[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 85.554530][ T27] audit: type=1800 audit(1581170245.184:25): pid=9471 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 85.574509][ T27] audit: type=1800 audit(1581170245.184:26): pid=9471 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 85.603729][ T27] audit: type=1800 audit(1581170245.184:27): pid=9471 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.235' (ECDSA) to the list of known hosts. 2020/02/08 13:57:35 fuzzer started 2020/02/08 13:57:37 dialing manager at 10.128.0.26:40741 2020/02/08 13:57:37 syscalls: 2781 2020/02/08 13:57:37 code coverage: enabled 2020/02/08 13:57:37 comparison tracing: enabled 2020/02/08 13:57:37 extra coverage: enabled 2020/02/08 13:57:37 setuid sandbox: enabled 2020/02/08 13:57:37 namespace sandbox: enabled 2020/02/08 13:57:37 Android sandbox: /sys/fs/selinux/policy does not exist 2020/02/08 13:57:37 fault injection: enabled 2020/02/08 13:57:37 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/02/08 13:57:37 net packet injection: enabled 2020/02/08 13:57:37 net device setup: enabled 2020/02/08 13:57:37 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/02/08 13:57:37 devlink PCI setup: PCI device 0000:00:10.0 is not available 13:59:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) dup2(r0, r1) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x4, 0x0, 0x0) 13:59:43 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f8}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) syzkaller login: [ 223.994669][ T9637] IPVS: ftp: loaded support on port[0] = 21 [ 224.130594][ T9639] IPVS: ftp: loaded support on port[0] = 21 [ 224.207953][ T9637] chnl_net:caif_netlink_parms(): no params data found 13:59:43 executing program 2: socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffb, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) [ 224.301957][ T9637] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.309864][ T9637] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.337022][ T9637] device bridge_slave_0 entered promiscuous mode [ 224.350257][ T9637] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.374921][ T9637] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.383029][ T9637] device bridge_slave_1 entered promiscuous mode [ 224.420761][ T9637] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 224.442690][ T9637] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 224.479279][ T9637] team0: Port device team_slave_0 added [ 224.487930][ T9637] team0: Port device team_slave_1 added [ 224.535110][ T9637] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 224.542120][ T9637] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 224.566379][ T9645] IPVS: ftp: loaded support on port[0] = 21 [ 224.569937][ T9637] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 224.586635][ T9639] chnl_net:caif_netlink_parms(): no params data found [ 224.598917][ T9637] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 224.605999][ T9637] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 224.632583][ T9637] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 13:59:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_ICV_LEN={0x5, 0x3, 0x4}]}}}]}, 0x3c}}, 0x0) [ 224.770040][ T9637] device hsr_slave_0 entered promiscuous mode [ 224.846087][ T9637] device hsr_slave_1 entered promiscuous mode [ 224.874730][ T9647] IPVS: ftp: loaded support on port[0] = 21 [ 224.978708][ T9639] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.988183][ T9639] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.997011][ T9639] device bridge_slave_0 entered promiscuous mode 13:59:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x58) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @ipv4}, 0x1c) listen(r1, 0x0) [ 225.019481][ T9639] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.033792][ T9639] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.041634][ T9639] device bridge_slave_1 entered promiscuous mode [ 225.180210][ T9639] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 225.225543][ T9651] IPVS: ftp: loaded support on port[0] = 21 [ 225.252570][ T9639] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 225.288247][ T9639] team0: Port device team_slave_0 added [ 225.343947][ T9639] team0: Port device team_slave_1 added [ 225.369084][ T9647] chnl_net:caif_netlink_parms(): no params data found [ 225.435784][ T9645] chnl_net:caif_netlink_parms(): no params data found [ 225.455194][ T9639] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 225.462200][ T9639] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 225.489590][ T9639] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 13:59:45 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030007000500154001008178a8001600a4000100e5580000000002000000006f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee48100000000000000d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d08fad95667e04adcdf634c1f215ce3bb53b409d5e1ca4e81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 225.526939][ T9639] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 225.534200][ T9639] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 225.565386][ T9639] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 225.605465][ T9637] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 225.662832][ T9655] IPVS: ftp: loaded support on port[0] = 21 [ 225.696378][ T9637] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 225.757996][ T9637] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 225.846601][ T9645] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.854572][ T9645] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.862399][ T9645] device bridge_slave_0 entered promiscuous mode [ 225.870482][ T9637] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 225.957136][ T9639] device hsr_slave_0 entered promiscuous mode [ 225.994618][ T9639] device hsr_slave_1 entered promiscuous mode [ 226.043888][ T9639] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 226.051640][ T9639] Cannot create hsr debugfs directory [ 226.065953][ T9645] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.073058][ T9645] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.081627][ T9645] device bridge_slave_1 entered promiscuous mode [ 226.104130][ T9645] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 226.124050][ T9647] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.131206][ T9647] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.139224][ T9647] device bridge_slave_0 entered promiscuous mode [ 226.160452][ T9645] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 226.177580][ T9647] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.185078][ T9647] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.192916][ T9647] device bridge_slave_1 entered promiscuous mode [ 226.221858][ T9647] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 226.238206][ T9647] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 226.262560][ T9645] team0: Port device team_slave_0 added [ 226.310851][ T9645] team0: Port device team_slave_1 added [ 226.342460][ T9647] team0: Port device team_slave_0 added [ 226.356129][ T9647] team0: Port device team_slave_1 added [ 226.376023][ T9651] chnl_net:caif_netlink_parms(): no params data found [ 226.404097][ T9645] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 226.411102][ T9645] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 226.437985][ T9645] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 226.453963][ T9645] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 226.460993][ T9645] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 226.487444][ T9645] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 226.529157][ T9647] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 226.536303][ T9647] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 226.562692][ T9647] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 226.618247][ T9647] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 226.626186][ T9647] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 226.653915][ T9647] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 226.716791][ T9645] device hsr_slave_0 entered promiscuous mode [ 226.783993][ T9645] device hsr_slave_1 entered promiscuous mode [ 226.833825][ T9645] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 226.841503][ T9645] Cannot create hsr debugfs directory [ 226.860696][ T9651] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.867951][ T9651] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.876147][ T9651] device bridge_slave_0 entered promiscuous mode [ 226.926376][ T9651] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.933485][ T9651] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.941543][ T9651] device bridge_slave_1 entered promiscuous mode [ 226.996938][ T9647] device hsr_slave_0 entered promiscuous mode [ 227.034154][ T9647] device hsr_slave_1 entered promiscuous mode [ 227.093806][ T9647] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 227.101439][ T9647] Cannot create hsr debugfs directory [ 227.142892][ T9639] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 227.176011][ T9639] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 227.239066][ T9651] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 227.251214][ T9655] chnl_net:caif_netlink_parms(): no params data found [ 227.263086][ T9639] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 227.317165][ T9639] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 227.392676][ T9651] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 227.507010][ T9655] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.514623][ T9655] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.522508][ T9655] device bridge_slave_0 entered promiscuous mode [ 227.533262][ T9637] 8021q: adding VLAN 0 to HW filter on device bond0 [ 227.545454][ T9651] team0: Port device team_slave_0 added [ 227.582152][ T9655] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.589735][ T9655] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.598324][ T9655] device bridge_slave_1 entered promiscuous mode [ 227.606950][ T9651] team0: Port device team_slave_1 added [ 227.642497][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 227.651288][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 227.686444][ T9637] 8021q: adding VLAN 0 to HW filter on device team0 [ 227.713853][ T9655] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 227.736549][ T9651] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 227.743563][ T9651] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 227.772769][ T9651] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 227.809640][ T9655] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 227.827522][ T9645] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 227.890880][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 227.899790][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 227.909130][ T2779] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.916397][ T2779] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.924951][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 227.934061][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 227.942463][ T2779] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.949577][ T2779] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.959210][ T9651] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 227.966672][ T9651] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 227.994627][ T9651] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 228.019670][ T9655] team0: Port device team_slave_0 added [ 228.029786][ T9645] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 228.087104][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 228.096942][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 228.118102][ T9655] team0: Port device team_slave_1 added [ 228.137403][ T9645] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 228.195809][ T9645] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 228.249337][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 228.258263][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 228.267985][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 228.290483][ T9655] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 228.301356][ T9655] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 228.332425][ T9655] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 228.351479][ T9655] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 228.358636][ T9655] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 228.388587][ T9655] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 228.418157][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 228.497541][ T9651] device hsr_slave_0 entered promiscuous mode [ 228.564393][ T9651] device hsr_slave_1 entered promiscuous mode [ 228.604387][ T9651] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 228.612006][ T9651] Cannot create hsr debugfs directory [ 228.617837][ T9647] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 228.666601][ T9647] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 228.707719][ T9647] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 228.757342][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 228.766159][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 228.774808][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 228.783129][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 228.822506][ T9647] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 228.876868][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 228.885656][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 228.935985][ T9655] device hsr_slave_0 entered promiscuous mode [ 228.974056][ T9655] device hsr_slave_1 entered promiscuous mode [ 229.034133][ T9655] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 229.041743][ T9655] Cannot create hsr debugfs directory [ 229.062570][ T9637] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 229.181992][ T3145] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 229.190255][ T3145] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 229.227840][ T9639] 8021q: adding VLAN 0 to HW filter on device bond0 [ 229.309469][ T9637] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 229.332561][ T9639] 8021q: adding VLAN 0 to HW filter on device team0 [ 229.359565][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 229.367901][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.413644][ T9651] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 229.466659][ T9651] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 229.528145][ T9651] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 229.586478][ T9651] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 229.646220][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 229.655225][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 229.663927][ T2767] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.671211][ T2767] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.683421][ T9645] 8021q: adding VLAN 0 to HW filter on device bond0 [ 229.725360][ T9647] 8021q: adding VLAN 0 to HW filter on device bond0 [ 229.732472][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 229.740947][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 229.750710][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 229.759867][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 229.768914][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 229.777796][ T2779] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.785072][ T2779] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.792886][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 229.812993][ T9645] 8021q: adding VLAN 0 to HW filter on device team0 [ 229.851844][ T3145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 229.860081][ T3145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.868580][ T3145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 229.877709][ T3145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 229.899053][ T9637] device veth0_vlan entered promiscuous mode [ 229.906776][ T9655] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 229.955089][ T3145] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 229.962870][ T3145] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 229.970961][ T3145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 229.979859][ T3145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 229.988630][ T3145] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 229.997694][ T3145] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.004945][ T3145] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.012695][ T3145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 230.021418][ T3145] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 230.029941][ T3145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 230.039147][ T3145] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 230.047807][ T3145] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.054919][ T3145] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.062468][ T3145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 230.070461][ T3145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 230.079079][ T3145] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 230.087368][ T3145] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 230.104167][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 230.117848][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 230.127692][ T9655] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 230.156802][ T9655] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 230.231294][ T9637] device veth1_vlan entered promiscuous mode [ 230.242155][ T9655] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 230.301701][ T9647] 8021q: adding VLAN 0 to HW filter on device team0 [ 230.309885][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 230.318856][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 230.327681][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 230.336201][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 230.345306][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 230.354195][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 230.362673][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 230.371402][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 230.380192][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 230.388761][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 230.397550][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 230.405971][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 230.414615][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 230.425296][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 230.451704][ T9639] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 230.479852][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 230.489349][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 230.498270][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 230.520229][ T9645] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 230.546959][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 230.558104][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 230.566776][ T3162] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.574020][ T3162] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.582049][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 230.591124][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 230.604068][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 230.623001][ T9637] device veth0_macvtap entered promiscuous mode [ 230.663827][ T3119] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 230.672039][ T3119] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 230.681971][ T3119] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 230.691016][ T3119] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.698492][ T3119] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.706771][ T3119] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 230.714428][ T3119] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 230.722131][ T3119] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 230.731030][ T3119] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 230.745757][ T9637] device veth1_macvtap entered promiscuous mode [ 230.772861][ T9639] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 230.782762][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 230.793502][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 230.803861][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 230.813348][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 230.831331][ T9645] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 230.851924][ T3145] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 230.860154][ T3145] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 230.867723][ T3145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 230.877452][ T3145] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 230.897106][ T9651] 8021q: adding VLAN 0 to HW filter on device bond0 [ 230.914542][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 230.922924][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 230.953629][ T9647] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 230.967975][ T9647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 230.988395][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 230.997187][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 231.019734][ T9637] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 231.046034][ T9655] 8021q: adding VLAN 0 to HW filter on device bond0 [ 231.053094][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 231.061552][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 231.069791][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 231.078601][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 231.089133][ T9651] 8021q: adding VLAN 0 to HW filter on device team0 [ 231.117826][ T3145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 231.126864][ T3145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 231.136543][ T3145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 231.145609][ T3145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 231.166916][ T9637] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 231.193127][ T9655] 8021q: adding VLAN 0 to HW filter on device team0 [ 231.202720][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 231.212640][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 231.221325][ T3162] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.228438][ T3162] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.236916][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 231.245858][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 231.254444][ T3162] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.261520][ T3162] bridge0: port 2(bridge_slave_1) entered forwarding state [ 231.269606][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 231.279044][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 231.287915][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 231.296082][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 231.304218][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 231.357019][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 231.368618][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 231.377211][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 231.386175][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 231.394162][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 231.401748][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 231.410851][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 231.419558][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 231.428492][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 231.437690][ T3162] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.444814][ T3162] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.452368][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 231.461241][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 231.469738][ T3162] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.477203][ T3162] bridge0: port 2(bridge_slave_1) entered forwarding state [ 231.485592][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 231.494549][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 231.503229][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 231.511986][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 231.520661][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 231.528662][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 231.536550][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 231.544883][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 231.563370][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 231.573164][ T9645] device veth0_vlan entered promiscuous mode [ 231.589016][ T9639] device veth0_vlan entered promiscuous mode [ 231.612126][ T9647] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 231.685400][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 231.694635][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 231.703031][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 231.712220][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 231.725609][ T9639] device veth1_vlan entered promiscuous mode [ 231.734760][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 231.742904][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 231.752090][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 231.848585][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 231.856987][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 