Warning: Permanently added '10.128.0.97' (ECDSA) to the list of known hosts. 2020/08/12 04:40:45 fuzzer started 2020/08/12 04:40:45 dialing manager at 10.128.0.105:41585 2020/08/12 04:40:45 syscalls: 3272 2020/08/12 04:40:45 code coverage: enabled 2020/08/12 04:40:45 comparison tracing: enabled 2020/08/12 04:40:45 extra coverage: enabled 2020/08/12 04:40:45 setuid sandbox: enabled 2020/08/12 04:40:45 namespace sandbox: enabled 2020/08/12 04:40:45 Android sandbox: /sys/fs/selinux/policy does not exist 2020/08/12 04:40:45 fault injection: enabled 2020/08/12 04:40:45 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/08/12 04:40:45 net packet injection: enabled 2020/08/12 04:40:45 net device setup: enabled 2020/08/12 04:40:45 concurrency sanitizer: enabled 2020/08/12 04:40:45 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/08/12 04:40:45 USB emulation: enabled 2020/08/12 04:40:45 hci packet injection: enabled 2020/08/12 04:40:49 suppressing KCSAN reports in functions: 'expire_timers' 'generic_write_end' 'blk_mq_sched_dispatch_requests' 'ondemand_readahead' 'shmem_file_read_iter' 'do_select' 'snd_seq_check_queue' '__xa_clear_mark' 'do_syslog' 'find_get_pages_range_tag' 'shmem_getpage_gfp' 'ext4_free_inode' 'do_nanosleep' '__delayacct_blkio_end' 'step_into' 'alloc_pid' 'kauditd_thread' 'shmem_unlink' 'wg_packet_decrypt_worker' '__ext4_new_inode' 'ext4_mark_iloc_dirty' 'do_sys_poll' 'ext4_free_inodes_count' 'snd_rawmidi_poll' 'pcpu_alloc' '__add_to_page_cache_locked' 'futex_wait_queue_me' 'delete_from_page_cache_batch' 'blk_mq_dispatch_rq_list' 'ext4_writepages' 'page_counter_charge' 'blk_mq_rq_ctx_init' 'tick_sched_timer' 'dd_has_work' 'n_tty_receive_buf_common' '__mark_inode_dirty' 'generic_file_buffered_read' 'shmem_mknod' 'ext4_setattr' '__ext4_update_other_inode_time' 'exit_mm' 04:41:51 executing program 0: [ 97.064107][ T8717] IPVS: ftp: loaded support on port[0] = 21 [ 97.113011][ T8717] chnl_net:caif_netlink_parms(): no params data found [ 97.149280][ T8717] bridge0: port 1(bridge_slave_0) entered blocking state [ 97.156532][ T8717] bridge0: port 1(bridge_slave_0) entered disabled state [ 97.163869][ T8717] device bridge_slave_0 entered promiscuous mode [ 97.172349][ T8717] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.179778][ T8717] bridge0: port 2(bridge_slave_1) entered disabled state [ 97.187528][ T8717] device bridge_slave_1 entered promiscuous mode [ 97.202875][ T8717] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 04:41:51 executing program 1: [ 97.213274][ T8717] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 97.238497][ T8717] team0: Port device team_slave_0 added [ 97.256255][ T8717] team0: Port device team_slave_1 added [ 97.286148][ T8717] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 97.293075][ T8717] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 97.355647][ T8717] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 97.376961][ T8717] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 97.383925][ T8717] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 04:41:51 executing program 2: [ 97.445624][ T8717] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 97.460773][ T8871] IPVS: ftp: loaded support on port[0] = 21 [ 97.491867][ T8717] device hsr_slave_0 entered promiscuous mode [ 97.499116][ T8717] device hsr_slave_1 entered promiscuous mode [ 97.581339][ T8871] chnl_net:caif_netlink_parms(): no params data found [ 97.628387][ T8717] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 97.629804][ T9010] IPVS: ftp: loaded support on port[0] = 21 [ 97.664849][ T8871] bridge0: port 1(bridge_slave_0) entered blocking state [ 97.673757][ T8871] bridge0: port 1(bridge_slave_0) entered disabled state [ 97.682370][ T8871] device bridge_slave_0 entered promiscuous mode [ 97.692094][ T8717] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 97.708166][ T8717] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 97.726829][ T8871] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.733840][ T8871] bridge0: port 2(bridge_slave_1) entered disabled state [ 97.741858][ T8871] device bridge_slave_1 entered promiscuous mode [ 97.756529][ T8717] netdevsim netdevsim0 netdevsim3: renamed from eth3 04:41:51 executing program 3: [ 97.782414][ T8871] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 97.793296][ T8871] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 97.828583][ T8717] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.835630][ T8717] bridge0: port 2(bridge_slave_1) entered forwarding state [ 97.842920][ T8717] bridge0: port 1(bridge_slave_0) entered blocking state [ 97.850042][ T8717] bridge0: port 1(bridge_slave_0) entered forwarding state [ 97.900020][ T8871] team0: Port device team_slave_0 added [ 97.912004][ T9092] IPVS: ftp: loaded support on port[0] = 21 [ 97.919234][ T8871] team0: Port device team_slave_1 added [ 97.967636][ T8871] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 97.974620][ T8871] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 98.003915][ T8871] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 98.049851][ T8871] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 98.057126][ T8871] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 98.083582][ T8871] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 04:41:52 executing program 4: [ 98.097764][ T9010] chnl_net:caif_netlink_parms(): no params data found [ 98.129708][ T8871] device hsr_slave_0 entered promiscuous mode [ 98.136768][ T8871] device hsr_slave_1 entered promiscuous mode [ 98.142992][ T8871] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 98.152550][ T8871] Cannot create hsr debugfs directory [ 98.159764][ T8717] 8021q: adding VLAN 0 to HW filter on device bond0 [ 98.169586][ T9092] chnl_net:caif_netlink_parms(): no params data found [ 98.178573][ T50] bridge0: port 1(bridge_slave_0) entered disabled state [ 98.196761][ T50] bridge0: port 2(bridge_slave_1) entered disabled state [ 98.205465][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 98.269363][ T8717] 8021q: adding VLAN 0 to HW filter on device team0 [ 98.294310][ T9339] IPVS: ftp: loaded support on port[0] = 21 [ 98.302658][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 98.310151][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 98.355944][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 98.364700][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 98.374714][ T3623] bridge0: port 1(bridge_slave_0) entered blocking state [ 98.381753][ T3623] bridge0: port 1(bridge_slave_0) entered forwarding state [ 98.391347][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 04:41:52 executing program 5: [ 98.400749][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 98.410251][ T3623] bridge0: port 2(bridge_slave_1) entered blocking state [ 98.417299][ T3623] bridge0: port 2(bridge_slave_1) entered forwarding state [ 98.427120][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 98.436207][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 98.444788][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 98.454694][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 98.474489][ T8871] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 98.491701][ T8717] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 98.502653][ T8717] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 98.515377][ T9092] bridge0: port 1(bridge_slave_0) entered blocking state [ 98.523071][ T9092] bridge0: port 1(bridge_slave_0) entered disabled state [ 98.530643][ T9092] device bridge_slave_0 entered promiscuous mode [ 98.537358][ T9010] bridge0: port 1(bridge_slave_0) entered blocking state [ 98.544360][ T9010] bridge0: port 1(bridge_slave_0) entered disabled state [ 98.552274][ T9010] device bridge_slave_0 entered promiscuous mode [ 98.560222][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 98.568322][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 98.576829][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 98.585176][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 98.594056][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 98.602221][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 98.610408][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 98.618731][ T8871] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 98.628523][ T8871] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 98.638516][ T9092] bridge0: port 2(bridge_slave_1) entered blocking state [ 98.645889][ T9092] bridge0: port 2(bridge_slave_1) entered disabled state [ 98.653322][ T9092] device bridge_slave_1 entered promiscuous mode [ 98.660336][ T9010] bridge0: port 2(bridge_slave_1) entered blocking state [ 98.667377][ T9010] bridge0: port 2(bridge_slave_1) entered disabled state [ 98.674769][ T9010] device bridge_slave_1 entered promiscuous mode [ 98.681446][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 98.693158][ T8871] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 98.716992][ T9092] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 98.727795][ T9092] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 98.729340][ T9412] IPVS: ftp: loaded support on port[0] = 21 [ 98.753631][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 98.761747][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 98.773586][ T9092] team0: Port device team_slave_0 added [ 98.785347][ T8717] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 98.794093][ T9010] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 98.803954][ T9092] team0: Port device team_slave_1 added [ 98.836255][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 98.844607][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 98.854074][ T9010] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 98.874017][ T9092] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 98.883539][ T9092] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 98.910387][ T9092] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 98.939929][ T9010] team0: Port device team_slave_0 added [ 98.959491][ T9092] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 98.967195][ T9092] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 98.993833][ T9092] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 99.015185][ T8871] 8021q: adding VLAN 0 to HW filter on device bond0 [ 99.022625][ T9010] team0: Port device team_slave_1 added [ 99.031559][ T8717] device veth0_vlan entered promiscuous mode [ 99.038024][ T9339] chnl_net:caif_netlink_parms(): no params data found [ 99.065655][ T8871] 8021q: adding VLAN 0 to HW filter on device team0 [ 99.073734][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 99.082280][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 99.090839][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 99.098366][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 99.120342][ T9092] device hsr_slave_0 entered promiscuous mode [ 99.126775][ T9092] device hsr_slave_1 entered promiscuous mode [ 99.132993][ T9092] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 99.140770][ T9092] Cannot create hsr debugfs directory [ 99.161455][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 99.168987][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 99.177070][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 99.185482][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 99.194071][ T3623] bridge0: port 1(bridge_slave_0) entered blocking state [ 99.201095][ T3623] bridge0: port 1(bridge_slave_0) entered forwarding state [ 99.240435][ T9412] chnl_net:caif_netlink_parms(): no params data found [ 99.258131][ T9010] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 99.265059][ T9010] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 99.291683][ T9010] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 99.302908][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 99.310794][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 99.319384][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 99.327816][ T3623] bridge0: port 2(bridge_slave_1) entered blocking state [ 99.334820][ T3623] bridge0: port 2(bridge_slave_1) entered forwarding state [ 99.342778][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 99.351563][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 99.368552][ T8717] device veth1_vlan entered promiscuous mode [ 99.378691][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 99.387704][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 99.397215][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 99.405148][ T9010] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 99.412130][ T9010] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 99.439060][ T9010] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 99.460180][ T9092] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 99.469428][ T9092] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 99.491816][ T9339] bridge0: port 1(bridge_slave_0) entered blocking state [ 99.499029][ T9339] bridge0: port 1(bridge_slave_0) entered disabled state [ 99.506680][ T9339] device bridge_slave_0 entered promiscuous mode [ 99.513956][ T9339] bridge0: port 2(bridge_slave_1) entered blocking state [ 99.521385][ T9339] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.528840][ T9339] device bridge_slave_1 entered promiscuous mode [ 99.536341][ T9092] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 99.544940][ T9092] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 99.556817][ T5244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 99.565028][ T5244] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 99.573496][ T5244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 99.581687][ T5244] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 99.589815][ T5244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 99.597932][ T5244] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 99.614946][ T9412] bridge0: port 1(bridge_slave_0) entered blocking state [ 99.622194][ T9412] bridge0: port 1(bridge_slave_0) entered disabled state [ 99.629823][ T9412] device bridge_slave_0 entered promiscuous mode [ 99.637843][ T9412] bridge0: port 2(bridge_slave_1) entered blocking state [ 99.644865][ T9412] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.652311][ T9412] device bridge_slave_1 entered promiscuous mode [ 99.667970][ T8871] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 99.688466][ T9010] device hsr_slave_0 entered promiscuous mode [ 99.695897][ T9010] device hsr_slave_1 entered promiscuous mode [ 99.702198][ T9010] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 99.710087][ T9010] Cannot create hsr debugfs directory [ 99.719738][ T9339] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 99.730546][ T9339] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 99.741112][ T9412] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 99.769964][ T9412] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 99.794350][ T8717] device veth0_macvtap entered promiscuous mode [ 99.806777][ T9339] team0: Port device team_slave_0 added [ 99.817419][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 99.826998][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 99.835268][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 99.843122][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 99.851236][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 99.866510][ T8717] device veth1_macvtap entered promiscuous mode [ 99.884926][ T9339] team0: Port device team_slave_1 added [ 99.890972][ T9412] team0: Port device team_slave_0 added [ 99.904891][ T8871] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 99.917940][ T9010] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 99.926596][ T9010] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 99.935175][ T9412] team0: Port device team_slave_1 added [ 99.945164][ T8717] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 99.958008][ T9010] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 99.969844][ T9010] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 99.978852][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 99.986945][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 99.995260][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 100.011343][ T9339] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 100.018479][ T9339] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 100.044928][ T9339] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 100.057388][ T8717] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 100.066848][ T9339] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 100.073777][ T9339] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 100.100508][ T9339] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 100.111446][ T9412] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 100.118650][ T9412] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 100.144625][ T9412] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 100.165941][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 100.174292][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 100.182929][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 100.191424][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 100.201697][ T9092] 8021q: adding VLAN 0 to HW filter on device bond0 [ 100.213774][ T8717] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 100.225241][ T8717] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 100.236653][ T8717] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 100.247343][ T8717] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 100.258716][ T9412] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 100.265975][ T9412] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 100.291857][ T9412] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 100.318127][ T9339] device hsr_slave_0 entered promiscuous mode [ 100.324556][ T9339] device hsr_slave_1 entered promiscuous mode [ 100.331136][ T9339] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 100.340063][ T9339] Cannot create hsr debugfs directory [ 100.348327][ T9092] 8021q: adding VLAN 0 to HW filter on device team0 [ 100.363146][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 100.370728][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 100.382757][ T8871] device veth0_vlan entered promiscuous mode [ 100.417777][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 100.426277][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 100.434423][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 100.444118][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 100.452338][ T50] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.459362][ T50] bridge0: port 1(bridge_slave_0) entered forwarding state [ 100.469258][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 100.476766][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 100.484301][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 100.495545][ T9412] device hsr_slave_0 entered promiscuous mode [ 100.502321][ T9412] device hsr_slave_1 entered promiscuous mode [ 100.508782][ T9412] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 100.516469][ T9412] Cannot create hsr debugfs directory [ 100.526941][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 100.535513][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 100.543773][ T9237] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.550805][ T9237] bridge0: port 2(bridge_slave_1) entered forwarding state [ 100.565075][ T8871] device veth1_vlan entered promiscuous mode [ 100.590899][ T3954] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 100.598868][ T3954] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 100.607546][ T3954] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 100.616236][ T3954] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 100.624412][ T3954] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 100.632838][ T3954] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 100.641204][ T3954] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 100.657070][ T3954] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 100.664894][ T3954] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 100.685021][ T9092] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 100.696591][ T9092] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 100.708896][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 100.717259][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 100.725785][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 100.733906][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 100.742192][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 100.750643][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 100.759170][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 100.769138][ T9010] 8021q: adding VLAN 0 to HW filter on device bond0 [ 100.778393][ T8871] device veth0_macvtap entered promiscuous mode [ 100.808409][ T9092] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 100.815864][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 100.823676][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 100.831060][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 100.850064][ T8871] device veth1_macvtap entered promiscuous mode [ 100.860691][ T9010] 8021q: adding VLAN 0 to HW filter on device team0 [ 100.868372][ T9412] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 100.881387][ T9412] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 100.889914][ T3954] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 100.898316][ T3954] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 100.906184][ T3954] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 100.923244][ T9339] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 100.931911][ T9339] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 100.946591][ T9412] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 100.957313][ T8871] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 100.967981][ T8871] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 100.978725][ T8871] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 100.986772][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 100.994988][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 101.003870][ T3623] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.010970][ T3623] bridge0: port 1(bridge_slave_0) entered forwarding state [ 101.018555][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 101.026995][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 101.035636][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 101.043441][ T9339] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 101.056161][ T9412] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 101.066640][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 101.074867][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 101.084611][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.091637][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 101.099551][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 101.112847][ T9339] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 101.123313][ T8871] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 101.133880][ T8871] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 101.144803][ T8871] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 101.158753][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 101.167454][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 101.176074][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 101.184357][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 101.192727][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 101.201185][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 101.209526][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 101.218174][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 101.226676][ T8871] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 101.238150][ T8871] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 101.249182][ T8871] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 101.260451][ T8871] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 101.275291][ T3954] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 101.283676][ T3954] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 101.304771][ T9092] device veth0_vlan entered promiscuous mode [ 101.320297][ T3954] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 101.329613][ T3954] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 101.338244][ T3954] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 101.346430][ T3954] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 101.371461][ T9010] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 101.382479][ T9010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 101.392550][ T3954] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 101.401240][ T3954] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 101.409117][ T3954] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 101.417645][ T3954] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 101.434480][ T9092] device veth1_vlan entered promiscuous mode [ 101.455974][ T3954] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 101.463298][ T3954] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 101.478775][ T9010] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 101.495307][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 101.503538][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 101.518355][ T9412] 8021q: adding VLAN 0 to HW filter on device bond0 [ 101.527562][ T9092] device veth0_macvtap entered promiscuous mode [ 101.537746][ T9339] 8021q: adding VLAN 0 to HW filter on device bond0 [ 101.547518][ T9092] device veth1_macvtap entered promiscuous mode [ 101.561586][ T9339] 8021q: adding VLAN 0 to HW filter on device team0 [ 101.568947][ T3954] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 101.576956][ T3954] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 101.584607][ T3954] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 101.592380][ T3954] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 101.605187][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 101.613522][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 101.629299][ T9412] 8021q: adding VLAN 0 to HW filter on device team0 [ 101.641296][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 101.649262][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 101.656956][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 101.665403][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 101.673567][ T3623] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.680583][ T3623] bridge0: port 1(bridge_slave_0) entered forwarding state [ 101.688752][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 101.697239][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 101.705564][ T3623] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.712558][ T3623] bridge0: port 1(bridge_slave_0) entered forwarding state [ 101.720217][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 101.728775][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 101.737165][ T3623] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.744191][ T3623] bridge0: port 2(bridge_slave_1) entered forwarding state [ 101.753099][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 101.760790][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 101.768600][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 101.777097][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 101.785454][ T3623] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.792451][ T3623] bridge0: port 2(bridge_slave_1) entered forwarding state [ 101.818312][ T9092] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 101.837843][ T9092] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 101.863623][ T9092] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 04:41:55 executing program 0: dup(0xffffffffffffffff) pwrite64(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x3) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) fsetxattr$trusted_overlay_nlink(r0, 0x0, &(0x7f00000000c0)={'L-'}, 0x16, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x9, &(0x7f0000000140)=0x26af, 0x4) syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0x5e8, 0x1, &(0x7f0000000040)=[{&(0x7f0000000340)="0400050900000a0e666174000404090a1000027400f801", 0x17}], 0x0, &(0x7f0000000000)={[{@nodots='nodots'}]}) [ 101.899895][ T9092] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 101.924713][ T9092] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 101.979660][ T9986] FAT-fs (loop0): Directory bread(block 2585) failed [ 101.992991][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 102.003016][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 102.011245][ T9986] FAT-fs (loop0): Directory bread(block 2586) failed [ 102.025579][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 102.033695][ T9986] FAT-fs (loop0): Directory bread(block 2587) failed [ 102.041224][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 102.042793][ T9986] FAT-fs (loop0): Directory bread(block 2588) failed [ 102.049771][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 102.058578][ T9986] FAT-fs (loop0): Directory bread(block 2589) failed [ 102.064897][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 102.072909][ T9986] FAT-fs (loop0): Directory bread(block 2590) failed [ 102.079471][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 102.087902][ T9986] FAT-fs (loop0): Directory bread(block 2591) failed [ 102.093715][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 102.100654][ T9986] FAT-fs (loop0): Directory bread(block 2592) failed [ 102.108161][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 102.116758][ T9986] FAT-fs (loop0): Directory bread(block 2593) failed [ 102.122958][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 102.129586][ T9986] FAT-fs (loop0): Directory bread(block 2594) failed [ 102.137143][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 102.152183][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 102.160635][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 102.173509][ T9010] device veth0_vlan entered promiscuous mode 04:41:56 executing program 0: dup(0xffffffffffffffff) pwrite64(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x3) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) fsetxattr$trusted_overlay_nlink(r0, 0x0, &(0x7f00000000c0)={'L-'}, 0x16, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x9, &(0x7f0000000140)=0x26af, 0x4) syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0x5e8, 0x1, &(0x7f0000000040)=[{&(0x7f0000000340)="0400050900000a0e666174000404090a1000027400f801", 0x17}], 0x0, &(0x7f0000000000)={[{@nodots='nodots'}]}) [ 102.196604][ T9092] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 102.220988][ T9092] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 102.232626][ T9092] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 102.243172][ T9092] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 102.254195][ T9092] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 102.263266][ T9412] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 102.275188][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 102.282886][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 102.293929][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 102.303965][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 102.313041][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 102.321554][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 102.329895][ C0] hrtimer: interrupt took 45790 ns [ 102.330135][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 102.343582][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 102.352262][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 102.360756][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 102.361203][ T9995] FAT-fs (loop0): Directory bread(block 2585) failed [ 102.369016][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 102.376935][ T9995] FAT-fs (loop0): Directory bread(block 2586) failed [ 102.389787][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 102.391031][ T9995] FAT-fs (loop0): Directory bread(block 2587) failed [ 102.405112][ T9995] FAT-fs (loop0): Directory bread(block 2588) failed [ 102.412070][ T9995] FAT-fs (loop0): Directory bread(block 2589) failed [ 102.417666][ T9339] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 102.429150][ T9995] FAT-fs (loop0): Directory bread(block 2590) failed [ 102.436610][ T9995] FAT-fs (loop0): Directory bread(block 2591) failed [ 102.442914][ T9339] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 102.443421][ T9995] FAT-fs (loop0): Directory bread(block 2592) failed [ 102.460088][ T9092] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 102.465295][ T9995] FAT-fs (loop0): Directory bread(block 2593) failed [ 102.482193][ T9092] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 04:41:56 executing program 0: dup(0xffffffffffffffff) pwrite64(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x3) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) fsetxattr$trusted_overlay_nlink(r0, 0x0, &(0x7f00000000c0)={'L-'}, 0x16, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x9, &(0x7f0000000140)=0x26af, 0x4) syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0x5e8, 0x1, &(0x7f0000000040)=[{&(0x7f0000000340)="0400050900000a0e666174000404090a1000027400f801", 0x17}], 0x0, &(0x7f0000000000)={[{@nodots='nodots'}]}) [ 102.491815][ T9995] FAT-fs (loop0): Directory bread(block 2594) failed 04:41:56 executing program 1: [ 102.537949][ T9092] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 102.560626][ T9092] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 102.586823][ T9010] device veth1_vlan entered promiscuous mode [ 102.606599][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 102.625396][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 04:41:56 executing program 1: [ 102.642361][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 102.652780][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 102.668086][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 102.688880][T10012] FAT-fs (loop0): Directory bread(block 2585) failed [ 102.696986][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 102.716848][T10012] FAT-fs (loop0): Directory bread(block 2586) failed [ 102.723736][T10012] FAT-fs (loop0): Directory bread(block 2587) failed 04:41:56 executing program 1: [ 102.764715][ T9412] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 102.781755][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 102.796607][T10012] FAT-fs (loop0): Directory bread(block 2588) failed [ 102.803557][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 04:41:56 executing program 1: [ 102.826357][T10012] FAT-fs (loop0): Directory bread(block 2589) failed [ 102.841994][ T9010] device veth0_macvtap entered promiscuous mode [ 102.854204][T10012] FAT-fs (loop0): Directory bread(block 2590) failed [ 102.868914][T10012] FAT-fs (loop0): Directory bread(block 2591) failed [ 