540573][T13758] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 16:19:57 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x4001, 0x3, 0x208, 0x0, 0x0, 0x148, 0x0, 0x148, 0x170, 0x240, 0x240, 0x170, 0x240, 0x3, 0x0, {[{{@ip={@multicast2, @empty, 0x0, 0x0, 'vlan1\x00', 'vlan0\x00', {}, {}, 0x89}, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x10000, 'netbios-ns\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE1={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x268) 16:19:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000140)=""/135, 0x87}], 0x1, 0x0, 0x0) 16:19:57 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1c, 0x0, 0x0) 16:19:57 executing program 4: r0 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x300, 0x0, 0x4000072, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(r0, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x106073, 0xffffffffffffffff, 0x10000000) 16:19:57 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x22, 0x0, 0x0) 16:19:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(r0, &(0x7f0000000900)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10041, 0x0) [ 528.986549][T13769] xt_CT: No such helper "netbios-ns" 16:20:00 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:20:00 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000180)={0x2, &(0x7f0000000140)=[{}, {0x30}]}) 16:20:00 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) 16:20:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@getchain={0x24, 0x2c, 0x1}, 0x24}}, 0x0) 16:20:00 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f0000000180)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0x541b, 0x0) 16:20:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@deltclass={0x2c, 0x29, 0x201, 0x0, 0x0, {}, [@TCA_RATE={0x6}]}, 0x2c}}, 0x0) 16:20:01 executing program 3: syz_emit_ethernet(0x165, &(0x7f00000002c0)=ANY=[@ANYBLOB="bb"], 0x0) 16:20:01 executing program 0: r0 = socket(0x2, 0x3, 0xa) ioctl$sock_ifreq(r0, 0x541b, &(0x7f0000000000)={'veth1\x00', @ifru_names}) 16:20:01 executing program 5: r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc1}, &(0x7f00000001c0)={0x0, "777f953a388aa402a26cbdbfbf6b79b4df4e5fa54d180976f87c8061fe646f525801653c2691191bb18bf159bd4ccd6a11914aa679999ba6656e2731773caef2"}, 0x48, r0) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000240)={'fscrypt:', @desc1}, &(0x7f0000000280)={0x0, "cb2c65d4bc852822bb4e95ef152a4db5e6e556b13f5ea56a34515dcc9d9c406737ec12daa937bc6ef86148769c240b09235325cee3f28e21f4aace6db104681b"}, 0x48, r0) 16:20:01 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000100)={'wg1\x00'}) 16:20:01 executing program 1: r0 = socket(0x2, 0x3, 0xa) setsockopt$sock_attach_bpf(r0, 0x1, 0x2b, &(0x7f0000000040), 0x4) 16:20:01 executing program 3: setrlimit(0x7, &(0x7f0000000000)={0x0, 0x8324}) 16:20:03 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:20:03 executing program 5: io_setup(0x6, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) io_setup(0x10000, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f00000001c0)) pselect6(0x0, 0x0, &(0x7f0000000140)={0x200, 0x5, 0x0, 0xccf0, 0xd3, 0x7fff, 0x0, 0xfab}, 0x0, &(0x7f0000000200)={0x0, 0x3938700}, &(0x7f0000000280)={&(0x7f0000000240)={[0x8]}, 0x8}) io_getevents(0x0, 0x9, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x989680}) 16:20:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@getchain={0x24, 0x13, 0x1}, 0x24}}, 0x0) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0}, 0x2124) 16:20:03 executing program 1: r0 = socket(0x2, 0x3, 0xa) ioctl$sock_ifreq(r0, 0x8927, &(0x7f0000000000)={'veth1\x00', @ifru_names}) 16:20:03 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x15, 0x0, 0x0) 16:20:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg$inet(r0, &(0x7f0000004140)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="2b457aeb60705d8f3fbdd1b2416d608e", 0x10}], 0x1, &(0x7f0000000100)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}], 0x30}}], 0x300, 0x0) [ 534.955963][T13846] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 535.017438][T13846] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 16:20:04 executing program 1: r0 = socket(0x11, 0xa, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000000), r0) 16:20:04 executing program 4: r0 = inotify_init1(0x0) inotify_add_watch(r0, 0x0, 0x3000800) 16:20:04 executing program 0: msgsnd(0x0, &(0x7f00000005c0)={0x2, "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"}, 0xfd1, 0x0) 16:20:04 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000400), 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000280), 0x7, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) 16:20:04 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 16:20:04 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) 16:20:07 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:20:07 executing program 0: clock_adjtime(0x6, 0x0) 16:20:07 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x40) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000300)={0x0, {{0xa, 0x0, 0x0, @dev}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 16:20:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=@newlink={0x7c, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_BROADCAST={0xa, 0x2, @remote}, @IFLA_GROUP={0x8}, @IFLA_PORT_SELF={0x2c, 0x19, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a3d4aee1454286fddbb440f9e4d27b04"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "0d4f91b9e2c872bb7a37a5be97aa870e"}]}, @IFLA_EXT_MASK={0x8, 0x1d, 0x20}, @IFLA_ALT_IFNAME={0x14, 0x35, 'bridge_slave_0\x00'}]}, 0x7c}}, 0x0) 16:20:07 executing program 1: add_key$user(&(0x7f0000000040), 0xfffffffffffffffe, 0x0, 0x0, 0xfffffffffffffffb) 16:20:07 executing program 5: r0 = mq_open(&(0x7f00000001c0)='gtp\x00', 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) [ 538.213743][T13882] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 16:20:07 executing program 3: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:20:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x240080d0) 16:20:07 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8, 0x13, 0xffffffffffffffff}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:20:07 executing program 4: waitid(0x3, 0xffffffffffffffff, 0x0, 0x8, 0x0) 16:20:07 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_int(r0, 0x1, 0x1, &(0x7f0000000000)=0xffffffff, 0x4) 16:20:07 executing program 3: mmap$perf(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x83872, 0xffffffffffffffff, 0x0) 16:20:10 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:20:10 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x14, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x2, 0x0, 0x1, {0x4}}, @AF_INET={0x8, 0x2, 0x0, 0x1, {0x4}}]}]}, 0x34}}, 0x0) 16:20:10 executing program 4: syz_emit_ethernet(0x1e, &(0x7f0000000040)={@empty, @local, @void, {@generic={0x88ca, "69a32982b39abd441f0cd6a9aa9edf8d"}}}, 0x0) 16:20:10 executing program 0: accept4(0xffffffffffffffff, 0x0, 0x0, 0x100000) 16:20:10 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0xffffffffffffff94}}, 0x0) 16:20:10 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="2c00000022001102"], 0x2c}}, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), r0) 16:20:10 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:20:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x14, 0x1a, 0x0, 0x1, [@AF_INET={0x10, 0x2, 0x0, 0x1, {0xc, 0x1, 0x0, 0x1, [{0x8}]}}]}]}, 0x34}}, 0x0) 16:20:10 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCSABS3F(r0, 0x401845ff, 0x0) 16:20:10 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8}, {0xc, 0x2, 0x0, 0x1, {0x8}}}}]}, 0x38}}, 0x0) 16:20:10 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000001640), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000000)) read$alg(r0, &(0x7f0000000100)=""/70, 0x46) 16:20:10 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000240), 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x0) 16:20:10 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:20:11 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0xffffffffffffff7d) 16:20:11 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x40) getsockname(r0, &(0x7f0000000580)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f0000000600)=0x80) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, 0x0) 16:20:11 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:20:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f0000000080)) 16:20:11 executing program 3: add_key(&(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @desc2}, &(0x7f00000001c0)={0x0, "4a40584ba9926adb749dff53c0ccee845c7f735a0ceb1034575cd3c7cbef26f206eb29c932680df79f4165113ed072253c4123c716f07e7c026950cea40371fb"}, 0x48, 0xffffffffffffffff) 16:20:11 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x40) getsockopt$inet6_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) 16:20:11 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:20:11 executing program 1: sched_rr_get_interval(0x0, &(0x7f00000003c0)) 16:20:11 executing program 0: r0 = epoll_create1(0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000140)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f00000001c0)) 16:20:11 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:20:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000010000000201000000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r0], 0x30}}, 0x0) 16:20:11 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x40) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000000)={0xf0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 16:20:11 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @desc2}, &(0x7f00000001c0)={0x0, "4a40584ba9926adb749dff53c0ccee845c7f735a0ceb1034575cd3c7cbef26f206eb29c932680df79f4165113ed072253c4123c716f07e7c026950cea40371fb"}, 0x48, 0xffffffffffffffff) r1 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @desc2}, &(0x7f00000001c0)={0x0, "4a40584ba9926adb749dff53c0ccee845c7f735a0ceb1034575cd3c7cbef26f206eb29c932680df79f4165113ed072253c4123c716f07e7c026950cea40371fb"}, 0x48, 0xffffffffffffffff) keyctl$link(0x8, r0, r1) 16:20:12 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(0x0, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 543.030560][T13977] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 16:20:12 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000001080)='./file0\x00', 0x41, 0x0) openat(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x0, 0x0) 16:20:12 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) sendmmsg$unix(r0, 0x0, 0x0, 0x0) 16:20:12 executing program 4: openat$dir(0xffffffffffffff9c, &(0x7f0000001080)='./file0\x00', 0x41, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x200000, 0x0) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, 0x0, 0x0) 16:20:12 executing program 5: r0 = socket(0x1, 0x5, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x5}) 16:20:12 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000001640), 0x0, 0x0) inotify_rm_watch(r0, 0x0) 16:20:12 executing program 1: mmap$perf(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xe3071, 0xffffffffffffffff, 0x0) 16:20:12 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PIO_FONT(r1, 0x4b61, 0x0) 16:20:13 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 16:20:13 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, &(0x7f00000002c0)) 16:20:13 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000001640), 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r0) 16:20:13 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f0000002640)={0x0, 0x0, &(0x7f0000002600)={0x0, 0x58}}, 0x0) 16:20:15 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(0x0, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:20:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f0000002640)={&(0x7f0000002400), 0xc, &(0x7f0000002600)={0x0, 0x58}}, 0x0) 16:20:15 executing program 4: r0 = add_key$keyring(&(0x7f0000001480), &(0x7f00000014c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000001580), &(0x7f00000015c0)={'syz', 0x0}, 0x0, 0x0, r0) 16:20:15 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100)={0x9}, &(0x7f0000000140), 0x0) 16:20:15 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000001740)='ns/time_for_children\x00') 16:20:15 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) waitid(0x2, 0x0, &(0x7f0000000480), 0x2, &(0x7f0000001600)) 16:20:15 executing program 3: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) r1 = shmat(r0, &(0x7f0000003000/0x3000)=nil, 0xd000) shmat(0x0, &(0x7f0000004000/0x2000)=nil, 0x7000) shmdt(r1) 16:20:15 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000003880)) [ 548.291080][T14009] bridge0: port 2(bridge_slave_1) entered disabled state [ 548.298793][T14009] bridge0: port 1(bridge_slave_0) entered disabled state [ 550.811008][T14009] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 551.030789][T14009] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 553.066236][T14009] netdevsim netdevsim5 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 553.075449][T14009] netdevsim netdevsim5 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 553.084853][T14009] netdevsim netdevsim5 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 553.094146][T14009] netdevsim netdevsim5 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 16:20:22 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x412001, 0x0) 16:20:22 executing program 4: r0 = fork() sched_rr_get_interval(r0, &(0x7f00000003c0)) 16:20:22 executing program 1: r0 = socket(0x1, 0x1, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) epoll_wait(r1, &(0x7f0000000380)=[{}], 0x1, 0xc0000000) 16:20:22 executing program 0: mmap$perf(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4017871, 0xffffffffffffffff, 0x0) 16:20:22 executing program 3: clock_settime(0x0, &(0x7f0000000000)={0x0, 0x3938700}) 16:20:22 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(0x0, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:20:22 executing program 0: mmap$perf(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x8) 16:20:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) getsockname(r0, &(0x7f0000003e00)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private1}}}, &(0x7f0000003e80)=0xffffff0f) 16:20:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000002640)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)={0x1c, 0x18, 0x0, 0x0, 0x0, "", [@typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x1c}], 0x1}, 0x0) 16:20:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffd22, &(0x7f0000000040)}, 0x0) 16:20:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000003a80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="140000000000000001000000010000007338"], 0x18}, 0x0) 16:20:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f00000000c0)=@xdp, 0x80, 0x0}, 0x0) 16:20:23 executing program 1: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000040)={'TPROXY\x00'}, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0xff90}, 0x0) 16:20:23 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000040)="5d6fcbc5f532c364ddadc24a9a2fa2d3aa4b816d72d518e92f82e2e6eaf5855547eaa8dd73bdfba3cfa8aa2a5b3af850cad37c84a1649fd23bcd5a71acf005e924798c10fd7ba61f422853c126ab7b5aaa6b143d93baad2e6169fe3320b3da642b153fa4e5f9c65074fbc3ca8e7ff37b1e3435a56affb160e1dc800c67417c50b1c1f90a4952f3836c9495c861b75e0cd6", 0x91, 0x0, 0x0, 0x0) 16:20:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0xff90}, 0x0) 16:20:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$IP_SET_OP_GET_BYINDEX(r0, 0x1, 0x53, 0x0, &(0x7f0000000040)) 16:20:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000080)={0x0, 0xffffffffffffff15, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYRES64], 0x18}, 0x0) 16:20:25 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:20:25 executing program 1: r0 = socket(0x2, 0x2, 0x0) connect$netlink(r0, 0x0, 0x0) 16:20:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000080)={0x0, 0x1c, 0x0, 0xfffffffffffffcf7, &(0x7f00000000c0)=ANY=[@ANYRESOCT, @ANYRESOCT=0x0, @ANYRESOCT], 0x18}, 0x0) 16:20:25 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) readv(r0, &(0x7f0000000080)=[{0x0}], 0x1) 16:20:25 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f00000000c0), &(0x7f0000000080)=0xffffffffffffffad) 16:20:25 executing program 0: r0 = syz_open_pts(0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="495aeabb63f50c286c0ce7fc4aa44a0a1e2d3c5520b05ace3dddd26fff421312f4c230fff65704e83ce1a3e3d502465f9af24a2dcb18b0f23d73d89aa5ab6acb95e56596992fc4157b2e37721e9c33c2809b26708eba8a3015f59c13c82dbe79e35fd8b05f05fe18bfe6051c624a3a2ebed8d2be23fba4d1b6586792f8c09949857164cfc9e3d79aacec623bf12d49827f10440ec45a0e54a990c7994fb26d9371fd9f44e87a0ad3ead45d162b24643e13d0c326db90fb90c38df660d51cd896a0c1e1b86742131ff99de059bfc139bff2bec4f496ef8897a9c749e2d884a7971e70934c27894a160757ef520af4427200", 0xf1}], 0x1) 16:20:26 executing program 0: pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$lock(r0, 0x7, 0x0) 16:20:26 executing program 5: r0 = socket$inet6(0x2, 0x1, 0x0) shutdown(r0, 0x1) 16:20:26 executing program 1: r0 = socket$inet6(0x18, 0x2, 0x0) bind(r0, &(0x7f0000000000)=@in6={0x18}, 0xc) 16:20:26 executing program 3: syz_usb_ep_read(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_usb_connect(0x0, 0x5a, &(0x7f0000000440)={{0x12, 0x1, 0x0, 0x80, 0x93, 0xb9, 0x10, 0x61d, 0xc140, 0xe537, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x5, 0x7a, 0xc5, 0xbf, 0x0, [], [{{0x9, 0x5, 0xc, 0x0, 0x400}}, {{0x9, 0x5, 0x0, 0x4, 0x8, 0x7, 0x2}}, {{0x9, 0x5, 0x0, 0x0, 0x200, 0x7f, 0x28, 0x6}}, {}, {{0x9, 0x5, 0x4495160a023177fc, 0x0, 0x0, 0x0, 0x0, 0x8, [@generic={0x2, 0x12}, @uac_iso={0x7, 0x25, 0x1, 0x0, 0x0, 0x8566}]}}]}}]}}]}}, &(0x7f0000000380)={0xa, &(0x7f0000000000)={0xa, 0x6, 0x0, 0x7, 0x0, 0x8, 0x10, 0xc5}, 0x164, 0x0, 0x2, [{0x0, 0x0}, {0x0, 0x0}]}) 16:20:26 executing program 4: syz_open_dev$hidraw(&(0x7f0000000280), 0x4, 0x0) 16:20:26 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000002c0), 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f00000000c0)={0x0, 0x1, &(0x7f0000000000)="10"}) [ 557.732544][T10403] usb 4-1: new high-speed USB device number 2 using dummy_hcd [ 557.992795][T10403] usb 4-1: Using ep0 maxpacket: 16 [ 558.133847][T10403] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid maxpacket 1024, setting to 64 [ 558.145095][T10403] usb 4-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 558.158117][T10403] usb 4-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 558.169363][T10403] usb 4-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 558.180051][T10403] usb 4-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0xFC, skipping [ 558.494182][T10403] usb 4-1: string descriptor 0 read error: -22 [ 558.500885][T10403] usb 4-1: New USB device found, idVendor=061d, idProduct=c140, bcdDevice=e5.37 [ 558.510308][T10403] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 558.575258][T10403] usb 4-1: config 0 descriptor?? [ 558.617390][T10403] quatech2 4-1:0.0: Quatech 2nd gen USB to Serial Driver converter detected [ 558.912398][T10403] usb 4-1: qt2_attach - failed to power on unit: -71 [ 558.919487][T10403] quatech2: probe of 4-1:0.0 failed with error -71 [ 558.971131][T10403] usb 4-1: USB disconnect, device number 2 16:20:29 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:20:29 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0), 0x0, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000200)=""/143) 16:20:29 executing program 0: syz_open_dev$evdev(&(0x7f00000001c0), 0x3, 0x44442) 16:20:29 executing program 4: syz_open_dev$evdev(&(0x7f0000002300), 0x0, 0x902c1) 16:20:29 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000001c0), 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f00000013c0)=""/4093) 16:20:29 executing program 3: ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000080)={0x1, 0xfffffffffffffd2c, &(0x7f0000000000)="436838e87d8b057de15488860a924510541dec2fa3772b6fb7c20c80f885743790b99266ae98be19ceaadeb6b6550783542905ebd7426186a0d39326551a2f96eb4226fd4855b07e8c065449464d58c4340c7937e71bdd3890d8ee2c35fdc1179629cc4cec00eee6a575e0500c"}) 16:20:29 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0), 0x0, 0x0) ioctl$EVIOCGNAME(r0, 0x4020940d, 0x0) 16:20:29 executing program 1: syz_usb_ep_read(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_usb_connect(0x0, 0x2d, &(0x7f0000000440)={{0x12, 0x1, 0x0, 0x80, 0x93, 0xb9, 0x10, 0x61d, 0xc140, 0xe537, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x7a, 0xc5, 0xbf, 0x0, [], [{}]}}]}}]}}, 0x0) 16:20:29 executing program 4: syz_usb_ep_write$ath9k_ep2(0xffffffffffffffff, 0x83, 0x9a, &(0x7f0000000000)=@generic={0x0, 0x2, 0x92, "2d65e1fa", "26a94f71975d5b23a62ce5020496845888f454b44a9d94e9d64a25ed8ced3678f8ad6b25d52a03c9da7e5d57f75537724cae7f02e2f056f18acbc125e59503ef9c33258f1196e1770e27083433735ddc4dd83d6a03f7012c7423c4fccca7bc4e7468ff972ceba5ee46c2178ef02345eb72326dcf87e35c35c8e2554171b37df73e9731b148fc60c97967a6a9b2d7cf12530a"}) syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f00000000c0)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) r0 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000140)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write(r0, 0xfe, 0xce, &(0x7f00000001c0)="fcfc3751eaa8c5334dbc9c143b12c19c1bdefae306e2074942c529cec867e13fd5e8716da8d73d186d47ef6ad599110e05287ddf171a3a40065b5ed4c3266dd4684dbdc2be45b515fd5e5adb669080b50fa2cb3dfab6d64a91f76c4113bf136eaf654922b7a93744ab07e68aeec722cadbd958120538adba15367e19a78c0a8faa57089d8755095746d54bf2a1d7d77fd0303020c2dc1ee2b554988ff363e600a90fca6a50000a6aa5a1f641592eca20f85419f2960ae67fdcfdf4e6262677782304d003fdebe1831e3bf92f20da") syz_usb_ep_write$ath9k_ep2(0xffffffffffffffff, 0x83, 0x10, &(0x7f0000000340)=@ready={0x0, 0x0, 0x8, "3bd04064", {0x1, 0x3f, 0x2, 0x2, 0x3}}) r1 = syz_usb_connect(0x3, 0x333, &(0x7f0000000380)={{0x12, 0x1, 0x200, 0x4c, 0xab, 0x17, 0x8, 0x7c0, 0x1501, 0x95bc, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x321, 0x1, 0x20, 0xff, 0x0, 0x0, [{{0x9, 0x4, 0x19, 0x12, 0xa, 0x1d, 0xdf, 0xbe, 0x2, [@cdc_ncm={{0x8, 0x24, 0x6, 0x0, 0x1, "f19201"}, {0x5, 0x24, 0x0, 0x7fff}, {0xd, 0x24, 0xf, 0x1, 0x80, 0x2, 0x38, 0x7c}, {0x6, 0x24, 0x1a, 0x7f, 0x20}, [@obex={0x5, 0x24, 0x15, 0x1}, @mbim={0xc, 0x24, 0x1b, 0x8, 0x8, 0x0, 0x0, 0x3, 0x6}]}], [{{0x9, 0x5, 0x6, 0x1, 0x20, 0x0, 0xdb}}, {{0x9, 0x5, 0x80, 0x0, 0x3ff, 0x6, 0x3, 0x9}}, {{0x9, 0x5, 0x9, 0x10, 0x400, 0x54, 0x0, 0x80, [@uac_iso={0x7, 0x25, 0x1, 0x82, 0x40, 0x1}, @generic={0xa1, 0x23, "1add1ff956e3db19e7889767700ca855abf404ed634a31708d019a3490b2f5a136def294ea3b99d6d89c50e2f6a37e146058a38d62f752040f3a2e82b548052707d3d1080eefcdb62ed2393b522d88b8f21dd944c7f37406ef4dae10cdc1601c0562dffedefcc6df0bfbbb746ab30cee580613e9fe883f36f209b8edf2014b7bf54079ebd2907173190838e757544819cec93f9249161ed9507af399fb4f56"}]}}, {{0x9, 0x5, 0xa, 0x1, 0x200, 0x0, 0x7, 0xf8, [@generic={0x85, 0x9, "de0ec14514619503d61b7785e5230c9a29ca10024bb24790e7935940c88f931ce9193b0a97ac30e2ccb7da4aa6350fadd656212b0db44b602dcbc2739f58727ec43023ddb8b83312ec271b99971917d1061f7d5b543ceb589b655ced2c74e6ed330e3e1d6ef9be02fa51532096809a040ab65188e9d63bcfc8f464899366ca7c2e42c6"}]}}, {{0x9, 0x5, 0x7, 0x4, 0x8, 0xfe, 0x97, 0x2}}, {{0x9, 0x5, 0x1, 0x0, 0x10, 0x9, 0x0, 0x1, [@generic={0x9c, 0x23, "3bcdb50488ecc18bdb59ebeb9c647944b397a16c8349e749d51f81f75bc9086f50105d0c33e407fb76c063241bd480d9b60ec8f25df6ebc3e5c0c36703ca999ad2975f4e58885392756482953f73d425cf69d43de3f43ff3c6e2928adacff82f8189849a88b133a3a9cabe1d2659a8ccedc786017968ede08198cf6b3c7388dbe8dcb8828f71fbf056ab9377e87aa998637c4951c3532a6fb32a"}, @generic={0x11, 0xc, "f85dd2d6a5abfc6b5f516626191d20"}]}}, {{0x9, 0x5, 0xc, 0x1, 0x10, 0x6, 0xc, 0x9}}, {{0x9, 0x5, 0xf, 0x1, 0x3ff, 0x0, 0x93, 0x40, [@uac_iso={0x7, 0x25, 0x1, 0x80, 0x7, 0x80}]}}, {{0x9, 0x5, 0x1, 0x8, 0x10, 0x9, 0x80, 0x80, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0xf1, 0x3}, @generic={0x9c, 0xd, "000d5d55bf4120e2b38cd5728233a66ae544c9f9a9c1f042018ca48b84524fa30349d3ef505526b1e7ed2d07512c922b0e0dbc0575dca0f8a849aa752280eadee40a64e3e04fade24e242f0e20d6d6fc63936dc83da3e7b5009ff00d26dc4d295cde75f48aa1392e8e0a2e665265c949394d7c4e530465012738926c6e8bb6139f353f1954798c71bdc64d03736bdb70bc09eb599e53e27ad112"}]}}, {{0x9, 0x5, 0xa, 0x0, 0x8, 0x3, 0x3, 0x20}}]}}]}}]}}, &(0x7f00000008c0)={0xa, &(0x7f00000006c0)={0xa, 0x6, 0x200, 0x40, 0xff, 0x80, 0xff, 0x7}, 0x125, &(0x7f0000000700)={0x5, 0xf, 0x125, 0x5, [@ptm_cap={0x3}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x3, 0x44, 0x101}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xb, 0x9, 0x6, 0x1}, @generic={0xff, 0x10, 0x3, "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"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x1, 0x0, 0x0, 0x2}]}, 0x2, [{0x4, &(0x7f0000000840)=@lang_id={0x4, 0x3, 0x81a}}, {0x4, &(0x7f0000000880)=@lang_id={0x4, 0x3, 0x812}}]}) syz_usb_ep_write$ath9k_ep2(r1, 0x83, 0xd5, &(0x7f0000000900)=@generic={0x1, 0x2, 0xcd, "77a126f9", "e865ff38b08a0928ddd7ba9176b52ca7e9b2078941fcf220836f0df45ebba1ab2268ea8fc1934eaf7afcfb8065c52f36626816f904a5eb78267ca7db1fe497f0d521f31b2ce04de45d20596db9aeaadae8375cbd05e05eac90c70b46c715a5b1804f2d0c14a6024ac5db47e65c0f63a70f90b0a6984bdd0fd5ec0b885f1263d1ff324077f86231e8c4d672f7ed6dbee7b049f777b53aed916f11a363aa3e10d3328b2c0d1355eaa74a2648024b3032ddb4cd60df086749f21523c0bc6998ab1dac779f2b5e58a73bcfb2e1bceb"}) syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000a00)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_connect$cdc_ncm(0x3, 0x81, &(0x7f0000000d80)={{0x12, 0x1, 0x200, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x6f, 0x2, 0x1, 0x3, 0x28, 0x4, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x8, 0x24, 0x6, 0x0, 0x1, "6db90b"}, {0x5, 0x24, 0x0, 0x5d9}, {0xd, 0x24, 0xf, 0x1, 0x0, 0x1, 0x200, 0xbe}, {0x6, 0x24, 0x1a, 0x100, 0x8}, [@mbim={0xc, 0x24, 0x1b, 0x0, 0x8, 0x40, 0x80, 0x1, 0x1}, @acm={0x4, 0x24, 0x2, 0x2}]}, {{0x9, 0x5, 0x81, 0x3, 0x0, 0xc8, 0xdb, 0x63}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x400, 0x0, 0x3b, 0x81}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0x7, 0xff, 0x3f}}}}}}}]}}, &(0x7f0000001100)={0xa, &(0x7f0000000e40)={0xa, 0x6, 0x110, 0x4, 0x1, 0x4, 0x24, 0x1}, 0x138, &(0x7f0000000e80)={0x5, 0xf, 0x138, 0x6, [@wireless={0xb, 0x10, 0x1, 0x2, 0x29, 0x1, 0xb2, 0x8}, @generic={0xc6, 0x10, 0x0, "d66bace44e2bed173fea81af1e35fa306ba163a0d4f9a55885ea009b6f2d43f754efd3317d5a09aaef115c94282a0b3ea4c3cdefa90df1bda1b6272a121799cbb28ba3141eb159cb0224b7063eee66110a9eb291ca5f210c9d5428f2eaf93c2b1d76ef80317ff511f012f80a1d35d54d894aa249ee4d6582ac9a84b75213d5511214ea195ac09c3a9f6ef09a2fc26bc7c7b67d863bba4be4a3b1cf7158eb38644311200606bfed11487f04befc1aa2821ee2edaab0d52b27ffab7feb10cacdb14b2d76"}, @ss_container_id={0x14, 0x10, 0x4, 0x0, "13cce566d67de783f3afa358ee3aa8a5"}, @ext_cap={0x7, 0x10, 0x2, 0x2, 0x9, 0xe}, @ptm_cap={0x3}, @generic={0x44, 0x10, 0x3, "c473a06d75f5d9bd3553477ac1d35effe75d669157a0f61599add712be97596fb19b23502a5d1c8ec5d8b7142ca959d06e172a50b8e3470f8602789777463086fa"}]}, 0x2, [{0xd0, &(0x7f0000000fc0)=@string={0xd0, 0x3, "231111d68ac070db8c2e0d4fe2226a866dc7a62a5a5a659074fd9ccd81f24081dc31a36239e413c5acbae6b6a63d3b33df9a7b56a7a8c47e78149b4ac6188b85b7092e4e53654fe2ce2dec9de549358b6803e764a27d43aa7f6c8023a5d6bcc1eb7cc07951a4dca07c155097740197d12015c3474fcabcfd509718c2dd2b45f4162b65a8d66dc17271fb80641a9dbc5e3fa49679f6feba1f6648b8579fd46345e4ff2e6a0852b2c1943bd22ac16a0010f871219fde4522a7013a893badc79d720c9e155d7aae47a2a951803a2c65"}}, {0x4, &(0x7f00000010c0)=@lang_id={0x4, 0x3, 0x3c19}}]}) syz_open_dev$hidraw(&(0x7f0000001280), 0xb9c, 0x80100) 16:20:29 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000002c0), 0x0, 0x0) ioctl$EVIOCGNAME(r0, 0x40044591, 0x0) 16:20:29 executing program 3: syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x3, 0x3, 0xca, 0x40, 0x1b3d, 0x931f, 0x4547, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x90, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x8, 0x7f, 0x92}}]}}]}}, 0x0) 16:20:29 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:20:30 executing program 0: syz_open_dev$evdev(&(0x7f0000000000), 0x4, 0xe80) [ 561.142436][T10403] usb 5-1: new high-speed USB device number 3 using dummy_hcd 16:20:30 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) r1 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000180)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x38e38e38e38e1ba, [{{0x9, 0x2, 0x48}}]}}, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80104592, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, 0x0) syz_usb_ep_write$ath9k_ep2(r1, 0x83, 0x49, &(0x7f0000000200)=ANY=[@ANYBLOB="0602"]) [ 561.212293][ T1977] usb 2-1: new high-speed USB device number 23 using dummy_hcd [ 561.352654][T10433] usb 4-1: new high-speed USB device number 3 using dummy_hcd [ 561.463646][ T1977] usb 2-1: Using ep0 maxpacket: 16 16:20:30 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0), 0x0, 0x0) ioctl$EVIOCGNAME(r0, 0xc0189436, &(0x7f0000000340)=""/82) [ 561.584737][ T1977] usb 2-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 561.663721][T10403] usb 5-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 561.673402][T10403] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 561.681563][T10403] usb 5-1: Product: syz [ 561.686062][T10403] usb 5-1: Manufacturer: syz [ 561.690798][T10403] usb 5-1: SerialNumber: syz [ 561.703276][ T8458] usb 6-1: new high-speed USB device number 2 using dummy_hcd 16:20:30 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0), 0x0, 0x0) ioctl$EVIOCGNAME(r0, 0x40086602, 0x0) [ 561.778535][ T1977] usb 2-1: New USB device found, idVendor=061d, idProduct=c140, bcdDevice=e5.37 [ 561.788060][ T1977] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 561.796624][ T1977] usb 2-1: Product: syz [ 561.800917][ T1977] usb 2-1: Manufacturer: syz [ 561.805794][ T1977] usb 2-1: SerialNumber: syz [ 561.832598][ T1977] usb 2-1: config 0 descriptor?? [ 561.864162][T10403] usb 5-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 561.903134][ T1977] quatech2 2-1:0.0: Quatech 2nd gen USB to Serial Driver converter detected [ 561.923647][T10433] usb 4-1: New USB device found, idVendor=1b3d, idProduct=931f, bcdDevice=45.47 [ 561.933521][T10433] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 561.941697][T10433] usb 4-1: Product: syz [ 561.946141][T10433] usb 4-1: Manufacturer: syz [ 561.950878][T10433] usb 4-1: SerialNumber: syz [ 562.003718][ T8458] usb 6-1: too many configurations: 186, using maximum allowed: 8 [ 562.031250][T10433] usb 4-1: config 0 descriptor?? [ 562.079368][T10433] ftdi_sio 4-1:0.0: FTDI USB Serial Device converter detected [ 562.088540][T10433] usb 4-1: Detected FT-X 16:20:31 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000001c0), 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000001540)=""/57) r1 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000100)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x40, 0x4f2, 0x1123, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x5, 0x20, 0xe, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x3, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x4ea}}, {{{0x9, 