231.867785][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 231.877462][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 231.886617][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 231.896211][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 231.905748][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 231.914650][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 231.923353][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 231.932983][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 231.941590][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 231.967688][ T9645] device veth1_vlan entered promiscuous mode [ 231.976937][ T9651] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 232.008441][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 232.016907][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 232.026796][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 232.042454][ T9639] device veth0_macvtap entered promiscuous mode [ 232.069494][ T9655] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 232.086043][ T9655] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 232.110184][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 232.123518][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 232.142911][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 13:59:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) dup2(r0, r1) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x4, 0x0, 0x0) [ 232.156289][ T9639] device veth1_macvtap entered promiscuous mode [ 232.193775][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 232.201874][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:59:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) dup2(r0, r1) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x4, 0x0, 0x0) [ 232.241499][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 232.249844][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 232.267556][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 232.311029][ T9645] device veth0_macvtap entered promiscuous mode [ 232.331491][ T9655] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 232.347253][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready 13:59:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) dup2(r0, r1) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x4, 0x0, 0x0) [ 232.364619][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 232.373254][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 232.383258][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 232.394809][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 232.402634][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 232.411362][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready 13:59:52 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ftruncate(r1, 0x400) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000040)) [ 232.440997][ T9639] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 232.464845][ T9639] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 232.486416][ T9639] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 232.507342][ T9645] device veth1_macvtap entered promiscuous mode [ 232.527568][ T9651] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 232.548127][ T9647] device veth0_vlan entered promiscuous mode [ 232.564147][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 232.582845][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready 13:59:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df82", 0x21) [ 232.593393][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 232.606176][ T9639] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 232.618795][ T9639] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 232.643167][ T9639] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 232.681736][ T9647] device veth1_vlan entered promiscuous mode [ 232.705398][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 232.713594][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 232.730975][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 13:59:52 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140)=[{0x0}, {&(0x7f00000000c0)}], 0x2}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000140)='sit0\x00') [ 232.790446][ T9645] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 232.804381][ T9645] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 232.815056][ T9645] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 232.835228][ T9645] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 232.847553][ T9645] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 232.861679][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 232.871292][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 232.889202][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 232.899468][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 232.908373][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 232.919330][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 232.928909][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 232.966723][ T9645] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 232.981800][ T9645] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 232.992187][ T9645] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 233.002767][ T9645] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 233.014423][ T9645] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 233.103887][ T3145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 233.112475][ T3145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 233.121787][ T3145] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 233.130651][ T3145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 233.139800][ T3145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready 13:59:52 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 233.148539][ T3145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 233.160539][ T9651] device veth0_vlan entered promiscuous mode [ 233.178866][ T9655] device veth0_vlan entered promiscuous mode [ 233.196937][ T3145] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 233.214454][ T3145] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 233.228167][ T3145] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 233.244716][ T3145] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 233.262740][ T9651] device veth1_vlan entered promiscuous mode [ 233.310116][ T9647] device veth0_macvtap entered promiscuous mode [ 233.446409][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 233.470762][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 233.490959][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 233.500670][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 233.535602][ T9655] device veth1_vlan entered promiscuous mode [ 233.553871][ T3145] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 233.562047][ T3145] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 233.572078][ T3145] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 233.605930][ T9647] device veth1_macvtap entered promiscuous mode [ 233.623421][ T9651] device veth0_macvtap entered promiscuous mode 13:59:53 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f8}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) [ 233.700172][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 233.721261][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 233.764744][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 233.799319][ T9651] device veth1_macvtap entered promiscuous mode [ 233.829039][ T3119] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 233.838646][ T3119] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 233.855422][ T3119] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 233.871250][ T3119] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 233.882006][ T9647] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 233.901877][ T9647] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 233.929115][ T9647] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 233.956448][ T9647] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 233.972017][ T9647] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 233.983222][ T9647] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 233.995446][ T9647] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 234.023168][ T9655] device veth0_macvtap entered promiscuous mode [ 234.043213][ T3119] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 234.051566][ T3119] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 234.061293][ T3119] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 234.082844][ T9655] device veth1_macvtap entered promiscuous mode [ 234.095072][ T9647] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 234.110570][ T9647] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 234.121090][ T9647] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 234.139826][ T9647] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 234.151082][ T9647] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 234.168410][ T9647] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 234.181724][ T9647] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 234.196177][ T3119] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 234.210532][ T3119] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 234.222263][ T9651] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 234.240508][ T9651] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 234.252555][ T9651] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 234.264413][ T9651] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 234.275002][ T9651] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 234.285819][ T9651] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 234.303038][ T9651] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 234.318184][ T9651] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 234.333147][ T9651] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 234.351200][ T9651] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 234.361729][ T9651] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 234.372301][ T9651] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 234.383495][ T9651] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 234.395302][ T9651] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 234.413680][ T9651] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 234.423524][ T9651] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 234.435859][ T9651] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 13:59:54 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) r2 = inotify_init1(0x0) poll(&(0x7f0000000100)=[{r1}, {r2}], 0x2, 0x0) r3 = inotify_init1(0x0) poll(&(0x7f0000000100)=[{}, {r3}], 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f00000000c0)={0x3, 0x9, 0x4, 0x4000, 0x3, {0x77359400}, {0x1, 0x0, 0x4, 0x20, 0x4, 0x1, "fea8a6c6"}, 0xe3, 0x2, @fd, 0x2, 0x0, 0xffffffffffffffff}) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r5, 0x110, 0x3) connect$rxrpc(r5, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r5, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, 'w'}], 0x18}}], 0x1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000140)={r5}) socket$kcm(0x2b, 0x6, 0x0) dup(0xffffffffffffffff) memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) sendmsg$BATADV_CMD_GET_MESH(r4, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x44, 0x0, 0x0, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000011}, 0x20000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$pptp(0xffffffffffffffff, 0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48000024000505d25a80648c63940d0424fc600800184001ac0f00281982c137153e370907088000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 234.450393][ T9651] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 234.458450][ T3119] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 234.494455][ T3119] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 234.503270][ T3119] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 234.521013][ T3119] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 234.572151][ T9717] netlink: 12010 bytes leftover after parsing attributes in process `syz-executor.2'. [ 234.655108][ T9655] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 234.665929][ T9655] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 234.676293][ T9655] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 234.686898][ T9655] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 234.697250][ T9655] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 234.707918][ T9655] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 234.722538][ T9655] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 234.733230][ T9655] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 234.743231][ T9655] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 234.754422][ T9655] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 234.766839][ T9655] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 234.807056][ C0] hrtimer: interrupt took 59100 ns [ 234.904109][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 234.913090][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 234.928390][ T9655] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 234.939537][ T9655] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 234.950029][ T9655] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 234.961425][ T9655] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 234.971380][ T9655] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 234.983060][ T9655] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 234.993062][ T9655] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 235.003945][ T9655] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 235.013931][ T9655] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 235.024381][ T9655] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 235.036585][ T9655] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 235.101221][ T3145] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 235.115130][ T3145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 235.153108][ T9718] netlink: 12010 bytes leftover after parsing attributes in process `syz-executor.2'. [ 235.174092][ C1] [ 235.176466][ C1] ================================ [ 235.181573][ C1] WARNING: inconsistent lock state [ 235.186696][ C1] 5.5.0-syzkaller #0 Not tainted [ 235.191767][ C1] -------------------------------- [ 235.196882][ C1] inconsistent {SOFTIRQ-ON-W} -> {IN-SOFTIRQ-W} usage. [ 235.203804][ C1] syz-executor.3/9720 [HC0[0]:SC1[1]:HE1:SE0] takes: [ 235.210606][ C1] ffffffff8a8d0018 (rxrpc_conn_id_lock){+.?.