102.883002][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 102.893192][T10012] FAT-fs (loop0): Directory bread(block 2592) failed [ 102.904861][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 102.915127][T10012] FAT-fs (loop0): Directory bread(block 2593) failed [ 102.921888][T10012] FAT-fs (loop0): Directory bread(block 2594) failed 04:41:56 executing program 1: [ 102.931847][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 102.949251][ T9339] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 102.964449][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 102.983910][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 103.008284][ T9010] device veth1_macvtap entered promiscuous mode [ 103.063305][ T3954] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 103.077440][ T3954] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 103.091237][ T3954] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 103.103279][ T9010] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 103.116209][ T9010] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 103.126171][ T9010] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 103.136715][ T9010] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 103.147283][ T9010] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 103.157679][ T9010] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 103.168212][ T9010] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 103.188669][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 103.197422][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 103.205962][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 103.213891][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 103.222454][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 103.230382][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 103.241666][ T9010] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 103.252384][ T9010] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 103.263141][ T9010] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 103.273833][ T9010] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 103.283692][ T9010] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 103.294198][ T9010] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 103.304676][ T9010] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 103.312049][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 103.322014][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 103.330574][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 103.339196][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 103.349104][ T9412] device veth0_vlan entered promiscuous mode [ 103.362233][ T9010] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 103.371659][ T9010] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 103.380533][ T9010] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 103.389329][ T9010] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 103.402865][ T9412] device veth1_vlan entered promiscuous mode [ 103.411417][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 103.419181][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 103.427599][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 103.436983][ T9339] device veth0_vlan entered promiscuous mode [ 103.453832][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 103.461412][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 103.474799][ T9339] device veth1_vlan entered promiscuous mode [ 103.492375][ T5244] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 103.501636][ T5244] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 103.509835][ T5244] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 103.518247][ T5244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 103.526670][ T5244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 103.538960][ T9412] device veth0_macvtap entered promiscuous mode [ 103.549604][ T9412] device veth1_macvtap entered promiscuous mode [ 103.559892][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 103.568134][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 103.576119][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 103.584347][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 103.595392][ T9339] device veth0_macvtap entered promiscuous mode [ 103.606968][ T9339] device veth1_macvtap entered promiscuous mode [ 103.614881][ T9412] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 103.626711][ T9412] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 103.636641][ T9412] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 103.648477][ T9412] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 103.658307][ T9412] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 103.669981][ T9412] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 103.679950][ T9412] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 103.690684][ T9412] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 103.701646][ T9412] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 103.710756][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 103.719028][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 103.726913][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 103.735526][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 103.746996][ T9412] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 103.759062][ T9412] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 103.769450][ T9412] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 103.781611][ T9412] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 103.792082][ T9412] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 103.802731][ T9412] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 103.812873][ T9412] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 103.824181][ T9412] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 103.835498][ T9412] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 103.844488][ T3954] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 103.853461][ T3954] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 103.868891][ T9412] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 103.877760][ T9412] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 103.886596][ T9412] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 103.895414][ T9412] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 103.908123][ T9339] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 103.918649][ T9237] Bluetooth: hci0: command 0x0409 tx timeout [ 103.918955][ T9339] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 103.936421][ T9339] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 103.946934][ T9339] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 103.957832][ T9339] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 103.968253][ T9339] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 103.979100][ T9339] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 103.996876][ T9339] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 104.007231][ T9339] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 104.020305][ T9339] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 104.042268][ T9339] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 104.073267][ T5244] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 104.085070][ T5244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 104.099882][ T9339] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 104.114353][ T9339] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 104.136400][ T9339] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 104.149180][ T9339] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 104.171444][ T9339] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 104.181883][ T9339] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 104.191707][ T9339] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 104.202132][ T9339] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 104.212093][ T9339] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 104.222550][ T9339] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 104.233469][ T9339] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 104.245771][ T5244] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 104.254364][ T5244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 104.269400][ T9339] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 104.278258][ T9339] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 104.288666][ T9339] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 104.297452][ T9339] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 04:41:58 executing program 2: 04:41:58 executing program 0: [ 104.558213][ T17] Bluetooth: hci1: command 0x0409 tx timeout 04:41:59 executing program 4: 04:41:59 executing program 1: 04:41:59 executing program 3: 04:41:59 executing program 2: 04:41:59 executing program 0: 04:41:59 executing program 5: 04:41:59 executing program 3: 04:41:59 executing program 0: 04:41:59 executing program 5: 04:41:59 executing program 2: 04:41:59 executing program 1: 04:41:59 executing program 4: 04:41:59 executing program 5: 04:41:59 executing program 2: 04:41:59 executing program 3: 04:41:59 executing program 0: 04:41:59 executing program 4: 04:41:59 executing program 5: 04:41:59 executing program 2: 04:41:59 executing program 1: 04:41:59 executing program 3: 04:41:59 executing program 0: 04:41:59 executing program 5: 04:41:59 executing program 4: 04:41:59 executing program 2: 04:41:59 executing program 1: 04:41:59 executing program 5: 04:41:59 executing program 3: 04:41:59 executing program 4: 04:41:59 executing program 0: 04:41:59 executing program 2: 04:41:59 executing program 1: 04:41:59 executing program 5: 04:41:59 executing program 1: 04:41:59 executing program 5: 04:41:59 executing program 3: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000193c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x44, 0x44, 0x4, [@typedef, @int, @int, @ptr, @func]}, {0x0, [0x0, 0x0]}}, 0x0, 0x60}, 0x20) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:41:59 executing program 0: 04:41:59 executing program 2: 04:41:59 executing program 4: 04:42:00 executing program 5: 04:42:00 executing program 2: 04:42:00 executing program 4: 04:42:00 executing program 5: 04:42:00 executing program 1: [ 105.994906][ T17] Bluetooth: hci0: command 0x041b tx timeout [ 106.029370][T10131] ptrace attach of "/root/syz-executor.3"[10128] was attempted by "/root/syz-executor.3"[10131] 04:42:00 executing program 2: 04:42:00 executing program 3: 04:42:00 executing program 0: 04:42:00 executing program 5: [ 106.064840][ T17] Bluetooth: hci2: command 0x0409 tx timeout 04:42:00 executing program 4: 04:42:00 executing program 2: 04:42:00 executing program 0: 04:42:00 executing program 3: 04:42:00 executing program 5: 04:42:00 executing program 1: 04:42:00 executing program 2: 04:42:00 executing program 4: 04:42:00 executing program 0: 04:42:00 executing program 5: 04:42:00 executing program 1: 04:42:00 executing program 3: 04:42:00 executing program 2: 04:42:00 executing program 4: 04:42:00 executing program 5: 04:42:00 executing program 0: 04:42:00 executing program 4: 04:42:00 executing program 2: 04:42:00 executing program 3: 04:42:00 executing program 1: 04:42:00 executing program 5: 04:42:00 executing program 4: 04:42:00 executing program 3: 04:42:00 executing program 2: 04:42:00 executing program 0: 04:42:00 executing program 1: 04:42:00 executing program 5: 04:42:00 executing program 0: 04:42:00 executing program 3: 04:42:00 executing program 2: 04:42:00 executing program 4: 04:42:00 executing program 1: 04:42:00 executing program 5: 04:42:00 executing program 5: 04:42:00 executing program 4: 04:42:00 executing program 0: 04:42:00 executing program 3: [ 106.634739][ T17] Bluetooth: hci3: command 0x0409 tx timeout [ 106.641131][ T17] Bluetooth: hci1: command 0x041b tx timeout 04:42:00 executing program 1: 04:42:00 executing program 2: 04:42:00 executing program 0: 04:42:00 executing program 3: 04:42:00 executing program 5: 04:42:00 executing program 2: 04:42:00 executing program 4: 04:42:00 executing program 1: 04:42:00 executing program 0: 04:42:00 executing program 4: 04:42:00 executing program 5: 04:42:00 executing program 3: 04:42:00 executing program 1: 04:42:00 executing program 2: 04:42:01 executing program 3: 04:42:01 executing program 0: 04:42:01 executing program 2: 04:42:01 executing program 4: 04:42:01 executing program 1: 04:42:01 executing program 5: 04:42:01 executing program 3: 04:42:01 executing program 0: 04:42:01 executing program 4: 04:42:01 executing program 5: 04:42:01 executing program 3: 04:42:01 executing program 1: 04:42:01 executing program 2: 04:42:01 executing program 0: 04:42:01 executing program 4: 04:42:01 executing program 1: 04:42:01 executing program 4: 04:42:01 executing program 1: 04:42:01 executing program 0: 04:42:01 executing program 5: 04:42:01 executing program 2: 04:42:01 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) move_pages(0x0, 0x20000047, &(0x7f0000000080), 0x0, &(0x7f0000000100), 0x0) 04:42:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000480)=@filter={'filter\x00', 0xe, 0x4, 0x2e0, 0x0, 0x0, 0xc8, 0x0, 0x0, 0x218, 0x248, 0x248, 0x248, 0x218, 0x4, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'caif0\x00', 'vcan0\x00'}, 0x0, 0xa0, 0xc8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'veth1_to_batadv\x00', 'veth0_to_bridge\x00', {}, {}, 0x6}, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x340) 04:42:01 executing program 1: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit(0x0) semctl$IPC_RMID(0x0, 0x2, 0x10) 04:42:01 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8000000190001000000000020000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a"], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) 04:42:01 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10=\x8f\xa2\xc7\x8b\x96|?\x16\xbf\xa1$\xe2\xf4\xa6t#M\xe0l\x0e<\x89\x8df\xa0m\x00\a\xbb\x84\xc2V\xff\xb0j\x06\x00\xba\x1a\xe7@\xab\xe2v\x8a\x97\x88\xd3\xa5\xeePb\x10\xf5\'\xc1\x01\xfew\xdfgCM>\xba\xc6\xe5\xa6\xac\xfa\xed\xdf;') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') r1 = openat(r0, &(0x7f00000000c0)='./file1\x00', 0x105442, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r2, r1, 0x0, 0x4000200000f) [ 107.336585][T10227] x_tables: duplicate underflow at hook 2 [ 107.373683][T10231] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. [ 107.383663][T10231] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. [ 107.387129][T10228] x_tables: duplicate underflow at hook 2 [ 107.395018][T10232] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. [ 107.424510][ T5244] Bluetooth: hci5: command 0x0409 tx timeout 04:42:01 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() getrandom(&(0x7f0000000000)=""/149, 0xfffffe2f, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xd) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:42:01 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8000000190001000000000020000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a"], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) [ 107.431826][ T5244] Bluetooth: hci4: command 0x0409 tx timeout 04:42:01 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000240)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = dup2(r0, r2) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000180)={0x0, 0x20}, 0x14) ptrace$setopts(0x4206, r1, 0x0, 0x0) lstat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr$security_capability(r3, 0x0, &(0x7f00000000c0)=@v3, 0x18, 0x0) tkill(r1, 0xd) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:42:01 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000005c0)=@raw={'raw\x00', 0x9, 0x3, 0x200, 0xd0, 0xd0, 0xd0, 0x0, 0x0, 0x168, 0x168, 0x168, 0x168, 0x168, 0x3, 0x0, {[{{@ip={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0xffffffff, 'bridge_slave_1\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @local}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x260) 04:42:01 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x54, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x7}]}]}, 0x54}}, 0x0) 04:42:01 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8000000190001000000000020000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a"], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) [ 107.508263][T10245] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. [ 107.531910][T10249] x_tables: duplicate underflow at hook 3 04:42:01 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) clone(0x2000000000200500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0xffffffffffffffff, 0x0, 0x20000080000000, 0x0) r1 = memfd_create(&(0x7f0000000080)='B\x8b\xb0\'%n-\xa59L\x81\xea\xe6;i\xa2R\x03\xfc\xf0\xe3od\x05\x00\x00\x1d-v\xcak\xff\xccX\xe2^)]\x00\x00\xe5\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd0', 0x0) write(r1, &(0x7f0000002000)='/', 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xd, 0x11, r1, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$9p(r3, &(0x7f0000000000), 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='personality\x00') fchdir(r4) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000187ff8)='.', 0x0, 0x7010, 0x0) r5 = gettid() tkill(r5, 0x33) [ 107.564284][T10255] x_tables: duplicate underflow at hook 3 [ 107.599451][T10259] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. [ 108.064568][ T12] Bluetooth: hci0: command 0x040f tx timeout [ 108.144433][ T12] Bluetooth: hci2: command 0x041b tx timeout [ 108.704400][ T17] Bluetooth: hci1: command 0x040f