0x5, 0x81, 0x3, 0x20, 0x3, 0x80}}}}}]}}]}}, &(0x7f0000000380)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x201, 0x0, 0xf7, 0x0, 0x0, 0x9}, 0x3e, &(0x7f00000001c0)={0x5, 0xf, 0x3e, 0x3, [@generic={0x1b, 0x10, 0x2, "acb56d60eb9e9a72748bea1f01fa3ed5b064b514ac93b92f"}, @ss_container_id={0x14, 0x10, 0x4, 0x9, "9b693a95e0477927c97f6806f76b6b10"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x1, 0x0, 0x1}]}, 0x3, [{0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0x458}}, {0x4, &(0x7f0000000300)=@lang_id={0x4}}, {0x4, &(0x7f0000000340)=@lang_id={0x4, 0x3, 0x140a}}]}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, 0x0) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000001740)=""/222) syz_usb_control_io(r1, 0x0, &(0x7f0000000b80)={0x84, 0x0, 0x0, &(0x7f0000000800)={0x0, 0x8, 0x1, 0xc1}, &(0x7f0000000840)={0x20, 0x0, 0x4}, 0x0, 0x0, &(0x7f0000000900)={0x40, 0x9, 0x1}, &(0x7f0000000940)={0x40, 0xb, 0x2, "0a14"}, 0x0, &(0x7f00000009c0)={0x40, 0x13, 0x6, @remote}, &(0x7f0000000a00)={0x40, 0x17, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, &(0x7f0000000a40)={0x40, 0x19, 0x2, 'we'}, &(0x7f0000000a80)={0x40, 0x1a, 0x2}, &(0x7f0000000ac0)={0x40, 0x1c, 0x1}, &(0x7f0000000b00)={0x40, 0x1e, 0x1, 0x40}, &(0x7f0000000b40)={0x40, 0x21, 0x1, 0x1}}) 16:20:31 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0), 0x0, 0x0) ioctl$EVIOCGNAME(r0, 0xc0189436, 0x0) [ 562.383209][ T1977] usb 2-1: qt2_attach - failed to power on unit: -71 [ 562.390376][ T1977] quatech2: probe of 2-1:0.0 failed with error -71 [ 562.424854][ T1977] usb 2-1: USB disconnect, device number 23 16:20:31 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000002c0), 0x0, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000340)=""/82) syz_usb_connect(0x5, 0x22f, &(0x7f00000003c0)={{0x12, 0x1, 0x310, 0x3e, 0xe4, 0xfc, 0x10, 0xe8d, 0xa2, 0xd369, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x21d, 0x1, 0xc5, 0x3, 0x10, 0x8, [{{0x9, 0x4, 0x0, 0x16, 0xf, 0xff, 0x2, 0x1, 0xa8, [@cdc_ecm={{0x8, 0x24, 0x6, 0x0, 0x0, "6ae1f6"}, {0x5, 0x24, 0x0, 0x1}, {0xd, 0x24, 0xf, 0x1, 0x0, 0x7ff, 0xff80, 0x3f}, [@dmm={0x7}, @network_terminal={0x7, 0x24, 0xa, 0x7f, 0x0, 0x9}]}, @hid_hid={0x9, 0x21, 0x4, 0x20, 0x1, {0x22, 0x553}}], [{{0x9, 0x5, 0xd, 0x3, 0x28, 0x0, 0x0, 0x5, [@uac_iso={0x7}]}}, {{0x9, 0x5, 0xa, 0x10, 0x200, 0x8, 0x5, 0x8, [@uac_iso={0x7, 0x25, 0x1, 0x80, 0x0, 0x1}]}}, {{0x9, 0x5, 0x0, 0x4, 0x10, 0x0, 0x6, 0x3, [@uac_iso={0x7, 0x25, 0x1, 0x83, 0x8a, 0x3f}, @generic={0x2, 0x24}]}}, {{0x9, 0x5, 0x5, 0x3, 0x0, 0x0, 0xe0, 0x4}}, {{0x9, 0x5, 0xf, 0x4, 0x20, 0x0, 0x3, 0xc}}, {{0x9, 0x5, 0x0, 0x0, 0x400, 0x1, 0x0, 0x2}}, {{0x9, 0x5, 0xa, 0x0, 0x0, 0x2, 0x0, 0x40}}, {{0x9, 0x5, 0x7, 0x0, 0x200, 0xff, 0x0, 0x81, [@generic={0x2, 0xc}]}}, {{0x9, 0x5, 0x0, 0x0, 0x400, 0x1, 0x81, 0x3, [@uac_iso={0x7, 0x25, 0x1, 0x181, 0x9, 0x8001}]}}, {{0x9, 0x5, 0x6, 0x0, 0x8, 0x20, 0x0, 0x4, [@generic={0x14, 0x1, "ddb82dfda17755ac99b53a57f4972d428f01"}]}}, {{0x9, 0x5, 0x6, 0x10, 0x8, 0x0, 0xff, 0xff, [@generic={0xd2, 0xd, "f84b69520d376c196d7339a70d6fa9274f9f7d833b0fce44c690bbc50f3b29fb74ca441f46b7e62383df44a556b80a408a65c32e9bbe6cbeda489ec3d5595624a5a768346c4ad813982061faccea93ea9e886d37986c9249078cfb7b284a6537a1638810cbc66a110f5360f3f3870cbf140cdf2e2bbead9514da9bc61cdfd526cf7a82598e557b57cabcd1f753268a19b8610c7ae354a43298c0e1aa145f68e4c837c38ee6c88ff10aeb33ffc13b90030a4426fae37bfba52b385d3bcbb2a1cfedfc8891d90df63171aaecd5d7ed64f3"}]}}, {{0x9, 0x5, 0x5, 0x10, 0x0, 0x20, 0x7, 0x80}}, {{0x9, 0x5, 0xb, 0x0, 0x40, 0xa8, 0x10, 0x8, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x40, 0x8}, @generic={0x2}]}}, {{0x9, 0x5, 0xe, 0x0, 0x20, 0x81, 0xff, 0x3, [@generic={0x42, 0x0, "41da5dab7a5a961a9a45091ba3f6f947ef77aad7f5a58b51fcc5a87c15a3d5fd4621ff4b15a1e2cfcc9ad2c0b7eff21e230e35cd6983259dfa0e8e6086fb5f41"}]}}, {{0x9, 0x5, 0x1, 0x10, 0x200, 0x7f, 0x7, 0x3, [@generic={0x2, 0x24}]}}]}}]}}]}}, &(0x7f0000000180)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x200, 0x5, 0x0, 0x5, 0x40}, 0x5, &(0x7f0000000080)={0x5, 0xf, 0x5}, 0x2, [{0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x457}}]}) [ 562.535169][T10433] ftdi_sio ttyUSB0: Unable to read latency timer: -71 [ 562.574775][T10433] ftdi_sio ttyUSB0: Unable to write latency timer: -71 [ 562.620213][T10433] ftdi_sio 4-1:0.0: GPIO initialisation failed: -71 [ 562.634189][ T5] usb 5-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 562.677556][T10433] usb 4-1: FTDI USB Serial Device converter now attached to ttyUSB0 [ 562.721824][T10433] usb 4-1: USB disconnect, device number 3 16:20:31 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0), 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000040)=""/45) [ 562.767596][T10433] ftdi_sio ttyUSB0: FTDI USB Serial Device converter now disconnected from ttyUSB0 [ 562.778229][T10433] ftdi_sio 4-1:0.0: device disconnected [ 562.833899][ T8458] usb 6-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 562.843933][ T8458] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 562.852239][ T8458] usb 6-1: Product: syz [ 562.856522][ T8458] usb 6-1: Manufacturer: syz [ 562.861369][ T8458] usb 6-1: SerialNumber: syz [ 562.992268][ T55] usb 1-1: new high-speed USB device number 8 using dummy_hcd [ 563.008463][ T8458] usb 6-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested 16:20:32 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000002c0), 0x0, 0x0) ioctl$EVIOCGNAME(r0, 0x401c5820, &(0x7f0000000340)=""/82) [ 563.100776][ T8463] usb 5-1: USB disconnect, device number 3 16:20:32 executing program 1: syz_open_dev$evdev(&(0x7f0000000040), 0xffffffffffffffff, 0x305c0) 16:20:32 executing program 4: syz_usb_ep_read(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_usb_connect(0x0, 0x24, &(0x7f0000000440)={{0x12, 0x1, 0x0, 0x80, 0x93, 0xb9, 0x10, 0x61d, 0xc140, 0xe537, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x7a, 0xc5, 0xbf}}]}}]}}, 0x0) [ 563.377520][T10433] usb 4-1: new high-speed USB device number 4 using dummy_hcd [ 563.474564][ T55] usb 1-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 563.596071][ T1977] usb 6-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 563.629093][T10433] usb 4-1: Using ep0 maxpacket: 16 [ 563.692796][ T5] ath9k_htc 5-1:1.0: ath9k_htc: Target is unresponsive [ 563.696629][ T55] usb 1-1: New USB device found, idVendor=04f2, idProduct=1123, bcdDevice= 0.40 [ 563.700107][ T5] ath9k_htc: Failed to initialize the device [ 563.709167][ T55] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 563.709275][ T55] usb 1-1: Product: ᐊ [ 563.709352][ T55] usb 1-1: SerialNumber: syz [ 563.737042][ T8463] usb 5-1: ath9k_htc: USB layer deinitialized [ 563.852698][T10433] usb 4-1: config 197 contains an unexpected descriptor of type 0x1, skipping [ 563.861986][T10433] usb 4-1: config 197 interface 0 altsetting 22 endpoint 0xD has an invalid bInterval 0, changing to 7 [ 563.873747][T10433] usb 4-1: config 197 interface 0 altsetting 22 endpoint 0xA has invalid maxpacket 512, setting to 64 [ 563.887492][T10433] usb 4-1: config 197 interface 0 altsetting 22 has an invalid endpoint with address 0x0, skipping [ 563.898957][T10433] usb 4-1: config 197 interface 0 altsetting 22 endpoint 0x5 has an invalid bInterval 0, changing to 7 [ 563.910370][T10433] usb 4-1: config 197 interface 0 altsetting 22 endpoint 0x5 has invalid wMaxPacketSize 0 [ 563.920628][T10433] usb 4-1: config 197 interface 0 altsetting 22 has an invalid endpoint with address 0x0, skipping [ 563.931617][T10433] usb 4-1: config 197 interface 0 altsetting 22 has a duplicate endpoint with address 0xA, skipping [ 563.942682][T10433] usb 4-1: config 197 interface 0 altsetting 22 endpoint 0x7 has invalid maxpacket 512, setting to 64 [ 563.953937][T10433] usb 4-1: config 197 interface 0 altsetting 22 has an invalid endpoint with address 0x0, skipping [ 563.964915][T10433] usb 4-1: config 197 interface 0 altsetting 22 has a duplicate endpoint with address 0x6, skipping [ 563.975983][T10433] usb 4-1: config 197 interface 0 altsetting 22 has a duplicate endpoint with address 0x5, skipping [ 563.987057][T10433] usb 4-1: config 197 interface 0 altsetting 22 endpoint 0x1 has invalid maxpacket 512, setting to 64 [ 563.998484][T10433] usb 4-1: config 197 interface 0 has no altsetting 0 [ 564.020902][ T4669] usb 6-1: USB disconnect, device number 2 16:20:33 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:20:33 executing program 1: sched_rr_get_interval(0x0, &(0x7f0000000480)) [ 564.173373][ T8463] usb 5-1: new high-speed USB device number 4 using dummy_hcd [ 564.193726][T10433] usb 4-1: New USB device found, idVendor=0e8d, idProduct=00a2, bcdDevice=d3.69 [ 564.201607][ T55] usbhid 1-1:1.0: couldn't find an input interrupt endpoint [ 564.203050][T10433] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 564.218512][T10433] usb 4-1: Product: syz [ 564.223009][T10433] usb 4-1: Manufacturer: ї [ 564.227645][T10433] usb 4-1: SerialNumber: syz [ 564.283086][ T55] usb 1-1: USB disconnect, device number 8 [ 564.462620][ T8463] usb 5-1: Using ep0 maxpacket: 16 [ 564.652569][ T1977] ath9k_htc 6-1:1.0: ath9k_htc: Target is unresponsive [ 564.659700][ T1977] ath9k_htc: Failed to initialize the device [ 564.667951][ T4669] usb 6-1: ath9k_htc: USB layer deinitialized [ 564.688803][T10433] option 4-1:197.0: GSM modem (1-port) converter detected [ 564.728506][T10433] usb 4-1: USB disconnect, device number 4 [ 564.749728][T10433] option 4-1:197.0: device disconnected [ 564.764028][ T8463] usb 5-1: New USB device found, idVendor=061d, idProduct=c140, bcdDevice=e5.37 [ 564.773411][ T8463] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 564.781549][ T8463] usb 5-1: Product: syz [ 564.785967][ T8463] usb 5-1: Manufacturer: syz [ 564.790697][ T8463] usb 5-1: SerialNumber: syz [ 564.802508][ T8463] usb 5-1: config 0 descriptor?? [ 564.857784][ T8463] quatech2 5-1:0.0: Quatech 2nd gen USB to Serial Driver converter detected [ 565.062508][ T4669] usb 6-1: new high-speed USB device number 3 using dummy_hcd [ 565.173676][ T8463] usb 5-1: qt2_attach - failed to power on unit: -71 [ 565.180801][ T8463] quatech2: probe of 5-1:0.0 failed with error -71 [ 565.219241][ T8463] usb 5-1: USB disconnect, device number 4 16:20:34 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) r1 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000180)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x38e38e38e38e1ba, [{{0x9, 0x2, 0x48}}]}}, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80104592, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, 0x0) syz_usb_ep_write$ath9k_ep2(r1, 0x83, 0x49, &(0x7f0000000200)=ANY=[@ANYBLOB="0602"]) 16:20:34 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x3, &(0x7f0000000440), 0x4) 16:20:34 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, &(0x7f00000002c0)=0x9c) 16:20:34 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0), &(0x7f0000000200)=0x8) 16:20:34 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, 0x0, &(0x7f0000000040)) [ 565.362404][ T4669] usb 6-1: device descriptor read/all, error -71 16:20:34 executing program 1: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000a80), 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r0, 0x8010500c, &(0x7f0000000080)) 16:20:34 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480), 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000500)={'syz0\x00'}, 0x45c) 16:20:34 executing program 0: socketpair(0x6, 0x0, 0x0, &(0x7f00000007c0)) 16:20:34 executing program 4: r0 = socket(0xa, 0x3, 0x4) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000001080)=@in6={0xa, 0x0, 0x0, @local, 0x7f}, 0x80) 16:20:35 executing program 3: socketpair(0x1e, 0x0, 0x0, &(0x7f00000007c0)) [ 566.036335][ T4669] usb 6-1: new high-speed USB device number 4 using dummy_hcd [ 566.341983][ T4669] usb 6-1: too many configurations: 186, using maximum allowed: 8 [ 567.142572][ T4669] usb 6-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 567.153945][ T4669] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 567.162339][ T4669] usb 6-1: Product: syz [ 567.166624][ T4669] usb 6-1: Manufacturer: syz [ 567.171340][ T4669] usb 6-1: SerialNumber: syz [ 567.223617][ T4669] usb 6-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested 16:20:36 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:20:36 executing program 4: socketpair(0x11, 0x8000a, 0x0, &(0x7f00000000c0)) [ 567.802639][ T1977] usb 6-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 568.338598][ T8463] usb 6-1: USB disconnect, device number 4 [ 568.893330][ T1977] ath9k_htc 6-1:1.0: ath9k_htc: Target is unresponsive [ 568.902756][ T1977] ath9k_htc: Failed to initialize the device 16:20:37 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x4004556e, 0x400000000000000) 16:20:37 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = getpid() r2 = getpid() sendmmsg$unix(r0, &(0x7f0000000380)=[{&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000340)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r2}}}], 0x40}], 0x1, 0x0) 16:20:37 executing program 1: clone3(&(0x7f0000002280)={0x80001000, &(0x7f0000000000), 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000002240)=[0x0], 0x1}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002300)) 16:20:37 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000040)={0x7, 0x8}, 0x10) 16:20:37 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, 0x0, &(0x7f0000000200)) [ 568.994479][ T8463] usb 6-1: ath9k_htc: USB layer deinitialized 16:20:38 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x11, 0x0, 0x0) 16:20:38 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) 16:20:38 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0xc, &(0x7f0000000440), 0x4) 16:20:38 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x71, 0x0, 0x0) 16:20:39 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x406855c9, 0x0) 16:20:39 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:20:39 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000040)={0x0, {0x0, 0x0, 0x20ef3e70}}) 16:20:39 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x7, 0x0, 0x0) 16:20:39 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x4004556a, 0x200000000000000) 16:20:39 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x5}, 0xc) 16:20:39 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000300)=0x1, 0x4) 16:20:40 executing program 5: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x81, 0x0) write$dsp(r0, 0x0, 0x0) 16:20:40 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480), 0x802, 0x0) write$uinput_user_dev(r0, 0x0, 0x0) [ 571.301856][ T3123] ieee802154 phy0 wpan0: encryption failed: -22 [ 571.308497][ T3123] ieee802154 phy1 wpan1: encryption failed: -22 16:20:40 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)={0x0, 0x1, "c3"}, &(0x7f0000000040)=0x9) 16:20:40 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x80a01, 0x0) 16:20:40 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x8, 0x0, 0x0) 16:20:40 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @rand_addr=0x64010101}]}, &(0x7f0000000180)=0x10) 16:20:43 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:20:43 executing program 4: socketpair(0x2c, 0x0, 0x0, &(0x7f00000007c0)) 16:20:43 executing program 5: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000a80), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000000)=0x80000000) 16:20:43 executing program 1: openat$dsp1(0xffffffffffffff9c, &(0x7f0000000300), 0x80002, 0x0) 16:20:43 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x0) ioctl$BLKPBSZGET(r0, 0x127b, 0x0) 16:20:43 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF2(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, "5764bca95c793a65615fa92b34ed2d67695f35"}) 16:20:43 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x8, &(0x7f0000000440), 0x4) 16:20:43 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000180)={0x0, 0x0}) getpgid(0x0) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000080)=@assoc_id=0x0, &(0x7f0000000040)=0x4) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000340), 0x4) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000480)={r2, 0x48, "72f2578af9be40ddf67c3c0074db3a8d62a86f93459d23eb1bc5d011d83cb5138c4ec44062188307ae20914a317866bc35380d2f524392008579c793e1fe47f968f86c052c49c38c"}, &(0x7f0000000380)=0x50) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000003c0)={r3, 0x8000}, 0x0) waitid(0x0, r1, &(0x7f0000000200), 0x8000000a, &(0x7f0000000280)) 16:20:43 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 16:20:43 executing program 0: socketpair(0x26, 0x5, 0x7, &(0x7f00000007c0)) [ 574.798285][T14442] sctp: [Deprecated]: syz-executor.3 (pid 14442) Use of int in maxseg socket option. [ 574.798285][T14442] Use struct sctp_assoc_value instead [ 574.898607][T14446] sctp: [Deprecated]: syz-executor.3 (pid 14446) Use of int in maxseg socket option. [ 574.898607][T14446] Use struct sctp_assoc_value instead 16:20:43 executing program 4: socketpair(0x27, 0x0, 0x0, &(0x7f00000007c0)) 16:20:44 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x100000001, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, 0x0) 16:20:46 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:20:46 executing program 0: socket(0x18, 0x0, 0x7fffffff) 16:20:46 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=@setlink={0x44, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_MTU={0x8, 0x4, 0x79}, @IFLA_VFINFO_LIST={0x8, 0x16, 0x0, 0x1, [{0x4}]}, @IFLA_IFNAME={0x14, 0x3, 'veth0_to_bond\x00'}]}, 0x44}}, 0x0) 16:20:46 executing program 3: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000a80), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000080)=0x7fff) 16:20:46 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x80}, 0x8) 16:20:46 executing program 4: rt_sigaction(0x4, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000100)) [ 577.578296][T14472] A link change request failed with some changes committed already. Interface veth0_to_bond may have been left with an inconsistent configuration, please check. 16:20:46 executing program 4: openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0), 0x60001, 0x0) 16:20:46 executing program 0: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$SOUND_PCM_READ_BITS(r0, 0x80045005, &(0x7f0000000040)) 16:20:46 executing program 1: getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3in6, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000300)=""/127, 0x7f, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) prlimit64(0x0, 0x0, 0x0, &(0x7f0000000140)) r0 = syz_open_dev$loop(&(0x7f0000000080), 0x7f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x2e03, 0x40, 0x2}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 16:20:46 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=@setlink={0x44, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_MTU={0x8, 0x4, 0x79}, @IFLA_VFINFO_LIST={0x8, 0x16, 0x0, 0x1, [{0x4}]}, @IFLA_IFNAME={0x14, 0x3, 'veth0_to_bond\x00'}]}, 0x44}}, 0x0) 16:20:47 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:20:47 executing program 3: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, 0x0) 16:20:47 executing program 4: r0 = socket(0xa, 0x3, 0x4) sendmmsg$unix(r0, &(0x7f0000002080)=[{&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000640)=[{&(0x7f0000000180)='5', 0x1}], 0x1, &(0x7f0000000700)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}], 0x28}, {0x0, 0x0, 0x0}], 0x2, 0x0) [ 578.211962][T14485] A link change request failed with some changes committed already. Interface veth0_to_bond may have been left with an inconsistent configuration, please check. [ 578.309371][T14489] debugfs: File 'dropped' in directory 'loop7' already present! [ 578.317686][T14489] debugfs: File 'msg' in directory 'loop7' already present! 16:20:47 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF2(r1, 0x4b52, &(0x7f0000000480)={0xfff, 0x0, 0x0, 0x0, 0x0, "5764bca95c793a65615fa92b34ed2d67695f35"}) ioctl$TCSETSF2(r0, 0x4b2f, 0x0) 16:20:47 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=@setlink={0x44, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_MTU={0x8, 0x4, 0x79}, @IFLA_VFINFO_LIST={0x8, 0x16, 0x0, 0x1, [{0x4}]}, @IFLA_IFNAME={0x14, 0x3, 'veth0_to_bond\x00'}]}, 0x44}}, 0x0) 16:20:47 executing program 1: socketpair(0x27, 0x0, 0x0, &(0x7f0000000040)) 16:20:47 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000740), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f00000012c0)=0x1) [ 578.847829][T14497] A link change request failed with some changes committed already. Interface veth0_to_bond may have been left with an inconsistent configuration, please check. 16:20:48 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0xc, 0x0, 0x0) 16:20:48 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=ANY=[@ANYBLOB="d000000001020375"], 0xd0}}, 0x0) 16:20:48 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x22, 0x0, 0x0) 16:20:48 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=@setlink={0x44, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_MTU={0x8, 0x4, 0x79}, @IFLA_VFINFO_LIST={0x8, 0x16, 0x0, 0x1, [{0x4}]}, @IFLA_IFNAME={0x14, 0x3, 'veth0_to_bond\x00'}]}, 0x44}}, 0x0) 16:20:48 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000200)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x48) [ 579.435915][T14509] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.1'. [ 579.565162][T14513] A link change request failed with some changes committed already. Interface veth0_to_bond may have been left with an inconsistent configuration, please check. 16:20:50 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:20:50 executing program 3: openat$adsp1(0xffffffffffffff9c, &(0x7f0000000740), 0x4200, 0x0) 16:20:50 executing program 0: socketpair(0x11, 0x0, 0x0, &(0x7f00000007c0)) 16:20:50 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000000), &(0x7f0000000040)=0x18) 16:20:50 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, 0x0, &(0x7f0000000180)) 16:20:50 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000004c0)=0x1, 0x4) 16:20:50 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000180), r0) syz_genetlink_get_family_id$smc(&(0x7f00000001c0), 0xffffffffffffffff) 16:20:50 executing program 1: clock_getres(0x0, &(0x7f0000003700)) 16:20:50 executing program 4: fanotify_mark(0xffffffffffffffff, 0x6a, 0x0, 0xffffffffffffffff, 0x0) 16:20:50 executing program 0: openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x81, 0x0) 16:20:51 executing program 3: io_setup(0x8, &(0x7f0000000080)=0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) io_submit(r0, 0x2, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x7, 0x0, r1, 0x0}, 0x0]) 16:20:51 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000000)={0x7f, 0x2, 0x101, 0x1f}, 0x8) 16:20:53 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:20:53 executing program 4: socket$nl_route(0x10, 0x3, 0x0) creat(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46802) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0x1, 0x10, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000), 0x7fff, 0x0) read$FUSE(r0, &(0x7f00000003c0)={0x2020}, 0x2020) socket$inet_udplite(0x2, 0x2, 0x88) io_submit(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=@setlink={0x48, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_MTU={0x8, 0x4, 0x79}, @IFLA_VFINFO_LIST={0xc, 0x16, 0x0, 0x1, [{0x8, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x4}]}]}, @IFLA_IFNAME={0x14, 0x3, 'veth0_to_bond\x00'}]}, 0x48}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) 16:20:53 executing program 1: socketpair(0x28, 0x0, 0x9, &(0x7f0000000180)) 16:20:53 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x20, &(0x7f0000000040)=[@in={0x2, 0x0, @remote}, @in={0x2, 0x4e22, @rand_addr=0x64010101}]}, &(0x7f0000000180)=0x10) 16:20:53 executing program 5: socketpair(0x1, 0x0, 0x0, &(0x7f00000007c0)) 16:20:53 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000300), 0x4) 16:20:53 executing program 5: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x4640, 0x0) 16:20:53 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x6, 0x0, 0x0) [ 584.877463][T14574] vivid-001: kernel_thread() failed 16:20:54 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000004c0), 0x4) 16:20:54 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x79, 0x0, 0x0) 16:20:54 executing program 4: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r0, 0x800c5012, &(0x7f0000000080)) 16:20:54 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0xb, &(0x7f0000000440), 0x4) 16:20:56 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:20:56 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$UI_SET_ABSBIT(r0, 0xc0189436, 0x400000000000000) 16:20:56 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x300) 16:20:56 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x12, 0x0, 0x0) 16:20:56 executing program 3: socket$nl_route(0x10, 0x3, 0x0) r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$video(&(0x7f0000000000), 0x7fff, 0x0) read$FUSE(r1, &(0x7f00000003c0)={0x2020}, 0x2020) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) 16:20:56 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000240), 0x98, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000040)) [ 588.170358][T14616] vivid-001: kernel_thread() failed 16:20:57 executing program 5: pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 16:20:57 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$procfs(0xffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{r0, 0x1c4}, {r1}], 0x2, 0x0, 0x0, 0x0) 16:20:57 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/user\x00') 16:20:57 executing program 1: socketpair(0x29, 0x5, 0x1000007, &(0x7f0000000000)) 16:20:57 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000300)=@assoc_value={0x0, 0x4}, 0x8) 16:20:57 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x20, &(0x7f0000000040)=[@in={0x2, 0x4e20, @remote}, @in={0x2, 0x0, @rand_addr=0x64010101}]}, &(0x7f0000000180)=0x10) [ 588.774785][T14636] sctp: [Deprecated]: syz-executor.3 (pid 14636) Use of struct sctp_assoc_value in delayed_ack socket option. [ 588.774785][T14636] Use struct sctp_sack_info instead 16:21:00 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:21:00 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, 0x0, &(0x7f0000000040)) 16:21:00 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000340), 0x4) 16:21:00 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x20, &(0x7f0000000040)=[@in={0x2, 0x0, @remote}, @in={0x2, 0x0, @rand_addr=0x64010101}]}, &(0x7f0000000180)=0x10) 16:21:00 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000005680)=[{{&(0x7f00000006c0)={0xa, 0x4e23, 0x0, @mcast2, 0x2}, 0x1c, 0x0}}], 0x1, 0x0) 16:21:00 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 16:21:00 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000000440)=ANY=[@ANYBLOB="14000000140001"], 0x14}}, 0x0) recvfrom(r0, &(0x7f0000000040)=""/6, 0x6, 0x0, 0x0, 0x0) 16:21:00 executing program 3: clock_gettime(0x0, &(0x7f0000000580)) 16:21:00 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x77, 0x0, 0x0) 16:21:00 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value, &(0x7f0000000180)=0x8) 16:21:00 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x2) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000480)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "2f21c4f41e13fc04b60c1eb2c049072f44c65236a2beae8a9ce6161093a739382a9a0b009b44ab33570faf05b1b1f9eb44f5bd75733febd1d9d66e5250e4ff09", "6c85087b4040d0b617a9e46b29b1676b9136a819b898c08332eabbdb931f3ed8"}) 16:21:01 executing program 3: setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0xfffffffffffffe8d) 16:21:03 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:21:03 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001080)={0x2020}, 0x2020) 16:21:03 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000100)='dns_resolver\x00', 0x0, &(0x7f0000000180)="d56f", 0x2, r0) 16:21:03 executing program 0: msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x8, 0x0) 16:21:03 executing program 4: r0 = memfd_create(&(0x7f0000000000)='*^+\x00', 0x0) fstat(r0, &(0x7f0000000040)) 16:21:03 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000080)) 16:21:03 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000500)=[{{&(0x7f0000000100)={0x2, 0x4e21, @loopback}, 0x10, 0x0}}, {{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000580)=[@ip_retopts={{0x14, 0x0, 0x7, {[@timestamp={0x44, 0x4, 0x88}]}}}], 0x18}}], 0x2, 0x0) 16:21:03 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x0) 16:21:03 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000d40)={0x20}, 0x4) 16:21:03 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0xa, r1, &(0x7f0000000140)='rxrpc_s\x00', &(0x7f0000000180)={'syz', 0x0}, r2) 16:21:03 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080), 0x571c82, 0x0) 16:21:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc) 16:21:06 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:21:06 executing program 3: syz_open_dev$dri(&(0x7f0000006000), 0x0, 0x4000) 16:21:06 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002e40)=[{{&(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000000580)=[@flowinfo={{0x14}}], 0x18}}], 0x1, 0x0) 16:21:06 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'macvlan1\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) 16:21:06 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000180), 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f00000001c0)=0x7fff) 16:21:06 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002300)=[{{&(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c, 0x0}}, {{&(0x7f0000000180)={0xa, 0x4e24, 0x0, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=[@pktinfo={{0x24, 0x29, 0x32, {@loopback}}}], 0x28}}], 0x2, 0x0) 16:21:06 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) sendmmsg$inet(r0, &(0x7f00000005c0)=[{{&(0x7f0000000100)={0x2, 0x4e21, @loopback}, 0x10, 0x0}}], 0x1, 0x0) 16:21:06 executing program 4: timer_create(0x8, 0x0, &(0x7f0000000240)) 16:21:07 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002300)=[{{&(0x7f0000000180)={0xa, 0x4e24, 0x0, @dev}, 0x1c, 0x0}}], 0x1, 0x0) 16:21:07 executing program 0: request_key(&(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) 16:21:07 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000240)={'hsr0\x00', {0x2, 0x0, @dev}}) 16:21:07 executing program 5: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, r0) 16:21:09 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 16:21:09 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_tables_matches\x00') 16:21:09 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020}, 0x19ae) 16:21:09 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000d40), 0x4) 16:21:09 executing program 5: sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000d80)=""/4096) 16:21:09 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/seq/clients\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 16:21:10 