}, at: rxrpc_put_client_connection_id+0x73/0xe0 [ 235.220814][ C1] {SOFTIRQ-ON-W} state was registered at: [ 235.226550][ C1] lock_acquire+0x190/0x410 [ 235.231132][ C1] _raw_spin_lock+0x2f/0x40 [ 235.235712][ C1] rxrpc_connect_call+0x954/0x4e30 [ 235.241020][ C1] rxrpc_new_client_call+0x9c0/0x1ad0 [ 235.246502][ C1] rxrpc_do_sendmsg+0xffa/0x1d5f [ 235.251524][ C1] rxrpc_sendmsg+0x4d6/0x5f0 [ 235.256196][ C1] sock_sendmsg+0xd7/0x130 [ 235.260692][ C1] ____sys_sendmsg+0x358/0x880 [ 235.265530][ C1] ___sys_sendmsg+0x100/0x170 [ 235.270282][ C1] __sys_sendmmsg+0x1bf/0x4d0 [ 235.275040][ C1] __x64_sys_sendmmsg+0x9d/0x100 [ 235.280165][ C1] do_syscall_64+0xfa/0x790 [ 235.284808][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 235.291155][ C1] irq event stamp: 394 [ 235.295320][ C1] hardirqs last enabled at (394): [] _raw_spin_unlock_irqrestore+0x66/0xe0 [ 235.305547][ C1] hardirqs last disabled at (393): [] _raw_spin_lock_irqsave+0x6f/0xcd [ 235.315626][ C1] softirqs last enabled at (0): [] copy_process+0x1ad2/0x7290 [ 235.324739][ C1] softirqs last disabled at (243): [] irq_exit+0x19b/0x1e0 [ 235.333477][ C1] [ 235.333477][ C1] other info that might help us debug this: [ 235.341640][ C1] Possible unsafe locking scenario: [ 235.341640][ C1] [ 235.349071][ C1] CPU0 [ 235.352336][ C1] ---- [ 235.355742][ C1] lock(rxrpc_conn_id_lock); [ 235.360396][ C1] [ 235.363905][ C1] lock(rxrpc_conn_id_lock); [ 235.368735][ C1] [ 235.368735][ C1] *** DEADLOCK *** [ 235.368735][ C1] [ 235.377023][ C1] 4 locks held by syz-executor.3/9720: [ 235.382477][ C1] #0: ffff88804e1ac428 (sb_writers#5){.+.+}, at: mnt_want_write+0x3f/0xc0 [ 235.391157][ C1] #1: ffff88808c6d9248 (&type->i_mutex_dir_key#4/1){+.+.}, at: filename_create+0x17c/0x4f0 [ 235.401219][ C1] #2: ffffffff8a01cca8 (tomoyo_ss){....}, at: tomoyo_path_perm+0x1cb/0x430 [ 235.409901][ C1] #3: ffffffff89bac140 (rcu_callback){....}, at: rcu_core+0x562/0x1390 [ 235.419227][ C1] [ 235.419227][ C1] stack backtrace: [ 235.425138][ C1] CPU: 1 PID: 9720 Comm: syz-executor.3 Not tainted 5.5.0-syzkaller #0 [ 235.433495][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 235.443541][ C1] Call Trace: [ 235.446809][ C1] [ 235.449657][ C1] dump_stack+0x197/0x210 [ 235.454124][ C1] print_usage_bug.cold+0x327/0x378 [ 235.459335][ C1] mark_lock+0xbb4/0x1220 [ 235.463663][ C1] ? check_usage_backwards+0x330/0x330 [ 235.469220][ C1] ? save_stack+0x5c/0x90 [ 235.473558][ C1] __lock_acquire+0x1e8e/0x4a00 [ 235.478413][ C1] ? debug_object_deactivate+0x1d9/0x320 [ 235.484046][ C1] ? __kasan_check_read+0x11/0x20 [ 235.489073][ C1] ? mark_held_locks+0xf0/0xf0 [ 235.493940][ C1] ? __kasan_check_read+0x11/0x20 [ 235.498967][ C1] ? __lock_acquire+0x8a0/0x4a00 [ 235.503897][ C1] ? debug_object_deactivate+0x1d9/0x320 [ 235.509558][ C1] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 235.515366][ C1] lock_acquire+0x190/0x410 [ 235.519876][ C1] ? rxrpc_put_client_connection_id+0x73/0xe0 [ 235.525939][ C1] _raw_spin_lock+0x2f/0x40 [ 235.530500][ C1] ? rxrpc_put_client_connection_id+0x73/0xe0 [ 235.536559][ C1] rxrpc_put_client_connection_id+0x73/0xe0 [ 235.542460][ C1] rxrpc_put_client_conn+0x243/0xc90 [ 235.547740][ C1] ? rxrpc_rcu_destroy_call+0xbd/0x200 [ 235.553658][ C1] rxrpc_rcu_destroy_call+0xbd/0x200 [ 235.559041][ C1] rcu_core+0x5e1/0x1390 [ 235.563277][ C1] ? __rcu_read_unlock+0x700/0x700 [ 235.568380][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 235.573915][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 235.579885][ C1] rcu_core_si+0x9/0x10 [ 235.584091][ C1] __do_softirq+0x262/0x98c [ 235.588584][ C1] ? sched_clock_cpu+0x1b/0x1b0 [ 235.593597][ C1] irq_exit+0x19b/0x1e0 [ 235.597810][ C1] smp_apic_timer_interrupt+0x1a3/0x610 [ 235.603403][ C1] apic_timer_interrupt+0xf/0x20 [ 235.608335][ C1] [ 235.611271][ C1] RIP: 0010:check_memory_region+0x56/0x1a0 [ 235.617060][ C1] Code: ff 49 89 f8 48 b8 00 00 00 00 00 fc ff df 4d 89 da 49 c1 e8 03 4d 8d 24 00 49 c1 ea 03 49 01 c2 4c 89 e0 49 8d 5a 01 49 89 d9 <4d> 29 e1 49 83 f9 10 0f 8e ad 00 00 00 45 89 e0 41 83 e0 07 75 5e [ 235.636841][ C1] RSP: 0018:ffffc90001647698 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 [ 235.645357][ C1] RAX: ffffed1015d2707b RBX: ffffed1015d2707c RCX: ffffffff81620384 [ 235.653408][ C1] RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffff8880ae9383d8 [ 235.661370][ C1] RBP: ffffc900016476b0 R08: 1ffff11015d2707b R09: ffffed1015d2707c [ 235.669337][ C1] R10: ffffed1015d2707b R11: ffff8880ae9383db R12: ffffed1015d2707b [ 235.677339][ C1] R13: ffffffff8367a671 R14: ffff88809a7b2880 R15: ffff88809ff230f2 [ 235.685326][ C1] ? tomoyo_init_log+0x15c1/0x2070 [ 235.690445][ C1] ? rcu_dynticks_curr_cpu_in_eqs+0x54/0xb0 [ 235.696341][ C1] ? tomoyo_init_log+0x15c1/0x2070 [ 235.701619][ C1] __kasan_check_read+0x11/0x20 [ 235.706580][ C1] rcu_dynticks_curr_cpu_in_eqs+0x54/0xb0 [ 235.712298][ C1] rcu_is_watching+0x10/0x30 [ 235.716880][ C1] rcu_read_lock_held_common+0xb4/0x130 [ 235.722425][ C1] rcu_read_lock_sched_held+0x5b/0xd0 [ 235.727792][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 235.733763][ C1] ? pointer+0x740/0x740 [ 235.737992][ C1] ? tomoyo_get_attributes+0x369/0x4c0 [ 235.743434][ C1] kfree+0x28b/0x2c0 [ 235.747440][ C1] tomoyo_init_log+0x15c1/0x2070 [ 235.752379][ C1] ? vsnprintf+0x32a/0x19a0 [ 235.756892][ C1] ? common_lsm_audit+0x1e00/0x1e00 [ 235.762278][ C1] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 235.767988][ C1] ? tomoyo_domain_quota_is_ok+0x2df/0x540 [ 235.773783][ C1] tomoyo_supervisor+0x32c/0xee0 [ 235.778742][ C1] ? trace_hardirqs_on_caller+0x6a/0x240 [ 235.784391][ C1] ? tomoyo_profile+0x60/0x60 [ 235.789119][ C1] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 235.794622][ C1] ? preempt_schedule_irq+0xf3/0x160 [ 235.799902][ C1] ? retint_kernel+0x2b/0x2b [ 235.804639][ C1] ? __sanitizer_cov_trace_const_cmp1+0x11/0x20 [ 235.811202][ C1] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 235.817720][ C1] ? tomoyo_check_acl+0x229/0x3e0 [ 235.822730][ C1] tomoyo_path_permission+0x263/0x360 [ 235.828109][ C1] ? tomoyo_fill_path_info+0x23c/0x430 [ 235.833694][ C1] tomoyo_path_perm+0x374/0x430 [ 235.838771][ C1] ? tomoyo_check_open_permission+0x3e0/0x3e0 [ 235.844948][ C1] ? kmem_cache_free+0x26b/0x320 [ 235.849890][ C1] tomoyo_path_symlink+0xaa/0xf0 [ 235.854823][ C1] ? tomoyo_inode_getattr+0x30/0x30 [ 235.860123][ C1] ? kern_path_mountpoint+0x40/0x40 [ 235.865323][ C1] ? strncpy_from_user+0x2d1/0x410 [ 235.870470][ C1] security_path_symlink+0x10a/0x170 [ 235.875786][ C1] do_symlinkat+0x137/0x290 [ 235.880349][ C1] ? __ia32_sys_unlink+0x50/0x50 [ 235.885391][ C1] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 235.890886][ C1] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 235.897115][ C1] ? do_syscall_64+0x26/0x790 [ 235.901773][ C1] ? lockdep_hardirqs_on+0x421/0x5e0 [ 235.907051][ C1] __x64_sys_symlink+0x59/0x80 [ 235.911983][ C1] do_syscall_64+0xfa/0x790 [ 235.916532][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 235.922412][ C1] RIP: 0033:0x45b0c7 [ 235.926314][ C1] Code: 0f 1f 00 b8 5c 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 6d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 58 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 4d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 235.945954][ C1] RSP: 002b:0000000000a6fda8 EFLAGS: 00000202 ORIG_RAX: 0000000000000058 [ 235.954483][ C1] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045b0c7 [ 235.962443][ C1] RDX: 0000000000a6fe47 RSI: 00000000004c0f44 RDI: 0000000000a6fe30 [ 235.970450][ C1] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000017 [ 235.978606][ C1] R10: 0000000000000075 R11: 0000000000000202 R12: 0000000000000001 [ 235.986629][ C1] R13: 0000000000a6fde0 R14: 0000000000000000 R15: 0000000000a6fdf0 [ 236.032918][ T9718] ieee80211 phy4: Selected rate control algorithm 'minstrel_ht' 13:59:55 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'wp384\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 13:59:55 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt(r0, 0x10e, 0xb, &(0x7f0000000000)="9a365972", 0x4) sendmsg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000040)="240000000f0007041dfffd946f610500020000001f00000000000800050016000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 236.184756][ T9736] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 13:59:55 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030007000500154001008178a8001600a4000100e5580000000002000000006f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee48100000000000000d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d08fad95667e04adcdf634c1f215ce3bb53b409d5e1ca4e81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 13:59:55 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:59:55 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f8}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 13:59:55 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) r2 = inotify_init1(0x0) poll(&(0x7f0000000100)=[{r1}, {r2}], 0x2, 0x0) r3 = inotify_init1(0x0) poll(&(0x7f0000000100)=[{}, {r3}], 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f00000000c0)={0x3, 0x9, 0x4, 0x4000, 0x3, {0x77359400}, {0x1, 0x0, 0x4, 0x20, 0x4, 0x1, "fea8a6c6"}, 0xe3, 0x2, @fd, 0x2, 0x0, 0xffffffffffffffff}) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r5, 0x110, 0x3) connect$rxrpc(r5, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r5, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, 'w'}], 0x18}}], 0x1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000140)={r5}) socket$kcm(0x2b, 0x6, 0x0) dup(0xffffffffffffffff) memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) sendmsg$BATADV_CMD_GET_MESH(r4, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x44, 0x0, 0x0, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000011}, 0x20000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$pptp(0xffffffffffffffff, 0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48000024000505d25a80648c63940d0424fc600800184001ac0f00281982c137153e370907088000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 13:59:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x2000000, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0xfffffffe, {}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 13:59:56 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030007000500154001008178a8001600a4000100e5580000000002000000006f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee48100000000000000d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d08fad95667e04adcdf634c1f215ce3bb53b409d5e1ca4e81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 13:59:56 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030007000500154001008178a8001600a4000100e5580000000002000000006f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee48100000000000000d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d08fad95667e04adcdf634c1f215ce3bb53b409d5e1ca4e81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 13:59:56 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x22, &(0x7f0000000140)=0x1, 