tx timeout [ 108.710408][ T17] Bluetooth: hci3: command 0x041b tx timeout [ 109.508394][ T17] Bluetooth: hci4: command 0x041b tx timeout [ 109.515699][ T17] Bluetooth: hci5: command 0x041b tx timeout [ 110.154348][ T17] Bluetooth: hci0: command 0x0419 tx timeout [ 110.224202][ T3954] Bluetooth: hci2: command 0x040f tx timeout [ 110.784486][ T12] Bluetooth: hci3: command 0x040f tx timeout [ 110.790534][ T12] Bluetooth: hci1: command 0x0419 tx timeout 04:42:04 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x0, 0x1182) r1 = memfd_create(0x0, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000000)={0x0, {}, 0x0, {}, 0x200, 0x0, 0x14, 0x15, "290ca35e4c5ae8ff8f9a9743f47832f09346bd136bf169a15d7a9f01b050190c4fc563842c20b3f1cb3a4773cdd96008e89b67a96e14e2c459ed8fed6378b233", "114352530bb415bf43423c5a2a9a2f15a223c1a485e6210b75035dc4a7030b64", [0x5, 0xffffffff]}) 04:42:04 executing program 4: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = eventfd2(0x0, 0x0) r1 = dup(r0) write$cgroup_netprio_ifpriomap(r1, &(0x7f00000000c0)={'syzkaller1'}, 0xd) 04:42:04 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="c40000000b06010100eb0000010bfdff1d000400070001000600f2ff9b000780180001808000000000000000ff0000000000020000001c0006000465000000000c00090000000000000014aa140017007665746800000000616e0000000080000500070088000000140017005f7863616e3100000000001b020100000900120000007a32000000000c001b4072dcf77b001980000c00148008200140ee040000000000000004028aab86000000001a000000322a3d9cbf3d0900020073797a30"], 0x1}}, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x883715, 0x0) 04:42:04 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8000000190001000000000020000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a"], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) 04:42:04 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) clone(0x2000000000200500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0xffffffffffffffff, 0x0, 0x20000080000000, 0x0) r1 = memfd_create(&(0x7f0000000080)='B\x8b\xb0\'%n-\xa59L\x81\xea\xe6;i\xa2R\x03\xfc\xf0\xe3od\x05\x00\x00\x1d-v\xcak\xff\xccX\xe2^)]\x00\x00\xe5\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd0', 0x0) write(r1, &(0x7f0000002000)='/', 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xd, 0x11, r1, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$9p(r3, &(0x7f0000000000), 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='personality\x00') fchdir(r4) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000187ff8)='.', 0x0, 0x7010, 0x0) r5 = gettid() tkill(r5, 0x33) 04:42:04 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() getrandom(&(0x7f0000000000)=""/149, 0xfffffe2f, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xd) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 110.910702][T10285] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. [ 110.941677][T10294] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 04:42:05 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) 04:42:05 executing program 3: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000000c0)=@gcm_256={{}, "3f7e3fc7541f6e41", "de3570ae014fab12ffddb1d3f87df23e413124f05a4a484cb68957a5d7dd4b46", "bb1b09ae", "cb3f4bb51ee4e466"}, 0x38) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x105, 0x105, 0x6, [@func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @const, @datasec={0x0, 0x9, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}], 'u'}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x126}, 0x20) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:42:05 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x40) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) 04:42:05 executing program 4: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10=\x8f\xa2\xc7\x8b\x96|?\x16\xbf\xa1$\xe2\xf4\xa6t#M\xe0l\x0e<\x89\x8df\xa0m\x00\a\xbb\x84\xc2V\xff\xb0j\x06\x00\xba\x1a\xe7@\xab\xe2v\x8a\x97\x88\xd3\xa5\xeePb\x10\xf5\'\xc1\x01\xfew\xdfgCM>\xba\xc6\xe5\xa6\xac\xfa\xed\xdf;') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/3\x00') ioctl$F2FS_IOC_RESIZE_FS(0xffffffffffffffff, 0x4008f510, &(0x7f0000000280)) r1 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x141202, 0x0) write$FUSE_INIT(r1, &(0x7f0000000140)={0x50}, 0xfaf741a0) 04:42:05 executing program 4: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="5c00000014001105000000000000000052c5f6175fcff1f271489c94e19382917f00000100"/63, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000a3"], 0x5c}}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmmsg(r0, &(0x7f0000000180), 0xf1, 0x0) 04:42:05 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) [ 111.058471][T10309] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. [ 111.121218][T10318] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. [ 111.133157][T10320] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 04:42:05 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) 04:42:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x40, 0x0, 0x0, 0xffffffff, 0xffffff81, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) [ 111.157009][T10321] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 111.225906][T10327] xt_hashlimit: overflow, try lower: 0/0 [ 111.236046][T10328] xt_hashlimit: overflow, try lower: 0/0 [ 111.584174][ T12] Bluetooth: hci5: command 0x040f tx timeout [ 111.590259][ T12] Bluetooth: hci4: command 0x040f tx timeout 04:42:05 executing program 1: pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000140)=@filter={'filter\x00', 0xe, 0x4, 0x3d0, 0x1c0, 0x0, 0x1d8, 0x1d8, 0x0, 0x288, 0x338, 0x338, 0x338, 0x288, 0x4, 0x0, {[{{@ip={@rand_addr, @empty, 0x0, 0x0, 'veth0_macvtap\x00', 'syzkaller0\x00', {}, {}, 0x1}, 0x0, 0x98, 0xd8, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "bd38"}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ip={@broadcast, @broadcast, 0x0, 0x0, 'vxcan1\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private2, [], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@unspec=@conntrack3={{0xc8, 'conntrack\x00'}, {{@ipv6=@local, [], @ipv4=@empty, [], @ipv6=@empty, [], @ipv4=@local}}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffc}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x430) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) bind$inet(r4, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r4, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) write$tun(r1, &(0x7f00000000c0)=ANY=[@ANYRES16=r0], 0xd) splice(r0, 0x0, r3, 0x0, 0x19404, 0x0) 04:42:05 executing program 2: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8000000190001000000000020000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a"], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) 04:42:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x40, 0x0, 0x0, 0xffffffff, 0xffffff81, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) [ 111.729997][T10335] xt_hashlimit: overflow, try lower: 0/0 [ 111.744641][T10337] x_tables: duplicate underflow at hook 2 [ 111.775795][T10340] x_tables: duplicate underflow at hook 2 [ 112.304069][ T12] Bluetooth: hci2: command 0x0419 tx timeout [ 112.864051][ T3954] Bluetooth: hci3: command 0x0419 tx timeout [ 113.663929][ T5244] Bluetooth: hci4: command 0x0419 tx timeout [ 113.670252][ T5244] Bluetooth: hci5: command 0x0419 tx timeout 04:42:07 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() getrandom(&(0x7f0000000000)=""/149, 0xfffffe2f, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xd) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:42:07 executing program 2: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8000000190001000000000020000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a"], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) 04:42:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x40, 0x0, 0x0, 0xffffffff, 0xffffff81, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) 04:42:08 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001400)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f736530000000000000000000000000000000000000000000000000000000000000e4ff0800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffffffffffff00000000000000000000000003000000070000000000000000000000000000004800435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000400000000000000000000000000000070009000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) socket$packet(0x11, 0x4000000000000a, 0x300) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 04:42:08 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'vlan1\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="4c000000000000000000000000000002"]}) 04:42:08 executing program 2: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8000000190001000000000020000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a"], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) 04:42:08 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8000000190001000000000020000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a"], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) 04:42:08 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="600000000b06010400005ce900008ebbcd22000005000100060000000900020073797a3000000000380007800c0001"], 0x60}}, 0x0) 04:42:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x40, 0x0, 0x0, 0xffffffff, 0xffffff81, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) 04:42:08 executing program 3: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000000c0)=@gcm_256={{}, "3f7e3fc7541f6e41", "de3570ae014fab12ffddb1d3f87df23e413124f05a4a484cb68957a5d7dd4b46", "bb1b09ae", "cb3f4bb51ee4e466"}, 0x38) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x105, 0x105, 0x6, [@func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @const, @datasec={0x0, 0x9, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}], 'u'}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x126}, 0x20) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 114.106067][T10357] xt_hashlimit: overflow, try lower: 0/0 [ 114.124382][T10362] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables 04:42:08 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="600000000b06010400005ce900008ebbcd22000005000100060000000900020073797a3000000000380007800c0001"], 0x60}}, 0x0) [ 114.171164][T10367] __nla_validate_parse: 1 callbacks suppressed [ 114.171171][T10367] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. [ 114.202389][T10371] xt_hashlimit: overflow, try lower: 0/0 04:42:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x40, 0x0, 0x0, 0xffffffff, 0xffffff81, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) 04:42:10 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000000d40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 04:42:10 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8000000190001000000000020000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a"], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) 04:42:10 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="600000000b06010400005ce900008ebbcd22000005000100060000000900020073797a3000000000380007800c0001"], 0x60}}, 0x0) 04:42:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x40, 0x0, 0x0, 0xffffffff, 0xffffff81, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) 04:42:10 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=0x20001, 0x4) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000100)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x1c, 0x0, "246575a45264d9a14fb62fe6bce0eeb5025264c73c839e09f5ff08cccc6e859dc6c5f28557a8046964d2a15b4c2a2bb1dcc5a80c010063c84b00837a7e1e000000907900000000000000000000000800"}, 0xd8) setsockopt$inet_tcp_int(r3, 0x6, 0x20, &(0x7f0000000040)=0x2, 0xf6) connect$inet(r3, &(0x7f0000000280)={0x2, 0x0, @empty}, 0x10) 04:42:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x40, 0x0, 0x0, 0xffffffff, 0xffffff81, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) 04:42:11 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="600000000b06010400005ce900008ebbcd22000005000100060000000900020073797a3000000000380007800c0001"], 0x60}}, 0x0) [ 116.977006][T10397] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. 04:42:11 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8000000190001000000000020000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a"], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) 04:42:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x40, 0x0, 0x0, 0xffffffff, 0xffffff81, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) [ 117.089852][T10417] xt_hashlimit: overflow, try lower: 0/0 [ 117.096824][T10419] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. 04:42:11 executing program 3: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000000c0)=@gcm_256={{}, "3f7e3fc7541f6e41", "de3570ae014fab12ffddb1d3f87df23e413124f05a4a484cb68957a5d7dd4b46", "bb1b09ae", "cb3f4bb51ee4e466"}, 0x38) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x105, 0x105, 0x6, [@func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @const, @datasec={0x0, 0x9, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}], 'u'}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x126}, 0x20) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:42:11 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) 04:42:11 executing program 1: sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="600000000b06010400005ce900008ebbcd22000005000100060000000900020073797a3000000000380007800c0001"], 0x60}}, 0x0) 04:42:11 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x63}, 0x20) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = eventfd2(0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ioctl$int_in(r2, 0x0, &(0x7f0000000380)=0x3) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:42:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x40, 0x0, 0x0, 0xffffffff, 0xffffff81, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) 04:42:11 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) 04:42:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x40, 0x0, 0x0, 0xffffffff, 0xffffff81, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) 04:42:11 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@mangle={'mangle\x00', 0x64, 0x6, 0x580, 0x298, 0xd0, 0x1b8, 0x1b8, 0x0, 0x4b0, 0x4b0, 0x4b0, 0x4b0, 0x4b0, 0x6, 0x0, {[{{@ipv6={@private1={0xfc, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60]}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'veth0_macvtap\x00', 'xfrm0\x00'}, 0x0, 0xa8, 0xd0}, @HL={0x28, 'HL\x00'}}, {{@ipv6={@dev, @local, [], [], 'ip6gre0\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, {{@ipv6={@private0, @dev, [], [], 'macvlan0\x00', 'gretap0\x00'}, 0x0, 0xa8, 0xe0}, @common=@inet=@SET3={0x38, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@dev, @ipv4=@remote}}}, {{@uncond, 0x0, 0x100, 0x128, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @inet=@rpfilter={{0xffffff88, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5e5) 04:42:11 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000003c0)='cpuset.mems\x00', 0x2, 0x0) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000140)='\x00', 0x1}], 0x1) [ 117.219041][T10433] xt_hashlimit: overflow, try lower: 0/0 [ 117.221064][T10431] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. 04:42:11 executing program 1: sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="600000000b06010400005ce900008ebbcd22000005000100060000000900020073797a3000000000380007800c0001"], 0x60}}, 0x0) 04:42:11 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x40, 0x0, 0x0, 0xffffffff, 0xffffff81, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) 04:42:11 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) [ 117.283929][T10440] xt_hashlimit: overflow, try lower: 0/0 [ 117.403807][T10451] xt_hashlimit: overflow, try lower: 0/0 [ 117.406221][T10452] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. 