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000480)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "2f21c4f41e13fc04b60c1eb2c049072f44c65236a2beae8a9ce6161093a739382a9a0b009b44ab33570faf05b1b1f9eb44f5bd75733febd1d9d66e5250e4ff09", "6c85087b4040d0b617a9e46b29b1676b9136a819b898c08332eabbdb931f3ed8", [0x3]}) 16:21:10 executing program 4: socketpair(0x28, 0x2, 0x0, 0x0) 16:21:10 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000000)=[{{&(0x7f0000000100)={0x2, 0x4e21, @loopback}, 0x10, 0x0}}, {{&(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000080)=ANY=[], 0x50}}], 0x2, 0x0) 16:21:10 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8949, &(0x7f0000000000)={'veth0_virt_wifi\x00', @ifru_names}) 16:21:10 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000004c00)={0x0, 0x0, &(0x7f0000004bc0)={&(0x7f0000003a80)={0x4c, 0x13, 0x1}, 0x4c}}, 0x0) 16:21:10 executing program 1: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x2000, 0x0) read$rfkill(r0, 0x0, 0x0) 16:21:12 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 16:21:12 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000002d00)=[{{&(0x7f0000000000)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000002500)=[{&(0x7f0000000040)='-', 0x1}], 0x1, &(0x7f0000002580)=[@ip_tos_u8={{0x11}}], 0x18}}, {{0x0, 0x0, &(0x7f0000002840)=[{&(0x7f0000002680)='_', 0x1}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x3, 0x8800) 16:21:12 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002300)=[{{&(0x7f0000000000)={0xa, 0x4e22, 0x0, @local}, 0x1c, 0x0}}, {{&(0x7f0000000180)={0xa, 0x4e24, 0x0, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000000480)=[@hopopts={{0x18}}], 0x18}}], 0x2, 0x0) 16:21:12 executing program 0: setresuid(0x0, 0x0, 0xee01) 16:21:12 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000080)) 16:21:13 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x2) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000480)={0x0, {}, 0x0, {}, 0x0, 0x12, 0x0, 0x0, "2f21c4f41e13fc04b60c1eb2c049072f44c65236a2beae8a9ce6161093a739382a9a0b009b44ab33570faf05b1b1f9eb44f5bd75733febd1d9d66e5250e4ff09", "6c85087b4040d0b617a9e46b29b1676b9136a819b898c08332eabbdb931f3ed8"}) 16:21:13 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/locks\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) 16:21:13 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r0, 0x0, 0x0, 0x0) 16:21:13 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000500)=[{{&(0x7f0000000100)={0x2, 0x4e21, @loopback}, 0x10, 0x0}}, {{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000580)=[@ip_retopts={{0x14, 0x0, 0x7, {[@timestamp={0x44, 0x4}]}}}], 0x18}}], 0x2, 0x0) 16:21:13 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002300)='/proc/crypto\x00', 0x0, 0x0) read$eventfd(r0, 0x0, 0x0) 16:21:13 executing program 5: setresuid(0xffffffffffffffff, 0xee01, 0xee00) setresuid(0xffffffffffffffff, 0xee01, 0xee00) 16:21:13 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000480)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "2f21c4f41e13fc04b60c1eb2c049072f44c65236a2beae8a9ce6161093a739382a9a0b009b44ab33570faf05b1b1f9eb44f5bd75733febd1d9d66e5250e4ff09", "6c85087b4040d0b617a9e46b29b1676b9136a819b898c08332eabbdb931f3ed8"}) 16:21:16 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 16:21:16 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000500)=[{{&(0x7f0000000100)={0x2, 0x4e24, @loopback}, 0x10, 0x0}}, {{&(0x7f0000000080)={0x2, 0x4e22, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_retopts={{0x14, 0x0, 0x7, {[@generic={0x82, 0x2}]}}}], 0x18}}], 0x2, 0x0) 16:21:16 executing program 4: r0 = timerfd_create(0x1, 0x0) timerfd_gettime(r0, &(0x7f00000001c0)) 16:21:16 executing program 0: r0 = msgget$private(0x0, 0x102) msgrcv(r0, 0x0, 0x0, 0x0, 0x1800) 16:21:16 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) bind(r0, &(0x7f0000000180)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha256\x00'}, 0x80) 16:21:16 executing program 3: setresuid(0xee01, 0xee00, 0x0) setresuid(0xffffffffffffffff, 0xee01, 0xee00) 16:21:16 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002080)='/proc/asound/timers\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 16:21:16 executing program 0: request_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)=')})-:,*E-:&\x00', 0x0) 16:21:16 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000600)=[{{&(0x7f0000000040)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x0) 16:21:16 executing program 3: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$unlink(0x9, r0, 0xfffffffffffffffc) 16:21:16 executing program 5: add_key(&(0x7f0000000040)='user\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)="a6", 0x1, 0xfffffffffffffffb) 16:21:16 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/tcp6\x00') 16:21:19 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 16:21:19 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) sendmsg$NL80211_CMD_SET_WOWLAN(r0, &(0x7f0000007b00)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000007ac0)={0x0}}, 0x0) 16:21:19 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/timer\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 16:21:19 executing program 3: syz_open_procfs(0x0, &(0x7f0000000700)='net/softnet_stat\x00') 16:21:19 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000180), 0x2, 0x4000) ioctl$EVIOCRMFF(r0, 0x40044581, 0x0) 16:21:19 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000005540)=[{{&(0x7f0000000040)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000240)=[@ip_retopts={{0x14, 0x0, 0x7, {[@generic={0x88, 0x2}]}}}], 0x18}}], 0x1, 0x0) 16:21:19 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(0xfffffffffffffffe, r0) 16:21:19 executing program 4: syz_open_dev$loop(&(0x7f0000000300), 0x0, 0x145483) 16:21:19 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f0000003f40)=[{0x0, 0x0, 0x0}], 0x1, 0x40010c5) 16:21:20 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/schedstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000200)={0x2020}, 0x2020) 16:21:20 executing program 5: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000040)={0x7}, 0xffffff9d) write$P9_RCREATE(r0, &(0x7f00000000c0)={0x18}, 0x18) 16:21:20 executing program 4: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) 16:21:22 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 16:21:22 executing program 1: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000040)={0x7}, 0xffffff9d) write$P9_RMKNOD(r0, &(0x7f00000001c0)={0x14}, 0x14) 16:21:22 executing program 3: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$FUSE_INIT(r0, 0x0, 0x4b) 16:21:22 executing program 0: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000040)={0x7}, 0xffffff9d) write$P9_ROPEN(r0, &(0x7f0000000080)={0x18}, 0x18) 16:21:22 executing program 5: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000040)={0x7}, 0xffffff9d) write$P9_RAUTH(r0, &(0x7f0000000080)={0x14}, 0x14) 16:21:22 executing program 4: openat$incfs(0xffffffffffffff9c, &(0x7f0000000080)='.log\x00', 0x10d041, 0x0) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 16:21:23 executing program 4: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RWSTAT(r0, &(0x7f0000000100)={0x7}, 0xfffffffffffffe45) 16:21:23 executing program 3: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_ROPEN(r0, &(0x7f0000000080)={0x18}, 0xfffffffffffffdb3) 16:21:23 executing program 4: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000040)={0x7}, 0xffffff9d) write$P9_RSTATFS(r0, &(0x7f0000000080)={0x43}, 0x43) 16:21:23 executing program 3: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$P9_RSETATTR(r0, &(0x7f0000000040)={0x7}, 0xffffff9d) write$P9_RSETATTR(r0, &(0x7f0000000080)={0x7}, 0x7) 16:21:23 executing program 1: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) write$P9_RSETATTR(r0, &(0x7f0000000040)={0xfffffffffffffd51}, 0xffffff9d) write$P9_RVERSION(r0, &(0x7f0000000140)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.L'}, 0x15) 16:21:24 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) pipe2(&(0x7f0000000100), 0x0) select(0x40, &(0x7f0000000000)={0xa}, 0x0, &(0x7f0000000080)={0x20}, 0x0) 16:21:26 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 16:21:26 executing program 5: r0 = socket$inet(0x2, 0x3, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x2}, 0xc) 16:21:26 executing program 3: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$sock_int(r0, 0xffff, 0x0, 0x0, 0x0) 16:21:26 executing program 0: setuid(0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) 16:21:26 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x8004741b, &(0x7f0000000180)) 16:21:26 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000340)="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", 0xfffffffffffffe47, 0x40e, 0x0, 0x0) 16:21:26 executing program 4: r0 = socket$inet(0x2, 0x3, 0x0) getsockname$inet(r0, 0x0, 0x0) 16:21:26 executing program 0: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 16:21:26 executing program 1: r0 = socket$inet(0x2, 0x3, 0x0) recvmsg(r0, &(0x7f0000001900)={0x0, 0x0, 0x0}, 0x0) 16:21:26 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x8004741b, &(0x7f0000000180)=0x7) 16:21:26 executing program 3: setrlimit(0x3, &(0x7f00000001c0)={0x100000, 0x100000}) 16:21:27 executing program 0: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8000, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/file0\x00', 0x0) 16:21:29 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 16:21:29 executing program 5: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1000, 0x0) fchownat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) 16:21:29 executing program 4: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8000, 0x0) faccessat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) 16:21:29 executing program 3: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8000, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x8000, 0x0) fchownat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000840)='./file\x00', 0x0, 0x0) chown(&(0x7f0000000680)='./file2\x00', 0x0, 0x0) 16:21:29 executing program 1: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8000, 0x0) open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) renameat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, 0x0) 16:21:29 executing program 0: setrlimit(0x8, &(0x7f00000001c0)) socket$unix(0x1, 0x5, 0x0) 16:21:29 executing program 0: setrlimit(0x2, &(0x7f00000001c0)={0x60000000, 0x60000000}) 16:21:29 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) 16:21:29 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x9, &(0x7f0000000000)="57280000434e787e5ffba9d221ad348f", 0x10) 16:21:29 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) sendmsg$xdp(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 16:21:29 executing program 1: socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="1558000028000000000000030000000c00001600000000d70000"], 0x20}}, 0x0) [ 621.098717][T15061] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 16:21:30 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f0000000040), 0x4) [ 621.167719][T15062] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 16:21:32 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 16:21:32 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x181, 0x181, 0x2, [@int, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x9, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:21:32 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="db3ee716434e787e5ffba9d221ad348f", 0x10) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="a9ff503f2fa62951e70499dcbd8fd940", 0x10) 16:21:32 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000000700)={&(0x7f0000000640), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, r1, 0x1}, 0x14}}, 0x0) 16:21:32 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) io_uring_setup(0x6bca, &(0x7f00000000c0)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, r0}) 16:21:32 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x6, &(0x7f0000000000)=0x3, 0x4) 16:21:32 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="db3ee716434e787e5ffba9d221ad348f", 0x10) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="a9ff503f2fa62951e70499dcbd8fd940", 0x10) 16:21:32 executing program 3: syz_io_uring_setup(0x37e2, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x3a5}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000002c0), &(0x7f0000000300)) 16:21:33 executing program 5: getsockname$l2tp6(0xffffffffffffffff, 0x0, 0x0) 16:21:33 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040), 0x4) 16:21:33 executing program 4: openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 16:21:33 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000009c0)={0x0, &(0x7f0000000740), 0x0, &(0x7f00000007c0), {0x21}, 0x0, 0x0, &(0x7f0000000880)=""/253, &(0x7f0000000980)=[0x0], 0x1}, 0x58) socket$vsock_stream(0x28, 0x1, 0x0) 16:21:35 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700aea0038a0665471db1ec0a2c00be81c3a311e6f62dd8e596bb00000000000000000000000000000000064448229924079559109ef0ca0e3140e705dea15a0705207f802cac06f1d8dd47da143a9bf355d1ec4e26e6cbb3d90db76d75ea5e5653c468c0f2f158e8107a42273e43ba261265f0f42241de7d9180c5dd00111c45eac615c42ae8de553bf858931237", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 16:21:35 executing program 1: syz_io_uring_setup(0x0, &(0x7f0000000400), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, 0x0) 16:21:35 executing program 3: socket(0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 16:21:35 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="db3ee716434e787e5ffba9d221ad348f", 0x10) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 16:21:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) 16:21:35 executing program 5: syz_io_uring_setup(0x711a, 0x0, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000fee000/0x11000)=nil, 0x0, 0x0) syz_io_uring_setup(0x37e2, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x3a5}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000002c0), &(0x7f0000000300)) [ 627.091914][T15133] "syz-executor.0" (15133) uses obsolete ecb(arc4) skcipher 16:21:36 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x13d, 0x13d, 0x2, [@int, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @ptr, @volatile, @datasec={0x0, 0x9, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x15a}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:21:36 executing program 5: syz_open_dev$amidi(&(0x7f0000000080), 0x2, 0x4100) 16:21:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = socket(0x10, 0x80002, 0x0) poll(&(0x7f0000000000)=[{r1, 0x3b2}, {r2, 0x8200}, {0xffffffffffffffff, 0x104}, {0xffffffffffffffff, 0x8a}, {r0}, {r0, 0x2000}, {0xffffffffffffffff, 0x9028}], 0x7, 0x0) 16:21:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000680)={'vcan0\x00'}) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000001900)={0x18, r2, 0x319, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 16:21:36 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x24051, r0, 0x8000000) 16:21:36 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001c00)=ANY=[@ANYBLOB="58160000", @ANYRES16=r1, @ANYBLOB="0b0628bd7000fedbdf25080000000c0202"], 0x1658}}, 0x0) 16:21:39 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x13, &(0x7f0000000000)="db3ee716434e787e5ffba9d221ad348f", 0x10) 16:21:39 executing program 4: mmap$xdp(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 16:21:39 executing program 0: r0 = socket(0x2, 0xa, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, 0x0, 0x0) 16:21:39 executing program 3: socket(0x15, 0x5, 0x9) 16:21:39 executing program 5: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x60000, 0x0) 16:21:39 executing program 2: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000480), 0x2) ioctl$UDMABUF_CREATE(r0, 0x4020940d, 0x0) 16:21:39 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x121, 0x121, 0x2, [@int, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @int, @ptr, @volatile, @datasec={0x0, 0x9, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x13e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:21:39 executing program 4: syz_io_uring_setup(0x0, &(0x7f0000000400), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000540), &(0x7f00000004c0)) 16:21:39 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100)=0x1000, 0x4) 16:21:39 executing program 3: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000480), 0x2) ioctl$UDMABUF_CREATE(r0, 0x40086602, 0x0) 16:21:39 executing program 5: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000480), 0x2) ioctl$UDMABUF_CREATE(r0, 0x401c5820, 0x0) 16:21:39 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:21:40 executing program 4: syz_io_uring_setup(0x711a, &(0x7f00000003c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000fee000/0x11000)=nil, 0x0, 0x0) syz_io_uring_setup(0x37e2, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x3a5}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000002c0), &(0x7f0000000300)) 16:21:40 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0xa, 0x0, &(0x7f0000000080)) 16:21:40 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x4, &(0x7f0000000000)="db3ee716434e787e5ffba9d221ad348f", 0x10) 16:21:40 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:21:40 executing program 3: socket(0x6985b73fba69035, 0x0, 0x0) 16:21:40 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x64010, r0, 0x8000000) 16:21:40 executing program 0: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, 0x0) 16:21:40 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:21:40 executing program 4: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) 16:21:40 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140), 0xa0803, 0x0) 16:21:40 executing program 3: memfd_create(&(0x7f0000000040)='-&&}\x00', 0x2) 16:21:40 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) 16:21:41 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:21:41 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:21:41 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), 0x14) 16:21:41 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x16d, 0x16d, 0x2, [@int, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x18a}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:21:41 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x10000, 0x4) 16:21:41 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000140)=0x200400, 0x4) 16:21:41 executing program 0: clock_getres(0x0, &(0x7f0000002080)) 16:21:41 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0xe, &(0x7f0000000000)="db3ee716434e787e5ffba9d221ad348f", 0x10) 16:21:41 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) rt_sigqueueinfo(0x0, 0x3c, &(0x7f0000000040)) [ 632.736489][ T3123] ieee802154 phy0 wpan0: encryption failed: -22 [ 632.743210][ T3123] ieee802154 phy1 wpan1: encryption failed: -22 16:21:41 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 16:21:42 executing program 3: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) getsockopt$inet_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000100)=""/85, &(0x7f0000000180)=0x55) 16:21:42 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0x40045731, 0x0) 16:21:42 executing program 0: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000480), 0x2) ioctl$UDMABUF_CREATE(r0, 0x2, &(0x7f00000004c0)) 16:21:42 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000002, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x18, r2, 0xb15, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 16:21:42 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000040)=0x4, 0x4) 16:21:42 executing program 4: mmap$IORING_OFF_SQ_RING(&(0x7f0000c68000/0x3000)=nil, 0x3000, 0x0, 0x8c32db67b79985f2, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x7318, &(0x7f00000001c0), &(0x7f0000c65000/0x3000)=nil, &(0x7f0000c65000/0x1000)=nil, &(0x7f0000000240), &(0x7f0000000280)) 16:21:42 executing program 5: openat2$dir(0xffffffffffffff9c, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xec217ba3dde367b9}, 0x18) 16:21:42 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000140)={'ip6tnl0\x00', 0x0}) 16:21:42 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="15"], 0x20}}, 0x0) 16:21:43 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000040), 0x4) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) [ 634.133201][T15299] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 634.216824][T15300] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 634.310104][T15302] "syz-executor.3" (15302) uses obsolete ecb(arc4) skcipher 16:21:45 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) rt_sigqueueinfo(0x0, 0x3c, &(0x7f0000000040)) 16:21:45 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xfd, 0xfd, 0x2, [@int, @array, @var, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @datasec={0x0, 0x9, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x11a}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:21:45 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x14, &(0x7f0000000000)="db3ee716434e787e5ffba9d221ad348f", 0x10) 16:21:45 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000000)={0x0, 0x0, 0x1000}, 0x20) 16:21:45 executing program 1: io_uring_setup(0x558b, &(0x7f0000000000)={0x0, 0x0, 0x2}) 16:21:45 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r1, 0x905}, 0x14}}, 0x0) 16:21:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) getsockopt$inet_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f0000000d80)) 16:21:45 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="db3ee716434e787e5ffba9d221ad348f", 0x10) 16:21:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="1558000028000000000000030000000c"], 0x20}}, 0x0) 16:21:45 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000000380)={0x0, 0x1658}}, 0x0) 16:21:45 executing program 1: mmap$xdp(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4, 0x31, 0xffffffffffffffff, 0x0) [ 636.758623][T15342] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 16:21:45 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={@private0, @mcast2, @loopback, 0x0, 0xeafd, 0x0, 0x0, 0x0, 0x1000000}) [ 636.848631][T15345] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 16:21:48 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) rt_sigqueueinfo(0x0, 0x3c, &(0x7f0000000040)) 16:21:48 executing program 0: r0 = socket(0x2a, 0x2, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 16:21:48 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000001240)=0x2000, 0x4) 16:21:48 executing program 1: memfd_create(&(0x7f0000000080)='\xba\x00', 0x6) 16:21:48 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x1e, &(0x7f0000000000)="db3ee716434e787e5ffba9d221ad348f", 0x10) 16:21:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="010000000000000066b317"], 0x14}}, 0x0) 16:21:48 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF2(r0, 0x5403, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, "5764bca95c793a65615fa92b34ed2d67695f35"}) 16:21:48 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000)=@gcm_128={{}, "db51ea82a73c66f1", "b7ff98d34b959e16c8bed845f6dbea0a", "7f03f081", "8071f266b93c3cab"}, 0x28) 16:21:48 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000000), 0x8) 16:21:48 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$cgroup_type(r0, 0x0, 0x0) 16:21:48 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x175, 0x175, 0x2, [@int, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @datasec={0x0, 0x9, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x192}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:21:49 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 16:21:51 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:21:51 executing program 3: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000480), 0x2) ioctl$UDMABUF_CREATE(r0, 0x40049409, 0x0) 16:21:51 executing program 5: memfd_create(&(0x7f00000001c0)='\x00', 0x0) 16:21:51 executing program 0: socket(0x22, 0x0, 0x8) 16:21:51 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, 0x0, &(0x7f0000000080)=0xffffffffffffff61) 16:21:51 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f00000005c0)=0x100000, 0x4) 16:21:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001fc0)=ANY=[@ANYBLOB="280000001000010000000000000000", @ANYRES32, @ANYBLOB="000100000000000005"], 0x28}}, 0x0) 16:21:52 executing program 4: syz_io_uring_setup(0x711a, &(0x7f00000003c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000fee000/0x11000)=nil, 0x0, 0x0) syz_io_uring_setup(0x37e2, &(0x7f0000000240), &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000002c0), &(0x7f0000000300)) 16:21:52 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x5, &(0x7f0000000000)="db3ee716434e787e5ffba9d221ad348f", 0x10) 16:21:52 executing program 5: syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_setup(0x15f3, &(0x7f0000000240)={0x0, 0x0, 0x20, 0x0, 0x342}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff2000/0xe000)=nil, &(0x7f00000002c0), &(0x7f0000000300)) 16:21:52 executing program 3: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000480), 0x2) ioctl$UDMABUF_CREATE(r0, 0x5421, &(0x7f00000004c0)) 16:21:52 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 643.258400][T15420] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 16:21:52 executing program 5: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000480), 0x2) ioctl$UDMABUF_CREATE(r0, 0x401c5820, &(0x7f00000004c0)) 16:21:52 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000480), 0x2) ioctl$UDMABUF_CREATE(r0, 0x5452, 0x0) 16:21:52 executing program 0: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000480), 0x2) ioctl$UDMABUF_CREATE(r0, 0x40087543, &(0x7f00000004c0)) 16:21:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001c00)=ANY=[@ANYBLOB="58160000", @ANYRES16=r1, @ANYBLOB="0b0628bd7000fedbdf25080000000c"], 0x1658}}, 0x0) 16:21:52 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:21:53 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001c00)=ANY=[@ANYBLOB="58160000", @ANYRES16=r1, @ANYBLOB="0b0628bd7000fedbdf25080000000c020280"], 0x1658}}, 0x0) 16:21:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000600)=@newqdisc={0x3c, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_dsmark={{0xb}, {0xc, 0x2, [@TCA_DSMARK_INDICES={0x6, 0x1, 0x1}]}}]}, 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB='L\x00\x00\x00,\x00\'\r\x00'/20, @ANYRES32=r4, @ANYBLOB="00000000000000000f000000080001007533320020000200140005"], 0x4c}}, 0x0) 16:21:53 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000140), 0x4) 16:21:53 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x24, 0x0, &(0x7f0000000080)) 16:21:53 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:21:53 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) connect$l2tp6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x20) [ 644.422979][T15445] netlink: 5176 bytes leftover after parsing attributes in process `syz-executor.5'. [ 644.472362][T15447] netlink: 5176 bytes leftover after parsing attributes in process `syz-executor.5'. [ 644.523875][T15449] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 644.709980][T15454] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 16:21:53 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[@mss, @timestamp, @timestamp, @sack_perm], 0x4) [ 644.754653][T15454] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 16:21:53 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x12, &(0x7f0000000000)="db3ee716434e787e5ffba9d221ad348f", 0x10) 16:21:53 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x3f, 0x0) r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 16:21:54 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:21:54 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x24, &(0x7f0000000000)="db3ee716434e787e5ffba9d221ad348f", 0x10) 16:21:54 executing program 1: socket(0x29, 0x2, 0x9) 16:21:54 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0xd, &(0x7f0000000000)="db3ee716434e787e5ffba9d221ad348f", 0x10) 16:21:54 executing program 4: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x200400, 0x0) 16:21:54 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:21:54 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 16:21:54 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={0x0}}, 0x0) 16:21:54 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x2, 0x0, &(0x7f0000000080)) 16:21:54 executing program 5: r0 = gettid() ptrace$setopts(0x4206, r0, 0x8, 0x0) 16:21:54 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:21:54 executing program 4: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='westwood\x00', 0x9) 16:21:55 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0xb, 0x0, &(0x7f00000001c0)) 16:21:55 executing program 1: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'blake2s-160-generic\x00'}, 0x58) 16:21:55 executing program 5: io_setup(0x1, &(0x7f0000000600)=0x0) io_getevents(r0, 0x4, 0x4, &(0x7f0000000640)=[{}, {}, {}, {}], &(0x7f00000006c0)={0x0, 0x989680}) 16:21:55 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:21:55 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x119, 0x119, 0x2, [@int, @var, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x9, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x136}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:21:55 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000040), 0x4) 16:21:55 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10, &(0x7f0000000040), 0x4) 16:21:55 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:21:55 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 16:21:55 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) accept$packet(r0, 0x0, 0x0) 16:21:55 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000000)={0x0, 0x0, 0x1000, 0x0, 0x2}, 0x20) 16:21:55 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:21:56 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x5, &(0x7f0000000040)=0x1000, 0x4) 16:21:56 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x22, &(0x7f0000000000)="db3ee716434e787e5ffba9d221ad348f", 0x10) 16:21:56 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) 16:21:56 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000100)={0x28, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_WOL_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}]}, 0x28}}, 0x0) 16:21:56 executing program 3: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r1, 0xfc3cdb29c10f0f53}, 0x14}}, 0x0) 16:21:56 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:21:56 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xc4, 0x4) 16:21:56 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0xd, &(0x7f0000000680)=""/4096, &(0x7f00000005c0)=0x1000) 16:21:56 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000100)={0x34, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}]}]}, 0x34}}, 0x0) 16:21:56 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000001a80)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4801004}, 0xc, &(0x7f0000000380)={&(0x7f0000001c00)=ANY=[@ANYBLOB="58160000", @ANYRES16=r1, @ANYBLOB="0b0628bd7000fedbdf25080000000c020280"], 0x1658}}, 0x0) 16:21:57 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:21:57 executing program 3: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r1, 0xfc3cdb29c10f0f53}, 0x14}}, 0x0) 16:21:57 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8, &(0x7f0000000040)=0xfff, 0x4) 16:21:57 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x1b, &(0x7f0000000000)="db3ee716434e787e5ffba9d221ad348f", 0x10) [ 648.217377][T15574] netlink: 5176 bytes leftover after parsing attributes in process `syz-executor.5'. [ 648.323229][T15576] netlink: 5176 bytes leftover after parsing attributes in process `syz-executor.5'. 