0x4) recvmmsg(r1, &(0x7f0000001600)=[{{&(0x7f0000000180)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x0, &(0x7f0000000540)=[{&(0x7f0000000280)=""/75}, {&(0x7f0000000100)=""/31}, {&(0x7f0000000300)=""/254}, {&(0x7f0000000200)=""/10}, {&(0x7f0000000400)=""/156}, {&(0x7f00000004c0)=""/103}], 0x0, &(0x7f0000000600)=""/4096}}], 0x400000000000241, 0x10002, 0x0) [ 236.450345][ T9757] netlink: 12010 bytes leftover after parsing attributes in process `syz-executor.2'. [ 236.479393][ T9758] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 236.491682][ T9757] ieee80211 phy5: Selected rate control algorithm 'minstrel_ht' 13:59:56 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f8}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 13:59:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt(r0, 0x10e, 0xb, &(0x7f0000000000)="9a365972", 0x4) sendmsg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000040)="240000000f0007041dfffd946f610500020000001f00000000000800050016000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 13:59:56 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2206dfd4c244ed34, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) 13:59:56 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x22, &(0x7f0000000140)=0x1, 0x4) recvmmsg(r1, &(0x7f0000001600)=[{{&(0x7f0000000180)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x0, &(0x7f0000000540)=[{&(0x7f0000000280)=""/75}, {&(0x7f0000000100)=""/31}, {&(0x7f0000000300)=""/254}, {&(0x7f0000000200)=""/10}, {&(0x7f0000000400)=""/156}, {&(0x7f00000004c0)=""/103}], 0x0, &(0x7f0000000600)=""/4096}}], 0x400000000000241, 0x10002, 0x0) 13:59:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt(r0, 0x10e, 0xb, &(0x7f0000000000)="9a365972", 0x4) sendmsg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000040)="240000000f0007041dfffd946f610500020000001f00000000000800050016000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 236.687604][ T9769] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 13:59:56 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 13:59:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt(r0, 0x10e, 0xb, &(0x7f0000000000)="9a365972", 0x4) sendmsg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000040)="240000000f0007041dfffd946f610500020000001f00000000000800050016000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 236.753091][ T9774] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 236.795066][ T9778] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 13:59:56 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) r2 = inotify_init1(0x0) poll(&(0x7f0000000100)=[{r1}, {r2}], 0x2, 0x0) r3 = inotify_init1(0x0) poll(&(0x7f0000000100)=[{}, {r3}], 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f00000000c0)={0x3, 0x9, 0x4, 0x4000, 0x3, {0x77359400}, {0x1, 0x0, 0x4, 0x20, 0x4, 0x1, "fea8a6c6"}, 0xe3, 0x2, @fd, 0x2, 0x0, 0xffffffffffffffff}) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r5, 0x110, 0x3) connect$rxrpc(r5, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r5, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, 'w'}], 0x18}}], 0x1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000140)={r5}) socket$kcm(0x2b, 0x6, 0x0) dup(0xffffffffffffffff) memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) sendmsg$BATADV_CMD_GET_MESH(r4, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x44, 0x0, 0x0, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000011}, 0x20000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$pptp(0xffffffffffffffff, 0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48000024000505d25a80648c63940d0424fc600800184001ac0f00281982c137153e370907088000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 13:59:56 executing program 3: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)={0x60, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x4c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @local}}, {0x14, 0x2, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}]}]}, 0x60}}, 0x0) 13:59:56 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x22, &(0x7f0000000140)=0x1, 0x4) recvmmsg(r1, &(0x7f0000001600)=[{{&(0x7f0000000180)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x0, &(0x7f0000000540)=[{&(0x7f0000000280)=""/75}, {&(0x7f0000000100)=""/31}, {&(0x7f0000000300)=""/254}, {&(0x7f0000000200)=""/10}, {&(0x7f0000000400)=""/156}, {&(0x7f00000004c0)=""/103}], 0x0, &(0x7f0000000600)=""/4096}}], 0x400000000000241, 0x10002, 0x0) 13:59:56 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff824f400005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffff8c77004000000020007700400000000000000040000000000000000000", 0xffffffe5}], 0x2) 13:59:56 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYBLOB='\\\x00', @ANYBLOB="000028bd7000000300000800000008000500000000004000037f6146c3"], 0x2}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, &(0x7f00000000c0)={0x0, 0x9}) listen(0xffffffffffffffff, 0x8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) [ 236.994228][ T9793] tipc: Enabling of bearer rejected, failed to enable media [ 237.022352][ T9794] netlink: 12010 bytes leftover after parsing attributes in process `syz-executor.2'. 13:59:56 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff824f400005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffff8c77004000000020007700400000000000000040000000000000000000", 0xffffffe5}], 0x2) 13:59:56 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x22, &(0x7f0000000140)=0x1, 0x4) recvmmsg(r1, &(0x7f0000001600)=[{{&(0x7f0000000180)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x0, &(0x7f0000000540)=[{&(0x7f0000000280)=""/75}, {&(0x7f0000000100)=""/31}, {&(0x7f0000000300)=""/254}, {&(0x7f0000000200)=""/10}, {&(0x7f0000000400)=""/156}, {&(0x7f00000004c0)=""/103}], 0x0, &(0x7f0000000600)=""/4096}}], 0x400000000000241, 0x10002, 0x0) 13:59:56 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff824f400005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffff8c77004000000020007700400000000000000040000000000000000000", 0xffffffe5}], 0x2) [ 237.145124][ T9794] ieee80211 phy6: Selected rate control algorithm 'minstrel_ht' [ 237.177317][ T9804] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 13:59:56 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="bf16000000000000b70700000100e0ff50700000000000006d0000000000000095000200000000007ae9413df8ff0af5aa35339f4b382c4caf9db6fa7a9b850162abaca1d0fb2b2ff50237440040fa00af0100000000000000000000ac3a474c27bdfbd30100000000000000040c4646d0cd3077c84d09685df560daf8b01658e32ec58703320382c59d45ebd3165a9063d67748288bcc2e759f4ffd7466f10deee48a0024286e8ccaefbf4700a5d8618ba18c3d1892ca580b37c20bbf361f6686868d9c4a184af707e87924aab98eb62f5df64b74d0b9ac22fda78982bff3353a5abe83f317d2e62e19291000f639900977e8e9b0d86c974fb7aff15df80effbc574cf59000584719ecbe098834718e68e801607f77bd02d35390882113009f4ce20e3fe23c39c8f2150fa7f537903fdcc268fb9f6adf1322e59af461c316fdefbe5094de9623be442c9bf1277eda95c9edd26376a9b7af1af05413fd3d66d8d243cd2f6df5ffb78c01b708103b0fb5a96bbfa2c261843bd84efb041fbbcd9b27073ff969fe607d95b966bb89250b0c1416d4fca80852173e49f2037fb4392eda63b0ea1ee3516dae5f822bebe359f0d1430e331916cff554164d423f5ae1d3ddaee2625afa24a91eae28"], &(0x7f0000000140)='GPL\x00'}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 237.238189][ T9801] tipc: Enabling of bearer rejected, failed to enable media 13:59:56 executing program 5: unshare(0x200) r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x15, 0x80000) fcntl$setstatus(r2, 0x4, 0x4000) prctl$PR_SET_PTRACER(0x59616d61, r0) io_uring_enter(0xffffffffffffffff, 0x80000001, 0x1, 0x1, &(0x7f0000000000), 0x8) setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f0000000040)='\x00', 0x1) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x20000, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000140)=0x4) ioctl$DRM_IOCTL_GET_MAGIC(0xffffffffffffffff, 0x80046402, &(0x7f00000002c0)=0x5) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x880002}, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = inotify_init() r4 = inotify_add_watch(r3, &(0x7f00000000c0)='.\x00', 0x1) inotify_rm_watch(r3, r4) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1) 13:59:57 executing program 3: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)={0x60, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x4c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @local}}, {0x14, 0x2, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}]}]}, 0x60}}, 0x0) 13:59:57 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff824f400005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffff8c77004000000020007700400000000000000040000000000000000000", 0xffffffe5}], 0x2) 13:59:57 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) r2 = inotify_init1(0x0) poll(&(0x7f0000000100)=[{r1}, {r2}], 0x2, 0x0) r3 = inotify_init1(0x0) poll(&(0x7f0000000100)=[{}, {r3}], 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f00000000c0)={0x3, 0x9, 0x4, 0x4000, 0x3, {0x77359400}, {0x1, 0x0, 0x4, 0x20, 0x4, 0x1, "fea8a6c6"}, 0xe3, 0x2, @fd, 0x2, 0x0, 0xffffffffffffffff}) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r5, 0x110, 0x3) connect$rxrpc(r5, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r5, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, 'w'}], 0x18}}], 0x1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000140)={r5}) socket$kcm(0x2b, 0x6, 0x0) dup(0xffffffffffffffff) memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) sendmsg$BATADV_CMD_GET_MESH(r4, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x44, 0x0, 0x0, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000011}, 0x20000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$pptp(0xffffffffffffffff, 0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48000024000505d25a80648c63940d0424fc600800184001ac0f00281982c137153e370907088000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 13:59:57 executing program 1: dup(0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@dev, @ipv4={[0x0, 0x0, 0x8], [], @loopback}, @initdev={0xfe, 0x88, [0xe, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8, 0x6], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r3}) [ 237.510624][ T9833] tipc: Enabling of bearer rejected, failed to enable media 13:59:57 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x29, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x210, 0xb8, 0x0, 0xb8, 0xb8, 0xb8, 0x178, 0x178, 0x178, 0x178, 0x178, 0x3, 0x0, {[{{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @empty, 0x0, 0x0, 'veth0\x00', 'team_slave_1\x00'}, 0x0, 0x70, 0xb8, 0x0, {0x6020000}}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@local, @multicast1, 0x0, 0x0, 'vxcan1\x00', 'nr0\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@inet=@set2={{0x28, 'set\x00'}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0xfef9) 13:59:57 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x3}, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}, {"e483cff3a0e0a0bea766cc0f02d9c821da806d73129a313cb0f9e699000ca775a738816bf8677b8d1c585d8453656b1215083bda9330e92b70"}}}}}, 0xfdef) 13:59:57 executing program 3: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)={0x60, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x4c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @local}}, {0x14, 0x2, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}]}]}, 0x60}}, 0x0) [ 237.556310][ T9838] netlink: 12010 bytes leftover after parsing attributes in process `syz-executor.2'. 13:59:57 executing program 5: unshare(0x200) r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x15, 0x80000) fcntl$setstatus(r2, 0x4, 0x4000) prctl$PR_SET_PTRACER(0x59616d61, r0) io_uring_enter(0xffffffffffffffff, 0x80000001, 0x1, 0x1, &(0x7f0000000000), 0x8) setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f0000000040)='\x00', 0x1) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x20000, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000140)=0x4) ioctl$DRM_IOCTL_GET_MAGIC(0xffffffffffffffff, 0x80046402, &(0x7f00000002c0)=0x5) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x880002}, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = inotify_init() r4 = inotify_add_watch(r3, &(0x7f00000000c0)='.\x00', 0x1) inotify_rm_watch(r3, r4) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1) 13:59:57 executing program 4: unshare(0x200) r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x15, 0x80000) fcntl$setstatus(r2, 0x4, 0x4000) prctl$PR_SET_PTRACER(0x59616d61, r0) io_uring_enter(0xffffffffffffffff, 0x80000001, 0x1, 0x1, &(0x7f0000000000), 0x8) setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f0000000040)='\x00', 0x1) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x20000, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000140)=0x4) ioctl$DRM_IOCTL_GET_MAGIC(0xffffffffffffffff, 0x80046402, &(0x7f00000002c0)=0x5) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x880002}, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = inotify_init() r4 = inotify_add_watch(r3, &(0x7f00000000c0)='.