04:42:14 executing program 3: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000000c0)=@gcm_256={{}, "3f7e3fc7541f6e41", "de3570ae014fab12ffddb1d3f87df23e413124f05a4a484cb68957a5d7dd4b46", "bb1b09ae", "cb3f4bb51ee4e466"}, 0x38) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x105, 0x105, 0x6, [@func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @const, @datasec={0x0, 0x9, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}], 'u'}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x126}, 0x20) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:42:14 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000580)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000c00)=""/155, 0x9b}], 0x1}}, {{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000006c0)=""/71, 0x47}, {&(0x7f0000000d80)=""/97, 0x61}, {&(0x7f0000000ac0)=""/243, 0xf3}], 0x3}}], 0x2, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 04:42:14 executing program 1: sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="600000000b06010400005ce900008ebbcd22000005000100060000000900020073797a3000000000380007800c0001"], 0x60}}, 0x0) 04:42:14 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0x6}, 0x4a424, 0xf5, 0x8000, 0x0, 0xaaa, 0x0, 0xfffb}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 04:42:14 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) 04:42:14 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x40, 0x0, 0x0, 0xffffffff, 0xffffff81, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) 04:42:14 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="600000000b06010400005ce900008ebbcd22000005000100060000000900020073797a3000000000380007800c0001"], 0x60}}, 0x0) 04:42:14 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) gettid() perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffbffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x9, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000200)="ce2cbe012a6f01914c371a6663759681ae957b88310b984f13154d1fd52e18ec52fa7448c43977b7405d606f52daffe41c429965048da01c99a3ed4294e9e70a3075881032ac338df9248e8a97fc8a6ecebaed819cda068f0209416b13293541312886557036ea245d65801c7fda1c08d154e1d219498d777ffbca55083b51ee83ff72aa3e07856278135142170a99c136b7", 0x0, 0x4}, 0x20) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80eccc4cb92e0a480e180f000000e8bd6ebb120309000e000100400000ff050005001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) [ 120.264562][T10472] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. [ 120.265892][T10470] xt_hashlimit: overflow, try lower: 0/0 04:42:14 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, 0x0, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) 04:42:14 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 04:42:14 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x40, 0x0, 0x0, 0xffffffff, 0xffffff81, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) 04:42:14 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) [ 120.401591][T10486] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. [ 120.420561][T10489] xt_hashlimit: overflow, try lower: 0/0 [ 120.448416][T10487] device bond0 entered promiscuous mode [ 120.454306][T10487] device bond_slave_0 entered promiscuous mode [ 120.480951][T10487] device bond_slave_1 entered promiscuous mode [ 120.502462][T10487] syz-executor.0 (10487) used greatest stack depth: 9864 bytes left 04:42:17 executing program 3: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000000c0)=@gcm_256={{}, "3f7e3fc7541f6e41", "de3570ae014fab12ffddb1d3f87df23e413124f05a4a484cb68957a5d7dd4b46", "bb1b09ae", "cb3f4bb51ee4e466"}, 0x38) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x105, 0x105, 0x6, [@func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @const, @datasec={0x0, 0x9, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}], 'u'}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x126}, 0x20) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x7, r0, 0x0, 0x0) 04:42:17 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="600000000b06010400005ce900008ebbcd22000005000100060000000900020073797a3000000000380007800c0001"], 0x60}}, 0x0) 04:42:17 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x40, 0x0, 0x0, 0xffffffff, 0xffffff81, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) 04:42:17 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, 0x0, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) 04:42:17 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="b702000076000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fefcff0000850000000d000000b700000000000000950008000000000023b5922c90d1db1be58a72e306b88bbaf158fce7df486c000400005121eddcd904d19ef888990200dd6f214a4a764f17b5a67b3919aefa67028b93ed8afd7ab9b35caf3dd19b5ace52671e851585fb6344b3cf3c9a36ffef62ca5bc2a344b033367a26fb4f2e6a6840506fde2f68bf083faa3b72c9666fbf707d3d6edc1abcc8440595a10d438c2a0bc03c3e3d0ed12bb0d232cd09ac5d064be5e76fcf58255984fa3448c44e23ac2fce2fb7211317e2a0ca2342ec1828931a50b5e8868298d64bad9b687f00000ae90d81aed4945d80b1871055580a133b29f9052b3cde45ca17ff592c67f5f9f3c184979ddfe2017d0631a3e5232ca746bc87d720c4fee7c1ff370fe32486e3f5e370e20dc9715d5b25415072eefe0b60fda800cfcd0422025d791315f80e58ea5f43767d2caa718d4732f097a0c84b59d8f4f213eb2e6bff3f3729f42367b61ed152d14d8660a23afa63ee3444de1ee4f4c3d7a170c0d7bea2fbd37faf6ef2f27712840245632a3495c6c05ba2ac28dd982a9a68d2c3f5672d69a92fc103048a7b1e295444131becd0ba370c4a19b9114c404f9d5942c41c707880c111a34df93fac8825b180bd073e85213b3a86e0d7ed5d680aff3b59b0a95bd6b8574c96b7fbf026729ff70ecdd79ab39abd7b91b9973d142516e4effbe593e057f256cd9c946430add07a30d0d74ce3afdfcf64ef5000949299003daa1b104d7236768526ca152af76f2f96ec439aa7cd0da96e7b0753ffb35543528bc2565b728648824da3cf67278f5a236379c78f70e94ddb0b2570d11165ea8fe695b2146a71af0800000000000000cea03a2edc33b8785963a588526f19153b3c89be6ee910039fb1a3f7883e75747be245b02fb4da477c09ec57be1cdb06fc84fb90af18963353fe77d2a64a0d053a1842a19cebb7b1c018a5c000677d96764a9ca414f8a619b7d1e40d2f2bbe3a0b567aec151718147c045f8f91d718b56d52c016e5421d8f6a9ceb0a8c5e1adc5786d327a134fdb95cc4059c3411286274878ea7ffb5d103ea9818e2645950c941ebff9c98b5ae405f7f94db105885d91fcebef0c0bf2510f60f9f4f60e3f744e6edf09600000000000000000000004b4413702aac741150b71cbb6c0c979a91688bb4f415f99c23bfa73cfb0f5f0ae3ffefe859c9e2504f993f7f1508e1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 04:42:17 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) gettid() perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffbffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x9, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000200)="ce2cbe012a6f01914c371a6663759681ae957b88310b984f13154d1fd52e18ec52fa7448c43977b7405d606f52daffe41c429965048da01c99a3ed4294e9e70a3075881032ac338df9248e8a97fc8a6ecebaed819cda068f0209416b13293541312886557036ea245d65801c7fda1c08d154e1d219498d777ffbca55083b51ee83ff72aa3e07856278135142170a99c136b7", 0x0, 0x4}, 0x20) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80eccc4cb92e0a480e180f000000e8bd6ebb120309000e000100400000ff050005001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) 04:42:17 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 04:42:17 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="600000000b06010400005ce900008ebbcd22000005000100060000000900020073797a3000000000380007800c0001"], 0x60}}, 0x0) [ 123.346428][T10511] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. [ 123.347263][T10512] xt_hashlimit: overflow, try lower: 0/0 04:42:17 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, 0x0, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) 04:42:17 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) 04:42:17 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x40, 0x0, 0x0, 0xffffffff, 0xffffff81, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) 04:42:17 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) sendmsg$inet(r0, &(0x7f0000000780)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000100)="b42623242103c0546412cf0404c30d3e8f647a98f48eb8acc3628ceda1b85fb7b92840779bdad2173369c1bd499644a492b0afd9b01d514031baa331facdcad1", 0x40}, {&(0x7f0000000180)="03351058a5397a5a7f650e856925e80d0fbfe61fd516", 0x16}, {&(0x7f0000002140)="b51b43b6fbf977f93646317cea4b944020faec2e6692eacb76a18fc37203c0da5e950060718dcb8d4b21dc17d3d305e495519568cf44a62322db125d64bfa97175e175bb5e78e448890d2911e4655730336e0f27ab34745cb80096969745dac984dc7a214ff6fba48917e5128651e496ef62ed70a03d", 0x76}, {&(0x7f00000007c0)}], 0x4, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x26}, @broadcast}}}], 0x20}, 0x0) [ 123.459902][T10522] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. [ 123.517131][T10529] xt_hashlimit: overflow, try lower: 0/0 04:42:20 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) 04:42:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, 0x0, 0x0) 04:42:20 executing program 3: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000000c0)=@gcm_256={{}, "3f7e3fc7541f6e41", "de3570ae014fab12ffddb1d3f87df23e413124f05a4a484cb68957a5d7dd4b46", "bb1b09ae", "cb3f4bb51ee4e466"}, 0x38) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x105, 0x105, 0x6, [@func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @const, @datasec={0x0, 0x9, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}], 'u'}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x126}, 0x20) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x7, r0, 0x0, 0x0) 04:42:20 executing program 0: socket$kcm(0x10, 0x2, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$inet(r2, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @rand_addr=0x20}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000380)}], 0x1}, 0x802) 04:42:20 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={0x0, 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) 04:42:20 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x40, 0x0, 0x0, 0xffffffff, 0xffffff81, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) 04:42:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, 0x0, 0x0) 04:42:20 executing program 5: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) 04:42:20 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x40, 0x0, 0x0, 0xffffffff, 0xffffff81, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) [ 126.372573][T10553] xt_hashlimit: overflow, try lower: 0/0 [ 126.381146][T10552] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. 04:42:20 executing program 0: socket$kcm(0x10, 0x2, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$inet(r2, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @rand_addr=0x20}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000380)}], 0x1}, 0x802) 04:42:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, 0x0, 0x0) 04:42:20 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={0x0, 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) 04:42:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) [ 126.496846][T10564] xt_hashlimit: overflow, try lower: 0/0 [ 126.555251][T10570] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. [ 128.063464][ T0] NOHZ: local_softirq_pending 08 04:42:23 executing program 0: r0 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r0, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0x1}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r0, &(0x7f0000000600)={&(0x7f0000000000)={0x2, 0x4e22, @loopback}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="bc", 0x1}], 0x1}, 0x0) 04:42:23 executing program 3: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000000c0)=@gcm_256={{}, "3f7e3fc7541f6e41", "de3570ae014fab12ffddb1d3f87df23e413124f05a4a484cb68957a5d7dd4b46", "bb1b09ae", "cb3f4bb51ee4e466"}, 0x38) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x105, 0x105, 0x6, [@func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @const, @datasec={0x0, 0x9, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}], 'u'}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x126}, 0x20) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x7, r0, 0x0, 0x0) 04:42:23 executing program 5: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) 04:42:23 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={0x0, 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) 04:42:23 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x40, 0x0, 0x0, 0xffffffff, 0xffffff81, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) 04:42:23 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 04:42:23 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 04:42:23 executing program 5: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) 04:42:23 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x40, 0x0, 0x0, 0xffffffff, 0xffffff81, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) 04:42:23 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) [ 129.427269][T10591] xt_hashlimit: overflow, try lower: 0/0 [ 129.451183][T10593] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. 04:42:23 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x60}}, 0x0) 04:42:23 executing program 5: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) [ 129.549511][T10607] xt_hashlimit: overflow, try lower: 0/0 [ 129.559623][T10608] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. 04:42:24 executing program 0: r0 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r0, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0x1}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r0, &(0x7f0000000600)={&(0x7f0000000000)={0x2, 0x4e22, @loopback}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="bc", 0x1}], 0x1}, 0x0) 04:42:26 executing program 3: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000000c0)=@gcm_256={{}, "3f7e3fc7541f6e41", "de3570ae014fab12ffddb1d3f87df23e413124f05a4a484cb68957a5d7dd4b46", "bb1b09ae", "cb3f4bb51ee4e466"}, 0x38) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x105, 0x105, 0x6, [@func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @const, @datasec={0x0, 0x9, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}], 'u'}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x126}, 0x20) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:42:26 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) 04:42:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x40, 0x0, 0x0, 0xffffffff, 0xffffff81, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) 04:42:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) 04:42:26 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x60}}, 0x0) 04:42:26 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0185879, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(r0, &(0x7f0000000780)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000100)="b42623242103c0546412cf0404c30d3e8f647a98f48eb8acc3628ceda1b85fb7b92840779bdad2173369c1bd499644a492b0afd9b01d514031baa331facdcad15314743f7254cbae7c2eb52cde21d34d6df4eb0903", 0x55}, {&(0x7f0000000180)="03351058a5397a5a7f650e856925e80d0fbfe61fd516f109faa04b23d813acc6ef7c08be46b4db4b71b3ad", 0x2b}, {&(0x7f0000002140)="b51b43b6fbf977f93646317cea4b944020faec2e6692eacb76a18fc37203c0da5e950060718dcb8d4b21dc17d3d305e495519568cf44a62322db125d64bfa97175e175bb5e78e448890d2911e4", 0x4d}, {&(0x7f00000007c0)}], 0x4, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x26}, @broadcast}}}], 0x20}, 0x0) 04:42:26 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x60}}, 0x0) 04:42:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) [ 132.488887][T10640] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. [ 132.500404][T10641] xt_hashlimit: overflow, try lower: 0/0 04:42:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x40, 0x0, 0x0, 0xffffffff, 0xffffff81, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) 04:42:26 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0185879, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$inet(r0, &(0x7f0000000780)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000100)="b42623242103c0546412cf0404c30d3e8f647a98f48eb8acc3628ceda1b85fb7b92840779bdad2173369c1", 0x2b}, {&(0x7f0000000180)}, {&(0x7f0000002140)="b51b43b6fbf977f93646317cea4b944020faec2e6692eacb76a18fc37203c0da5e950060718dcb8d4b21dc17d3d305e495519568cf44a62322db125d64bfa97175e175bb5e78e448890d2911e4655730336e0f27ab34745cb80096969745dac984dc7a214ff6fba48917e5128651e496ef62ed70a03dfd", 0x77}, {&(0x7f00000007c0)}], 0x4, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x26}, @broadcast}}}], 0x20}, 0x0) 04:42:26 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) 04:42:26 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x60}}, 0x0) [ 132.623653][T10658] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. [ 132.634154][T10654] xt_hashlimit: overflow, try lower: 0/0 04:42:29 executing program 3: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000000c0)=@gcm_256={{}, "3f7e3fc7541f6e41", "de3570ae014fab12ffddb1d3f87df23e413124f05a4a484cb68957a5d7dd4b46", "bb1b09ae", "cb3f4bb51ee4e466"}, 0x38) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x105, 0x105, 0x6, [@func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @const, @datasec={0x0, 0x9, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}], 'u'}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x126}, 0x20) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:42:29 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) 04:42:29 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0185879, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$inet(r0, &(0x7f0000000780)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000100)="b42623242103c0546412cf0404c30d3e8f647a98f48eb8acc3628ceda1b85fb7b92840779bdad2173369c1", 0x2b}, {&(0x7f0000000180)}, {&(0x7f0000002140)="b51b43b6fbf977f93646317cea4b944020faec2e6692eacb76a18fc37203c0da5e950060718dcb8d4b21dc17d3d305e495519568cf44a62322db125d64bfa97175e175bb5e78e448890d2911e4655730336e0f27ab34745cb80096969745dac984dc7a214ff6fba48917e5128651e496ef62ed70a03dfd", 0x77}, {&(0x7f00000007c0)}], 0x4, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x26}, @broadcast}}}], 0x20}, 0x0) 04:42:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x40, 0x0, 0x0, 0xffffffff, 0xffffff81, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) 04:42:29 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) 04:42:29 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x60}}, 0x0) 04:42:29 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) 04:42:29 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x49, &(0x7f0000000100)="480e003f0000007e5bc5795eca00", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) 04:42:29 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x60}}, 0x0) 04:42:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x40, 0x0, 0x0, 0xffffffff, 0xffffff81, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) [ 135.545139][T10683] xt_hashlimit: overflow, try lower: 0/0 [ 135.569085][T10684] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. 04:42:29 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) 04:42:29 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB], 0x60}}, 0x0) [ 135.651251][T10692] xt_hashlimit: overflow, try lower: 0/0 [ 135.698822][T10699] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. 