16:21:57 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, 0x0, 0x300) 16:21:57 executing program 5: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540), 0x200, 0x0) 16:21:57 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:21:57 executing program 3: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r1, 0xfc3cdb29c10f0f53}, 0x14}}, 0x0) 16:21:57 executing program 4: openat2$dir(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0xb}, 0x18) 16:21:57 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) 16:21:58 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x17, &(0x7f0000000400)=0xffffff7f, 0x4) 16:21:58 executing program 3: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r1, 0xfc3cdb29c10f0f53}, 0x14}}, 0x0) 16:21:58 executing program 5: syz_io_uring_setup(0x711a, &(0x7f00000003c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000fee000/0x11000)=nil, 0x0, 0x0) syz_io_uring_setup(0x37e2, &(0x7f0000000240), &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000002c0), 0x0) 16:21:58 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:21:58 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000480), 0x2) ioctl$UDMABUF_CREATE(r0, 0x5421, 0x0) 16:21:58 executing program 4: socket(0x2b, 0x1, 0x200) 16:21:58 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x10040, 0x0) 16:21:58 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:21:58 executing program 3: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0x0, 0xfc3cdb29c10f0f53}, 0x14}}, 0x0) 16:21:58 executing program 5: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000480), 0x2) r1 = memfd_create(&(0x7f0000000000)='-\x00', 0x0) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f00000004c0)={r1}) 16:21:58 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000480), 0x2) ioctl$UDMABUF_CREATE(r0, 0x5460, 0x0) 16:21:58 executing program 1: syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000fee000/0x11000)=nil, 0x0, 0x0) syz_io_uring_setup(0x37e2, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000002c0), &(0x7f0000000300)) 16:21:59 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x26200, 0x0) 16:21:59 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:21:59 executing program 3: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0x0, 0xfc3cdb29c10f0f53}, 0x14}}, 0x0) 16:21:59 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x18, &(0x7f0000000000)="db3ee716434e787e5ffba9d221ad348f", 0x10) 16:21:59 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000480), 0x2) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f00000004c0)={0xffffffffffffffff, 0x0, 0x0, 0x300000000000000}) 16:21:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x20, r1, 0x23257f708ac95815, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_COOKIE={0xc}]}, 0x20}}, 0x0) 16:21:59 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:21:59 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="db3ee716434e787e5ffba9d221ad348f", 0x10) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000080)) 16:21:59 executing program 3: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0x0, 0xfc3cdb29c10f0f53}, 0x14}}, 0x0) 16:21:59 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:21:59 executing program 5: bpf$PROG_LOAD(0x4, 0x0, 0x700) 16:22:00 executing program 1: bpf$PROG_LOAD(0x3, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 16:22:00 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x4, &(0x7f0000000080)=@framed={{}, [@jmp={0x5, 0x0, 0x8, 0x0, 0x0, 0xfffffffffffffffc}]}, &(0x7f00000000c0)='GPL\x00', 0x7, 0xe8, &(0x7f0000000100)=""/232, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:22:00 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:00 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x5427, 0x0) 16:22:00 executing program 3: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r0, 0xfc3cdb29c10f0f53}, 0x14}}, 0x0) 16:22:00 executing program 5: sendmsg$BATADV_CMD_GET_BLA_BACKBONE(0xffffffffffffffff, 0x0, 0x9effffff) 16:22:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x3, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x8}, {0xf}, {0x2}, {0x5}]}]}, {0x0, [0x0]}}, &(0x7f0000000080)=""/132, 0x47, 0x84, 0x1}, 0x20) 16:22:00 executing program 4: bpf$PROG_LOAD(0x22, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 16:22:00 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:00 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000100)={0x0, "ab0130ee23d0c720028f31267651e9774617eaa5b47d77adac525ddc31fc6016084d6279f84e7e7a67c32b9d03d971ba859f992f17e97702fa96137af4e93ed9"}, 0x48, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), 0x0, 0x0, 0x0, r0) 16:22:00 executing program 5: futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000)=0x80000, 0x0) 16:22:00 executing program 3: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r0, 0xfc3cdb29c10f0f53}, 0x14}}, 0x0) 16:22:01 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg(r0, &(0x7f0000002680)={&(0x7f0000000100)=@xdp={0x2c, 0x0, r1}, 0x80, &(0x7f0000001400)=[{&(0x7f0000000240)="85e80910d9d8b43c319a5b2889061189d4fb70be07c1eadf9ff21b2e32a77d29be2c2ef5063180974dd7703a0f4e5768ac035514", 0x34}], 0x1}, 0x0) 16:22:01 executing program 4: bpf$PROG_LOAD(0xd, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 16:22:01 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:01 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1788e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000000)={0x77359400}, &(0x7f0000048000), 0x0) exit(0x0) 16:22:01 executing program 3: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r0, 0xfc3cdb29c10f0f53}, 0x14}}, 0x0) 16:22:01 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000180), 0x4) 16:22:01 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000180)={0x2c, r1, 0x1, 0x0, 0x0, {0x3}, [@ETHTOOL_A_WOL_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}]}]}, 0x2c}}, 0x0) 16:22:01 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:01 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r1, 0xfc3cdb29c10f0f53}, 0x14}}, 0x0) 16:22:02 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:02 executing program 5: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$revoke(0x1d, r0) 16:22:02 executing program 4: bpf$PROG_LOAD(0x4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 16:22:02 executing program 1: shmat(0xffffffffffffffff, &(0x7f0000ffd000/0x1000)=nil, 0x0) 16:22:02 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(0x0, 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r1, 0xfc3cdb29c10f0f53}, 0x14}}, 0x0) 16:22:02 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:02 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1788e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000000)={0x77359400}, &(0x7f0000048000), 0x0) exit(0x0) 16:22:02 executing program 1: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xf6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = socket$vsock_stream(0x28, 0x1, 0x0) sendfile(r1, r0, 0x0, 0x10008004) 16:22:02 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r0 = gettid() rt_sigqueueinfo(r0, 0x3c, &(0x7f0000000040)) 16:22:02 executing program 4: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$revoke(0x7, r0) 16:22:02 executing program 5: keyctl$restrict_keyring(0x1d, 0xfffffffffffffffb, &(0x7f0000000000)='rxrpc\x00', 0x0) 16:22:02 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(0x0, 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r1, 0xfc3cdb29c10f0f53}, 0x14}}, 0x0) 16:22:03 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r0 = gettid() rt_sigqueueinfo(r0, 0x3c, &(0x7f0000000040)) 16:22:03 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x0, 0x0, 0x0, 0x6}, 0x40) 16:22:03 executing program 1: bpf$PROG_LOAD(0x10, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 16:22:03 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='cpuset\x00') lseek(r0, 0x3, 0x0) 16:22:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(0x0, 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r1, 0xfc3cdb29c10f0f53}, 0x14}}, 0x0) 16:22:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000280)={0x14, r1, 0x1, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) 16:22:03 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1788e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000000)={0x77359400}, &(0x7f0000048000), 0x0) exit(0x0) 16:22:03 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r0 = gettid() rt_sigqueueinfo(r0, 0x3c, &(0x7f0000000040)) 16:22:03 executing program 5: socketpair(0x1, 0x0, 0x81, &(0x7f0000000000)) 16:22:03 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @mcast1, @private2}}) 16:22:03 executing program 4: pipe(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4240a2c6) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000840)=@filter={'filter\x00', 0x50, 0x4, 0x3c0, 0x0, 0xd0, 0x1f8, 0xd0, 0x1f8, 0x2f0, 0x2f0, 0x2f0, 0x2f0, 0x2f0, 0x4, 0x0, {[{{@ipv6={@mcast1, @loopback, [], [], 'bond_slave_0\x00', 'syzkaller1\x00', {}, {}, 0x6, 0x0, 0x7}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x6}}}, {{@ipv6={@dev, @mcast1, [], [], 'dummy0\x00', 'veth0_to_bond\x00'}, 0x0, 0x100, 0x128, 0x0, {}, [@common=@frag={{0x30}}, @common=@ipv6header={{0x28}}]}, @REJECT={0x28}}, {{@ipv6={@remote, @empty, [], [], 'ip6tnl0\x00', 'ip_vti0\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@icmp6={{0x28}, {0x0, "1883"}}]}, @REJECT={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x473) 16:22:03 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r0, 0xfc3cdb29c10f0f53}, 0x14}}, 0x0) [ 655.114983][T15779] x_tables: ip6_tables: icmp6 match: only valid for protocol 58 16:22:04 executing program 4: pipe(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4240a2c6) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000840)=@filter={'filter\x00', 0x50, 0x4, 0x3c0, 0x0, 0xd0, 0x1f8, 0xd0, 0x1f8, 0x2f0, 0x2f0, 0x2f0, 0x2f0, 0x2f0, 0x4, 0x0, {[{{@ipv6={@mcast1, @loopback, [], [], 'bond_slave_0\x00', 'syzkaller1\x00', {}, {}, 0x6, 0x0, 0x7}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x6}}}, {{@ipv6={@dev, @mcast1, [], [], 'dummy0\x00', 'veth0_to_bond\x00'}, 0x0, 0x100, 0x128, 0x0, {}, [@common=@frag={{0x30}}, @common=@ipv6header={{0x28}}]}, @REJECT={0x28}}, {{@ipv6={@remote, @empty, [], [], 'ip6tnl0\x00', 'ip_vti0\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@icmp6={{0x28}, {0x0, "1883"}}]}, @REJECT={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x473) 16:22:04 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r0, 0xfc3cdb29c10f0f53}, 0x14}}, 0x0) 16:22:04 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0xc01047d0, &(0x7f0000000080)=0x1d) 16:22:04 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000200)={'gre0\x00', &(0x7f00000002c0)={'tunl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback}}}}) 16:22:04 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:04 executing program 4: pipe(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4240a2c6) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000840)=@filter={'filter\x00', 0x50, 0x4, 0x3c0, 0x0, 0xd0, 0x1f8, 0xd0, 0x1f8, 0x2f0, 0x2f0, 0x2f0, 0x2f0, 0x2f0, 0x4, 0x0, {[{{@ipv6={@mcast1, @loopback, [], [], 'bond_slave_0\x00', 'syzkaller1\x00', {}, {}, 0x6, 0x0, 0x7}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x6}}}, {{@ipv6={@dev, @mcast1, [], [], 'dummy0\x00', 'veth0_to_bond\x00'}, 0x0, 0x100, 0x128, 0x0, {}, [@common=@frag={{0x30}}, @common=@ipv6header={{0x28}}]}, @REJECT={0x28}}, {{@ipv6={@remote, @empty, [], [], 'ip6tnl0\x00', 'ip_vti0\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@icmp6={{0x28}, {0x0, "1883"}}]}, @REJECT={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x473) [ 655.628700][T15789] x_tables: ip6_tables: icmp6 match: only valid for protocol 58 [ 655.920511][T15801] x_tables: ip6_tables: icmp6 match: only valid for protocol 58 16:22:05 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1788e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000000)={0x77359400}, &(0x7f0000048000), 0x0) exit(0x0) 16:22:05 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r0, 0xfc3cdb29c10f0f53}, 0x14}}, 0x0) 16:22:05 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x5409, 0x0) 16:22:05 executing program 4: pipe(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4240a2c6) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000840)=@filter={'filter\x00', 0x50, 0x4, 0x3c0, 0x0, 0xd0, 0x1f8, 0xd0, 0x1f8, 0x2f0, 0x2f0, 0x2f0, 0x2f0, 0x2f0, 0x4, 0x0, {[{{@ipv6={@mcast1, @loopback, [], [], 'bond_slave_0\x00', 'syzkaller1\x00', {}, {}, 0x6, 0x0, 0x7}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x6}}}, {{@ipv6={@dev, @mcast1, [], [], 'dummy0\x00', 'veth0_to_bond\x00'}, 0x0, 0x100, 0x128, 0x0, {}, [@common=@frag={{0x30}}, @common=@ipv6header={{0x28}}]}, @REJECT={0x28}}, {{@ipv6={@remote, @empty, [], [], 'ip6tnl0\x00', 'ip_vti0\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@icmp6={{0x28}, {0x0, "1883"}}]}, @REJECT={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x473) 16:22:05 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:05 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @private2, 0x7800}}) [ 656.345366][T15814] x_tables: ip6_tables: icmp6 match: only valid for protocol 58 16:22:05 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f736530000000000000000000000000000000000000000000000000000000000000e4ff0800000000000000000000000000000000000000000000000000000000000000000000000000000000000e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000fcffffffffffffff00000000000000000000000003000000070000000000000000000000000000004800435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000009000000000000000000000000000000200000000000000000000000000400000000000000000000000000000070009000000000094100000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000004000000000000000000000000000000000000000000000feffffff"], 0x1) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000010c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfe4b}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 16:22:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r0, 0x0, 0x0) 16:22:05 executing program 1: clock_gettime(0x7, &(0x7f0000002080)) 16:22:05 executing program 5: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000004f0007031dfffd946fa2830020020a0003000800001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 16:22:05 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 656.851270][T15823] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables 16:22:06 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r0, 0x0, 0x0) 16:22:06 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000009c0)={'ip6tnl0\x00', &(0x7f0000000640)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @remote}}) 16:22:06 executing program 0: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$revoke(0x6, r0) 16:22:06 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x6c0040, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x6}, &(0x7f0000000140)={0x9}, &(0x7f0000000180)={0x77359400}, 0x0) 16:22:06 executing program 2: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:06 executing program 5: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x11e7, 0x0, 0x0, 0x0, 0x0) 16:22:06 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r0, 0x0, 0x0) 16:22:09 executing program 4: memfd_create(&(0x7f0000000000)='\x00', 0x0) 16:22:09 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) 16:22:09 executing program 2: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x1, &(0x7f0000000340)=@raw=[@exit], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x20000678) 16:22:09 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0xc008ae88, &(0x7f0000000640)={"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"}) 16:22:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) [ 660.581653][T15866] ptrace attach of "/root/syz-executor.2"[15862] was attempted by "/root/syz-executor.2"[15866] 16:22:09 executing program 2: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 16:22:09 executing program 1: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000500), &(0x7f00000005c0)={0x0}) 16:22:09 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x65, 0x0, 0x0) [ 660.897727][T15878] ptrace attach of "/root/syz-executor.2"[15877] was attempted by "/root/syz-executor.2"[15878] 16:22:09 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:10 executing program 0: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x77359400}, 0x0) 16:22:10 executing program 4: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 16:22:10 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 16:22:10 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000004840)={'ip6tnl0\x00', &(0x7f00000047c0)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @local}}) 16:22:10 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x18}, 0x40) 16:22:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xb, 0x2, [@const]}}, &(0x7f0000000140)=""/155, 0x26, 0x9b, 0x1}, 0x20) 16:22:10 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:10 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 16:22:10 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) read$char_raw(r0, 0x0, 0x0) 16:22:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x28, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x28}}, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r0, 0x0, 0x0) r3 = syz_io_uring_setup(0x7dbf, &(0x7f0000000240)={0x0, 0x0, 0x1}, &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000), &(0x7f0000000180)=0x0) syz_io_uring_submit(0x0, r4, &(0x7f0000000200)=@IORING_OP_POLL_REMOVE={0x7, 0x4}, 0x0) io_uring_enter(r3, 0x4c0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f00000001c0)={'ip6gre0\x00', {0x2, 0x0, @local}}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000008, 0x1010, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r5, &(0x7f00000004c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x4c, 0x0, 0x110, 0x70bd28, 0x0, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xc}}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x10) 16:22:11 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x3f}}}, 0x1c) sendmmsg(r1, &(0x7f0000004d80)=[{{0x0, 0xfffffdef, 0x0, 0x0, 0x0, 0x0, 0xffffffe0}}], 0xaa, 0x0) 16:22:11 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:11 executing program 0: pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000180), 0x0) 16:22:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 16:22:11 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000001640)={0x16, 0x0, 0x9, 0x6, 0x12}, 0x40) [ 662.400977][T15923] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 16:22:11 executing program 5: bpf$BPF_PROG_QUERY(0x21, &(0x7f0000000080)={0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0}, 0x20) 16:22:11 executing program 0: add_key$keyring(&(0x7f0000000380), 0x0, 0x0, 0x0, 0xfffffffffffffff8) 16:22:11 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x5428, 0x0) 16:22:11 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:12 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/fib_triestat\x00') preadv(r2, &(0x7f0000000080)=[{&(0x7f0000000280)=""/76, 0xff0d}], 0x1, 0x0, 0x0) 16:22:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 16:22:12 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:12 executing program 0: syz_genetlink_get_family_id$batadv(&(0x7f0000000000), 0xffffffffffffffff) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) 16:22:12 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/ipc\x00') 16:22:12 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x5411, 0x970000) 16:22:12 executing program 1: shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000100)=""/127) 16:22:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0x0, 0xfc3cdb29c10f0f53}, 0x14}}, 0x0) 16:22:12 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000040)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x78) 16:22:12 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x4020aea5, &(0x7f0000000080)={0x0, 0x0, @ioapic}) 16:22:12 executing program 4: msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000000)=""/250) 16:22:13 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:13 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const={0x0, 0x0, 0x0, 0x8}]}}, &(0x7f0000000140)=""/155, 0x26, 0x9b, 0x1}, 0x20) 16:22:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0x0, 0xfc3cdb29c10f0f53}, 0x14}}, 0x0) 16:22:13 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg(r0, &(0x7f0000002680)={&(0x7f0000000100)=@xdp={0x2c, 0x0, r1}, 0x80, &(0x7f0000001400)=[{&(0x7f0000000180)="53ae6d3ddac1f7193102e3bb2fcf0b706f115026cc4aaef2cb285fd19775a505079a6fee5d799c93435efd69cd4d466acc7e4bec739c", 0x36}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}], 0x20}, 0x0) 16:22:13 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) mmap(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x0, 0x12, r0, 0x0) 16:22:13 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x4, &(0x7f0000000080)=@framed={{}, [@jmp={0x7, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}]}, &(0x7f00000000c0)='GPL\x00', 0x7, 0xe8, &(0x7f0000000100)=""/232, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:22:13 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0x0, 0xfc3cdb29c10f0f53}, 0x14}}, 0x0) 16:22:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@bridge_getneigh={0x28, 0x1e, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, 0x0, 0x0, 0x62214}, [@IFLA_LINK_NETNSID={0x8}]}, 0x28}}, 0x0) 16:22:13 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x19, 0x0, 0x0, 0x100000, 0x0, 0x1}, 0x40) 16:22:13 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000080)=""/132, 0x36, 0x84, 0x1}, 0x20) [ 664.930407][T16005] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 16:22:14 executing program 5: bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 16:22:14 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:14 executing program 1: add_key$fscrypt_provisioning(0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="03"], 0xc, 0xfffffffffffffff9) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) 16:22:14 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r1}, 0x14}}, 0x0) 16:22:14 executing program 0: add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) 16:22:14 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x4, &(0x7f0000000080)=@framed={{}, [@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}]}, &(0x7f00000000c0)='GPL\x00', 0x7, 0xe8, &(0x7f0000000100)=""/232, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:22:14 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="f6975a262942"}, 0x14) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) 16:22:14 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:14 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0x6, &(0x7f0000000200)=@framed={{}, [@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, @alu, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000240)='GPL\x00', 0x6, 0xff, &(0x7f0000000280)=""/255, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:22:14 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r1}, 0x14}}, 0x0) 16:22:14 executing program 4: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) 16:22:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000000c0)={'tunl0\x00', &(0x7f0000000040)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}}}}) 16:22:15 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0, 0x0) 16:22:15 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:15 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f736530000000000000000000000000000000000000000000000000000000000000e4ff0800000000000000000000000000000000000000000000000000000000000000000000000000000000000e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000fcffffffffffffff00000000000000000000000003000000070000000000000000000000000000004800435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000009000000000000000000000000000000200000000000000000000000000400000000000000000000000000000070009000000000094100000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000004000000000000000000000000000000000000000000000feffffff"], 0x1) r1 = perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000010c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00010000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02c8695e5a7f24df41dc10d1e8bf076d83923dd29c034055b67dafe6c8dc3d5d78c084a1f7e655ce34e4d5b318e2ec0e0700897a74a0091ff110026e6d2ef831ab7ea0c34f17e3ad6ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f93781965f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fbce841f8a97be6148ba532e6ea09c346dfebd31a08b32808b80200000000009dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61b663a3462fd50117b89a9ab359b4eea0c6e90467d42b4e54861d0227dbfd2ed8576a3f7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0180af9a9ceafd07e500b0000002cab154ad029a119ca3c972780870014601c3c975d5aec84222fff0d7216fdb0d3a0ec4be3e563112f4b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a2a71bc85018e5ff2c910496f18afc9ffc2cc788bee1b47683db01a469398685211bbae3e2ed0a5670e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcdcc22ee17476d738992533ac2a9f5a699593f084419cae0b4183fb01c73f99857399537f5dc2acb72c7eae93ffc9eb22d130665b6341da114f08cd0509d380578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a08707671315c302fae29187d4f5c06a960fd37c10223fdae7ed04935c3c90d3add8eebce6adcda2130f5011e48455b588b90dfae158b94f50adab988dd8e12baf5cc9398c88607a08009c2977aab37d9a44cfc1c7b4000000000000fa47742f6c5b9c4b11e7d7262a1457c39495c826b956ba859ac8e3c177b91bd7d5ca1664fe2f3ced8468911806e8916dc15e21644db60c2499d5d16d7d915836ab26c169482008ef06854797f2f900c2a12d8c38a967c12b28dd30c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf29f517d90bdc01e73835d5a387a9e90d767671414c99d4894ee7f8249dc1e3428d2129369ece5be5e1b85afa1a5be5f6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1038debd64cbe359454a3f2239cfe35f81b7aded448859968ff0e90500d0b07c0dd00490f167e6d5c1109681739dc33f75b20428d6474a0a91ee90b8de802c69f8ffdd8c25e6a48a243d5a9789db538622e6bbcb8f786b415263c401e64ed69a2f75409000000000000001d695c4559b82cabac3cccadc1e1c19af4e03020abf5ff0433d660f20898d2a045d009a0ffb20a77c9af2b80c05184a66d30bbea2ca45a4d6d00587b603306a5af8d867d80a07f10d82eafb03062e95196d5e3b854b1c8c768c001496fa99ce5b5040be959096ea948cfa8e7194123e918914a71ad5a8539fb956dbc60f7d9719b55b3abb6bba3d113a680a8d46fe074c83fbe378a3889e8145b2eaceab05ef932c6e4f8ef0ed0d8c56f7ec452aa8a48ac18a7b76d8380b1680000000049563cfee3a7f0fc10bfa32c418cef875fb49e299d177a1bcd1e30e9280bc586e79a5dd8076c248e7d6e97b3ce267dd4e27b6ef206660090bb216447d0f69351306b80bef8bc4cef378f97ca33fccf363361dcdba10c1547053453d0c9aec91a24079b21d52fb5516bf0c28ef37aa76442f6083dc99cd61afaf6be45d7b00d3639f2f10ac2d5c759c3e5468f5874c24411d415b6b085fb73a2c7c3852e0e658ffeb4e863428a792bee94f6cd895424360e0464f9d7ea425f2fa6aac029d15af607ad83532ff181c985f54b39370c06e63055b4d6a36fa98a44e379d2bccf977c3e88538f406b598307c9912fcd919d156bb496b002d645a5013f88a2ca6fd1f9320cfe7fc8e9f7f15f02e177ce23f43a154b42e26f037e8a01377cbd3f509e6e540c9ba9c2a589ac5d8ad67a65e9cfd61aa17f96471214dd68a44c576dc24452eaa9d819e2b04bdd1c5faae549a216d6156cc7a54be90dbd24f0434723eabcb1e6b9463041164feced93fba98d611aaea9ec2cd8cabbfa3705158803220f021e3de721e9d47c85ed0bd8424c3cd5242e1dbd85999392f6d05b00bca7af687bbed847faf6446ff9f88af43d7b7efd790ad7fc2d71f99959699cc683ae5325874dc34b5939e3822e0943d559e15996632e9f52c323210e68bcbd2876d2d4296a884cc7ef1f237d86be76050000000000fd35d5f93eef4c7c6bf021e743d28aba637c99745b038df9162de873d6cebd8a9fcb26a5e696a6167d07f351243e51ce74b1bd1be55d117a21d7e3924bee0eef4ce8a100d5da4da83f05efa0c09e9884fe68854b4f3c7ce1a38bbb137220f2a806b406bcbab259c3ae00000000000000246540fdea0d76b175a9b61f3de6b3687655371a659bf109cc0a3cc02203fe0f3180bb70be8893acd28ac2948c717a9d9ebc97cc49e2e7"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfe4b}, 0x48) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(0x0, r3, 0x0, r1, 0xb) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="b9ff03006044238cb89e14f088a81bffffff0400400a630677fbac141431e934e0a662079f4b4d2f89e5feca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000000}, 0x2c) 16:22:15 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r1}, 0x14}}, 0x0) 16:22:15 executing program 4: r0 = timerfd_create(0x7, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x77359400}, {0x0, r1+60000000}}, &(0x7f0000000080)) 16:22:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x28, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @random="75b2e48ff864"}]}, 0x28}}, 0x0) 16:22:15 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0xa, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 666.570832][T16049] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables 16:22:15 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@dellink={0x34, 0x11, 0x1, 0x0, 0x0, {}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'syz_tun\x00'}]}, 0x34}}, 0x0) lsetxattr$security_capability(&(0x7f0000000280)='./file2\x00', &(0x7f00000002c0), &(0x7f0000000300)=@v2={0x2000000, [{0x9, 0x200}, {0x726, 0x8aa}]}, 0x14, 0x2) rmdir(&(0x7f0000000240)='./file2/file0\x00') read$FUSE(0xffffffffffffffff, &(0x7f0000000380)={0x2020}, 0x2020) fstat(0xffffffffffffffff, &(0x7f0000000000)) fcntl$dupfd(r0, 0x406, r0) socket$inet6_udp(0xa, 0x2, 0x0) 16:22:16 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x540a, 0x2) 16:22:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000540)=0x2, 0x4) 16:22:16 executing program 5: r0 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$chown(0x4, r0, 0xee00, 0x0) 16:22:16 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:16 executing program 3: bpf$PROG_LOAD(0x7, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 16:22:19 executing program 1: memfd_create(&(0x7f0000002480)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x2) 16:22:19 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000), 0x4) 16:22:19 executing program 5: bpf$PROG_LOAD(0x2, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 16:22:19 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:19 executing program 3: pselect6(0x40, &(0x7f00000000c0)={0x7}, &(0x7f0000000100)={0x5}, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0), 0x8}) 16:22:19 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0xfffffffffffffffd) 16:22:20 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:20 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240)={0xffffffffffffffff}, 0x4) 16:22:20 executing program 0: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@broadcast, @broadcast, @val, {@ipv6}}, 0x0) 16:22:20 executing program 5: setrlimit(0x2, &(0x7f0000000400)={0x60000000, 0x60000000}) 16:22:20 executing program 4: r0 = socket(0x11, 0x3, 0x0) bind$unix(r0, &(0x7f0000000040)=@abs={0x0, 0x0, 0x1}, 0x8) 16:22:20 executing program 1: r0 = open$dir(&(0x7f00000000c0)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file1\x00', 0x0) symlinkat(&(0x7f0000000240)='./file1\x00', r0, &(0x7f0000000280)='./file0\x00') openat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 16:22:20 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:20 executing program 3: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @local, @val, {@ipv6}}, 0x0) 16:22:20 executing program 5: r0 = open$dir(&(0x7f00000000c0)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000240)='./file1\x00', r0, &(0x7f0000000280)='./file1\x00') renameat(r0, &(0x7f0000000000)='./file1\x00', 0xffffffffffffff9c, 0x0) 16:22:20 executing program 4: syz_emit_ethernet(0xae, &(0x7f0000000100)={@local, @broadcast, @val, {@ipv6}}, 0x0) 16:22:20 executing program 0: syz_emit_ethernet(0x32, &(0x7f0000000000)={@broadcast, @local, @val, {@ipv4}}, 0x0) 16:22:20 executing program 1: r0 = open$dir(&(0x7f00000000c0)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file1\x00', 0x0) symlinkat(&(0x7f0000000240)='./file1\x00', r0, &(0x7f0000000280)='./file0\x00') openat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 16:22:21 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:21 executing program 3: syz_emit_ethernet(0xe, &(0x7f0000000000)={@local, @remote, @val, {@ipv4={0x806}}}, 0x0) 16:22:21 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @remote, @val, {@ipv4}}, 0x0) 16:22:21 executing program 0: syz_open_pts(0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) select(0x40, &(0x7f0000000080), &(0x7f00000000c0)={0x3ff}, 0x0, 0x0) 16:22:21 executing program 5: syz_emit_ethernet(0x146, &(0x7f0000000100)={@local, @broadcast, @val, {@ipv6}}, 0x0) 16:22:21 executing program 1: r0 = open$dir(&(0x7f00000000c0)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file1\x00', 0x0) symlinkat(&(0x7f0000000240)='./file1\x00', r0, &(0x7f0000000280)='./file0\x00') openat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 16:22:21 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:21 executing program 3: r0 = open$dir(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) 16:22:21 executing program 4: syz_emit_ethernet(0x22, &(0x7f0000000080)={@local, @broadcast, @val, {@ipv4}}, 0x0) 16:22:21 executing program 0: r0 = open$dir(&(0x7f00000000c0)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file1\x00', 0x0) mknodat(r0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) 16:22:21 executing program 5: syz_emit_ethernet(0x32, &(0x7f0000000000)={@broadcast, @local, @val, {@ipv4}}, 0x0) 16:22:22 executing program 1: r0 = open$dir(&(0x7f00000000c0)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file1\x00', 0x0) symlinkat(&(0x7f0000000240)='./file1\x00', r0, &(0x7f0000000280)='./file0\x00') openat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 16:22:22 executing program 4: syz_emit_ethernet(0x3e, &(0x7f0000000380)={@local, @empty, @val, {@ipv6}}, 0x0) 16:22:22 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="7294d12ed5ad", @val, {@ipv6}}, 0x0) 16:22:22 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:22 executing program 0: syz_emit_ethernet(0x3a, &(0x7f0000000040)={@broadcast, @random="7294d12ed5ad", @val, {@ipv6}}, 0x0) 16:22:22 executing program 5: syz_emit_ethernet(0x883, &(0x7f00000001c0)={@local, @broadcast, @val, {@ipv6}}, 0x0) 16:22:22 executing program 1: syz_emit_ethernet(0x3a, &(0x7f0000000040)={@local, @broadcast, @val, {@ipv4}}, 0x0) 16:22:22 executing program 3: r0 = open$dir(&(0x7f00000000c0)='.