\x00', 0x1) inotify_rm_watch(r3, r4) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1) [ 237.701130][ T9838] ieee80211 phy7: Selected rate control algorithm 'minstrel_ht' 13:59:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) socket(0x1e, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) shmget(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfdef) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000300), 0xc, &(0x7f0000000340)={&(0x7f00000017c0)=ANY=[@ANYBLOB="04010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x104}, 0x1, 0x0, 0x0, 0x10}, 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r2) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r0, 0x0, 0x0, 0x0) r4 = semget(0x3, 0x0, 0x20) semctl$GETNCNT(r4, 0x1, 0xe, &(0x7f0000000700)=""/4096) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r5, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000001c0)={0x2d, 0xa, 0x4, 0x80000, 0x81, {0x0, 0x2710}, {0x3, 0x8, 0x7, 0x1, 0x0, 0x9, "71e45447"}, 0xcce2, 0xacc5449cedb110d, @planes=&(0x7f0000000000)={0x8, 0x401, @mem_offset=0x9, 0x7}, 0x7fffffff}) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, &(0x7f0000000480)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@mcast2, @in6=@empty}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f00000006c0)=0xe8) 13:59:57 executing program 3: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)={0x60, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x4c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @local}}, {0x14, 0x2, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}]}]}, 0x60}}, 0x0) 13:59:57 executing program 2: write$sndseq(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000040)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 13:59:57 executing program 4: unshare(0x200) r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x15, 0x80000) fcntl$setstatus(r2, 0x4, 0x4000) prctl$PR_SET_PTRACER(0x59616d61, r0) io_uring_enter(0xffffffffffffffff, 0x80000001, 0x1, 0x1, &(0x7f0000000000), 0x8) setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f0000000040)='\x00', 0x1) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x20000, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000140)=0x4) ioctl$DRM_IOCTL_GET_MAGIC(0xffffffffffffffff, 0x80046402, &(0x7f00000002c0)=0x5) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x880002}, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = inotify_init() r4 = inotify_add_watch(r3, &(0x7f00000000c0)='.\x00', 0x1) inotify_rm_watch(r3, r4) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1) 13:59:57 executing program 5: unshare(0x200) r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x15, 0x80000) fcntl$setstatus(r2, 0x4, 0x4000) prctl$PR_SET_PTRACER(0x59616d61, r0) io_uring_enter(0xffffffffffffffff, 0x80000001, 0x1, 0x1, &(0x7f0000000000), 0x8) setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f0000000040)='\x00', 0x1) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x20000, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000140)=0x4) ioctl$DRM_IOCTL_GET_MAGIC(0xffffffffffffffff, 0x80046402, &(0x7f00000002c0)=0x5) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x880002}, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = inotify_init() r4 = inotify_add_watch(r3, &(0x7f00000000c0)='.\x00', 0x1) inotify_rm_watch(r3, r4) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1) 13:59:57 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="000000000000000000000e0000004800010044000400200001000a00000000000000ff01000000000000000000000000000100000000200002000a00000000000000fe8000"/86], 0x5c}}, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYRES16, @ANYBLOB="00082bbd7000ffdbdf25110000000c00050008000100756470001000060008000100090000000400020034000200080002005d0700000800010000660000040004000400040008000200680c030008000100008000000800020001000000dc000100380004001400010002004e2300000002000000d023000000200002000a004e23000007fffe80000000000000000000000000002a010400001000010044000400200001000a004e21000001ffff02000000000000000000"], 0x2}}, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e5777c3c431deb1c79d4346b4634", @ANYRES32=r1, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x3}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 238.136592][ T9872] tipc: Enabling of bearer rejected, failed to enable media 13:59:57 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000001380)='attr\x00') getdents64(r0, &(0x7f0000000280)=""/134, 0x2c) getdents64(r0, &(0x7f0000000340)=""/4096, 0x1000) 13:59:57 executing program 5: unshare(0x200) r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x15, 0x80000) fcntl$setstatus(r2, 0x4, 0x4000) prctl$PR_SET_PTRACER(0x59616d61, r0) io_uring_enter(0xffffffffffffffff, 0x80000001, 0x1, 0x1, &(0x7f0000000000), 0x8) setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f0000000040)='\x00', 0x1) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x20000, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000140)=0x4) ioctl$DRM_IOCTL_GET_MAGIC(0xffffffffffffffff, 0x80046402, &(0x7f00000002c0)=0x5) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x880002}, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = inotify_init() r4 = inotify_add_watch(r3, &(0x7f00000000c0)='.\x00', 0x1) inotify_rm_watch(r3, r4) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1) [ 238.226267][ T9887] ptrace attach of ""[9884] was attempted by "/root/syz-executor.5"[9887] 13:59:58 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x3}, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}, {"e483cff3a0e0a0bea766cc0f02d9c821da806d73129a313cb0f9e699000ca775a738816bf8677b8d1c585d8453656b1215083bda9330e92b70"}}}}}, 0xfdef) 13:59:58 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000001380)='attr\x00') getdents64(r0, &(0x7f0000000280)=""/134, 0x2c) getdents64(r0, &(0x7f0000000340)=""/4096, 0x1000) 13:59:58 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="000000000000000000000e0000004800010044000400200001000a00000000000000ff01000000000000000000000000000100000000200002000a00000000000000fe8000"/86], 0x5c}}, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYRES16, @ANYBLOB="00082bbd7000ffdbdf25110000000c00050008000100756470001000060008000100090000000400020034000200080002005d0700000800010000660000040004000400040008000200680c030008000100008000000800020001000000dc000100380004001400010002004e2300000002000000d023000000200002000a004e23000007fffe80000000000000000000000000002a010400001000010044000400200001000a004e21000001ffff02000000000000000000"], 0x2}}, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e5777c3c431deb1c79d4346b4634", @ANYRES32=r1, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x3}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:59:58 executing program 4: unshare(0x200) r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x15, 0x80000) fcntl$setstatus(r2, 0x4, 0x4000) prctl$PR_SET_PTRACER(0x59616d61, r0) io_uring_enter(0xffffffffffffffff, 0x80000001, 0x1, 0x1, &(0x7f0000000000), 0x8) setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f0000000040)='\x00', 0x1) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x20000, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000140)=0x4) ioctl$DRM_IOCTL_GET_MAGIC(0xffffffffffffffff, 0x80046402, &(0x7f00000002c0)=0x5) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x880002}, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = inotify_init() r4 = inotify_add_watch(r3, &(0x7f00000000c0)='.\x00', 0x1) inotify_rm_watch(r3, r4) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1) 13:59:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) socket(0x1e, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) shmget(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfdef) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000300), 0xc, &(0x7f0000000340)={&(0x7f00000017c0)=ANY=[@ANYBLOB="04010000", @ANYRES16=0x0, @ANYBLOB="040000000000ffdbdf2508000000b80005002c000200080004000005d797a3d0bc201a56cbaf91802c0000000800030001000000080004000700000008000400c5040000080003001f000000240002000800030007000000080003000100000008000400000000000800030009000000140002000800030007000000080003007f00000007000100696200000c000200080001000e0000003c0002000800020013540000080001000f000000080004002000000008000300030000000800020000000000080003000000000008000100120000000400090020000700080002000000000008000100000000000c0003000000000000000000140002000800"], 0x104}, 0x1, 0x0, 0x0, 0x10}, 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r2) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r0, 0x0, 0x0, 0x0) r4 = semget(0x3, 0x0, 0x20) semctl$GETNCNT(r4, 0x1, 0xe, &(0x7f0000000700)=""/4096) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r5, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000001c0)={0x2d, 0xa, 0x4, 0x80000, 0x81, {0x0, 0x2710}, {0x3, 0x8, 0x7, 0x1, 0x0, 0x9, "71e45447"}, 0xcce2, 0xacc5449cedb110d, @planes=&(0x7f0000000000)={0x8, 0x401, @mem_offset=0x9, 0x7}, 0x7fffffff}) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, &(0x7f0000000480)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@mcast2, @in6=@empty}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f00000006c0)=0xe8) 13:59:58 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000001380)='attr\x00') getdents64(r0, &(0x7f0000000280)=""/134, 0x2c) getdents64(r0, &(0x7f0000000340)=""/4096, 0x1000) 13:59:58 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="000000000000000000000e0000004800010044000400200001000a00000000000000ff01000000000000000000000000000100000000200002000a00000000000000fe8000"/86], 0x5c}}, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYRES16, @ANYBLOB="00082bbd7000ffdbdf25110000000c00050008000100756470001000060008000100090000000400020034000200080002005d0700000800010000660000040004000400040008000200680c030008000100008000000800020001000000dc000100380004001400010002004e2300000002000000d023000000200002000a004e23000007fffe80000000000000000000000000002a010400001000010044000400200001000a004e21000001ffff02000000000000000000"], 0x2}}, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e5777c3c431deb1c79d4346b4634", @ANYRES32=r1, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x3}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:59:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) socket(0x1e, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) shmget(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfdef) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000300), 0xc, &(0x7f0000000340)={&(0x7f00000017c0)=ANY=[@ANYBLOB="04010000", @ANYRES16=0x0, @ANYBLOB="040000000000ffdbdf2508000000b80005002c000200080004000005d797a3d0bc201a56cbaf91802c0000000800030001000000080004000700000008000400c5040000080003001f000000240002000800030007000000080003000100000008000400000000000800030009000000140002000800030007000000080003007f00000007000100696200000c000200080001000e0000003c0002000800020013540000080001000f000000080004002000000008000300030000000800020000000000080003000000000008000100120000000400090020000700080002000000000008000100000000000c0003000000000000000000140002000800"], 0x104}, 0x1, 0x0, 0x0, 0x10}, 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r2) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r0, 0x0, 0x0, 0x0) r4 = semget(0x3, 0x0, 0x20) semctl$GETNCNT(r4, 0x1, 0xe, &(0x7f0000000700)=""/4096) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r5, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000001c0)={0x2d, 0xa, 0x4, 0x80000, 0x81, {0x0, 0x2710}, {0x3, 0x8, 0x7, 0x1, 0x0, 0x9, "71e45447"}, 0xcce2, 0xacc5449cedb110d, @planes=&(0x7f0000000000)={0x8, 0x401, @mem_offset=0x9, 0x7}, 0x7fffffff}) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, &(0x7f0000000480)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@mcast2, @in6=@empty}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f00000006c0)=0xe8) [ 238.849675][ T9925] ptrace attach of ""[9922] was attempted by "/root/syz-executor.4"[9925] 13:59:58 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000001380)='attr\x00') getdents64(r0, &(0x7f0000000280)=""/134, 0x2c) getdents64(r0, &(0x7f0000000340)=""/4096, 0x1000) 13:59:58 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000001380)='attr\x00') getdents64(r0, &(0x7f0000000280)=""/134, 0x2c) getdents64(r0, &(0x7f0000000340)=""/4096, 0x1000) 13:59:58 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000001380)='attr\x00') getdents64(r0, &(0x7f0000000280)=""/134, 0x2c) getdents64(r0, &(0x7f0000000340)=""/4096, 0x1000) 14:00:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) socket(0x1e, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) shmget(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfdef) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000300), 0xc, &(0x7f0000000340)={&(0x7f00000017c0)=ANY=[@ANYBLOB="04010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x104}, 0x1, 0x0, 0x0, 0x10}, 