04:42:32 executing program 3: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000000c0)=@gcm_256={{}, "3f7e3fc7541f6e41", "de3570ae014fab12ffddb1d3f87df23e413124f05a4a484cb68957a5d7dd4b46", "bb1b09ae", "cb3f4bb51ee4e466"}, 0x38) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x105, 0x105, 0x6, [@func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @const, @datasec={0x0, 0x9, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}], 'u'}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x126}, 0x20) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:42:32 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) 04:42:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x40, 0x0, 0x0, 0xffffffff, 0xffffff81, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) 04:42:32 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x2, 0x0, 0x0, @mcast2={0x0, 0x2, [0xe803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='memory.stat\x00', 0x0, 0x0) socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f00000007c0)={&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x0, 0x0, 0xffffffff}}, 0x80, &(0x7f0000000640)=[{0x0}, {0x0}, {&(0x7f0000000380)="ca48f3ebbd6509d1bc97a8f765e71b19c6b9eedc48ed5695e5b380abfe9fb0c264c31c4cfa66a36b66ba80df540f3360db805f70aa5a4c3859b41beee4f9400677f7148ef5f7c578c1e7", 0x4a}, {0x0}, {&(0x7f0000000540)="9153abbb12cce2aae8d2996523bd4ea1f7c894bf68878296c5bef59ea9a2926f1a568284770bcb3b8f1bb0b4adac3ad59b0bd37bad7cae0d592f6cc2ff13feb1618c71db59dc882f5f45eddbff06a4b06833fa12cac9018cb0876f9f532c56523f0b248a3d17e6540675fd527f0133ea61fcf1eb555856eb492f74b16bcab935e12c7ae36c5cbc9dc734af2b9ae4a0246f9e12b59622d7800072cd6eaf9b99fd7ce7ef0f5c698525694e9de9d6d43ffd015295e32ea4c95e89d44b0ff22fe5aa942cf723a60a8cf66b875c5607727ffab9", 0xd1}], 0x5}, 0x4000000) socket$kcm(0x2b, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='memory.swap.current\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, &(0x7f0000000000)=r1, 0x4) socket$kcm(0x2, 0x3, 0x2) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c2e17a606fec68cb7d18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56bffcb3dfd4e70ebec677d6ac14c2c794f72cbf5fe31789e702080000005efd90c8c48358f8dbe82e16cf000000000000000000000000000000000000000000000000790ae2fd45d54b107c8c8a14195e32f13799d6707432ff48bc085760314166443ce72c74f3db890e1ff15a10d91f27e9a232fe2238fff867ba8fd41b29caad2a986e0e244bd11747ffc91a869db7605202f964e632df4de8572344b419c45c2170fe873692d8255170c16822bdffd3135480dae93c7e33bdef00000000d8fd8c79a5d0967ab7e43686b4d1e03e326beea7905ef7de375ef8bc8143df20d13c37db269971210faa7071e93094078a044777aab9d86cf50afefd7b72a0950d389bc9cb43aa607b7269561dd50b22bd2491331818a10f2ac8c3249582a20d4e04fd1ab7883f656b84137d5f7a6edba86a7b9a4c2f3b3a8abf93b280ea53ce01dcc2da0f4310e8281b0cdc017f9759060ea88a2f6597e966a85c9a74ca196700218f919746bb4b84c16fd56ee450e411d75ab7613b644ba7580b2a0942394ed1737517eed1c892422f54d5a2e1cf1a60fe2dcc1a465aa8d54cb4000053c3f01ea714a7bd4fad615ff6e2991589bbdd1ae0d1bce65c620c4a2527a82afe16e019a5e0b5ec1b1b8aafba090000c3630488edcc4a8cbd3246e962b773a75b28a51cd09cbcb3577fea6f1e9fe8cd2b532c084cbdb957fc1de55580a678c664813354f14a453b093948d49bca31a7170419bb1d32f256ff3010e69b2f0482c63ab78a19ecb713559075b6f0dd1236ce12a86fc60a2d4f658ac161164c52acd01348669305dd52da9668f683134afa2b973aa73a4b9d42fdd6c14d9e6200de42e6b42f2d1ecf20510ece2ae343796f9e95580be2c37945a6b6144cef685a9eeffc44d940d22cf0ef08c972d11b36eba1f6e26e354475c30171ab0ff869d4d04c2dec6a0000007d27c7c7269bed9d643881327ce7a3418215997b97289892e1dd1c9c28516dfa93b82c5e62f7013109dc92c0f84a8c0000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0xe, 0x49, &(0x7f0000000100)="480e003f0000007e5bc5795eca00", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) 04:42:32 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB], 0x60}}, 0x0) 04:42:32 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) 04:42:32 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) 04:42:32 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB], 0x60}}, 0x0) [ 138.546701][T10717] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. [ 138.565733][T10720] xt_hashlimit: overflow, try lower: 0/0 04:42:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x40, 0x0, 0x0, 0xffffffff, 0xffffff81, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) 04:42:32 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8000000190001000000000020000000ff0100"/29], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) 04:42:32 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0x6}, 0x4a424, 0xf5, 0x8000, 0x0, 0xaaa, 0x0, 0xfffb}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) 04:42:32 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) [ 138.689878][T10733] xt_hashlimit: overflow, try lower: 0/0 [ 138.721002][T10737] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. 04:42:35 executing program 3: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000000c0)=@gcm_256={{}, "3f7e3fc7541f6e41", "de3570ae014fab12ffddb1d3f87df23e413124f05a4a484cb68957a5d7dd4b46", "bb1b09ae", "cb3f4bb51ee4e466"}, 0x38) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x105, 0x105, 0x6, [@func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @const, @datasec={0x0, 0x9, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}], 'u'}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x126}, 0x20) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:42:35 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="600000000b06010400005ce900008ebbcd22000005000100"], 0x60}}, 0x0) 04:42:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x40, 0x0, 0x0, 0xffffffff, 0xffffff81, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) 04:42:35 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0x6}, 0x4a424, 0xf5, 0x8000, 0x0, 0xaaa, 0x0, 0xfffb}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) 04:42:35 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) 04:42:35 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8000000190001000000000020000000ff0100"/29], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) 04:42:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x40, 0x0, 0x0, 0xffffffff, 0xffffff81, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) 04:42:35 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c80)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) 04:42:35 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8000000190001000000000020000000ff0100"/29], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) [ 141.613510][T10759] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. [ 141.625587][T10758] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.1'. 04:42:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x40, 0x0, 0x0, 0xffffffff, 0xffffff81, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) 04:42:35 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="600000000b06010400005ce900008ebbcd22000005000100"], 0x60}}, 0x0) 04:42:35 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket$kcm(0x2, 0x3, 0x2) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x49, &(0x7f0000000100)="480e003f0000007e5bc5795eca00", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 141.749439][T10771] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. [ 141.784012][T10776] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.1'. 04:42:38 executing program 3: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000000c0)=@gcm_256={{}, "3f7e3fc7541f6e41", "de3570ae014fab12ffddb1d3f87df23e413124f05a4a484cb68957a5d7dd4b46", "bb1b09ae", "cb3f4bb51ee4e466"}, 0x38) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x105, 0x105, 0x6, [@func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @const, @datasec={0x0, 0x9, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}], 'u'}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x126}, 0x20) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:42:38 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c80)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) 04:42:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) 04:42:38 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8000000190001000000000020000000ff010000000000000000000000000001e000000100000000000000"], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) 04:42:38 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="600000000b06010400005ce900008ebbcd22000005000100"], 0x60}}, 0x0) 04:42:38 executing program 0: 04:42:38 executing program 0: 04:42:38 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c80)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) 04:42:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) [ 144.678433][T10794] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. [ 144.689932][T10796] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.1'. 04:42:38 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8000000190001000000000020000000ff010000000000000000000000000001e000000100000000000000"], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) 04:42:38 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="600000000b06010400005ce900008ebbcd22000005000100060000000900020073797a30"], 0x60}}, 0x0) 04:42:38 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x6) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e, 0x0, &(0x7f0000000040)="207ef38e41d2b2292f7cd2176cbb6edd05a9b19c5f3e810000bb00000000004caac3dc645af50635d7420e2c8aa8"}, 0x40) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 144.817569][T10811] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. [ 144.827295][T10810] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.1'. 04:42:41 executing program 3: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000000c0)=@gcm_256={{}, "3f7e3fc7541f6e41", "de3570ae014fab12ffddb1d3f87df23e413124f05a4a484cb68957a5d7dd4b46", "bb1b09ae", "cb3f4bb51ee4e466"}, 0x38) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x105, 0x105, 0x6, [@func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @const, @datasec={0x0, 0x9, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}], 'u'}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x126}, 0x20) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:42:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) 04:42:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) 04:42:41 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="600000000b06010400005ce900008ebbcd22000005000100060000000900020073797a30"], 0x60}}, 0x0) 04:42:41 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8000000190001000000000020000000ff010000000000000000000000000001e000000100000000000000"], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) 04:42:41 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x80000000004) write(r1, &(0x7f000058bfe4)="29000000140003b7ff000000040860eb0100100006a40e07fff00fd57f25ffffff0100002a00f3ff09", 0x29) 04:42:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) 04:42:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x440, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x200, 0x268, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x40, 0x0, 0x0, 0xffffffff, 0xffffff81, 0x7}}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4a0) [ 147.744046][T10835] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.1'. [ 147.749316][T10834] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. 04:42:41 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8000000190001000000000020000000ff010000000000000000000000000001e000000100"/50], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) 04:42:41 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="600000000b06010400005ce900008ebbcd22000005000100060000000900020073797a30"], 0x60}}, 0x0) 04:42:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r1, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 04:42:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x440, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x200, 0x268, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x40, 0x0, 0x0, 0xffffffff, 0xffffff81, 0x7}}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4a0) [ 147.859954][T10849] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.1'. [ 147.870470][T10850] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. [ 150.472344][ T0] NOHZ: local_softirq_pending 08 04:42:44 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="600000000b06010400005ce900008ebbcd22000005000100060000000900020073797a30000000003800"], 0x60}}, 0x0) 04:42:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) 04:42:44 executing program 3: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000000c0)=@gcm_256={{}, "3f7e3fc7541f6e41", "de3570ae014fab12ffddb1d3f87df23e413124f05a4a484cb68957a5d7dd4b46", "bb1b09ae", "cb3f4bb51ee4e466"}, 0x38) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x105, 0x105, 0x6, [@func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @const, @datasec={0x0, 0x9, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}], 'u'}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x126}, 0x20) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:42:44 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000240)=0x7fe, 0x4) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e23}, 0x10) mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x3, 0x64031, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000603000)=""/81, 0xb15e2ac0d3828044}, 0x40002102) 04:42:44 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8000000190001000000000020000000ff010000000000000000000000000001e000000100"/50], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) 04:42:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x440, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x200, 0x268, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x40, 0x0, 0x0, 0xffffffff, 0xffffff81, 0x7}}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4a0) 04:42:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) 04:42:44 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="600000000b06010400005ce900008ebbcd22000005000100060000000900020073797a30000000003800"], 0x60}}, 0x0) [ 150.770202][T10871] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. 04:42:44 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000240)=0x7fe, 0x4) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e23}, 0x10) mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x3, 0x64031, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000603000)=""/81, 0xb15e2ac0d3828044}, 0x40002102) 04:42:44 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8000000190001000000000020000000ff010000000000000000000000000001e000000100"/50], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) 04:42:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x40, 0x0, 0x0, 0xffffffff, 0xffffff81, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) 04:42:44 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="600000000b06010400005ce900008ebbcd22000005000100060000000900020073797a30000000003800"], 0x60}}, 0x0) 04:42:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) 04:42:44 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000240)=0x7fe, 0x4) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e23}, 0x10) mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x3, 0x64031, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000603000)=""/81, 0xb15e2ac0d3828044}, 0x40002102) [ 150.885277][T10887] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. 04:42:47 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8000000190001000000000020000000ff010000000000000000000000000001e000000100"/54], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) 04:42:47 executing program 3: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000000c0)=@gcm_256={{}, "3f7e3fc7541f6e41", "de3570ae014fab12ffddb1d3f87df23e413124f05a4a484cb68957a5d7dd4b46", "bb1b09ae", "cb3f4bb51ee4e466"}, 0x38) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x105, 0x105, 0x6, [@func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @const, @datasec={0x0, 0x9, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}], 'u'}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x126}, 0x20) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:42:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x40, 0x0, 0x0, 0xffffffff, 0xffffff81, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) 04:42:47 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000240)=0x7fe, 0x4) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e23}, 0x10) mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x3, 0x64031, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000603000)=""/81, 0xb15e2ac0d3828044}, 0x40002102) 04:42:47 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) 04:42:47 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="600000000b06010400005ce900008ebbcd22000005000100060000000900020073797a3000000000380007800c"], 0x60}}, 0x0) 04:42:47 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="b702000076000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fefcff0000850000000d000000b700000000000000950008000000000023b5922c90d1db1be58a72e306b88bbaf158fce7df486c000400005121eddcd904d19ef888990200dd6f214a4a764f17b5a67b3919aefa67028b93ed8afd7ab9b35caf3dd19b5ace52671e851585fb6344b3cf3c9a36ffef62ca5bc2a344b033367a26fb4f2e6a6840506fde2f68bf083faa3b72c9666fbf707d3d6edc1abcc8440595a10d438c2a0bc03c3e3d0ed12bb0d232cd09ac5d064be5e76fcf58255984fa3448c44e23ac2fce2fb7211317e2a0ca2342ec1828931a50b5e8868298d64bad9b687f00000ae90d81aed4945d80b1871055580a133b29f9052b3cde45ca17ff592c67f5f9f3c184979ddfe2017d0631a3e5232ca746bc87d720c4fee7c1ff370fe32486e3f5e370e20dc9715d5b25415072eefe0b60fda800cfcd0422025d791315f80e58ea5f43767d2caa718d4732f097a0c84b59d8f4f213eb2e6bff3f3729f42367b61ed152d14d8660a23afa63ee3444de1ee4f4c3d7a170c0d7bea2fbd37faf6ef2f27712840245632a3495c6c05ba2ac28dd982a9a68d2c3f5672d69a92fc103048a7b1e295444131becd0ba370c4a19b9114c404f9d5942c41c707880c111a34df93fac8825b180bd073e85213b3a86e0d7ed5d680aff3b59b0a95bd6b8574c96b7fbf026729ff70ecdd79ab39abd7b91b9973d142516e4effbe593e057f256cd9c946430add07a30d0d74ce3afdfcf64ef5000949299003daa1b104d7236768526ca152af76f2f96ec439aa7cd0da96e7b0753ffb35543528bc2565b728648824da3cf67278f5a236379c78f70e94ddb0b2570d11165ea8fe695b2146a71af0800000000000000cea03a2edc33b8785963a588526f19"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) 04:42:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x440, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x200, 0x268, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4a0) 04:42:47 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="600000000b06010400005ce900008ebbcd22000005000100060000000900020073797a3000000000380007800c"], 0x60}}, 0x0) 04:42:47 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000240)=0x7fe, 0x4) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e23}, 0x10) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000603000)=""/81, 0xb15e2ac0d3828044}, 0x40002102) [ 153.823263][T10915] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. 