\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000040)='./file1\x00', 0x1000, 0x0) 16:22:22 executing program 4: open$dir(&(0x7f00000000c0)='.\x00', 0x200, 0x0) 16:22:22 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:23 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000540)={@broadcast, @local, @val, {@ipv6}}, 0x0) 16:22:23 executing program 5: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@broadcast, @broadcast, @val, {@ipv6}}, 0x0) 16:22:23 executing program 1: r0 = open$dir(&(0x7f00000000c0)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000240)='./file1\x00', r0, &(0x7f0000000280)='./file1\x00') r1 = geteuid() fchown(r0, r1, 0x0) 16:22:23 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000140)={@broadcast, @local, @val, {@ipv6}}, 0x0) 16:22:23 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000780)={0xffffffffffffffff}) connect$unix(r0, &(0x7f00000007c0)=@file={0x0, './file1/file0\x00'}, 0x10) 16:22:23 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:23 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000080)={@broadcast, @random="7294d12ed5ad", @val, {@ipv6}}, 0x0) 16:22:23 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@broadcast, @local, @val, {@ipv4}}, 0x0) 16:22:23 executing program 4: r0 = open$dir(&(0x7f00000000c0)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file1\x00', 0x0) symlinkat(&(0x7f0000000240)='./file1\x00', r0, &(0x7f0000000280)='./file0\x00') 16:22:23 executing program 1: syz_emit_ethernet(0x32, &(0x7f0000000040)={@random="e37e8a3f7649", @local, @val, {@arp={0x806, @generic={0x1, 0x0, 0x6, 0x0, 0x0, @random="3588d9ddc87c", "", @broadcast, "5da9b0ec5eff50b3cdfe26c0d5f733ab"}}}}, 0x0) 16:22:23 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @broadcast, @val, {@ipv6}}, 0x0) 16:22:24 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:24 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @remote, @val, {@ipv4}}, 0x0) 16:22:24 executing program 5: r0 = open$dir(&(0x7f00000000c0)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000240)='./file1\x00', r0, &(0x7f0000000280)='./file1\x00') openat(r0, &(0x7f0000001740)='./file1\x00', 0x0, 0x0) 16:22:24 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:24 executing program 4: syz_emit_ethernet(0x27f, &(0x7f0000000600)={@local, @random="5955ddbae5b2", @val, {@ipv6}}, 0x0) 16:22:24 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF2(r0, 0x5608, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, "5764bca95c793a65615fa92b34ed2d67695f35"}) 16:22:24 executing program 3: socketpair(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[], 0x1c}}, 0x0) 16:22:24 executing program 5: socket$inet(0x2, 0x800, 0xfffffffd) r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x107202) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 16:22:24 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x200, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084503, &(0x7f0000000000)=[0x0, 0xfdfdffff]) 16:22:24 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000001940)={0x2, 0x4e24, @rand_addr=0x64010100}, 0x10) 16:22:25 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:25 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000200)) 16:22:25 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:25 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x891c, 0x0) 16:22:25 executing program 0: syz_emit_ethernet(0x46, &(0x7f0000000140)={@random="eb87ad11d189", @broadcast, @val, {@ipv4}}, 0x0) 16:22:25 executing program 5: syz_emit_ethernet(0x6a, &(0x7f0000000000)={@dev, @multicast, @val, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, "c68dee", 0x2c, 0x6, 0x0, @loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 16:22:25 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1aa}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:25 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0x0, 0x1, 0x3, 0x0, 0x0, {}, [@CTA_ZONE={0x6}]}, 0x1c}}, 0x0) 16:22:25 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000100), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xa) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0x5420, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xa) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 16:22:25 executing program 0: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @local, @val={@void, {0x8100, 0x0, 0x1}}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "114c03", 0x14, 0x6, 0x0, @local, @mcast1, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:22:25 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:25 executing program 3: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="03"], 0x84, 0x0) msgrcv(r0, &(0x7f0000000140)={0x0, ""/127}, 0x87, 0x3, 0x0) 16:22:26 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) 16:22:26 executing program 4: r0 = socket(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f00000005c0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000000)=""/20, 0x14}, {&(0x7f0000000040)=""/222, 0xde}], 0x2, &(0x7f0000000300)=""/163, 0xa3}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/144, 0x90}, {&(0x7f0000000680)=""/143, 0xffffffffffffff8f}, {&(0x7f00000001c0)=""/65, 0x41}, {&(0x7f0000000180)=""/41, 0x29}], 0x4, &(0x7f00000007c0)=""/201, 0xc9}}], 0x2, 0x0, 0x0) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000003f00)={0x0, 0x0, &(0x7f0000003ec0)={&(0x7f0000002c40)=ANY=[@ANYBLOB="4c000000120001"], 0x4c}}, 0x0) 16:22:26 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'netdevsim0\x00'}) 16:22:26 executing program 0: sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, 0x0, 0x0) socket(0x10, 0x0, 0x0) 16:22:26 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:26 executing program 1: r0 = socket(0x26, 0x5, 0x0) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r0, 0x89a0, 0x0) 16:22:26 executing program 5: rt_sigtimedwait(&(0x7f0000000240), 0x0, &(0x7f0000000440)={0x77359400}, 0x8) [ 677.457837][T16290] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.4'. [ 677.557161][T16290] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.4'. 16:22:26 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETSHIFTSTATE(r0, 0x541c, &(0x7f0000000200)) 16:22:26 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000012c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="14020000100001000000000000dd000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000a8001680600001800c00050001000000000000000c00050001000000000000000c00090000800000cac400000c000700060000002804000014000b00ff0f00000000000006000000000000000c00070033400000060000000c00040004000000df0400002c00018010000200810000005c0000000200000018000c80140001000b0400000b0c00000700000088a800001800018014000a00e2000000000000000800000000000000080025000000000008001300", @ANYRES32, @ANYBLOB="20002200da6bbe54ea074b1c94d26cb3d404c7b8ea265552d20344e2fef6b134240012800b0001006970766c616e0000140002800600020003000000060001"], 0x214}}, 0x0) 16:22:26 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000003f00)={0x0, 0x0, &(0x7f0000003ec0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="5400000012000102"], 0x54}}, 0x0) recvmmsg(r0, &(0x7f00000005c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/30, 0x1e}}], 0x1, 0x0, 0x0) 16:22:27 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF2(r0, 0x4b46, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, "5764bca95c793a65615fa92b34ed2d67695f35"}) 16:22:27 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 678.137688][T16307] netlink: 248 bytes leftover after parsing attributes in process `syz-executor.4'. [ 678.205556][T16309] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.3'. [ 678.215564][T16309] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.3'. 16:22:27 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000006b80), 0x0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) [ 678.270913][T16310] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.3'. [ 678.351796][T16309] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.3'. [ 678.361710][T16309] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.3'. [ 678.379116][T16310] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.3'. 16:22:27 executing program 4: request_key(&(0x7f00000000c0)='logon\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='^\x00', 0x0) 16:22:27 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, {'syz1\x00', 'syz0\x00', 'syz0\x00', 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 'S'}}, 0x119) 16:22:27 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:27 executing program 3: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)=0x6) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000040)) read$dsp(r0, &(0x7f0000000440)=""/33, 0x21) 16:22:27 executing program 0: syz_open_dev$mouse(&(0x7f0000000200), 0x80000000, 0x0) 16:22:27 executing program 5: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x10) [ 678.848043][ T4669] hid-generic 0000:0000:0000.0001: item fetching failed at offset 0/1 [ 678.885314][ T4669] hid-generic: probe of 0000:0000:0000.0001 failed with error -22 16:22:28 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000280)='reno\x00', 0x4) 16:22:28 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:28 executing program 1: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000000)={0x42, 0x0, 0x3}, 0x10) 16:22:28 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) 16:22:28 executing program 5: r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 16:22:28 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000080)={0x1, 0x0, 0x11, &(0x7f0000000000)="5661e0de3b0393f378df736a122216e76d"}) 16:22:28 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x48) 16:22:28 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x0, 0x0) 16:22:28 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 16:22:28 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:28 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x400, 0x5b3}) 16:22:29 executing program 3: r0 = syz_open_dev$mouse(&(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000000), r0) 16:22:29 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="d6", 0x1, 0xfffffffffffffffd) 16:22:29 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bind$inet(r0, 0x0, 0x0) 16:22:29 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}]}}, 0x0, 0x13a}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 680.343422][T16366] blktrace: Concurrent blktraces are not allowed on loop0 16:22:29 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_user\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x13, r0, 0x0) r1 = io_uring_setup(0x233d, &(0x7f0000000280)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000b40)=[0xffffffffffffffff], 0x300) 16:22:29 executing program 5: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) sendmmsg$inet(r0, &(0x7f0000005240)=[{{0x0, 0xffffff7f, 0x0}, 0x201}], 0x102, 0x401eb94) 16:22:29 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000280)={0x0, 0x0, 0x0, &(0x7f0000000180)}) 16:22:29 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}]}}, 0x0, 0x13a}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:29 executing program 0: syz_open_dev$swradio(&(0x7f00000000c0), 0x1, 0x2) 16:22:31 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000000), 0x0, 0x28a41) write$FUSE_ENTRY(r0, &(0x7f0000002080)={0x90, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xffffffffffffffff}}}, 0x90) 16:22:31 executing program 4: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xdc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$can_raw(0x1d, 0x3, 0x1) openat$vfio(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) 16:22:31 executing program 3: openat$nullb(0xffffffffffffff9c, 0x0, 0x402000, 0x0) 16:22:31 executing program 5: syz_open_dev$ndb(&(0x7f0000000040), 0x0, 0x4000) 16:22:31 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}]}}, 0x0, 0x13a}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:31 executing program 0: socket(0x1d, 0x0, 0x81) 16:22:32 executing program 5: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) 16:22:32 executing program 3: r0 = msgget(0x3, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000340)={{}, 0x0, 0x0, 0xffffffffffffffff}) 16:22:32 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x181, 0x181, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:32 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'syztnl1\x00', &(0x7f0000000180)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @private0}}) 16:22:32 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000480)='\xb9\xecm1\xc1\xf8\xa6\x8d\xc1\xe2zMN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r1, &(0x7f0000000080)="0600", 0x2) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000800)=ANY=[@ANYBLOB=','], 0x2c) sendfile(r1, r1, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f000002eff0)={0x85c, &(0x7f0000000000)=[{}]}, 0x10) 16:22:32 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000540), 0x0, 0x0) r1 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x6, 0x20, 0x1, r1, 0x0, 0x0, 'syz1\x00', 0x0}) 16:22:32 executing program 5: r0 = memfd_create(&(0x7f0000000040)='net/unix\x00', 0x0) pwritev2(r0, &(0x7f0000000380)=[{&(0x7f0000000100)="ab", 0x1}], 0x1, 0x0, 0x0, 0x0) finit_module(r0, 0x0, 0x0) [ 683.818990][T16434] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present 16:22:32 executing program 3: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040), 0x550d01, 0x0) 16:22:32 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, 0x0) [ 683.888141][T16435] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present 16:22:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpriority(0x2, 0x0) 16:22:33 executing program 5: ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @rumble={0x0, 0xfff}}) r0 = syz_open_dev$hidraw(0xfffffffffffffffc, 0x0, 0x141f42) r1 = syz_open_dev$hidraw(0xfffffffffffffffc, 0x0, 0x161f42) write$hidraw(r1, &(0x7f00000002c0)="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", 0xfffffc71) ioctl$HIDIOCGRAWNAME(r0, 0x40305828, &(0x7f0000000080)) r2 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed105400000000003ec13e2000"}) 16:22:33 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, 0x0, 0x0) 16:22:33 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, 0x0) 16:22:33 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x181, 0x181, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:33 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000700)={0x0}) ppoll(&(0x7f00000006c0)=[{}], 0x1, &(0x7f0000000600)={r1}, &(0x7f0000000780)={[0xefddc5b]}, 0x8) syz_open_dev$evdev(0x0, 0x0, 0x0) 16:22:33 executing program 4: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000001680)={0x0, 0x0, 0x0}, 0x0) 16:22:33 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, 0x0, 0xd5ffcbb011d065b5) 16:22:34 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "1130744342ba53132049cd4b1b0c30b1b12243f026d68d0a0047876087c96aa77ae9152f1e02fe77c2a355b5b952ca63fb45c0c919c7f7ceeb382aa78bc9d5ac"}, 0x48, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r0, r0, r0, 0x0) 16:22:34 executing program 0: syz_open_dev$evdev(&(0x7f0000000700), 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000800), 0x0, 0x8c400) 16:22:34 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000080)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_IOCTL(r0, &(0x7f00000020c0)={0x20, 0x0, r2}, 0x20) 16:22:34 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) 16:22:34 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @loopback}}) 16:22:35 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x181, 0x181, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:35 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000700)={0x0}) ppoll(&(0x7f00000006c0)=[{}], 0x1, &(0x7f0000000600)={r1}, &(0x7f0000000780)={[0xefddc5b]}, 0x8) syz_open_dev$evdev(0x0, 0x0, 0x0) 16:22:35 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000080), 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f00000000c0)=r1) 16:22:35 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x0, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f0000000200)={0x2, 0x0, @local}, 0x10) 16:22:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8912, &(0x7f0000000080)={'batadv_slave_0\x00', @ifru_map}) 16:22:35 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x28, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'ip6_vti0\x00'}]}, 0x28}}, 0x0) 16:22:35 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$tipc(r0, 0x0, 0x0) 16:22:35 executing program 3: add_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\a', 0x1, 0xfffffffffffffffe) 16:22:36 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) dup2(r1, r2) 16:22:36 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) clone(0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x60, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 16:22:36 executing program 3: r0 = socket$isdn_base(0x22, 0x3, 0x0) accept4(r0, 0x0, 0x0, 0x80400) 16:22:36 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x181, 0x181, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:36 executing program 4: socket(0x28, 0x0, 0x400) 16:22:36 executing program 1: fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 687.514359][T16509] team0: Device ipvlan1 failed to register rx_handler 16:22:36 executing program 0: r0 = openat$ttyS3(0xffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000340)={0x0, 0x0, 0xfdfdffff, 0x0, 0x0, "7809b869013223e462f5d614818c35281f3f3a"}) 16:22:36 executing program 3: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x10, &(0x7f0000000040), 0x4) 16:22:37 executing program 4: syz_open_dev$video(&(0x7f0000000040), 0x0, 0x4400) [ 688.012812][T16526] team0: Device ipvlan1 failed to register rx_handler 16:22:37 executing program 1: request_key(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0xfffffffffffffffa) 16:22:37 executing program 3: syz_open_dev$ndb(&(0x7f0000000040), 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000040), 0x0, 0x0) 16:22:37 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "eaff18e2090000000000000200000000010051"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x16, 0x0, 0x0, 0x0, 0x0, "00000000000007000000000000000000000400"}) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000280)={0x3ff, 0x0, 0x0, 0x102, 0x0, "5eb9d5e03e7de477c096c2cd9df22acda19c34"}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000100003000000000000000900001000"}) 16:22:37 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x181, 0x181, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:38 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @local}, 0xc) syz_emit_ethernet(0x2a, &(0x7f00000000c0)={@random="03366dadf711", @remote, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1=0xe0000002}, @address_request}}}}, 0x0) 16:22:38 executing program 1: ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000180)) r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f0000000080)) 16:22:38 executing program 3: syz_open_dev$mouse(&(0x7f0000000000), 0x0, 0x28a41) 16:22:38 executing program 0: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000006c0)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{{}, 0x7}, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x380}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffc0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x3}, {}, {}, {0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x401}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xadfe}], [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x5}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0) 16:22:38 executing program 4: r0 = fork() tkill(r0, 0x9) 16:22:38 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x9, &(0x7f0000001640), 0x4) 16:22:38 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={{'fd', 0x22}}) 16:22:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000600)=@ipv6_newroute={0x24, 0x12, 0x631, 0x0, 0x0, {}, [@RTA_METRICS={0x5, 0x8, 0x0, 0x1, "d4"}]}, 0x24}}, 0x0) 16:22:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x2, 0x3, 0x2f8, 0x8f, 0x0, 0x160, 0x160, 0x62020000, 0x260, 0x260, 0x260, 0x260, 0x260, 0x3, 0x0, {[{{@ip={@loopback=0x7f008e04, @local, 0x0, 0x0, 'vlan0\x00', 'bridge_slave_0\x00'}, 0xb003, 0x130, 0x160, 0x8, {0xf400000000000000}, [@common=@unspec=@string={{0xc0}, {0x0, 0x0, 'kmp\x00', "4bc74c01d6369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa2acab6b1d2cc05060feb70b5bc8c2d4ba3a94a2d2393e3182f64695d7d05fb478c8f56627a5cf905d564eeeb83ff0150ca0f3c44f7fda4d20a55050342ea9685ecc8838e049f1f2e2d081ddda375bb7008adc297a5ece1bb2df53d17bef26bb6f8", 0x5a}}]}, @common=@unspec=@CONNMARK={0x30}}, {{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@common=@ttl={{0x28}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x358) 16:22:39 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x181, 0x181, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) [ 690.079808][T16568] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 690.105556][T16569] fuse: Unknown parameter 'fd"0xffffffffffffffff' [ 690.107154][T16570] xt_CT: You must specify a L4 protocol and not use inversions on it 16:22:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) close(r1) 16:22:39 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0xa, 0x1, 0x0) r3 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x4, 0x0}, 0x0, r4}) ioctl(r2, 0x8916, &(0x7f0000000000)) ioctl(r2, 0x8936, &(0x7f0000000000)) 16:22:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x2, &(0x7f0000001640), 0x4) 16:22:39 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_set$pid(0x1, 0x0, 0x2007) 16:22:39 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) getsockname(r0, 0x0, &(0x7f0000000240)) 16:22:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x29, &(0x7f0000001640), 0x4) 16:22:40 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clock_gettime(0x2, &(0x7f0000000200)={0x0, 0x0}) clock_nanosleep(0x2, 0x1, &(0x7f0000000280)={0x0, r1+10000000}, 0x0) 16:22:40 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clock_nanosleep(0xb, 0x0, &(0x7f0000000280), 0x0) 16:22:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r2, 0xc1004110, &(0x7f0000000040)={0x0, [0x3, 0x9b, 0x45], [{0x0, 0x0, 0x0, 0x1}, {0x2, 0x445}, {0x0, 0x43f}], 0x8}) 16:22:40 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x181, 0x181, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:40 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/current\x00') exit_group(0x0) wait4(0x0, 0x0, 0x80000000, 0x0) read$FUSE(r0, 0x0, 0x0) 16:22:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000600)=@ipv6_newroute={0x20, 0x10, 0x631, 0x0, 0x0, {}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) 16:22:40 executing program 3: r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) syncfs(r0) 16:22:40 executing program 1: ftruncate(0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) fallocate(0xffffffffffffffff, 0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) syncfs(r0) 16:22:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x8, &(0x7f00000010c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0xb3, 0xe, 0xfeffffff, &(0x7f0000000280)="5f39868de2639b12c1a2ff010000", 0x0, 0x2d7, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 16:22:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x8, &(0x7f00000010c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0xb3, 0xe, 0xfeffffff, &(0x7f0000000280)="5f39868de2639b12c1a2ff0100f0", 0x0, 0x2d7, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 16:22:41 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x19e, 0x0, 0x80000000}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3b, &(0x7f0000000040)) 16:22:41 executing program 1: r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) fallocate(0xffffffffffffffff, 0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000000)) syncfs(r0) 16:22:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r2, 0xc1004110, &(0x7f0000000040)={0x0, [0x3, 0x9b, 0x45], [{0x11, 0x0, 0x0, 0x1}, {0x0, 0x445}, {0x0, 0x43f}], 0x8}) 16:22:41 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x8, &(0x7f00000010c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0xb3, 0xe, 0xfeffffff, &(0x7f0000000280)="5f39868de2639b12c1a2ff010000", 0x0, 0x2d7, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 16:22:41 executing program 4: syz_emit_ethernet(0x92, &(0x7f0000000180)={@local, @local, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "42f3de", 0x5c, 0x4, 0x0, @loopback, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, {[@routing={0x2c, 0x2, 0x0, 0x0, 0x0, [@ipv4]}]}}}}}, 0x0) 16:22:41 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x181, 0x181, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:41 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x14, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:22:41 executing program 1: socket$inet(0x2, 0x6000000000000003, 0x6) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xdd860000, &(0x7f0000000040)={&(0x7f0000000500)=@newlink={0xec, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0xcc, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @local}]}, @AF_INET={0x30, 0x2, 0x0, 0x1, {0x2c, 0x1, 0x0, 0x1, [{0xc, 0x16}, {0x8}, {0x1b}, {0x3}, {0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8, 0xd}, {0x8, 0xf}]}}, @AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}]}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8}, {0x8}, {0x8}, {0x8}]}}, @AF_MPLS={0x4}, @AF_INET6={0x0, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr=' \x01\x00'}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr=' \x01\x00'}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE]}, @AF_MPLS={0x4}]}]}, 0xec}}, 0x0) 16:22:42 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x28, &(0x7f0000001640), 0x4) 16:22:42 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @qipcrtr, @tipc, @llc}) 16:22:42 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000140), 0xc5b5, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000140), 0xc5b5, 0x2) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) 16:22:42 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2400000001, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x10, 0x0, &(0x7f0000e5f000)) 16:22:42 executing program 1: sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) syncfs(r0) 16:22:42 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000009800)=[{{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {0x0}], 0x2, &(0x7f0000000680)}}, {{0x0, 0x0, &(0x7f0000002900)=[{&(0x7f0000000800)="0ebebc8b13bd24e893201c9363bb1cb9b6fb5fb97b7d63c45718a5d6c1c9a744332f3135", 0x24}], 0x1, &(0x7f0000002940)=[{0x10, 0x0, 0xfffffffe}, {0x10, 0x104}, {0x10, 0x119, 0x5}, {0x18, 0x116, 0x0, "3c27b0349cd62d0a"}], 0x48}}, {{0x0, 0x0, &(0x7f0000005d40)}}, {{0x0, 0x0, 0x0}}], 0x4, 0x0) ftruncate(0xffffffffffffffff, 0x0) r0 = open(0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) fallocate(0xffffffffffffffff, 0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) fcntl$getownex(r2, 0x10, &(0x7f0000000000)) syncfs(r1) 16:22:42 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x23, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) getpid() perf_event_open(0x0, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) 16:22:43 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x4, 0x0, 0x2}]}, &(0x7f0000000040)='GPL\x00', 0x5, 