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r2) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r0, 0x0, 0x0, 0x0) r4 = semget(0x3, 0x0, 0x20) semctl$GETNCNT(r4, 0x1, 0xe, &(0x7f0000000700)=""/4096) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r5, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000001c0)={0x2d, 0xa, 0x4, 0x80000, 0x81, {0x0, 0x2710}, {0x3, 0x8, 0x7, 0x1, 0x0, 0x9, "71e45447"}, 0xcce2, 0xacc5449cedb110d, @planes=&(0x7f0000000000)={0x8, 0x401, @mem_offset=0x9, 0x7}, 0x7fffffff}) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, &(0x7f0000000480)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@mcast2, @in6=@empty}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f00000006c0)=0xe8) 14:00:00 executing program 2: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="000000000000000000000e0000004800010044000400200001000a00000000000000ff01000000000000000000000000000100000000200002000a00000000000000fe8000"/86], 0x5c}}, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYRES16, @ANYBLOB="00082bbd7000ffdbdf25110000000c00050008000100756470001000060008000100090000000400020034000200080002005d0700000800010000660000040004000400040008000200680c030008000100008000000800020001000000dc000100380004001400010002004e2300000002000000d023000000200002000a004e23000007fffe80000000000000000000000000002a010400001000010044000400200001000a004e21000001ffff02000000000000000000"], 0x2}}, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e5777c3c431deb1c79d4346b4634", @ANYRES32=r1, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x3}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) 14:00:00 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000001380)='attr\x00') getdents64(r0, &(0x7f0000000280)=""/134, 0x2c) getdents64(r0, &(0x7f0000000340)=""/4096, 0x1000) 14:00:00 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x3}, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}, {"e483cff3a0e0a0bea766cc0f02d9c821da806d73129a313cb0f9e699000ca775a738816bf8677b8d1c585d8453656b1215083bda9330e92b70"}}}}}, 0xfdef) 14:00:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) socket(0x1e, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) shmget(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfdef) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000300), 0xc, &(0x7f0000000340)={&(0x7f00000017c0)=ANY=[@ANYBLOB="04010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x104}, 0x1, 0x0, 0x0, 0x10}, 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r2) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r0, 0x0, 0x0, 0x0) r4 = semget(0x3, 0x0, 0x20) semctl$GETNCNT(r4, 0x1, 0xe, &(0x7f0000000700)=""/4096) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r5, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000001c0)={0x2d, 0xa, 0x4, 0x80000, 0x81, {0x0, 0x2710}, {0x3, 0x8, 0x7, 0x1, 0x0, 0x9, "71e45447"}, 0xcce2, 0xacc5449cedb110d, @planes=&(0x7f0000000000)={0x8, 0x401, @mem_offset=0x9, 0x7}, 0x7fffffff}) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, &(0x7f0000000480)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@mcast2, @in6=@empty}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f00000006c0)=0xe8) 14:00:00 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000027000)={0x1}) unshare(0x40600) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000140)="99", 0x1}], 0x1, 0x0) gettid() fchmod(0xffffffffffffffff, 0x0) timerfd_settime(0xffffffffffffffff, 0x1, 0xfffffffffffffffe, &(0x7f0000000040)) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffffc, 0x0) ioctl$BLKBSZGET(r2, 0x80081270, 0x0) pwrite64(r2, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x1010, r1, 0x0) lseek(r0, 0x0, 0x1) readahead(r0, 0x4, 0x2) shmget(0x2, 0x2000, 0x800, &(0x7f0000001000/0x2000)=nil) sendfile(r1, r1, &(0x7f0000000440), 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2044, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x4e24, 0x1, @dev, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r3, r4, 0x0, 0x8607) 14:00:01 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x2, 0x0) syz_open_dev$radio(0x0, 0x2, 0x2) 14:00:01 executing program 2: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='hugetlbfs\x00', 0x0, &(0x7f0000000200)='nseli\xb4\x10x\x00\x00olicy\x00\xfb\x89q\x92\xfbw\x88=\xa2\x97\f8x\xa3\x1e\xdd\x1a\xce\x9e[\x04rk\n\xc2-{\x9a`\xbde\xab2 \x9a\x9c\x19)d\xf7,\xa2\x13\xcb\x1c6\xed\xb24#\xfe\n\xe8s\x9e\x9d\xc0)\xf4BR\x98\xd9\xb0\n\xbe\xf14\xdb\x1e\xdc') 14:00:01 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x802) write$FUSE_LK(r0, &(0x7f0000000040)={0xffffffffffffff37}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read$eventfd(r0, 0x0, 0x6) [ 241.586176][ T9989] hugetlbfs: Unknown parameter 'nseli´x' 14:00:01 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xc) r2 = socket$netlink(0x10, 0x3, 0xc) writev(r2, &(0x7f0000fb5ff0)=[{&(0x7f0000000080)="1f00000002031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1) writev(r1, &(0x7f0000fb5ff0), 0x100000000000006c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r0, r1, 0x0) 14:00:01 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xc) r2 = socket$netlink(0x10, 0x3, 0xc) writev(r2, &(0x7f0000fb5ff0)=[{&(0x7f0000000080)="1f00000002031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1) writev(r1, &(0x7f0000fb5ff0), 0x100000000000006c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r0, r1, 0x0) 14:00:01 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000027000)={0x1}) unshare(0x40600) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000140)="99", 0x1}], 0x1, 0x0) gettid() fchmod(0xffffffffffffffff, 0x0) timerfd_settime(0xffffffffffffffff, 0x1, 0xfffffffffffffffe, &(0x7f0000000040)) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffffc, 0x0) ioctl$BLKBSZGET(r2, 0x80081270, 0x0) pwrite64(r2, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x1010, r1, 0x0) lseek(r0, 0x0, 0x1) readahead(r0, 0x4, 0x2) shmget(0x2, 0x2000, 0x800, &(0x7f0000001000/0x2000)=nil) sendfile(r1, r1, &(0x7f0000000440), 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2044, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x4e24, 0x1, @dev, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r3, r4, 0x0, 0x8607) 14:00:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) socket(0x1e, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) shmget(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfdef) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000300), 0xc, &(0x7f0000000340)={&(0x7f00000017c0)=ANY=[@ANYBLOB="04010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x104}, 0x1, 0x0, 0x0, 0x10}, 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r2) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r0, 0x0, 0x0, 0x0) r4 = semget(0x3, 0x0, 0x20) semctl$GETNCNT(r4, 0x1, 0xe, &(0x7f0000000700)=""/4096) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r5, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000001c0)={0x2d, 0xa, 0x4, 0x80000, 0x81, {0x0, 0x2710}, {0x3, 0x8, 0x7, 0x1, 0x0, 0x9, "71e45447"}, 0xcce2, 0xacc5449cedb110d, @planes=&(0x7f0000000000)={0x8, 0x401, @mem_offset=0x9, 0x7}, 0x7fffffff}) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, &(0x7f0000000480)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@mcast2, @in6=@empty}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f00000006c0)=0xe8) 14:00:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd000000100001000a0c10000000000000000000", 0xfe9f}], 0x1) recvmmsg(r0, &(0x7f0000003dc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:00:01 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xc) r2 = socket$netlink(0x10, 0x3, 0xc) writev(r2, &(0x7f0000fb5ff0)=[{&(0x7f0000000080)="1f00000002031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1) writev(r1, &(0x7f0000fb5ff0), 0x100000000000006c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r0, r1, 0x0) 14:00:01 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x3}, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}, {"e483cff3a0e0a0bea766cc0f02d9c821da806d73129a313cb0f9e699000ca775a738816bf8677b8d1c585d8453656b1215083bda9330e92b70"}}}}}, 0xfdef) 14:00:01 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000027000)={0x1}) unshare(0x40600) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000140)="99", 0x1}], 0x1, 0x0) gettid() fchmod(0xffffffffffffffff, 0x0) timerfd_settime(0xffffffffffffffff, 0x1, 0xfffffffffffffffe, &(0x7f0000000040)) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffffc, 0x0) ioctl$BLKBSZGET(r2, 0x80081270, 0x0) pwrite64(r2, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x1010, r1, 0x0) lseek(r0, 0x0, 0x1) readahead(r0, 0x4, 0x2) shmget(0x2, 0x2000, 0x800, &(0x7f0000001000/0x2000)=nil) sendfile(r1, r1, &(0x7f0000000440), 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2044, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x4e24, 0x1, @dev, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r3, r4, 0x0, 0x8607) 14:00:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) socket(0x1e, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) shmget(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfdef) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000300), 0xc, &(0x7f0000000340)={&(0x7f00000017c0)=ANY=[@ANYBLOB="04010000", @ANYRES16=0x0, @ANYBLOB="040000000000ffdbdf2508000000b80005002c000200080004000005d797a3d0bc201a56cbaf91802c0000000800030001000000080004000700000008000400c5040000080003001f000000240002000800030007000000080003000100000008000400000000000800030009000000140002000800030007000000080003007f00000007000100696200000c000200080001000e0000003c0002000800020013540000080001000f000000080004002000000008000300030000000800020000000000080003000000000008000100120000000400090020000700080002000000000008000100000000000c0003000000000000000000140002000800"], 0x104}, 0x1, 0x0, 0x0, 0x10}, 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r2) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r0, 0x0, 0x0, 0x0) r4 = semget(0x3, 0x0, 0x20) semctl$GETNCNT(r4, 0x1, 0xe, &(0x7f0000000700)=""/4096) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r5, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000001c0)={0x2d, 0xa, 0x4, 0x80000, 0x81, {0x0, 0x2710}, {0x3, 0x8, 0x7, 0x1, 0x0, 0x9, "71e45447"}, 0xcce2, 0xacc5449cedb110d, @planes=&(0x7f0000000000)={0x8, 0x401, @mem_offset=0x9, 0x7}, 0x7fffffff}) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, &(0x7f0000000480)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@mcast2, @in6=@empty}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f00000006c0)=0xe8) 14:00:02 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xc) r2 = socket$netlink(0x10, 0x3, 0xc) writev(r2, &(0x7f0000fb5ff0)=[{&(0x7f0000000080)="1f00000002031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1) writev(r1, &(0x7f0000fb5ff0), 0x100000000000006c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r0, r1, 0x0) 14:00:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@local, 0x0, 0x3}, &(0x7f0000000200)=0x20) 14:00:02 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000027000)={0x1}) unshare(0x40600) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000140)="99", 0x1}], 0x1, 0x0) gettid() fchmod(0xffffffffffffffff, 0x0) timerfd_settime(0xffffffffffffffff, 0x1, 0xfffffffffffffffe, &(0x7f0000000040)) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffffc, 0x0) ioctl$BLKBSZGET(r2, 0x80081270, 0x0) pwrite64(r2, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x1010, r1, 0x0) lseek(r0, 0x0, 0x1) readahead(r0, 0x4, 0x2) shmget(0x2, 0x2000, 0x800, &(0x7f0000001000/0x2000)=nil) sendfile(r1, r1, &(0x7f0000000440), 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2044, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x4e24, 0x1, @dev, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r3, r4, 0x0, 0x8607) 14:00:02 executing program 3: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000024000)=[{&(0x7f00000001c0)="24000000100007031dff22946fa2830020200a0009100300001d85e87f0000000400ff7e", 0x24}], 0x1}, 0x0) [ 242.688399][T10043] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 242.755498][T10044] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 14:00:02 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000040)=0x80000000, 0x4) sendto(r3, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0xac0, 0x0) 14:00:02 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8698071") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') recvmmsg(r1, &(0x7f0000003840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(r1, &(0x7f000001d0c0)={0x0, 0x0, &(0x7f000001d080)={&(0x7f000001d000)={0x14, r2, 0x709}, 0x14}}, 0x0) 14:00:02 executing program 0: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8698071") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') recvmmsg(r1, &(0x7f0000003840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(r1, &(0x7f000001d0c0)={0x0, 0x0, &(0x7f000001d080)={&(0x7f000001d000)={0x14, r2, 