04:42:47 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8000000190001000000000020000000ff010000000000000000000000000001e000000100"/54], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) 04:42:47 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) 04:42:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x440, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x200, 0x268, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4a0) [ 153.957933][T10935] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. 04:42:50 executing program 3: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000000c0)=@gcm_256={{}, "3f7e3fc7541f6e41", "de3570ae014fab12ffddb1d3f87df23e413124f05a4a484cb68957a5d7dd4b46", "bb1b09ae", "cb3f4bb51ee4e466"}, 0x38) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x105, 0x105, 0x6, [@func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @const, @datasec={0x0, 0x9, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}], 'u'}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x126}, 0x20) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:42:50 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="600000000b06010400005ce900008ebbcd22000005000100060000000900020073797a3000000000380007800c"], 0x60}}, 0x0) 04:42:50 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) 04:42:50 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000240)=0x7fe, 0x4) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e23}, 0x10) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000603000)=""/81, 0xb15e2ac0d3828044}, 0x40002102) 04:42:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x440, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x200, 0x268, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4a0) 04:42:50 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8000000190001000000000020000000ff010000000000000000000000000001e000000100"/54], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) 04:42:50 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) 04:42:50 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="600000000b06010400005ce900008ebbcd22000005000100060000000900020073797a3000000000380007800c00"], 0x60}}, 0x0) 04:42:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x0, 0x0, 0x40, 0x0, 0x0, 0xffffffff, 0xffffff81, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) 04:42:50 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000240)=0x7fe, 0x4) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e23}, 0x10) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000603000)=""/81, 0xb15e2ac0d3828044}, 0x40002102) [ 156.898277][T10956] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. 04:42:51 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) [ 156.955915][T10964] xt_hashlimit: invalid rate 04:42:51 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8000000190001000000000020000000ff010000000000000000000000000001e000000100"/56], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) [ 157.037556][T10973] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. 04:42:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x0, 0x0, 0x40, 0x0, 0x0, 0xffffffff, 0xffffff81, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) 04:42:53 executing program 3: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000000c0)=@gcm_256={{}, "3f7e3fc7541f6e41", "de3570ae014fab12ffddb1d3f87df23e413124f05a4a484cb68957a5d7dd4b46", "bb1b09ae", "cb3f4bb51ee4e466"}, 0x38) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x105, 0x105, 0x6, [@func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @const, @datasec={0x0, 0x9, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}], 'u'}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x126}, 0x20) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:42:53 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) 04:42:53 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="600000000b06010400005ce900008ebbcd22000005000100060000000900020073797a3000000000380007800c00"], 0x60}}, 0x0) 04:42:53 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000240)=0x7fe, 0x4) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x3, 0x64031, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000603000)=""/81, 0xb15e2ac0d3828044}, 0x40002102) 04:42:53 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8000000190001000000000020000000ff010000000000000000000000000001e000000100"/56], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) 04:42:53 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="600000000b06010400005ce900008ebbcd22000005000100060000000900020073797a3000000000380007800c00"], 0x60}}, 0x0) 04:42:54 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="b702000076000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fefcff0000850000000d000000b700000000000000950008000000000023b5922c90d1db1be58a72e306b88bbaf158fce7df486c000400005121eddcd904d19ef888990200dd6f214a4a764f17b5a67b3919aefa67028b93ed8afd7ab9b35caf3dd19b5ace52671e851585fb6344b3cf3c9a36ffef62ca5bc2a344b033367a26fb4f2e6a6840506fde2f68bf083faa3b72c9666fbf707d3d6edc1abcc8440595a10d438c2a0bc03c3e3d0ed12bb0d232cd09ac5d064be5e76fcf58255984fa3448c44e23ac2fce2fb7211317e2a0ca2342ec1828931a50b5e8868298d64bad9b687f00000ae90d81aed4945d80b1871055580a133b29f9052b3cde45ca17ff592c67f5f9f3c184979ddfe2017d0631a3e5232ca746bc87d720c4fee7c1ff370fe32486e3f5e370e20dc9715d5b25415072eefe0b60fda800cfcd0422025d791315f80e58ea5f43767d2caa718d4732f097a0c84b59d8f4f213eb2e6bff3f3729f42367b61ed152d14d8660a23afa63ee3444de1ee4f4c3d7a170c0d7bea2fbd37faf6ef2f27712840245632a3495c6c05ba2ac28dd982a9a68d2c3f5672d69a92fc103048a7b1e295444131becd0ba370c4a19b9114c404f9d5942c41c707880c111a34df93fac8825b180bd073e85213b3a86e0d7ed5d680aff3b59b0a95bd6b8574c96b7fbf026729ff70ecdd79ab39abd7b91b9973d142516e4effbe593e057f256cd9c946430add07a30d0d74ce3afdfcf64ef5000949299003daa1b104d7236768526ca152af76f2f96ec439aa7cd0da96e7b0753ffb35543528bc2565b728648824da3cf67278f5a236379c78f70e94ddb0b2570d11165ea8fe695b2146a71af0800000000000000cea03a2edc33b8785963a588526f19153b3c89be6ee910039fb1a3f7883e75747be245b02fb4da477c09ec57be1cdb06fc84fb90af18963353fe77d2a64a0d053a1842a19cebb7b1c018a5c000677d96764a9ca414f8a619b7d1e40d2f2bbe3a0b567aec151718147c045f8f91d718b56d52c016e5421d8f6a9ceb0a8c5e1adc5786d327a134fdb95cc4059c3411286274878ea7ffb5d103ea9818e2645950c941ebff9c98b5ae405f7f94db105885d91fcebef0c0bf2510f60f9f4f60e3f744e6edf0"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) 04:42:54 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8000000190001000000000020000000ff010000000000000000000000000001e000000100"/56], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) [ 159.922636][T10991] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. [ 159.946855][T10994] xt_hashlimit: invalid rate 04:42:54 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000240)=0x7fe, 0x4) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x3, 0x64031, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000603000)=""/81, 0xb15e2ac0d3828044}, 0x40002102) 04:42:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x0, 0x0, 0x40, 0x0, 0x0, 0xffffffff, 0xffffff81, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) 04:42:54 executing program 1: 04:42:54 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000240)=0x7fe, 0x4) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x3, 0x64031, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000603000)=""/81, 0xb15e2ac0d3828044}, 0x40002102) [ 160.050745][T11006] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. [ 160.070449][T11009] xt_hashlimit: invalid rate 04:42:56 executing program 1: 04:42:56 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) 04:42:56 executing program 3: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000000c0)=@gcm_256={{}, "3f7e3fc7541f6e41", "de3570ae014fab12ffddb1d3f87df23e413124f05a4a484cb68957a5d7dd4b46", "bb1b09ae", "cb3f4bb51ee4e466"}, 0x38) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x105, 0x105, 0x6, [@func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @const, @datasec={0x0, 0x9, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}], 'u'}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x126}, 0x20) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:42:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0xffffff81, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) 04:42:56 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000240)=0x7fe, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e23}, 0x10) mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x3, 0x64031, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000603000)=""/81, 0xb15e2ac0d3828044}, 0x40002102) 04:42:56 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8000000190001000000000020000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a"], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) 04:42:57 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) 04:42:57 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e23}, 0x10) mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x3, 0x64031, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000603000)=""/81, 0xb15e2ac0d3828044}, 0x40002102) 04:42:57 executing program 1: [ 163.005850][T11032] xt_hashlimit: overflow, try lower: 5/0 04:42:57 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8000000190001000000000020000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a"], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) 04:42:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0xffffff81, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) 04:42:57 executing program 1: 04:42:57 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e23}, 0x10) mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x3, 0x64031, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000603000)=""/81, 0xb15e2ac0d3828044}, 0x40002102) 04:42:57 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) [ 163.150751][T11046] xt_hashlimit: overflow, try lower: 5/0 04:43:00 executing program 3: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000000c0)=@gcm_256={{}, "3f7e3fc7541f6e41", "de3570ae014fab12ffddb1d3f87df23e413124f05a4a484cb68957a5d7dd4b46", "bb1b09ae", "cb3f4bb51ee4e466"}, 0x38) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x105, 0x105, 0x6, [@func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @const, @datasec={0x0, 0x9, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}], 'u'}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x126}, 0x20) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:43:00 executing program 1: 04:43:00 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8000000190001000000000020000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a"], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) 04:43:00 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e23}, 0x10) mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x3, 0x64031, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000603000)=""/81, 0xb15e2ac0d3828044}, 0x40002102) 04:43:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0xffffff81, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) 04:43:00 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) 04:43:00 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) 04:43:00 executing program 0: setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000240)=0x7fe, 0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e23}, 0x10) mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x3, 0x64031, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000edffc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000603000)=""/81, 0xb15e2ac0d3828044}, 0x40002102) 04:43:00 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8000000190001000000000020000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a"], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, 0x0, 0x0) 04:43:00 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="b702000076000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fefcff0000850000000d000000b700000000000000950008000000000023b5922c90d1db1be58a72e306b88bbaf158fce7df486c000400005121eddcd904d19ef888990200dd6f214a4a764f17b5a67b3919aefa67028b93ed8afd7ab9b35caf3dd19b5ace52671e851585fb6344b3cf3c9a36ffef62ca5bc2a344b033367a26fb4f2e6a6840506fde2f68bf083faa3b72c9666fbf707d3d6edc1abcc8440595a10d438c2a0bc03c3e3d0ed12bb0d232cd09ac5d064be5e76fcf58255984fa3448c44e23ac2fce2fb7211317e2a0ca2342ec1828931a50b5e8868298d64bad9b687f00000ae90d81aed4945d80b1871055580a133b29f9052b3cde45ca17ff592c67f5f9f3c184979ddfe2017d0631a3e5232ca746bc87d720c4fee7c1ff370fe32486e3f5e370e20dc9715d5b25415072eefe0b60fda800cfcd0422025d791315f80e58ea5f43767d2caa718d4732f097a0c84b59d8f4f213eb2e6bff3f3729f42367b61ed152d14d8660a23afa63ee3444de1ee4f4c3d7a170c0d7bea2fbd37faf6ef2f27712840245632a3495c6c05ba2ac28dd982a9a68d2c3f5672d69a92fc103048a7b1e295444131becd0ba370c4a19b9114c404f9d5942c41c707880c111a34df93fac8825b180bd073e85213b3a86e0d7ed5d680aff3b59b0a95bd6b8574c96b7fbf026729ff70ecdd79ab39abd7b91b9973d142516e4effbe593e057f256cd9c946430add07a30d0d74ce3afdfcf64ef5000949299003daa1b104d7236768526ca152af76f2f96ec439aa7cd0da96e7b0753ffb35543528bc2565b728648824da3cf67278f5a236379c78f70e94ddb0b2570d11165ea8fe695b2146a71af0800000000000000cea03a2edc33b8785963a588526f19153b3c89be6ee910039fb1a3f7883e75747be245b02fb4da477c09ec57be1cdb06fc84fb90af18963353fe77d2a64a0d053a1842a19cebb7b1c018a5c000677d96764a9ca414f8a619b7d1e40d2f2bbe3a0b567aec151718147c045f8f91d718b56d52c016e5421d8f6a9ceb0a8c5e1adc5786d327a134fdb95cc4059c3411286274878ea7ffb5d103ea9818e2645950c941ebff9c98b5ae405f7f94db105885d91fcebef0c0bf2510f60f9f4f60e3f744e6edf09600000000000000000000004b4413702aac741150b71cbb6c0c979a91688bb4f415f99c23bfa73cfb0f5f0ae3"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) [ 166.073199][T11070] xt_hashlimit: overflow, try lower: 5/0 04:43:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x40, 0x0, 0x0, 0x0, 0xffffff81, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) 04:43:00 executing program 1: 04:43:03 executing program 3: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000000c0)=@gcm_256={{}, "3f7e3fc7541f6e41", "de3570ae014fab12ffddb1d3f87df23e413124f05a4a484cb68957a5d7dd4b46", "bb1b09ae", "cb3f4bb51ee4e466"}, 0x38) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x105, 0x105, 0x6, [@func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @const, @datasec={0x0, 0x9, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}], 'u'}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x126}, 0x20) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:43:03 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8000000190001000000000020000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a"], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, 0x0, 0x0) 04:43:03 executing program 0: setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000240)=0x7fe, 0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e23}, 0x10) mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x3, 0x64031, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000edffc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000603000)=""/81, 0xb15e2ac0d3828044}, 0x40002102) 04:43:03 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="b702000076000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fefcff0000850000000d000000b700000000000000950008000000000023b5922c90d1db1be58a72e306b88bbaf158fce7df486c000400005121eddcd904d19ef888990200dd6f214a4a764f17b5a67b3919aefa67028b93ed8afd7ab9b35caf3dd19b5ace52671e851585fb6344b3cf3c9a36ffef62ca5bc2a344b033367a26fb4f2e6a6840506fde2f68bf083faa3b72c9666fbf707d3d6edc1abcc8440595a10d438c2a0bc03c3e3d0ed12bb0d232cd09ac5d064be5e76fcf58255984fa3448c44e23ac2fce2fb7211317e2a0ca2342ec1828931a50b5e8868298d64bad9b687f00000ae90d81aed4945d80b1871055580a133b29f9052b3cde45ca17ff592c67f5f9f3c184979ddfe2017d0631a3e5232ca746bc87d720c4fee7c1ff370fe32486e3f5e370e20dc9715d5b25415072eefe0b60fda800cfcd0422025d791315f80e58ea5f43767d2caa718d4732f097a0c84b59d8f4f213eb2e6bff3f3729f42367b61ed152d14d8660a23afa63ee3444de1ee4f4c3d7a170c0d7bea2fbd37faf6ef2f27712840245632a3495c6c05ba2ac28dd982a9a68d2c3f5672d69a92fc103048a7b1e295444131becd0ba370c4a19b9114c404f9d5942c41c707880c111a34df93fac8825b180bd073e85213b3a86e0d7ed5d680aff3b59b0a95bd6b8574c96b7fbf026729ff70ecdd79ab39abd7b91b9973d142516e4effbe593e057f256cd9c946430add07a30d0d74ce3afdfcf64ef5000949299003daa1b104d7236768526ca152af76f2f96ec439aa7cd0da96e7b0753ffb35543528bc2565b728648824da3cf67278f5a236379c78f70e94ddb0b2570d11165ea8fe695b2146a71af0800000000000000cea03a2edc33b8785963a588526f19153b3c89be6ee910039fb1a3f7883e75747be245b02fb4da477c09ec57be1cdb06fc84fb90af18963353fe77d2a64a0d053a1842a19cebb7b1c018a5c000677d96764a9ca414f8a619b7d1e40d2f2bbe3a0b567aec151718147c045f8f91d718b56d52c016e5421d8f6a9ceb0a8c5e1adc5786d327a134fdb95cc4059c3411286274878ea7ffb5d103ea9818e2645950c941ebff9c98b5ae405f7f94db105885d91fcebef0c0bf2510f60f9f4f60e3f744e6edf09600000000000000000000004b4413702aac741150b71cbb6c0c979a91688bb4f415f99c23bfa73cfb0f5f0ae3"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) 