0x81, &(0x7f0000000080)=""/129, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:22:43 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000140), 0xc5b5, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000140), 0xc5b5, 0x2) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) [ 694.176432][ T3123] ieee802154 phy0 wpan0: encryption failed: -22 [ 694.183197][ T3123] ieee802154 phy1 wpan1: encryption failed: -22 16:22:43 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x181, 0x181, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:43 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000400), 0x10) 16:22:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000340)=ANY=[@ANYBLOB="20000000000301"], 0x20}}, 0x0) 16:22:43 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@alu={0x4}]}, &(0x7f0000000040)='GPL\x00', 0x5, 0x81, &(0x7f0000000080)=""/129, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:22:43 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x84, 0x81, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 694.707642][T16696] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 16:22:43 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000140), 0xc5b5, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000140), 0xc5b5, 0x2) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) 16:22:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000600)=@ipv6_newroute={0x1c, 0x12, 0x631}, 0x1c}}, 0x0) 16:22:44 executing program 0: bpf$MAP_UPDATE_ELEM(0x22, 0x0, 0x0) 16:22:44 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000100)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000080)=0x7, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='cdg\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f0f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 16:22:44 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x80000001) r1 = socket$inet6(0xa, 0x6, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r2, 0x8912, 0x400308) setsockopt$inet6_int(r1, 0x29, 0x6, &(0x7f0000000040), 0x4) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) [ 695.376248][T16709] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 16:22:44 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x181, 0x181, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8}]}, 0x24}}, 0x0) 16:22:44 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000140), 0xc5b5, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000140), 0xc5b5, 0x2) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) 16:22:44 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0), 0x4) 16:22:44 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x80000001) r1 = socket$inet6(0xa, 0x6, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r2, 0x8912, 0x400308) setsockopt$inet6_int(r1, 0x29, 0x6, &(0x7f0000000040), 0x4) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) 16:22:45 executing program 0: r0 = socket(0x25, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x4020940d, &(0x7f0000000080)={'ip6gre0\x00', 0x0}) 16:22:45 executing program 4: unshare(0x14040000) unshare(0x50008b00) unshare(0x48000000) socket$can_raw(0x1d, 0x3, 0x1) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) 16:22:45 executing program 1: unshare(0x48000000) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) 16:22:45 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x80000001) r1 = socket$inet6(0xa, 0x6, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r2, 0x8912, 0x400308) setsockopt$inet6_int(r1, 0x29, 0x6, &(0x7f0000000040), 0x4) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) 16:22:45 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x5}]}, &(0x7f0000000040)='GPL\x00', 0x5, 0x81, &(0x7f0000000080)=""/129, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 696.601630][T16734] IPVS: ftp: loaded support on port[0] = 21 [ 696.631747][T16735] IPVS: ftp: loaded support on port[0] = 21 16:22:45 executing program 0: r0 = socket(0x25, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x2, 0x0) 16:22:46 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x181, 0x181, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:46 executing program 5: r0 = socket(0x25, 0x1, 0x0) recvmmsg(r0, &(0x7f00000061c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x50, 0x0) [ 697.187733][T16737] IPVS: ftp: loaded support on port[0] = 21 16:22:46 executing program 0: r0 = socket(0xa, 0x2, 0x0) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f00000006c0)={&(0x7f0000000480)={0xa, 0x9}, 0x5d, &(0x7f0000000680)={0x0}}, 0x0) [ 697.340530][T16735] IPVS: ftp: loaded support on port[0] = 21 16:22:46 executing program 3: socket$caif_stream(0x25, 0x1, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000001e80)={0x0, 0x0, &(0x7f0000001e40)={&(0x7f0000001400)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="440001007072696f72507479000000000000000000", @ANYBLOB], 0x60}}, 0x0) 16:22:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000001c0), 0x4) 16:22:46 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x4f45183eb9d7a76b, 0x1, &(0x7f00000002c0)=@raw=[@alu], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 697.848586][T16836] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 16:22:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) [ 697.899313][T16837] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 16:22:47 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @private2}}) 16:22:47 executing program 3: unshare(0x0) unshare(0x50008b00) unshare(0x48000000) r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000080), 0x10, 0x0}, 0x0) socket$can_j1939(0x2c, 0x2, 0x7) 16:22:47 executing program 5: unshare(0x48000000) sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) 16:22:47 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000280)={0x11, 0x19, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) 16:22:47 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x181, 0x181, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:47 executing program 0: r0 = socket(0x25, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x5452, &(0x7f0000000080)={'ip6gre0\x00', 0x0}) [ 698.570927][T16849] IPVS: ftp: loaded support on port[0] = 21 [ 698.600520][T16850] IPVS: ftp: loaded support on port[0] = 21 16:22:47 executing program 1: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@tcp}, 0xdb) 16:22:48 executing program 4: syz_genetlink_get_family_id$smc(&(0x7f0000000000), 0xffffffffffffffff) 16:22:48 executing program 0: r0 = socket(0x25, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x2, &(0x7f0000000080)={'ip6gre0\x00', 0x0}) 16:22:48 executing program 1: unshare(0x14040000) unshare(0x50008b00) unshare(0x48000000) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) getsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) socket$can_j1939(0x2c, 0x2, 0x7) 16:22:48 executing program 5: bpf$MAP_UPDATE_ELEM(0x1a, 0x0, 0x0) 16:22:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x5, 0x81, &(0x7f0000000080)=""/129, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:22:48 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000440)={'sit0\x00', &(0x7f00000003c0)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private0, @ipv4={'\x00', '\xff\xff', @empty}}}) 16:22:51 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x0, 0x4}, 0xc) 16:22:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x0, 0x3}]}]}}, &(0x7f00000001c0)=""/177, 0x36, 0xb1, 0x1}, 0x20) 16:22:51 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x181, 0x181, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:51 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f0000000000)=@framed={{}, [], {0x95, 0x2}}, &(0x7f0000000040)='GPL\x00', 0x5, 0x81, &(0x7f0000000080)=""/129, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:22:51 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, 0xfffffffffffffffc, 0x0) 16:22:51 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x5}]}, &(0x7f0000000040)='GPL\x00', 0x5, 0x81, &(0x7f0000000080)=""/129, 0x0, 0xf, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:22:51 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x16, 0x0, 0x6, 0x8000, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x40) 16:22:51 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x1}, 0x40) 16:22:51 executing program 0: unshare(0x14040000) unshare(0x50008b00) unshare(0x48000000) r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000080), 0x10, &(0x7f0000000100)={0x0, 0xffffffffffffff32}}, 0x0) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) socket$can_j1939(0x2c, 0x2, 0x7) 16:22:51 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) bind$l2tp(r0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) 16:22:51 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x5451, 0x0) [ 702.772023][T16948] IPVS: ftp: loaded support on port[0] = 21 16:22:52 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, @remote, @private1}}) 16:22:52 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x4}}, &(0x7f0000000040)='GPL\x00', 0x5, 0x81, &(0x7f0000000080)=""/129, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:22:52 executing program 4: socketpair(0x10, 0x80003, 0x0, &(0x7f00000001c0)) 16:22:52 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x181, 0x181, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:52 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000000240)={'ip6gre0\x00', 0x0}) 16:22:52 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8931, &(0x7f0000000680)={'sit0\x00', 0x0}) 16:22:52 executing program 5: unshare(0x48000000) r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000080), 0x10, &(0x7f0000000100)={0x0, 0xffffffffffffff32}}, 0x0) 16:22:52 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000ac0)={'batadv0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x13, 0x0, 0x0, 0x0, 0xca9, 0xffffffffffffffff, 0x0, '\x00', r1, 0xffffffffffffffff, 0x2, 0x5}, 0x40) 16:22:53 executing program 3: r0 = socket(0x25, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x401c5820, 0x0) 16:22:55 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xf, 0x4, 0x0, 0x6, 0x0, 0x1}, 0x40) 16:22:55 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x7}]}, &(0x7f0000000040)='GPL\x00', 0x5, 0x81, &(0x7f0000000080)=""/129, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:22:55 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000140)=0xc, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 16:22:55 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x181, 0x181, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:55 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8927, &(0x7f0000000680)={'sit0\x00', 0x0}) 16:22:55 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001500)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:22:55 executing program 5: bpf$MAP_UPDATE_ELEM(0x11, 0x0, 0x0) 16:22:55 executing program 1: r0 = socket(0xa, 0x2, 0x0) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f00000006c0)={&(0x7f0000000480)={0xa}, 0x5d, &(0x7f0000000680)={0x0}}, 0x0) 16:22:55 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0xa}}, &(0x7f0000000040)='GPL\x00', 0x5, 0x81, &(0x7f0000000080)=""/129, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:22:55 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x4, 0x0, 0x5}]}, &(0x7f0000000040)='GPL\x00', 0x5, 0x81, &(0x7f0000000080)=""/129, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:22:55 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x401c5820, 0x0) 16:22:56 executing program 5: unshare(0x14040000) 16:22:56 executing program 1: r0 = socket(0x25, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @private2, 0xff00}}) 16:22:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x4, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x10, 0x3}]}, @fwd={0x3}]}, {0x0, [0x0, 0x0]}}, &(0x7f00000001c0)=""/177, 0x44, 0xb1, 0x1}, 0x20) 16:22:56 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x2, 0xe3, &(0x7f0000000140)=""/227, 0x0, 0x1a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:22:56 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x181, 0x181, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:56 executing program 4: r0 = socket(0xa, 0x2, 0x0) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f00000006c0)={&(0x7f0000000480)={0x2, 0x48}, 0x5d, &(0x7f0000000680)={0x0}}, 0x0) 16:22:56 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x4, 0x0, 0xa}]}, &(0x7f0000000040)='GPL\x00', 0x5, 0x81, &(0x7f0000000080)=""/129, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:22:56 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x13, 0x0, 0x0, 0x0, 0xca9, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5}, 0x40) 16:22:56 executing program 0: bpf$MAP_UPDATE_ELEM(0xb, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 16:22:56 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x1000000000004e24, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) 16:22:56 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f0000000000)=@framed={{}, [], {0x95, 0x0, 0x0, 0x61}}, &(0x7f0000000040)='GPL\x00', 0x5, 0x81, &(0x7f0000000080)=""/129, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:22:57 executing program 5: pipe(&(0x7f0000000480)={0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x4, &(0x7f00000002c0)=@framed={{}, [@jmp]}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0xdc, &(0x7f0000000380)=""/220, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500), 0x10}, 0x78) 16:22:57 executing program 0: unshare(0x14040000) unshare(0x0) unshare(0x48000000) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:22:57 executing program 4: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000005c40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)=""/145, 0x91}], 0x1}}], 0x1, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[], 0xfffffd6d) 16:22:57 executing program 3: bpf$MAP_UPDATE_ELEM(0x3, 0x0, 0x0) [ 708.548319][T17075] IPVS: ftp: loaded support on port[0] = 21 16:22:57 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000019c0)={0x0, 0x0, &(0x7f0000001980)={&(0x7f0000000040)=ANY=[@ANYBLOB="14000000110001"], 0x1908}}, 0x0) 16:22:57 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x181, 0x181, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:22:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01002bbd7000cbdbdf2586"], 0x28}}, 0x0) 16:22:58 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000140), 0xc5b5, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000000)=""/128, 0x80}], 0x1, 0x0, 0x0) [ 709.202825][T17076] IPVS: ftp: loaded support on port[0] = 21 16:22:58 executing program 5: socketpair(0x23, 0x0, 0x6, &(0x7f0000000000)) 16:22:58 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0xc0189436, 0x0) 16:22:59 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x4, &(0x7f00000002c0)=@framed={{}, [@jmp]}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0xdc, &(0x7f0000000380)=""/220, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:22:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x4, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x7}, {}]}, @fwd={0x3}]}, {0x0, [0x0, 0x0]}}, &(0x7f00000001c0)=""/177, 0x44, 0xb1, 0x1}, 0x20) 16:22:59 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000019c0)={0x0, 0x0, &(0x7f0000001980)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a701800000e0a01"], 0x1908}}, 0x0) [ 710.301602][T17148] netlink: 6236 bytes leftover after parsing attributes in process `syz-executor.5'. 16:23:00 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f0000000000)=@framed={{}, [], {0x95, 0x71}}, &(0x7f0000000040)='GPL\x00', 0x5, 0x81, &(0x7f0000000080)=""/129, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:23:00 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x181, 0x181, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:00 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x1, &(0x7f0000000040)=@raw=[@jmp], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xa7, &(0x7f00000000c0)=""/167, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:23:00 executing program 3: bpf$MAP_UPDATE_ELEM(0x10, 0x0, 0x0) 16:23:00 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x40086602, 0x0) 16:23:00 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) 16:23:01 executing program 3: r0 = socket(0x1e, 0x2, 0x0) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f00000006c0)={&(0x7f0000000480)={0x2}, 0xc, &(0x7f0000000680)={0x0}}, 0x0) 16:23:01 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x3, &(0x7f00000002c0)=@raw=[@generic={0x9}, @initr0], &(0x7f0000000300)='GPL\x00', 0x7, 0xac, &(0x7f0000000340)=""/172, 0x0, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:23:01 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x894a, &(0x7f0000000680)={'sit0\x00', 0x0}) 16:23:01 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x4, 0x0, 0x4}]}, &(0x7f0000000040)='GPL\x00', 0x5, 0x81, &(0x7f0000000080)=""/129, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:23:01 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x4}]}, &(0x7f0000000040)='GPL\x00', 0x5, 0x8d, &(0x7f0000000240)=""/141, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:23:01 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x16, 0x7f, 0x0, 0x8000, 0x0, 0x1}, 0x40) 16:23:01 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3c, &(0x7f0000000000)=@framed={{}, [@alu]}, &(0x7f0000000040)='GPL\x00', 0x5, 0x81, &(0x7f0000000080)=""/129, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:23:01 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x181, 0x181, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(r0, &(0x7f0000005040)=[{{0x0, 0x0, 0x0}}], 0x1, 0x60, 0x0) 16:23:01 executing program 0: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000980)={0x80000000}, 0x8) 16:23:01 executing program 4: r0 = socket(0x25, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x5421, 0x0) 16:23:02 executing program 5: bpf$MAP_UPDATE_ELEM(0x12, 0x0, 0x0) 16:23:02 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000680)={'ip6_vti0\x00', 0x0}) 16:23:02 executing program 1: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r0, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="28571724b75aec4ad474304f834782b0c653ba9224d00000000000"], 0x1) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000140)=0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000000)={@remote, 0x0, r1}) socketpair(0x0, 0x80000, 0x3ff, &(0x7f0000000080)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000000), 0x4) r3 = socket(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x3, 0x3f, 0xff, 0x2, 0x0, 0x3, 0x40000000, 0x25a, 0x40, 0x170, 0x2, 0x1c00, 0x38, 0x1, 0x0, 0x5}, [{0x1, 0x4, 0x9, 0xffffffff8580729a, 0x26302461, 0xb08, 0x2, 0x6}], "127123f30ebf7710445189ae3a3e6a6d38764018bed4c0bc0763fce92ddb2436080997b14f98b05809773b7109b1eb46dd7f6e638873e059f326ac5a0f6032fd3db1a4b3d1b4a05380a0df319ec83fe7f1d45ac4486c4e38e3c903037296906b29746231fcdca838d8a73c456448d9909671c01d", ['\x00', '\x00']}, 0x2ec) ioctl(r3, 0x8916, &(0x7f0000000000)) ioctl(r3, 0x8936, &(0x7f0000000000)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, 0x0) 16:23:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x2c, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x2c}}, 0x0) 16:23:02 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8971, &(0x7f0000000680)={'sit0\x00', 0x0}) 16:23:02 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x7}]}, &(0x7f0000000040)='GPL\x00', 0x5, 0x81, &(0x7f0000000080)=""/129, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:23:02 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000080)={'syztnl0\x00', 0x0}) 16:23:02 executing program 0: r0 = socket(0x25, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x80086601, 0x0) 16:23:03 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x181, 0x181, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:03 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @private1}}) 16:23:03 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="f7"], 0x14}}, 0x0) 16:23:03 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 16:23:03 executing program 3: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, &(0x7f0000000100)=[{}, {}], 0x40) 16:23:03 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_genetlink_get_family_id$l2tp(&(0x7f0000002500), r0) 16:23:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="010000000000000000001f"], 0x1c}}, 0x0) 16:23:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0xfffffffb, 0x4) 16:23:03 executing program 5: socketpair(0x2a, 0x0, 0x0, &(0x7f00000005c0)) 16:23:03 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000040)={'sit0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}) [ 714.836149][T17232] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 714.879349][T17233] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 16:23:04 executing program 4: r0 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) 16:23:04 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f4, &(0x7f0000000680)={'sit0\x00', 0x0}) 16:23:04 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x181, 0x181, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:04 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000)=0x80000001, 0x4) 16:23:04 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) 16:23:04 executing program 0: r0 = socket(0x25, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000023c0)={'sit0\x00', &(0x7f0000002340)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private1, @dev}}) 16:23:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f00000000c0)=@gcm_256={{}, "6c9054d8d8532704", "9ee43fae86c4dbf884b860843bb0de02c4664fea8f344bf5e39aa567c0977653", "8a136c45", "98467c52ebc9c886"}, 0x38) 16:23:04 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x4, 0x0, 0x8}]}, &(0x7f0000000040)='GPL\x00', 0x5, 0x81, &(0x7f0000000080)=""/129, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:23:04 executing program 5: r0 = socket$caif_stream(0x25, 0x1, 0x0) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, &(0x7f0000000000), 0x4) 16:23:04 executing program 3: r0 = socket(0x25, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x801c581f, 0x0) 16:23:05 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f00000000c0)={@remote, @empty}, 0xc) 16:23:05 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000005640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 16:23:05 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x16, 0x0, 0x6, 0x8000, 0x5a0, 0x1}, 0x40) 16:23:05 executing program 3: r0 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000340)) 16:23:05 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x181, 0x181, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:05 executing program 5: bpf$MAP_UPDATE_ELEM(0xc, 0x0, 0x0) 16:23:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000b00)=@raw={'raw\x00', 0x3c1, 0x3, 0x6c0, 0x0, 0xffffff80, 0x178, 0x498, 0x178, 0x5f0, 0x258, 0x258, 0x5f0, 0x258, 0x3, 0x0, {[{{@ipv6={@mcast2, @private0, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x430, 0x498, 0x0, {}, [@common=@unspec=@bpf1={{0x230}, @fd}, @common=@inet=@hashlimit3={{0x158}, {'veth0_macvtap\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @remote}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'hsr0\x00'}, 0x0, 0xf8, 0x158, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@ipv6header={{0x28}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x720) 16:23:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x7}, {}]}, @fwd]}}, &(0x7f00000001c0)=""/177, 0x42, 0xb1, 0x1}, 0x20) 16:23:05 executing program 0: r0 = socket(0xa, 0x2, 0x0) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f00000006c0)={&(0x7f0000000480)={0x2}, 0x5d, &(0x7f0000000680)={0x0}}, 0x0) 16:23:06 executing program 5: socketpair(0x10, 0x80003, 0x2, &(0x7f00000001c0)) 16:23:06 executing program 4: bpf$MAP_UPDATE_ELEM(0x19, 0x0, 0x0) 16:23:06 executing program 3: r0 = socket(0x25, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a00)={'sit0\x00', &(0x7f0000000980)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private1, @private0}}) 16:23:06 executing program 0: bpf$MAP_UPDATE_ELEM(0x1c, 0x0, 0x0) 16:23:06 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8983, &(0x7f0000000680)={'sit0\x00', 0x0}) 16:23:06 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff3f, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xa0) 16:23:06 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000002c0)={'syztnl2\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @dev}}) 16:23:07 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x181, 0x181, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:07 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', 0x0}) 16:23:07 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, 0x0, &(0x7f0000000180)) 16:23:07 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x1b, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x5, 0x81, &(0x7f0000000080)=""/129, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:23:07 executing program 1: r0 = socket(0xa, 0x2, 0x0) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f00000006c0)={&(0x7f0000000480)={0x2, 0xa, 0xf0ff7f}, 0x5d, &(0x7f0000000680)={0x0}}, 0x0) 16:23:07 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0xf}}, &(0x7f0000000040)='GPL\x00', 0x5, 0x81, &(0x7f0000000080)=""/129, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:23:07 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000480)={{0x2, 0x0, @remote}, {0x0, @local}, 0x0, {0x2, 0x0, @broadcast}, 'ip6tnl0\x00'}) 16:23:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000001e80)={0x0, 0x0, &(0x7f0000001e40)={&(0x7f0000001400)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000000000008"], 0x60}}, 0x0) 16:23:07 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x5421, &(0x7f0000000680)={'sit0\x00', 0x0}) 16:23:07 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f0000000040)='GPL\x00', 0x5, 0x81, &(0x7f0000000080)=""/129, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:23:07 executing program 4: unshare(0x14040000) unshare(0x0) unshare(0x48000000) socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, &(0x7f0000000000), 0x0) [ 718.741407][T17319] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.0'. [ 718.801034][T17323] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.0'. 16:23:07 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, 0x13, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) [ 718.937052][T17327] IPVS: ftp: loaded support on port[0] = 21 16:23:08 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x181, 0x181, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:08 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001500)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000014c0), 0x10}, 0x78) 16:23:08 executing program 1: r0 = socket(0xa, 0x2, 0x0) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f00000006c0)={&(0x7f0000000480)={0x2}, 0x5d, &(0x7f0000000680)={0x0}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002240)=[{{&(0x7f0000001400)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'ip6_vti0\x00', 0x0, 0x29, 0x1, 0x81, 0xc80, 0x41, @dev={0xfe, 0x80, '\x00', 0x24}, @private0, 0x1, 0x700, 0x4, 0x8}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000240)={'syztnl2\x00', &(0x7f00000001c0)={'ip6tnl0\x00', r1, 0x4, 0x4, 0x4, 0xb447241, 0x20, @mcast2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x7f00, 0x40, 0x6, 0x4}}) syz_genetlink_get_family_id$batadv(&(0x7f0000002700), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd25, 0x25dfdbff, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8050}, 0x8880) 16:23:08 executing program 0: r0 = socket(0x25, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x5421, &(0x7f0000000080)={'ip6gre0\x00', 0x0}) [ 719.287532][T17328] IPVS: ftp: loaded support on port[0] = 21 16:23:08 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private1, @empty}}) 16:23:08 executing program 0: sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, 0x0, 0xabb0718e80bd8fe6) 16:23:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="67daa0df35b08026c161669b70d6576a", 0x10) 16:23:08 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)={0x58, 0x0, 0x9, 0x801, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8}, {0x8, 0x2, @multicast2}}}]}, @NFCTH_PRIV_DATA_LEN={0x8}, @NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8}}]}, 0x58}}, 0x0) 16:23:09 executing program 5: r0 = socket(0xa, 0x2, 0x0) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0xff00}, 0x0) 16:23:09 executing program 4: r0 = socket(0x25, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0xc0189436, &(0x7f0000000080)={'ip6gre0\x00', 0x0}) 16:23:09 executing program 3: r0 = socket(0xa, 0x2, 0x0) connect$inet(r0, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) 16:23:09 executing program 1: socketpair(0x11, 0xa, 0xfffffff7, &(0x7f0000000240)) 16:23:09 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x151, 0x151, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x16e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:09 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8923, &(0x7f0000000680)={'sit0\x00', 0x0}) 16:23:09 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000500)={&(0x7f0000000480), 0xc, &(0x7f0000000540)={&(0x7f0000000740)={0x1}, 0x40}}, 0x0) 16:23:09 executing program 4: r0 = socket(0xa, 0x2, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 16:23:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000001e80)={0x0, 0x0, &(0x7f0000001e40)={&(0x7f0000001400)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000000000008", @ANYRES32=0x0, @ANYBLOB='D'], 0x60}}, 0x0) 16:23:09 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000002dc0)={'sit0\x00', &(0x7f0000002d40)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2}}) 16:23:10 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x15, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 721.106033][T17412] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.3'. 16:23:10 executing program 0: r0 = socket(0xa, 0x3, 0xda) sendmsg$kcm(r0, &(0x7f0000000640)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80, 0x0}, 0x0) [ 721.195629][T17415] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.3'. 