0x709}, 0x14}}, 0x0) 14:00:02 executing program 3: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000024000)=[{&(0x7f00000001c0)="24000000100007031dff22946fa2830020200a0009100300001d85e87f0000000400ff7e", 0x24}], 0x1}, 0x0) 14:00:02 executing program 5: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f00006dbffc)=0x1, 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @loopback}, 0x10) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=""/2, 0xba}, 0x0) 14:00:02 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000040)=0x80000000, 0x4) sendto(r3, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0xac0, 0x0) 14:00:02 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8008000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) close(r0) truncate(&(0x7f0000000240)='./file0\x00', 0x0) 14:00:02 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8698071") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') recvmmsg(r1, &(0x7f0000003840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(r1, &(0x7f000001d0c0)={0x0, 0x0, &(0x7f000001d080)={&(0x7f000001d000)={0x14, r2, 0x709}, 0x14}}, 0x0) [ 243.300803][T10065] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 14:00:03 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8008000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) close(r0) truncate(&(0x7f0000000240)='./file0\x00', 0x0) 14:00:03 executing program 3: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000024000)=[{&(0x7f00000001c0)="24000000100007031dff22946fa2830020200a0009100300001d85e87f0000000400ff7e", 0x24}], 0x1}, 0x0) 14:00:03 executing program 5: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f00006dbffc)=0x1, 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @loopback}, 0x10) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=""/2, 0xba}, 0x0) 14:00:03 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8698071") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') recvmmsg(r1, &(0x7f0000003840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(r1, &(0x7f000001d0c0)={0x0, 0x0, &(0x7f000001d080)={&(0x7f000001d000)={0x14, r2, 0x709}, 0x14}}, 0x0) 14:00:03 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000040)=0x80000000, 0x4) sendto(r3, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0xac0, 0x0) 14:00:03 executing program 0: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8698071") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') recvmmsg(r1, &(0x7f0000003840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(r1, &(0x7f000001d0c0)={0x0, 0x0, &(0x7f000001d080)={&(0x7f000001d000)={0x14, r2, 0x709}, 0x14}}, 0x0) [ 243.484259][T10084] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 14:00:03 executing program 3: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000024000)=[{&(0x7f00000001c0)="24000000100007031dff22946fa2830020200a0009100300001d85e87f0000000400ff7e", 0x24}], 0x1}, 0x0) 14:00:03 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8008000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) close(r0) truncate(&(0x7f0000000240)='./file0\x00', 0x0) 14:00:03 executing program 5: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f00006dbffc)=0x1, 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @loopback}, 0x10) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=""/2, 0xba}, 0x0) 14:00:03 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8698071") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') recvmmsg(r1, &(0x7f0000003840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(r1, &(0x7f000001d0c0)={0x0, 0x0, &(0x7f000001d080)={&(0x7f000001d000)={0x14, r2, 0x709}, 0x14}}, 0x0) [ 243.723608][T10101] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 14:00:03 executing program 0: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8698071") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') recvmmsg(r1, &(0x7f0000003840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(r1, &(0x7f000001d0c0)={0x0, 0x0, &(0x7f000001d080)={&(0x7f000001d000)={0x14, r2, 0x709}, 0x14}}, 0x0) 14:00:03 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000040)=0x80000000, 0x4) sendto(r3, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0xac0, 0x0) 14:00:03 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8008000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) close(r0) truncate(&(0x7f0000000240)='./file0\x00', 0x0) 14:00:03 executing program 5: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f00006dbffc)=0x1, 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @loopback}, 0x10) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=""/2, 0xba}, 0x0) 14:00:03 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0xfffffffffffffffe, 0x0) 14:00:03 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000001440)={'syz', 0x0}, 0x0, 0x0, r0) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="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", 0x1001, r1) 14:00:03 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x14, 0x0, 0xfd1b) 14:00:03 executing program 5: openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x80006, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x88a9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x900}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 14:00:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x13) close(0xffffffffffffffff) syz_emit_ethernet(0x7a, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x0) getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000000)) 14:00:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0xa, 0x801, 0x84) connect$inet(r2, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r2, 0x83) r3 = accept4(r2, 0x0, 0x0, 0x0) getsockopt$inet_buf(r3, 0x84, 0x11, &(0x7f0000dcffe8)=""/11, &(0x7f0000000080)=0x9b) 14:00:03 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x100000001, 0x0, 0x0, 0x3}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f000001cfb0)={0x0, 0x2}) 14:00:03 executing program 0: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") r1 = fsopen(&(0x7f0000000040)='bpf\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r1, 0x2, &(0x7f0000000140)='\x00', &(0x7f0000000000)="03", 0x1) 14:00:04 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000001440)={'syz', 0x0}, 0x0, 0x0, r0) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="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", 0x1001, r1) 14:00:04 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000001440)={'syz', 0x0}, 0x0, 0x0, r0) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="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", 0x1001, r1) 14:00:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x13) close(0xffffffffffffffff) syz_emit_ethernet(0x7a, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x0) getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000000)) 14:00:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000001440)={'syz', 0x0}, 0x0, 0x0, r0) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="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", 0x1001, r1) 14:00:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'macvlan0\x00'}, @IFLA_PROTO_DOWN={0x5, 0x27, 0x8}]}, 0x3c}}, 0x0) 14:00:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x0, 0x449}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @dev}, 0x2}}, 0x2e) close(r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit(0x0) 14:00:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x13) close(0xffffffffffffffff) syz_emit_ethernet(0x7a, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x0) getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000000)) 14:00:04 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000001440)={'syz', 0x0}, 0x0, 0x0, r0) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67f6c3d7605eab3b675b6c061e6ef32b7ea8847b6f84da1334d35322b94447bfaca74b152eb64cfa54cb63126c2cc662e7898e6459ed40c4566403f303d341c9c34c6049d9f8e1c2a9483f003c20e66886d0e1629f498668c202f183de294d03da07c9f5feb65bc196554a79a2f255828c1f1cf9a09654f9df849443e8d290debcc78efbdca391a348b33f18ef618011273faa1f095298dd71db08a90e177a1e9a0c771deca3b51670a26850b89d4439574328c19d9e91766dd52169e0ad5011e4acc005861b3b3146d67445e6f6c75ce4af9d8db6963887d79113613267c5bc42fb0aca828590fb291ce8836d3cd391d364efdbb7015d8ec643d83b623380c21c6ebbf774498c94e60838a45d4692bfe73aaea2bbcecb6dcec20e5aa48a950428e2372009212f2f6be608cdec5ff84108f3f3d2e42c99a6d4cd4577ec9f39a51533efe71d494ccadb66eddd4cc0e56b33eefb0ada68ae36c905a977d9042a63299d2130f4e85357b0078c31bc45b00f5ccd879a6735d85882bfddbc6f2cff4a2b976b29e5a8adc74893c748b297a660ba0f64ad8a6ac6fcf180b6a4357ad6733cb75035cd58631142bd720cf52bcd1438647cbe1058e32d33c38f1327bef3f6b1c815ab4f2d47366473ae37c65a2d1df88823dd4c326d640c50e5bddfa976f04cd034331b632cd7a8bbc838081f28f6e24ed646721cea36e56501f9085e428a6c94b7ba5431f59651f36c8f715e4547ffed53c03cc58d2d4382193625cf69c197c4eb3c3c86c291d693837ab7eb23d61d2518379f0c61acf67425afa1ff8d1fac196a7ef9f6f9b514a2028ae010d1bf10833940294c400401ec706ce366dc4c62f6c55c6985a31592360cc7e6cc30a90cae1891b4cffb882b0329457503055db6a8e3b651b3302c24e6d149e8368ee6d3bafbc417256d042b4b87cb1bf46169ad1a593da66b2c6f453180f2c51be35c431e1af07e54c1251334415135422fa81b015a7a746c1979827e3d32057d408016cdc2b641a42626bbf8b7970a5638e9e48783ff80ded5b5184b69d41e60ba9e2ff7ef3e85b4419db2b064d64f833dc2035a6cc3ea28335ad94eb5ba974d9799ce94565559e6a7636b725c4c3dc1702af3c0f3d9dc77f6d404b7c8ff2cec1b4e703451a1d2750d9a22e9f4b5e27da765d228f09bbd30088ac9dff793ec759161849cf4217f5684bff8eddd65be61d3ed2dcc7bae8ab5e1260c3a90cdb37626c4871098802b34f271d8a091b0517bd1588b43cf21b2e3fe676e34d115a56d450d50a97ac7e2ea5904f9695dbde822dba41ac3a1190d63ef486a1829d38b005f9458a82533a555a2f674eea95af7ef7f0cf9654e0ed8d2ab722ca065fd97e6518b76a39cc1b04dc49c395f3aad5e05c76c1881f6a85fee6c6fba8340692eb0b7f3f948350e6947dac635cfef9e4ff4d3f756802cbd97e8c5845b25bc5a021d9875277f197d1bce55661e6961dd788a444962e33fa582a01d0bd61aaa22a76adf68b3169d3f0b49", 0x1001, r1) 14:00:04 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000001440)={'syz', 0x0}, 0x0, 0x0, r0) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="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", 0x1001, r1) 14:00:04 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffbc, 0x10}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) 14:00:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000001440)={'syz', 0x0}, 0x0, 0x0, r0) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67f6c3d7605eab3b675b6c061e6ef32b7ea8847b6f84da1334d35322b94447bfaca74b152eb64cfa54cb63126c2cc662e7898e6459ed40c4566403f303d341c9c34c6049d9f8e1c2a9483f003c20e66886d0e1629f498668c202f183de294d03da07c9f5feb65bc196554a79a2f255828c1f1cf9a09654f9df849443e8d290debcc78efbdca391a348b33f18ef618011273faa1f095298dd71db08a90e177a1e9a0c771deca3b51670a26850b89d4439574328c19d9e91766dd52169e0ad5011e4acc005861b3b3146d67445e6f6c75ce4af9d8db6963887d79113613267c5bc42fb0aca828590fb291ce8836d3cd391d364efdbb7015d8ec643d83b623380c21c6ebbf774498c94e60838a45d4692bfe73aaea2bbcecb6dcec20e5aa48a950428e2372009212f2f6be608cdec5ff84108f3f3d2e42c99a6d4cd4577ec9f39a51533efe71d494ccadb66eddd4cc0e56b33eefb0ada68ae36c905a977d9042a63299d2130f4e85357b0078c31bc45b00f5ccd879a6735d85882bfddbc6f2cff4a2b976b29e5a8adc74893c748b297a660ba0f64ad8a6ac6fcf180b6a4357ad6733cb75035cd58631142bd720cf52bcd1438647cbe1058e32d33c38f1327bef3f6b1c815ab4f2d47366473ae37c65a2d1df88823dd4c326d640c50e5bddfa976f04cd034331b632cd7a8bbc838081f28f6e24ed646721cea36e56501f9085e428a6c94b7ba5431f59651f36c8f715e4547ffed53c03cc58d2d4382193625cf69c197c4eb3c3c86c291d693837ab7eb23d61d2518379f0c61acf67425afa1ff8d1fac196a7ef9f6f9b514a2028ae010d1bf10833940294c400401ec706ce366dc4c62f6c55c6985a31592360cc7e6cc30a90cae1891b4cffb882b0329457503055db6a8e3b651b3302c24e6d149e8368ee6d3bafbc417256d042b4b87cb1bf46169ad1a593da66b2c6f453180f2c51be35c431e1af07e54c1251334415135422fa81b015a7a746c1979827e3d32057d408016cdc2b641a42626bbf8b7970a5638e9e48783ff80ded5b5184b69d41e60ba9e2ff7ef3e85b4419db2b064d64f833dc2035a6cc3ea28335ad94eb5ba974d9799ce94565559e6a7636b725c4c3dc1702af3c0f3d9dc77f6d404b7c8ff2cec1b4e703451a1d2750d9a22e9f4b5e27da765d228f09bbd30088ac9dff793ec759161849cf4217f5684bff8eddd65be61d3ed2dcc7bae8ab5e1260c3a90cdb37626c4871098802b34f271d8a091b0517bd1588b43cf21b2e3fe676e34d115a56d450d50a97ac7e2ea5904f9695dbde822dba41ac3a1190d63ef486a1829d38b005f9458a82533a555a2f674eea95af7ef7f0cf9654e0ed8d2ab722ca065fd97e6518b76a39cc1b04dc49c395f3aad5e05c76c1881f6a85fee6c6fba8340692eb0b7f3f948350e6947dac635cfef9e4ff4d3f756802cbd97e8c5845b25bc5a021d9875277f197d1bce55661e6961dd788a444962e33fa582a01d0bd61aaa22a76adf68b3169d3f0b49", 0x1001, r1) 14:00:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x13) close(0xffffffffffffffff) syz_emit_ethernet(0x7a, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x0) getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000000)) 14:00:04 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0