16:23:10 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000004b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x12000, 0x0) 16:23:10 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x151, 0x151, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x16e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:10 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) 16:23:10 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_BEACON(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000b40)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 16:23:10 executing program 0: bpf$MAP_UPDATE_ELEM(0x9, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 16:23:10 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x2}}, &(0x7f0000000040)='GPL\x00', 0x5, 0x81, &(0x7f0000000080)=""/129, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:23:11 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}, @remote}}) 16:23:11 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0xc020660b, 0x0) 16:23:11 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x151, 0x151, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x16e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:11 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f0000000000)=@framed={{}, [], {0x95, 0x0, 0x0, 0x2}}, &(0x7f0000000040)='GPL\x00', 0x5, 0x81, &(0x7f0000000080)=""/129, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:23:11 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8947, &(0x7f0000000680)={'sit0\x00', 0x0}) 16:23:11 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000580)={'ip6_vti0\x00', 0x0}) 16:23:11 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000080), 0x10, &(0x7f0000000100)={0x0, 0xffffffffffffff32}}, 0x0) 16:23:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000019c0)={0x0, 0x0, &(0x7f0000001980)={&(0x7f0000000040)=ANY=[@ANYBLOB="14000000100a01"], 0x1908}}, 0x0) 16:23:11 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x181, 0x181, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:11 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000480)={0x2, 0x0, 0x1, 0x0, 0x0, 0x0, {}, [@CTA_LABELS_MASK, @CTA_TUPLE_ORIG={0x0, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @local}, {0x0, 0x2, @dev}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv6={{0x0, 0x3, @mcast2}, {0x0, 0x4, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @loopback}, {0x0, 0x2, @multicast2}}}, @CTA_TUPLE_PROTO, @CTA_TUPLE_ZONE, @CTA_TUPLE_PROTO, @CTA_TUPLE_ZONE, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv6={{0x0, 0x3, @remote}, {0x0, 0x4, @mcast2}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv6={{0x0, 0x3, @dev}, {0x0, 0x4, @dev}}}]}, @CTA_SEQ_ADJ_REPLY={0x0, 0x10, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE, @CTA_SEQADJ_OFFSET_AFTER, @CTA_SEQADJ_CORRECTION_POS, @CTA_SEQADJ_OFFSET_BEFORE, @CTA_SEQADJ_CORRECTION_POS, @CTA_SEQADJ_OFFSET_BEFORE, @CTA_SEQADJ_OFFSET_AFTER, @CTA_SEQADJ_OFFSET_AFTER, @CTA_SEQADJ_OFFSET_AFTER]}, @CTA_NAT_DST={0x0, 0xd, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x0, 0x1, @multicast2}, @CTA_NAT_V6_MINIP={0x0, 0x4, @ipv4={'\x00', '\xff\xff', @private}}, @CTA_NAT_V6_MINIP={0x0, 0x4, @loopback}, @CTA_NAT_V4_MAXIP={0x0, 0x2, @private}]}, @CTA_NAT_SRC={0x0, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x0, 0x5, @empty}, @CTA_NAT_V4_MINIP={0x0, 0x1, @private}]}, @CTA_SYNPROXY={0x0, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN, @CTA_SYNPROXY_ITS]}, @CTA_LABELS_MASK={0x0, 0x17, [0x0]}, @CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv6={{0x0, 0x3, @remote}, {0x0, 0x4, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, @CTA_TUPLE_ZONE, @CTA_TUPLE_ZONE, @CTA_TUPLE_ZONE, @CTA_TUPLE_ZONE, @CTA_TUPLE_ZONE, @CTA_TUPLE_PROTO]}]}, 0x14}}, 0x0) 16:23:12 executing program 0: unshare(0x14040000) unshare(0x48000000) r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000080), 0x10, &(0x7f0000000100)={0x0, 0xffffffffffffff32}}, 0x0) socket$can_j1939(0x2c, 0x2, 0x7) 16:23:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(r0, &(0x7f0000005040)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 16:23:12 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8922, &(0x7f0000000680)={'sit0\x00', 0x0}) 16:23:12 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) bind$can_j1939(r0, 0x0, 0x700) [ 723.610371][T17468] sit0: mtu less than device minimum 16:23:12 executing program 3: r0 = socket(0xa, 0x2, 0x0) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f00000006c0)={&(0x7f0000000480)={0x2, 0xa}, 0x5d, &(0x7f0000000680)={0x0, 0x4800}}, 0x0) 16:23:12 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0xb, &(0x7f0000000000)=0x1, 0x4) 16:23:12 executing program 5: socket$caif_stream(0x25, 0x1, 0x3) 16:23:13 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x181, 0x181, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:13 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000040)='GPL\x00', 0x5, 0x81, &(0x7f0000000080)=""/129, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:23:13 executing program 3: r0 = socket$inet(0x2, 0x3, 0x2) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) 16:23:13 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000001e80)={0x0, 0x0, &(0x7f0000001e40)={&(0x7f0000001400)={0x14, r1, 0x1}, 0x14}}, 0x0) 16:23:13 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000000), 0x4) 16:23:13 executing program 0: r0 = socket(0xa, 0x2, 0x0) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f00000006c0)={&(0x7f0000000480)={0x2}, 0x5d, &(0x7f0000000680)={0x0, 0x3000000}}, 0x0) 16:23:13 executing program 3: unshare(0x14040000) unshare(0x0) unshare(0x48000000) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) getsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) 16:23:14 executing program 5: socket$can_j1939(0x1d, 0xa, 0x7) 16:23:14 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x4020940d, 0x0) 16:23:14 executing program 4: socketpair(0x11, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = accept$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000040)={@empty, 0x0}, &(0x7f00000002c0)=0x14) r3 = socket(0x25, 0x1, 0x0) r4 = accept4$inet(r3, &(0x7f0000000140)={0x2, 0x0, @dev}, &(0x7f0000000180)=0x10, 0x1800) r5 = accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000001c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@ipv4={""/10, ""/2, @loopback}, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@empty}}, &(0x7f0000000200)=0xe8) bind$packet(r5, &(0x7f0000000240)={0x11, 0x17, r6, 0x1, 0xaf, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000380)={'ip6_vti0\x00', &(0x7f0000000300)={'syztnl2\x00', r2, 0x29, 0x8, 0x1f, 0x2, 0x1, @private1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x80, 0x80, 0x0, 0xb845}}) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f00000000c0)={r2, 0x1, 0x6}, 0x10) 16:23:14 executing program 0: r0 = socket(0xa, 0x2, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 725.169418][T17499] IPVS: ftp: loaded support on port[0] = 21 [ 725.562667][T17500] IPVS: ftp: loaded support on port[0] = 21 16:23:14 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000880)='ns/pid\x00') 16:23:14 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x181, 0x181, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:14 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x4, 0x0, 0x3}]}, &(0x7f0000000040)='GPL\x00', 0x5, 0x81, &(0x7f0000000080)=""/129, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:23:14 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89b0, &(0x7f0000000680)={'sit0\x00', 0x0}) 16:23:14 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000001180), 0x4) 16:23:15 executing program 5: r0 = socket(0xa, 0x2, 0x0) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f00000006c0)={&(0x7f0000000480)={0x2, 0xa}, 0x5d, &(0x7f0000000680)={0x0}}, 0x0) 16:23:15 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89b0, &(0x7f0000000680)={'sit0\x00', 0x0}) 16:23:15 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x4, 0x0, 0x6}]}, &(0x7f0000000040)='GPL\x00', 0x5, 0x81, &(0x7f0000000080)=""/129, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:23:15 executing program 0: r0 = socket(0xa, 0x2, 0x0) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f00000006c0)={&(0x7f0000000480)={0x2, 0x600}, 0x5d, &(0x7f0000000680)={0x0}}, 0x0) 16:23:15 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8921, &(0x7f0000000680)={'sit0\x00', 0x0}) 16:23:15 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000006c0)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000000)) 16:23:15 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x40) 16:23:15 executing program 4: socket$inet6(0xa, 0x5, 0x0) 16:23:16 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x181, 0x181, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) 16:23:16 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x1c, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x5, 0x81, &(0x7f0000000080)=""/129, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:23:16 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000000)='(\x00', 0x2) 16:23:16 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x401c5820, &(0x7f0000000680)={'sit0\x00', 0x0}) 16:23:16 executing program 5: r0 = socket(0xa, 0x2, 0x0) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f00000006c0)={&(0x7f0000000480)={0x2, 0x6800}, 0x5d, &(0x7f0000000680)={0x0}}, 0x0) 16:23:17 executing program 3: r0 = socket(0x25, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x5452, 0x0) 16:23:17 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000040)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @ipv4={'\x00', '\xff\xff', @remote}}}) 16:23:17 executing program 1: unshare(0x14040000) unshare(0x48000000) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080), 0x10, &(0x7f0000000100)={0x0, 0xffffffffffffff32}}, 0x0) socket$can_j1939(0x2c, 0x2, 0x7) 16:23:17 executing program 4: r0 = socket(0x25, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x5450, 0x0) 16:23:17 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) [ 728.552454][T17612] IPVS: ftp: loaded support on port[0] = 21 16:23:17 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x181, 0x181, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:17 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0x33}, 0x0, @in=@dev, 0x0, 0x0, 0x0, 0x4}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 16:23:17 executing program 5: r0 = socket(0x1, 0x5, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) 16:23:17 executing program 4: socketpair(0x23, 0x0, 0x2, &(0x7f0000000000)) 16:23:18 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}], 0x2}, 0x0) [ 729.191838][T17612] IPVS: ftp: loaded support on port[0] = 21 16:23:18 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x181, 0x181, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 729.432974][T17641] not chained 200000 origins [ 729.437607][T17641] CPU: 0 PID: 17641 Comm: syz-executor.3 Not tainted 5.12.0-rc6-syzkaller #0 [ 729.446466][T17641] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 729.456522][T17641] Call Trace: [ 729.459794][T17641] dump_stack+0x24c/0x2e0 [ 729.464131][T17641] kmsan_internal_chain_origin+0x6f/0x130 [ 729.469858][T17641] ? kmsan_get_metadata+0x116/0x180 [ 729.475055][T17641] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 729.480864][T17641] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 729.486928][T17641] ? kmsan_get_metadata+0x116/0x180 [ 729.492128][T17641] ? kmsan_set_origin_checked+0xa2/0x100 [ 729.497759][T17641] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 729.503839][T17641] ? kmsan_unpoison_shadow+0x74/0xa0 [ 729.509153][T17641] ? _copy_from_user+0x1fd/0x300 [ 729.514092][T17641] ? kmsan_get_metadata+0x116/0x180 [ 729.519306][T17641] __msan_chain_origin+0x54/0xa0 [ 729.524239][T17641] __copy_msghdr_from_user+0x4cf/0xc10 [ 729.529700][T17641] ? kmsan_get_metadata+0x116/0x180 [ 729.534918][T17641] __sys_sendmmsg+0x673/0x1010 [ 729.539689][T17641] ? kmsan_set_origin_checked+0xa2/0x100 [ 729.545319][T17641] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 729.551385][T17641] ? kmsan_get_metadata+0x116/0x180 [ 729.556582][T17641] ? kmsan_get_metadata+0x116/0x180 [ 729.561779][T17641] ? kmsan_get_metadata+0x116/0x180 [ 729.566975][T17641] ? kmsan_set_origin_checked+0xa2/0x100 [ 729.572605][T17641] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 729.578676][T17641] ? __msan_instrument_asm_store+0x104/0x130 [ 729.584652][T17641] ? kmsan_get_metadata+0x116/0x180 [ 729.589846][T17641] __se_sys_sendmmsg+0xbd/0xe0 [ 729.594606][T17641] __x64_sys_sendmmsg+0x56/0x70 [ 729.599457][T17641] do_syscall_64+0x9f/0x140 [ 729.603970][T17641] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 729.609861][T17641] RIP: 0033:0x4665d9 [ 729.613749][T17641] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 729.633353][T17641] RSP: 002b:00007fb94435a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 729.642480][T17641] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 729.650529][T17641] RDX: 00000000000002e9 RSI: 0000000020000480 RDI: 0000000000000003 [ 729.658492][T17641] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 729.666456][T17641] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 729.674420][T17641] R13: 0000000000a9fb1f R14: 00007fb94435a300 R15: 0000000000022000 [ 729.682412][T17641] Uninit was stored to memory at: [ 729.687418][T17641] kmsan_internal_chain_origin+0xad/0x130 [ 729.693139][T17641] __msan_chain_origin+0x54/0xa0 [ 729.698074][T17641] __copy_msghdr_from_user+0x4cf/0xc10 [ 729.703532][T17641] __sys_sendmmsg+0x673/0x1010 [ 729.708292][T17641] __se_sys_sendmmsg+0xbd/0xe0 [ 729.713052][T17641] __x64_sys_sendmmsg+0x56/0x70 [ 729.717915][T17641] do_syscall_64+0x9f/0x140 [ 729.722418][T17641] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 729.728333][T17641] [ 729.730646][T17641] Uninit was stored to memory at: [ 729.735646][T17641] kmsan_internal_chain_origin+0xad/0x130 [ 729.741363][T17641] __msan_chain_origin+0x54/0xa0 [ 729.746315][T17641] __copy_msghdr_from_user+0x4cf/0xc10 [ 729.751772][T17641] __sys_sendmmsg+0x673/0x1010 [ 729.756551][T17641] __se_sys_sendmmsg+0xbd/0xe0 [ 729.761319][T17641] __x64_sys_sendmmsg+0x56/0x70 [ 729.766169][T17641] do_syscall_64+0x9f/0x140 [ 729.770671][T17641] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 729.776560][T17641] [ 729.778872][T17641] Uninit was stored to memory at: [ 729.783880][T17641] kmsan_internal_chain_origin+0xad/0x130 [ 729.789597][T17641] __msan_chain_origin+0x54/0xa0 [ 729.794536][T17641] __copy_msghdr_from_user+0x4cf/0xc10 [ 729.799999][T17641] __sys_sendmmsg+0x673/0x1010 [ 729.804773][T17641] __se_sys_sendmmsg+0xbd/0xe0 [ 729.809532][T17641] __x64_sys_sendmmsg+0x56/0x70 [ 729.814377][T17641] do_syscall_64+0x9f/0x140 [ 729.818876][T17641] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 729.824786][T17641] [ 729.827100][T17641] Uninit was stored to memory at: [ 729.832106][T17641] kmsan_internal_chain_origin+0xad/0x130 [ 729.837833][T17641] __msan_chain_origin+0x54/0xa0 [ 729.842783][T17641] __copy_msghdr_from_user+0x4cf/0xc10 [ 729.848262][T17641] __sys_sendmmsg+0x673/0x1010 [ 729.853036][T17641] __se_sys_sendmmsg+0xbd/0xe0 [ 729.857803][T17641] __x64_sys_sendmmsg+0x56/0x70 [ 729.862654][T17641] do_syscall_64+0x9f/0x140 [ 729.867159][T17641] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 729.873068][T17641] [ 729.875380][T17641] Uninit was stored to memory at: [ 729.880383][T17641] kmsan_internal_chain_origin+0xad/0x130 [ 729.886093][T17641] __msan_chain_origin+0x54/0xa0 [ 729.891036][T17641] __copy_msghdr_from_user+0x4cf/0xc10 [ 729.896599][T17641] __sys_sendmmsg+0x673/0x1010 [ 729.901359][T17641] __se_sys_sendmmsg+0xbd/0xe0 [ 729.906133][T17641] __x64_sys_sendmmsg+0x56/0x70 [ 729.910984][T17641] do_syscall_64+0x9f/0x140 [ 729.915523][T17641] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 729.921426][T17641] [ 729.923748][T17641] Uninit was stored to memory at: [ 729.928763][T17641] kmsan_internal_chain_origin+0xad/0x130 [ 729.934486][T17641] __msan_chain_origin+0x54/0xa0 [ 729.939421][T17641] __copy_msghdr_from_user+0x4cf/0xc10 [ 729.944880][T17641] __sys_sendmmsg+0x673/0x1010 [ 729.949640][T17641] __se_sys_sendmmsg+0xbd/0xe0 [ 729.954401][T17641] __x64_sys_sendmmsg+0x56/0x70 [ 729.959250][T17641] do_syscall_64+0x9f/0x140 [ 729.963751][T17641] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 729.969641][T17641] [ 729.971949][T17641] Uninit was stored to memory at: [ 729.976954][T17641] kmsan_internal_chain_origin+0xad/0x130 [ 729.982672][T17641] __msan_chain_origin+0x54/0xa0 [ 729.987607][T17641] __copy_msghdr_from_user+0x4cf/0xc10 [ 729.993065][T17641] __sys_sendmmsg+0x673/0x1010 [ 729.997829][T17641] __se_sys_sendmmsg+0xbd/0xe0 [ 730.002592][T17641] __x64_sys_sendmmsg+0x56/0x70 [ 730.007440][T17641] do_syscall_64+0x9f/0x140 [ 730.011944][T17641] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 730.017838][T17641] [ 730.020147][T17641] Local variable ----msg_sys@__sys_sendmmsg created at: [ 730.027063][T17641] __sys_sendmmsg+0xbd/0x1010 [ 730.031743][T17641] __sys_sendmmsg+0xbd/0x1010 16:23:19 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xa, 0x1, 0x0, 0x1fffe, 0x0, 0x1}, 0x40) 16:23:19 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8930, &(0x7f0000000680)={'sit0\x00', 0x0}) 16:23:19 executing program 1: r0 = socket(0x25, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x5451, 0x0) 16:23:20 executing program 0: bpf$MAP_UPDATE_ELEM(0xd, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 16:23:20 executing program 5: r0 = socket(0xa, 0x2, 0x0) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f00000006c0)={&(0x7f0000000480)={0x2, 0x7a00}, 0x5d, &(0x7f0000000680)={0x0}}, 0x0) 16:23:20 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_BEACON(r0, &(0x7f0000000b00)={&(0x7f0000000000), 0xc, &(0x7f0000000ac0)={&(0x7f0000000b40)={0x48, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_IE={0xf, 0x2a, [@peer_mgmt={0x75, 0x6, {0x0, 0x0, @val, @void, @void}}, @erp={0x2a, 0x1}]}, @NL80211_ATTR_FTM_RESPONDER={0xc, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_ENABLED={0x4}, @NL80211_FTM_RESP_ATTR_CIVICLOC={0x4}]}, @NL80211_ATTR_IE={0x4}]}, 0x48}}, 0x0) 16:23:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 16:23:21 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 16:23:21 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x181, 0x181, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:21 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}]}, 0x1c}}, 0x0) 16:23:21 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:23:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000001e80)={0x0, 0x0, &(0x7f0000001e40)={&(0x7f0000001400)={0x20, r1, 0x1, 0x0, 0x0, {}, [{{0x8}, {0x4}}]}, 0x20}}, 0x0) 16:23:21 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{}]}, 0x10) r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0x33}, 0x0, @in=@dev, 0x0, 0x0, 0x0, 0x4}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 16:23:22 executing program 0: unshare(0x14040000) unshare(0x50008b00) unshare(0x48000000) r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) socket$can_j1939(0x2c, 0x2, 0x7) 16:23:22 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000100)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='cdg\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f0f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 16:23:22 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x4) socket$inet(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x1, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x0) write$binfmt_elf64(r0, &(0x7f0000001680)=ANY=[], 0x858) sendto$inet(r0, &(0x7f00000012c0)="11268a927f", 0xad11, 0x11, 0x0, 0x0) 16:23:22 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85200000}, [@alu={0x4}]}, &(0x7f0000000040)='GPL\x00', 0x5, 0x81, &(0x7f0000000080)=""/129, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 733.322856][T17712] IPVS: ftp: loaded support on port[0] = 21 16:23:22 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x16, 0x0, 0x0, 0x8000, 0x0, 0x1}, 0x40) 16:23:22 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x181, 0x181, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:23 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000005c40)=[{{0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000280)=""/183, 0xb7}}], 0x1, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[], 0xfffffd6d) 16:23:23 executing program 4: r0 = socket(0x25, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0xc020660b, 0x0) 16:23:23 executing program 5: socketpair(0x11, 0xa, 0x0, &(0x7f0000000240)) 16:23:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000e4e72f"], 0x14}}, 0x0) 16:23:24 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004600)={0x11, 0x3, &(0x7f00000034c0)=@framed, &(0x7f0000003540)='GPL\x00', 0x4, 0x1000, &(0x7f0000003580)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:23:24 executing program 1: sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x902f7b27f325dfe6) 16:23:25 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_BEACON(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000b40)={0x130, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_BEACON_TAIL={0x107, 0xf, [@perr={0x84, 0x101, {0x0, 0xf, [@ext={{}, @broadcast}, @ext={{}, @broadcast, 0x0, @broadcast}, @not_ext={{}, @device_b}, @not_ext={{}, @broadcast}, @ext={{}, @broadcast, 0x0, @broadcast}, @not_ext, @not_ext={{}, @device_b}, @ext={{}, @broadcast}, @ext={{}, @device_a, 0x0, @device_b}, @ext={{}, @device_a, 0x0, @device_b}, @ext={{}, @broadcast}, @not_ext={{}, @device_b}, @ext={{}, @device_b, 0x0, @device_b}, @ext={{}, @broadcast, 0x0, @broadcast}, @ext={{}, @broadcast, 0x0, @device_b}]}}]}]}, 0x130}}, 0x0) 16:23:25 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x181, 0x181, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:25 executing program 3: socketpair(0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0), 0xffffffffffffffff) 16:23:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='nv\x00', 0x3) 16:23:25 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x1, &(0x7f0000000040)=@raw=[@jmp], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:23:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)={0x38, 0x0, 0x9, 0x801, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x18, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8}, {0x8, 0x2, @multicast2}}}]}, @NFCTH_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x38}}, 0x0) 16:23:26 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @loopback, @dev}, 0xc) 16:23:26 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x40086602, &(0x7f0000000680)={'sit0\x00', 0x0}) 16:23:26 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) getpeername$netlink(r0, 0x0, 0x0) 16:23:26 executing program 3: r0 = socket(0x10, 0x2, 0x0) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f00000006c0)={&(0x7f0000000480)={0x2}, 0x5d, &(0x7f0000000680)={0x0}}, 0x0) 16:23:26 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x4, 0x0, 0x7}]}, &(0x7f0000000040)='GPL\x00', 0x5, 0x81, &(0x7f0000000080)=""/129, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:23:26 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @broadcast}, {0x0, @local}, 0x48, {0x2, 0x0, @multicast2}, 'wg0\x00'}) 16:23:26 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000001e80)={0x0, 0x0, &(0x7f0000001e40)={&(0x7f0000001400)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000"], 0x60}}, 0x0) 16:23:26 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x181, 0x181, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:26 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000019c0)={0x0, 0x0, &(0x7f0000001980)={&(0x7f0000000040)=ANY=[@ANYBLOB="081900001000010000000000000000000000000a"], 0x1908}}, 0x0) 16:23:26 executing program 3: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @private0}, 0x45) [ 737.870631][T17803] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.5'. [ 737.937636][T17805] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.5'. 16:23:27 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x4020940d, &(0x7f0000000680)={'sit0\x00', 0x0}) [ 738.050960][T17807] netlink: 6388 bytes leftover after parsing attributes in process `syz-executor.1'. 16:23:27 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0x33}, 0x0, @in=@dev, 0x0, 0x0, 0x0, 0x4}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 16:23:27 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x19, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:23:27 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000040)='GPL\x00', 0x5, 0x81, &(0x7f0000000080)=""/129, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:23:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd, 0xd, 0x2, [@datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "c7"}]}}, &(0x7f0000000280)=""/210, 0x2a, 0xd2, 0x1}, 0x20) 16:23:27 executing program 0: r0 = socket(0x1e, 0x2, 0x0) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) 16:23:27 executing program 5: r0 = socket(0xa, 0x2, 0x0) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f00000006c0)={&(0x7f0000000480)={0x2}, 0xc, &(0x7f0000000680)={0x0}}, 0x40001) 16:23:28 executing program 3: r0 = socket$caif_stream(0x25, 0x1, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) 16:23:28 executing program 1: unshare(0x50008b00) unshare(0x48000000) r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000080), 0x10, &(0x7f0000000100)={0x0, 0xffffffffffffff32}}, 0x0) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) socket$can_j1939(0x2c, 0x2, 0x7) 16:23:28 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x181, 0x181, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x20000000ec071, 0xffffffffffffffff, 0xaba4d000) shmat(0x0, &(0x7f0000e12000/0x1000)=nil, 0x0) 16:23:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) recvfrom(r1, &(0x7f0000003240)=""/4096, 0x100000205, 0x0, 0x0, 0x415) sendmsg(r1, &(0x7f00000019c0)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f00000002c0)="fb", 0x1}], 0x1}, 0xc010) [ 739.580346][T17834] IPVS: ftp: loaded support on port[0] = 21 16:23:28 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x2, 0x0) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f0000000140)) 16:23:29 executing program 4: mknodat$null(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x103) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x42000812) 16:23:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @private1}, 0x1c) 16:23:29 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x12, 0x0, 0x0, 0x0, 0x9, 0x1000, &(0x7f0000000640)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0xe}, 0x10}, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff000}], 0x1}, 0x0) close(0xffffffffffffffff) 16:23:29 executing program 0: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_int(r0, 0x29, 0x48, &(0x7f0000000080)=0x5, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0xa, 0x4e25, 0x0, @mcast1={0xff, 0x5}}, 0x1c) 16:23:29 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x181, 0x181, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:30 executing program 4: io_setup(0x1, &(0x7f0000000600)=0x0) io_getevents(r0, 0x4, 0x4, &(0x7f0000000640)=[{}, {}, {}, {}], &(0x7f00000006c0)={0x77359400}) io_destroy(r0) 16:23:30 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000680)={0x2c, 0x1, 0x4, 0x801, 0x0, 0x0, {}, [@NFULA_CFG_NLBUFSIZ={0x8}, @NFULA_CFG_QTHRESH={0x8}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x2c}}, 0x0) 16:23:31 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000540), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x6, 0x20, 0x1, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 16:23:31 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) sendmmsg$unix(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=@abs={0x1}, 0x6e, 0x0}], 0x1, 0x4000040) 16:23:31 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF2(r0, 0x5404, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, "5764bca95c793a65615fa92b34ed2d67695f35"}) 16:23:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @private1}]}, &(0x7f00000001c0)=0x10) 16:23:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, r1, 0x1}, 0x14}}, 0x0) 16:23:31 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x181, 0x181, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:31 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF2(r0, 0x402c542b, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, "5764bca95c793a65615fa92b34ed2d67695f35"}) 16:23:31 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000480)={0x0, 0x0, 0x1e00, 0x0, 0x0, "5764bca95c793a65615fa92b34ed2d67695f35"}) 16:23:31 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF2(r0, 0x4b65, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, "5764bca95c793a65615fa92b34ed2d67695f35"}) 16:23:32 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x82, 0x80, 0xf}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340), &(0x7f00000004c0), 0x3ff, r0}, 0x38) 16:23:32 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f000000c140)={0x0, 0x0, &(0x7f000000c080)=[{0x0}, {0x0}, {&(0x7f0000002c40)={0x10}, 0x10}], 0x3}, 0x0) 16:23:32 executing program 0: process_madvise(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f00000000c0)="c9b69e7360d8a583d74a34b3318c", 0xe}], 0x1, 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmsg(r0, &(0x7f0000000200)={&(0x7f0000000100)=@nfc_llcp, 0x80, &(0x7f0000000180)=[{&(0x7f0000000000)=""/20, 0x14}], 0x1, &(0x7f00000001c0)=""/12, 0xc}, 0x40000141) ioctl$sock_ifreq(r0, 0x89a0, &(0x7f0000000080)={'vxcan1\x00', @ifru_hwaddr}) 16:23:32 executing program 5: syz_emit_ethernet(0x12, &(0x7f00000000c0)={@multicast, @dev, @val={@void}, {@generic={0x88a8}}}, 0x0) 16:23:32 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_ifreq(r0, 0x8916, &(0x7f0000000000)={'syzkaller0\x00', @ifru_hwaddr}) 16:23:32 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x181, 0x181, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:32 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd\x00') r1 = fcntl$dupfd(r0, 0x0, r0) getdents(r1, &(0x7f0000000000)=""/44, 0x2c) getdents(r0, &(0x7f0000001f40)=""/4091, 0xffb) 16:23:32 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_ifreq(r0, 0x8917, &(0x7f0000000000)={'caif0\x00', @ifru_hwaddr}) 16:23:32 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={0x0, @rc, @tipc=@name, @xdp, 0x0, 0x0, 0x0, 0x0, 0x401, &(0x7f0000000080)='veth0_macvtap\x00', 0x5, 0x7f, 0xe8}) 16:23:33 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x0) 16:23:33 executing program 1: socketpair(0x10, 0x2, 0x0, &(0x7f0000000040)) 16:23:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x2) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001ac0)={&(0x7f0000001a40)={0x14, r1, 0x111}, 0x14}}, 0x0) 16:23:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x89b0, &(0x7f0000000080)={'veth1_virt_wifi\x00', @ifru_hwaddr}) 16:23:33 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x25, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x9c) 16:23:33 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRESHEX], 0x38}}, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)=@rc={0x1f, @none}, 0x80) 16:23:33 executing program 3: syz_io_uring_setup(0x26f2, &(0x7f00000003c0), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000440), &(0x7f0000000480)) 16:23:33 executing program 4: perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = dup3(r0, r1, 0x0) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000000300)={0x1000}) 16:23:34 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x181, 0x181, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @ptr, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fstat(r1, &(0x7f0000000080)) 16:23:34 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, 0x0) 16:23:34 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={'\x00', '\xff\xff', @empty}, 0x0, 0x3}, 0x20) 16:23:34 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, 0xffffffffffffffff, &(0x7f0000000040)) 16:23:34 executing program 1: syz_emit_ethernet(0xc2, &(0x7f0000000000)={@remote, @local, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "9bc397", 0x8c, 0x2f, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}, @mcast2, {[@srh={0x0, 0x8, 0x4, 0x4, 0x0, 0x0, 0x0, [@empty, @empty, @local, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02']}]}}}}}, 0x0) 16:23:34 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f000000c140)={&(0x7f0000000000), 0xc, &(0x7f000000c080)=[{&(0x7f0000001600)={0xec4, 0x0, 0x0, 0x70bd28, 0x0, "", [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @typed={0x41, 0x0, 0x0, 0x0, @binary="3e8e858269296e4f9678a8837693982f13966382793a8e8b8331184c67a687b3cee4a83328d16882a73de2fa35ecc661569336997fd3c8b0c7aa474a68"}, @generic="27c45bea9c2fbdebe7d12195ae059af6bcc49234dfaf928309f640c6119a9c59a76e012be6e09cd5c661cd8ed2494a250837167c12bbfa1e7a1e003baf", @nested={0xb9, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @generic="31e8a5b60bef1f636e9d6dee6bbe139615a34a0ac8526aa6e5bf701ed6f8941b0c4a6d49caafd1fbd10b89b719008ae840f1e8e3c1c7e88bda0e0ab5db175a5caabc015f74047c7286f4dbaed9b71c8fc576f3c6e2e7e827b509ff106c66f99b7cdde5569bd7e3e118e72017f04761b9fc62f9124f9b6a4850b7d6190fc21a2f0ecdfec3044a261c52b518cd81d33ac4325bffe31f96d5c9f4dd0b9c434b30919081ef3ec3", @typed={0x6, 0x0, 0x0, 0x0, @str=')\x00'}]}, @nested={0x125, 0x0, 0x0, 0x1, [@generic="94a0af331446ea005a0f7c398918b6143cc665c8366b3c4093250459dae5d86b049ea998685cbdcce02cd7153bf0ebf18058fb76bd74d99d3e7e98b05fa9b7d4a53969257de103c52f6a00466a", @typed={0x8, 0x91, 0x0, 0x0, @ipv4=@empty}, @generic="85bb7141858fd4be80f599d2599bd0efb3f31d209149b30d2eac98b9fbd6546b5cfc56740f0c27571d819f0e2b8f643487466cfe1ac3d7d5e3c67d7de658ad8d46b6b098ef60504a78efecf1119286257e5f33cd7e48a40bffc169f76801fcefcf132d9e27ff495a220502e141a869586a734b52033351ee94e2a0c8967ba524eb56ac52dcb0d72917624b6b407ec8a23477db7e79b7992d8c581b5a31514db78392fa79f794bb09cfb6b50dbcf012d59f35e11ad84899cccc4f5aeb64e407422894013d78033e7340f93abb"]}, @nested={0xc3d, 0x0, 0x0, 0x1, [@generic="7693a538f6e160dbc3bda402723108b987c3e0948a6aadb969b8d3dd7467b8841186e53f4014b3b009b5684c9a92a5cdd0fbf63c38d06a0f0e1fe45f06e2800a2c945b2088177e1b662cf324a26b0e2c9f7286c315cd24df09199d00a299204527d0f6d0467024a6a9db9b87b24394f75c9320306276dfb05c9557607e27420c0af93b7edc51d54f5a04d90800be0b89a9a9e950e5beb7b89f08ad32b525717d62ad9d4208de5ce6e5d147dee22ba6b072653f8a4188", @generic="615cdbc0449011fdc84825d5637a1758f46599ce8a74ee1117bc2a649c52eedb4b30ceadcbcbeae5c4dabbb3171fc55234cff0161b9f06148c4663c827d8fd5ef61b839f82be708aca3dc811599f2562afc4e3a4db7d3c5f032ef5304c6b7e6a874c538f9fdf76235809eee21e0a5ded7dffbeddcf7634bd9a9e9c547cdb", @generic="20a58c2eb7aa27aae0cfa73d6e13a7767ca12ce70e581f678446120870799123a1ccc2e0e9a7dcff1c3e98bb068d0586faa1c5d204208b91bc3975f00cd52d44", @generic="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", @typed={0x8, 0x0, 0x0, 0x0, @uid}]}]}, 0xec4}, {0x0}, {0x0}, {0x0}], 0x4}, 0x8040) 16:23:34 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x0, @remote}], 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e22, 0x0, @rand_addr=' \x01\x00'}, @in6={0xa, 0x4e22, 0x0, @private0}], 0x38) 16:23:35 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) 16:23:35 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fstat(r1, 0x0) 16:23:35 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f000000c140)={0x0, 0x0, &(0x7f000000c080)=[{&(0x7f0000001600)={0xe9c, 0x0, 0x0, 0x0, 0x0, "", [@typed={0xc, 0x59, 0x0, 0x0, @u64=0xffffffff}, @typed={0x42, 0x4c, 0x0, 0x0, @binary="3e8e858269296e4f9678a8837693982f13966382793a8e8b8331184c67a687b3cee4a83328d16882a73de2fa35ecc661569336997fd3c8b0c7aa474a6882"}, @generic="27c45bea9c2fbdebe7d12195ae059af6bcc49234dfaf928309f640c6119a9c59a76e012be6e09cd5c661cd8ed2494a250837167c12bbfa1e7a1e003bafee46b3", @nested={0xb9, 0x0, 0x0, 0x1, [@typed={0x8, 0x1033, 0x0, 0x0, @uid}, @generic="31e8a5b60bef1f636e9d6dee6bbe139615a34a0ac8526aa6e5bf701ed6f8941b0c4a6d49caafd1fbd10b89b719008ae840f1e8e3c1c7e88bda0e0ab5db175a5caabc015f74047c7286f4dbaed9b71c8fc576f3c6e2e7e827b509ff106c66f99b7cdde5569bd7e3e118e72017f04761b9fc62f9124f9b6a4850b7d6190fc21a2f0ecdfec3044a261c52b518cd81d33ac4325bffe31f96d5c9f4dd0b9c434b30919081ef3ec3", @typed={0x6, 0x8b, 0x0, 0x0, @str=')\x00'}]}, @nested={0x125, 0x1a, 0x0, 0x1, [@generic="94a0af331446ea005a0f7c398918b6143cc665c8366b3c4093250459dae5d86b049ea998685cbdcce02cd7153bf0ebf18058fb76bd74d99d3e7e98b05fa9b7d4a53969257de103c52f6a00466a", @typed={0x8, 0x91, 0x0, 0x0, @ipv4=@empty}, @generic="85bb7141858fd4be80f599d2599bd0efb3f31d209149b30d2eac98b9fbd6546b5cfc56740f0c27571d819f0e2b8f643487466cfe1ac3d7d5e3c67d7de658ad8d46b6b098ef60504a78efecf1119286257e5f33cd7e48a40bffc169f76801fcefcf132d9e27ff495a220502e141a869586a734b52033351ee94e2a0c8967ba524eb56ac52dcb0d72917624b6b407ec8a23477db7e79b7992d8c581b5a31514db78392fa79f794bb09cfb6b50dbcf012d59f35e11ad84899cccc4f5aeb64e407422894013d78033e7340f93abb"]}, @nested={0xc15, 0x0, 0x0, 0x1, [@generic="7693a538f6e160dbc3bda402723108b987c3e0948a6aadb969b8d3dd7467b8841186e53f4014b3b009b5684c9a92a5cdd0fbf63c38d06a0f0e1fe45f06e2800a2c945b2088177e1b662cf324a26b0e2c9f7286c315cd24df09199d00a299204527d0f6d0467024a6a9db9b87b24394f75c9320306276dfb05c9557607e27420c0af93b7edc51d54f5a04d90800be0b89a9a9e950e5beb7b89f08ad32b525717d62ad9d4208de5ce6e5d147dee22ba6b072653f8a4188", @generic="615cdbc0449011fdc84825d5637a1758f46599ce8a74ee1117bc2a649c52eedb4b30ceadcbcbeae5c4dabbb3171fc55234cff0161b9f06148c4663c827d8fd5ef61b839f82be708aca3dc811599f2562afc4e3a4db7d3c5f032ef5304c6b7e6a874c538f9fdf76235809eee21e0a5ded7dffbeddcf7634bd9a9e9c547c", @generic="20a58c2eb7aa27aae0cfa73d6e13a7767ca12ce70e581f678446120870799123a1ccc2e0e9a7dcff1c3e98bb068d0586faa1c5d204208b91bc3975f00cd52d44", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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", @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x8, 0x0, 0x0, 0x0, @u32}]}]}, 0xe9c}, {&(0x7f0000001500)={0x18, 0x0, 0x0, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @ipv4=@multicast2}]}, 0x18}, {&(0x7f0000007340)={0x10}, 0x10}], 0x3}, 0x8040) 16:23:35 executing program 1: creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x8003, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) io_setup(0xb6, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f00000000c0)={0x6b00, 0xf5d6f000, 0x0, 0x1, 0x0, r0, &(0x7f0000000100)="c6", 0x1}]) 16:23:35 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x181, 0x181, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:35 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, [0x5c00]}}) 16:23:35 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x2, &(0x7f0000000340)=@raw=[@initr0], &(0x7f0000000380)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:23:35 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000340)={@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85c}, 0x20) 16:23:35 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) 16:23:36 executing program 3: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x192, 0x0, 0x1}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:36 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000001880)={@private2}, 0x14) 16:23:36 executing program 4: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x179, 0x179, 0x2, [@int, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x9, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x196}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:36 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge0\x00'}) [ 747.290743][T18034] ptrace attach of "/root/syz-executor.3"[18032] was attempted by "/root/syz-executor.3"[18034] 16:23:36 executing program 3: socketpair(0xa, 0x0, 0xffffff01, &(0x7f0000000300)) 16:23:36 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x89a1, &(0x7f0000000080)={'veth1_virt_wifi\x00', @ifru_hwaddr}) 16:23:36 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f00000016c0)) [ 747.480091][T18041] ptrace attach of "/root/syz-executor.4"[18040] was attempted by "/root/syz-executor.4"[18041] 16:23:36 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x181, 0x181, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:36 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x89b1, &(0x7f0000000040)={'sit0\x00', @ifru_hwaddr}) 16:23:36 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000004b40)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000004a40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:23:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000280)="c9", 0x1, 0xfffffffffffffffb) keyctl$unlink(0x9, r1, 0xfffffffffffffffd) 16:23:36 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f00000005c0)={&(0x7f00000000c0)={0xa, 0x4e24, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c, 0x0, 0x0, &(0x7f0000000440)=[@rthdrdstopts={{0x18}}, @dontfrag={{0x14}}], 0x30}, 0x0) 16:23:36 executing program 3: r0 = socket$inet_sctp(0x2, 0xa, 0x84) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 16:23:37 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8942, &(0x7f0000000080)={'veth1_virt_wifi\x00', @ifru_hwaddr}) 16:23:37 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x89a1, &(0x7f0000000080)={'vxcan1\x00', @ifru_hwaddr}) 16:23:37 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x181, 0x181, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @int, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:37 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$sock_ifreq(r0, 0x7b9, 0x0) 16:23:37 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000200)={&(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c, 0x0}, 0x8014) 16:23:37 executing program 1: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3d, 0x3d, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @func_proto, @union, @func_proto]}, {0x0, [0x0, 0x0]}}, 0x0, 0x5c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:37 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000380)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000080)={0x24, r1, 0x5, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x24}}, 0x0) 16:23:37 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_ifreq(r0, 0x890d, 0x0) [ 748.847085][T18079] ptrace attach of "/root/syz-executor.1"[18078] was attempted by "/root/syz-executor.1"[18079] 16:23:37 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr\x00') r1 = fcntl$dupfd(r0, 0x0, r0) getdents(r1, &(0x7f0000000000)=""/44, 0x2c) getdents(r0, &(0x7f0000001f40)=""/4091, 0xffb) 16:23:37 executing program 1: openat$cuse(0xffffffffffffff9c, &(0x7f0000001800), 0x2, 0x0) 16:23:38 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000080)={'veth1_virt_wifi\x00', @ifru_hwaddr}) 16:23:38 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x826, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x40) 16:23:38 executing program 3: perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, 0x0, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = dup3(r0, r1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000000300)={0x1000, 0x101}) 16:23:38 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8903, &(0x7f0000000080)={'veth1_virt_wifi\x00', @ifru_hwaddr}) 16:23:38 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x17d, 0x17d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19a}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:38 executing program 1: syz_emit_ethernet(0x1fe, 0x0, 0x0) syz_emit_ethernet(0x16, &(0x7f00000000c0)={@multicast, @dev, @val={@void}, {@generic={0x88a8, "6630f26f"}}}, 0x0) 16:23:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 16:23:38 executing program 0: r0 = socket$inet_sctp(0x2, 0xa, 0x84) ioctl$sock_ifreq(r0, 0x8954, 0x0) 16:23:38 executing program 5: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x105, 0x105, 0x2, [@int, @var, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x122}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:39 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000002, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x5, 0x9, 0x1, 0x0, 0x1}, 0x40) 16:23:39 executing program 3: getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x4431, &(0x7f0000000d40), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000dc0), &(0x7f0000000e00)) syz_io_uring_submit(0x0, 0x0, 0x0, 0x1) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000e80), 0x0, 0x0) 16:23:39 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}, 0x10) 16:23:39 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x17d, 0x17d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19a}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:39 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8932, &(0x7f0000000000)={'erspan0\x00', @ifru_hwaddr}) 16:23:39 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001580)={@rand_addr=' \x01\x00', @empty, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40120120}) [ 750.267664][T18121] ptrace attach of "/root/syz-executor.5"[18120] was attempted by "/root/syz-executor.5"[18121] 16:23:39 executing program 3: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10d, 0x10d, 0x2, [@int, @var, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x12a}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:39 executing program 1: syz_emit_ethernet(0x7a, &(0x7f0000000000)={@remote, @local, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "9bc397", 0x44, 0x2f, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x1}}}}}}}, 0x0) 16:23:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@newlink={0x40, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x2}]}, @IFLA_IFNAME={0x14, 0x3, 'macvlan0\x00'}]}, 0x40}}, 0x0) 16:23:39 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x17d, 0x17d, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x19a}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:39 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_ifreq(r0, 0x8931, &(0x7f0000000080)={'veth1_to_bridge\x00', @ifru_hwaddr}) 16:23:39 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f00000025c0)={0x2020}, 0x2020) [ 750.879419][T18142] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 750.909266][T18146] ptrace attach of "/root/syz-executor.3"[18144] was attempted by "/root/syz-executor.3"[18146] 16:23:39 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000002, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x2, 0xc4000000, 0x0, 0xb3550aa4ba878254}, 0x9c) 16:23:40 executing program 4: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14d, 0x14d, 0x2, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "bb"}, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], 'E'}, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {0x0, 0x0, 0x2}, {}, {}, {}, {}]}, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "dad5a3"}, @typedef, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}}, 0x0, 0x16a}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x30) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:40 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000000)={@private0}, 0x14) 16:23:40 executing program 0: r0 = socket(0xa, 0x2, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000300)) 16:23:40 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x169, 0x169, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x186}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:40 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.stat\x00', 0x26e1, 0x0) [ 751.470298][T18165] ptrace attach of "/root/syz-executor.4"[18162] was attempted by "/root/syz-executor.4"[18165] 16:23:40 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x143042, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000200)=ANY=[], 0x116) sendfile(r0, r0, &(0x7f0000000400), 0x7fff) 16:23:40 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={@empty, @private1, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000fc, r2}) 16:23:40 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000080)=@get={0x1, 0x0, 0x8e}) 16:23:40 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x169, 0x169, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x186}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:40 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1}, &(0x7f0000000180)=0x1c) r1 = accept(r0, &(0x7f0000000380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0x80) recvfrom$inet6(r1, &(0x7f00000001c0)=""/121, 0x79, 0x0, &(0x7f0000000240)={0xa, 0x4e22, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000340)={@loopback, 0x0, 0x0, 0x0, 0x5}, 0x20) 16:23:41 executing program 4: perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, 0x0, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = dup3(r0, r1, 0x0) clone3(&(0x7f0000000580)={0x2081a0080, &(0x7f00000002c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000540)=[0xffffffffffffffff], 0x1}, 0x58) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000000300)={0x1000, 0x0, 0x6}) [ 752.327669][T18187] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 752.455145][T18189] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 16:23:41 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8020001) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)) 16:23:41 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net\x00') r1 = fcntl$dupfd(r0, 0x0, r0) getdents(r1, &(0x7f0000000000)=""/44, 0x2c) getdents(r0, &(0x7f0000001f40)=""/4091, 0xffb) 16:23:41 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x143042, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000200)=ANY=[], 0x116) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f0000000400), 0x7fff) 16:23:41 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x169, 0x169, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x186}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:41 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x891e, &(0x7f0000000080)={'veth1_virt_wifi\x00', @ifru_hwaddr}) 16:23:41 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8993, &(0x7f0000000080)={'veth1_virt_wifi\x00', @ifru_hwaddr}) 16:23:42 executing program 1: io_setup(0x8, &(0x7f0000000000)) 16:23:42 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x185, 0x185, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1a2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:42 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x541b, &(0x7f0000000380)={'syz_tun\x00', 0x0}) 16:23:42 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB="280000001c00070c002e21000000000007000000", @ANYRES32=r2, @ANYBLOB="4800ee000a000200aa"], 0x28}}, 0x0) 16:23:42 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000000)=0x1d00001d) 16:23:42 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x185, 0x185, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1a2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 753.579078][T18221] bridge_slave_0: FDB only supports static addresses 16:23:43 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001140)={&(0x7f0000000000)={0xa, 0x4e1b, 0x0, @empty, 0xffff}, 0x1c, 0x0}, 0x2c015) 16:23:43 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000200)={&(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c, 0x0, 0x0, &(0x7f00000000c0)=[@rthdr_2292={{0x18}}, @tclass={{0x14}}], 0x30}, 0x8014) 16:23:43 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8946, &(0x7f0000000080)={'veth1_virt_wifi\x00', @ifru_hwaddr}) 16:23:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="340000000c0601030000000000000000070000060900020073797a32000000000900020073797a3200000000050001"], 0x34}}, 0x0) 16:23:43 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 16:23:43 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x185, 0x185, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1a2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:43 executing program 5: process_madvise(0xffffffffffffffff, &(0x7f0000002480)=[{0xfffffffffffffffe}], 0x1, 0x0, 0x0) 16:23:43 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) getdents(r1, &(0x7f0000000000)=""/44, 0x2c) 16:23:43 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000140)=@buf={0x28, &(0x7f0000000080)="94f3c07e9d1f46d28569b1632c7be9e313fe78921d70b108932d960693e81e94cdabc756f8781686"}) 16:23:43 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x185, 0x185, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1a2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:43 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x891d, &(0x7f0000000080)={'veth1_virt_wifi\x00', @ifru_hwaddr}) 16:23:43 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8931, &(0x7f0000000080)={'vxcan1\x00', @ifru_hwaddr}) 16:23:43 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getdents(r0, &(0x7f0000000200)=""/58, 0x3a) getdents(r0, &(0x7f0000001240)=""/4091, 0xffb) 16:23:43 executing program 0: pselect6(0x40, &(0x7f0000000000)={0x7}, 0x0, &(0x7f0000000080), 0x0, 0x0) 16:23:44 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr\x00') r1 = fcntl$dupfd(r0, 0x0, r0) getdents64(r1, &(0x7f0000000100)=""/133, 0x85) 16:23:44 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$bt_hci(r0, 0x0, 0x3, 0x0, &(0x7f00000000c0)) 16:23:44 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x185, 0x185, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1a2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:44 executing program 3: add_key$user(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)="d6", 0x1, 0xfffffffffffffffd) 16:23:44 executing program 0: socket$inet(0x2, 0xa, 0x20) 16:23:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) semget(0x0, 0x0, 0x0) semop(0xffffffffffffffff, &(0x7f0000000040)=[{0x2, 0x400, 0x1800}, {0x1, 0x7fff, 0x1000}, {0x1, 0x7ff}, {0x0, 0x1, 0x1400}, {0x1, 0x46, 0x1800}, {0x2, 0x200, 0x1000}, {0x5, 0x2, 0x1800}], 0x7) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8}]}, @IFLA_GROUP={0x8}]}, 0x34}}, 0x0) 16:23:44 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000002, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xf401}, 0x9c) [ 755.620767][ T3123] ieee802154 phy0 wpan0: encryption failed: -22 [ 755.627459][ T3123] ieee802154 phy1 wpan1: encryption failed: -22 16:23:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="c9", 0x1, 0xfffffffffffffffd) 16:23:44 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x185, 0x185, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1a2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 755.871900][T18282] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 755.891577][T18282] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 755.899538][T18282] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 16:23:44 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x2000000) 16:23:45 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r0, &(0x7f0000001600)={0x2020}, 0xffffffffffffff3a) 16:23:45 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000002, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$inet6_int(r0, 0x29, 0x18, 0x0, &(0x7f0000000000)) 16:23:45 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x185, 0x185, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1a2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:45 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd\x00') r1 = fcntl$dupfd(r0, 0x0, r0) getdents(r1, &(0x7f0000000000)=""/44, 0x2c) getdents64(r1, 0x0, 0x0) [ 756.552877][T18299] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 756.570262][T18299] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 756.578196][T18299] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 16:23:45 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001340)={0x3ff, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) 16:23:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x541b, 0x0) 16:23:46 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x185, 0x185, 0x2, [@int, @array, @var, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}, @int, @ptr, @volatile, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], '*'}]}}, 0x0, 0x1a2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:23:46 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4d, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) 16:23:46 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'syz_tun\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="4d000000000000000000010000000003"]}) 16:23:46 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x89a1, &(0x7f0000000000)={'vxcan1\x00', @ifru_hwaddr}) [ 757.413208][T18321] ===================================================== [ 757.420173][T18321] BUG: KMSAN: uninit-value in __ethtool_get_link_ksettings+0x503/0x5a0 [ 757.428501][T18321] CPU: 1 PID: 18321 Comm: syz-executor.5 Not tainted 5.12.0-rc6-syzkaller #0 [ 757.437268][T18321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 757.447313][T18321] Call Trace: [ 757.450589][T18321] dump_stack+0x24c/0x2e0 [ 757.454935][T18321] kmsan_report+0xfb/0x1e0 [ 757.459350][T18321] __msan_warning+0x5c/0xa0 [ 757.463850][T18321] __ethtool_get_link_ksettings+0x503/0x5a0 [ 757.469751][T18321] linkinfo_prepare_data+0x1e8/0x4b0 [ 757.475099][T18321] ? strset_cleanup_data+0x190/0x190 [ 757.480385][T18321] ethnl_default_notify+0x432/0x1030 [ 757.485756][T18321] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 757.491842][T18321] ? kmsan_get_metadata+0x116/0x180 [ 757.497042][T18321] ethtool_notify+0x259/0x520 [ 757.501716][T18321] dev_ethtool+0xe228/0xe7b0 [ 757.506311][T18321] ? kmsan_get_metadata+0x116/0x180 [ 757.511504][T18321] ? kmsan_get_metadata+0x116/0x180 [ 757.516697][T18321] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 757.522495][T18321] ? kmsan_get_metadata+0x116/0x180 [ 757.527797][T18321] dev_ioctl+0x5a3/0x1260 [ 757.532204][T18321] sock_do_ioctl+0x477/0x700 [ 757.536795][T18321] sock_ioctl+0x997/0xef0 [ 757.541138][T18321] ? kmsan_get_metadata+0x116/0x180 [ 757.546335][T18321] ? sock_poll+0x690/0x690 [ 757.550746][T18321] __se_sys_ioctl+0x311/0x4d0 [ 757.555498][T18321] __x64_sys_ioctl+0x4a/0x70 [ 757.560090][T18321] do_syscall_64+0x9f/0x140 [ 757.564594][T18321] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 757.570486][T18321] RIP: 0033:0x4665d9 [ 757.574375][T18321] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 757.593979][T18321] RSP: 002b:00007fc8be742188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 757.602392][T18321] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 757.610356][T18321] RDX: 0000000020000380 RSI: 0000000000008946 RDI: 0000000000000003 [ 757.618328][T18321] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 757.626291][T18321] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 757.634254][T18321] R13: 0000000000a9fb1f R14: 00007fc8be742300 R15: 0000000000022000 [ 757.642230][T18321] [ 757.644540][T18321] Uninit was stored to memory at: [ 757.649540][T18321] kmsan_internal_chain_origin+0xad/0x130 [ 757.655261][T18321] kmsan_memcpy_memmove_metadata+0x25e/0x2d0 [ 757.661250][T18321] kmsan_memcpy_metadata+0xb/0x10 [ 757.666265][T18321] __msan_memcpy+0x46/0x60 [ 757.670674][T18321] tun_get_link_ksettings+0x7c/0xb0 [ 757.675924][T18321] __ethtool_get_link_ksettings+0x204/0x5a0 [ 757.681824][T18321] linkinfo_prepare_data+0x1e8/0x4b0 [ 757.687104][T18321] ethnl_default_notify+0x432/0x1030 [ 757.692383][T18321] ethtool_notify+0x259/0x520 [ 757.697051][T18321] dev_ethtool+0xe228/0xe7b0 [ 757.701655][T18321] dev_ioctl+0x5a3/0x1260 [ 757.705977][T18321] sock_do_ioctl+0x477/0x700 [ 757.710567][T18321] sock_ioctl+0x997/0xef0 [ 757.714892][T18321] __se_sys_ioctl+0x311/0x4d0 [ 757.719583][T18321] __x64_sys_ioctl+0x4a/0x70 [ 757.724435][T18321] do_syscall_64+0x9f/0x140 [ 757.728936][T18321] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 757.734914][T18321] [ 757.737219][T18321] Uninit was stored to memory at: [ 757.742229][T18321] kmsan_internal_chain_origin+0xad/0x130 [ 757.747945][T18321] kmsan_memcpy_memmove_metadata+0x25e/0x2d0 [ 757.753982][T18321] kmsan_memcpy_metadata+0xb/0x10 [ 757.759001][T18321] __msan_memcpy+0x46/0x60 [ 757.763412][T18321] tun_set_link_ksettings+0x7e/0xb0 [ 757.768611][T18321] dev_ethtool+0xe1a2/0xe7b0 [ 757.773203][T18321] dev_ioctl+0x5a3/0x1260 [ 757.777529][T18321] sock_do_ioctl+0x477/0x700 [ 757.782116][T18321] sock_ioctl+0x997/0xef0 [ 757.786456][T18321] __se_sys_ioctl+0x311/0x4d0 [ 757.791132][T18321] __x64_sys_ioctl+0x4a/0x70 [ 757.795718][T18321] do_syscall_64+0x9f/0x140 [ 757.800220][T18321] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 757.806153][T18321] [ 757.808464][T18321] Local variable ----link_ksettings.i893@dev_ethtool created at: [ 757.816163][T18321] dev_ethtool+0x3cdc/0xe7b0 [ 757.820751][T18321] dev_ethtool+0x3cdc/0xe7b0 [ 757.825362][T18321] ===================================================== [ 757.832278][T18321] Disabling lock debugging due to kernel taint [ 757.838412][T18321] Kernel panic - not syncing: panic_on_kmsan set ... [ 757.845506][T18321] CPU: 1 PID: 18321 Comm: syz-executor.5 Tainted: G B 5.12.0-rc6-syzkaller #0 [ 757.855743][T18321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 757.865789][T18321] Call Trace: [ 757.869177][T18321] dump_stack+0x24c/0x2e0 [ 757.873527][T18321] panic+0x4c6/0xea7 [ 757.877523][T18321] ? add_taint+0x17c/0x210 [ 757.881945][T18321] kmsan_report+0x1de/0x1e0 [ 757.886450][T18321] __msan_warning+0x5c/0xa0 [ 757.890952][T18321] __ethtool_get_link_ksettings+0x503/0x5a0 [ 757.896853][T18321] linkinfo_prepare_data+0x1e8/0x4b0 [ 757.902138][T18321] ? strset_cleanup_data+0x190/0x190 [ 757.907422][T18321] ethnl_default_notify+0x432/0x1030 [ 757.912796][T18321] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 757.918877][T18321] ? kmsan_get_metadata+0x116/0x180 [ 757.925494][T18321] ethtool_notify+0x259/0x520 [ 757.930194][T18321] dev_ethtool+0xe228/0xe7b0 [ 757.934795][T18321] ? kmsan_get_metadata+0x116/0x180 [ 757.939991][T18321] ? kmsan_get_metadata+0x116/0x180 [ 757.945189][T18321] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 757.950994][T18321] ? kmsan_get_metadata+0x116/0x180 [ 757.956197][T18321] dev_ioctl+0x5a3/0x1260 [ 757.960527][T18321] sock_do_ioctl+0x477/0x700 [ 757.965207][T18321] sock_ioctl+0x997/0xef0 [ 757.969541][T18321] ? kmsan_get_metadata+0x116/0x180 [ 757.974738][T18321] ? sock_poll+0x690/0x690 [ 757.979153][T18321] __se_sys_ioctl+0x311/0x4d0 [ 757.983853][T18321] __x64_sys_ioctl+0x4a/0x70 [ 757.988449][T18321] do_syscall_64+0x9f/0x140 [ 757.992953][T18321] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 757.998854][T18321] RIP: 0033:0x4665d9 [ 758.002754][T18321] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 758.022369][T18321] RSP: 002b:00007fc8be742188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 758.030810][T18321] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 758.038776][T18321] RDX: 0000000020000380 RSI: 0000000000008946 RDI: 0000000000000003 [ 758.046742][T18321] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 758.054708][T18321] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 758.062681][T18321] R13: 0000000000a9fb1f R14: 00007fc8be742300 R15: 0000000000022000 [ 758.072251][T18321] Kernel Offset: disabled [ 758.076575][T18321] Rebooting in 86400 seconds..