04:43:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x40, 0x0, 0x0, 0x0, 0xffffff81, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) 04:43:03 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000240), &(0x7f0000001700)=0x4) 04:43:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x40, 0x0, 0x0, 0x0, 0xffffff81, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) 04:43:03 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8000000190001000000000020000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a"], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, 0x0, 0x0) 04:43:03 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) 04:43:03 executing program 0: setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000240)=0x7fe, 0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e23}, 0x10) mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x3, 0x64031, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000edffc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000603000)=""/81, 0xb15e2ac0d3828044}, 0x40002102) 04:43:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x40, 0x0, 0x0, 0xffffffff, 0x0, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) 04:43:03 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) sendto$inet(r1, &(0x7f0000000000)="16", 0x1, 0x0, &(0x7f0000000080)={0x10, 0x2}, 0x10) [ 170.301347][ T0] NOHZ: local_softirq_pending 08 [ 170.951649][ T0] NOHZ: local_softirq_pending 08 04:43:06 executing program 3: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000000c0)=@gcm_256={{}, "3f7e3fc7541f6e41", "de3570ae014fab12ffddb1d3f87df23e413124f05a4a484cb68957a5d7dd4b46", "bb1b09ae", "cb3f4bb51ee4e466"}, 0x38) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x105, 0x105, 0x6, [@func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @const, @datasec={0x0, 0x9, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}], 'u'}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x126}, 0x20) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:43:06 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8000000190001000000000020000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a"], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, 0x0, 0x1, 0xfffff000}, 0x0) 04:43:06 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) 04:43:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x40, 0x0, 0x0, 0xffffffff, 0x0, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) 04:43:06 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000240)=0x7fe, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e23}, 0x10) mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x3, 0x64031, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000603000)=""/81, 0xb15e2ac0d3828044}, 0x40002102) 04:43:06 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000240)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000240)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x21, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, r4}, 0x10) 04:43:06 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8000000190001000000000020000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a"], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, 0x0, 0x1, 0xfffff000}, 0x0) 04:43:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x40, 0x0, 0x0, 0xffffffff, 0x0, 0x7}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) 04:43:06 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) 04:43:06 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000240)=0x7fe, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e23}, 0x10) mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x3, 0x64031, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000603000)=""/81, 0xb15e2ac0d3828044}, 0x40002102) 04:43:06 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8000000190001000000000020000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a"], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, 0x0, 0x1, 0xfffff000}, 0x0) 04:43:06 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="b702000076000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fefcff0000850000000d000000b700000000000000950008000000000023b5922c90d1db1be58a72e306b88bbaf158fce7df486c000400005121eddcd904d19ef888990200dd6f214a4a764f17b5a67b3919aefa67028b93ed8afd7ab9b35caf3dd19b5ace52671e851585fb6344b3cf3c9a36ffef62ca5bc2a344b033367a26fb4f2e6a6840506fde2f68bf083faa3b72c9666fbf707d3d6edc1abcc8440595a10d438c2a0bc03c3e3d0ed12bb0d232cd09ac5d064be5e76fcf58255984fa3448c44e23ac2fce2fb7211317e2a0ca2342ec1828931a50b5e8868298d64bad9b687f00000ae90d81aed4945d80b1871055580a133b29f9052b3cde45ca17ff592c67f5f9f3c184979ddfe2017d0631a3e5232ca746bc87d720c4fee7c1ff370fe32486e3f5e370e20dc9715d5b25415072eefe0b60fda800cfcd0422025d791315f80e58ea5f43767d2caa718d4732f097a0c84b59d8f4f213eb2e6bff3f3729f42367b61ed152d14d8660a23afa63ee3444de1ee4f4c3d7a170c0d7bea2fbd37faf6ef2f27712840245632a3495c6c05ba2ac28dd982a9a68d2c3f5672d69a92fc103048a7b1e295444131becd0ba370c4a19b9114c404f9d5942c41c707880c111a34df93fac8825b180bd073e85213b3a86e0d7ed5d680aff3b59b0a95bd6b8574c96b7fbf026729ff70ecdd79ab39abd7b91b9973d142516e4effbe593e057f256cd9c946430add07a30d0d74ce3afdfcf64ef5000949299003daa1b104d7236768526ca152af76f2f96ec439aa7cd0da96e7b0753ffb35543528bc2565b728648824da3cf67278f5a236379c78f70e94ddb0b2570d11165ea8fe695b2146a71af0800000000000000cea03a2edc33b8785963a588526f19153b3c89be6ee910039fb1a3f7883e75747be245b02fb4da477c09ec57be1cdb06fc84fb90af18963353fe77d2a64a0d053a1842a19cebb7b1c018a5c000677d96764a9ca414f8a619b7d1e40d2f2bbe3a0b567aec151718147c045f8f91d718b56d52c016e5421d8f6a9ceb0a8c5e1adc5786d327a134fdb95cc4059c3411286274878ea7ffb5d103ea9818e2645950c941ebff9c98b5ae405f7f94db105885d91fcebef0c0bf2510f60f9f4f60e3f744e6edf09600000000000000000000004b4413702aac741150b71cbb6c0c979a91688bb4f415f99c23bfa73cfb0f5f0ae3ffefe859c9e250"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) 04:43:09 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000240)=0x7fe, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e23}, 0x10) mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x3, 0x64031, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000603000)=""/81, 0xb15e2ac0d3828044}, 0x40002102) 04:43:09 executing program 3: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000000c0)=@gcm_256={{}, "3f7e3fc7541f6e41", "de3570ae014fab12ffddb1d3f87df23e413124f05a4a484cb68957a5d7dd4b46", "bb1b09ae", "cb3f4bb51ee4e466"}, 0x38) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x105, 0x105, 0x6, [@func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @const, @datasec={0x0, 0x9, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}], 'u'}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x126}, 0x20) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:43:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x40, 0x0, 0x0, 0xffffffff, 0xffffff81}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) 04:43:09 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendmsg(r0, &(0x7f0000000200)={&(0x7f00000000c0)=@in6={0x1c, 0x1c}, 0x1c, &(0x7f00000001c0)=[{&(0x7f0000000100)="f0", 0x1}], 0x1, &(0x7f0000000280)=[{0x10}, {0x10}], 0x20}, 0x0) 04:43:09 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8000000190001000000000020000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a"], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={0x0}, 0x1, 0xfffff000}, 0x0) 04:43:09 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) 04:43:09 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) [ 175.274146][T11196] xt_hashlimit: invalid interval 04:43:09 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8000000190001000000000020000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a"], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={0x0}, 0x1, 0xfffff000}, 0x0) 04:43:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x40, 0x0, 0x0, 0xffffffff, 0xffffff81}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) 04:43:09 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x7, &(0x7f0000000100), &(0x7f0000000240)=0x84) 04:43:09 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000240)=0x7fe, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e23}, 0x10) mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x3, 0x64031, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000603000)=""/81, 0xb15e2ac0d3828044}, 0x40002102) 04:43:09 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) 04:43:09 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8000000190001000000000020000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a"], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={0x0}, 0x1, 0xfffff000}, 0x0) [ 175.377280][T11214] xt_hashlimit: invalid interval 04:43:12 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) 04:43:12 executing program 3: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000000c0)=@gcm_256={{}, "3f7e3fc7541f6e41", "de3570ae014fab12ffddb1d3f87df23e413124f05a4a484cb68957a5d7dd4b46", "bb1b09ae", "cb3f4bb51ee4e466"}, 0x38) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:43:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x598, 0x3c0, 0x4000000, 0x158, 0x3c0, 0x0, 0x4c8, 0x240, 0x240, 0x4c8, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x358, 0x3c0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth0_to_hsr\x00', {0x5, 0x0, 0x40, 0x0, 0x0, 0xffffffff, 0xffffff81}}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) 04:43:12 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000240)=0x7fe, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e23}, 0x10) mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x3, 0x64031, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000603000)=""/81, 0xb15e2ac0d3828044}, 0x40002102) 04:43:12 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8000000190001000000000020000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a"], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x0, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) 04:43:12 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000000)={&(0x7f00000001c0)=@in={0x10, 0x2}, 0x10, 0x0}, 0x81) 04:43:12 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8000000190001000000000020000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a"], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x0, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) [ 178.340693][T11244] xt_hashlimit: invalid interval 04:43:12 executing program 1: 04:43:12 executing program 4: 04:43:12 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8000000190001000000000020000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a"], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x0, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) 04:43:12 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000240)=0x7fe, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e23}, 0x10) mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x3, 0x64031, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000603000)=""/81, 0xb15e2ac0d3828044}, 0x40002102) 04:43:12 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) 04:43:12 executing program 4: 04:43:12 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8000000190001000000000020000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a"], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) [ 178.511694][T11265] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. 04:43:15 executing program 3: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000000c0)=@gcm_256={{}, "3f7e3fc7541f6e41", "de3570ae014fab12ffddb1d3f87df23e413124f05a4a484cb68957a5d7dd4b46", "bb1b09ae", "cb3f4bb51ee4e466"}, 0x38) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:43:15 executing program 1: 04:43:15 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) 04:43:15 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x0, &(0x7f0000000240)=0x7fe, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e23}, 0x10) mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x3, 0x64031, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000603000)=""/81, 0xb15e2ac0d3828044}, 0x40002102) 04:43:15 executing program 4: 04:43:15 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8000000190001000000000020000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a"], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) 04:43:15 executing program 1: 04:43:15 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe80, 0x6000300, &(0x7f0000000500)="b9ff0300000d698cb89e14f08848000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28) 04:43:15 executing program 4: vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x50000103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:43:15 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x0, &(0x7f0000000240)=0x7fe, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e23}, 0x10) mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x3, 0x64031, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000603000)=""/81, 0xb15e2ac0d3828044}, 0x40002102) [ 181.442810][T11284] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. 04:43:15 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02c8695e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b318e2ec0e0700897a74a0091ff110026e6d2ef831ab7ea0c34f17e3ad6ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b80200000000000000334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18ce28ee42c1a89ae2ed4b4390af9a9ceafd07ed00b0000002cab154ad029a119ca3c972780870014601c3c975d5aec84222fff0d7216fdb0d3a0ec4be3e563112f4b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a2a71bc85018e5ff2c910496f18afc9ffc2cc788bee1b47683db01a469398685211bbae3e2ed0a5670e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcdcc22ee17476d738992533ac2a9f5a699593f084419cae0b4183fb01c73f99857399537f5dc2acb72c7eae993fc9eb22d130665b6341da114f08cd0509d380578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a08707671315c302fae29187d4f5c06a960fd37c10223fdae7ed04935c3c90d3add8eebc8619d73415eeadcda2130f5011e48455b5a8b90dfae158994f50adab988dd8e12baf5cc9398c88607a67e18c2977aab37d9a44cfc1c7b4000000000000fa47742f6c5b9c4b11e7d7262a1457c39495c826b956ba859ac8e3c177b91bd7d5ca1664fe2f3ced8468911806e8916dc15e21644db60c2499d5d16d7d915836ab26c169482008ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a9e90d767671414c99d4894ee7f8249dc1e3428d2129369ee1b85afa1a5be5f6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1038debd64cbe359454a3f2239cfe35f81b7aded448859968ff0e90500d0b07c0dd00490f167e6d5c1109681739dc33f75b2042b8ff8c21ad702ccccf"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x25, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 04:43:15 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000440)=ANY=[@ANYBLOB="b8000000190001000000000020000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a"], 0xb8}, 0x1, 0xfffff000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x3f000000]}, @in=@multicast1}}}, 0xb8}, 0x1, 0xfffff000}, 0x0) [ 181.525985][T11292] IPVS: ftp: loaded support on port[0] = 21 [ 181.570234][T11300] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. [ 181.680378][ T3569] tipc: TX() has been purged, node left! [ 181.829480][ T5076] ================================================================== [ 181.837574][ T5076] BUG: KCSAN: data-race in fsnotify / fsnotify_put_mark [ 181.844479][ T5076] [ 181.846781][ T5076] write to 0xffff888129ff894c of 4 bytes by task 11332 on cpu 0: [ 181.854466][ T5076] fsnotify_put_mark+0x269/0x5e0 [ 181.859406][ T5076] __se_sys_inotify_rm_watch+0xff/0x170 [ 181.864918][ T5076] __x64_sys_inotify_rm_watch+0x2d/0x40 [ 181.870438][ T5076] do_syscall_64+0x39/0x80 [ 181.874839][ T5076] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 181.880697][ T5076] [ 181.883005][ T5076] read to 0xffff888129ff894c of 4 bytes by task 5076 on cpu 1: [ 181.890511][ T5076] fsnotify+0x171/0xe50 [ 181.894632][ T5076] __fsnotify_parent+0x3e3/0x470 [ 181.899550][ T5076] do_sys_openat2+0x492/0x500 [ 181.904197][ T5076] __x64_sys_open+0xe2/0x110 [ 181.908752][ T5076] do_syscall_64+0x39/0x80 [ 181.913136][ T5076] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 181.918988][ T5076] [ 181.921286][ T5076] Reported by Kernel Concurrency Sanitizer on: [ 181.927410][ T5076] CPU: 1 PID: 5076 Comm: systemd-udevd Not tainted 5.8.0-syzkaller #0 [ 181.935522][ T5076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 181.945542][ T5076] ================================================================== [ 181.953569][ T5076] Kernel panic - not syncing: panic_on_warn set ... [ 181.960122][ T5076] CPU: 1 PID: 5076 Comm: systemd-udevd Not tainted 5.8.0-syzkaller #0 [ 181.968234][ T5076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 181.978346][ T5076] Call Trace: [ 181.981612][ T5076] dump_stack+0x10f/0x19d [ 181.985922][ T5076] panic+0x207/0x64a [ 181.989846][ T5076] ? vprintk_emit+0x44a/0x4f0 [ 181.994492][ T5076] kcsan_report+0x684/0x690 [ 181.998968][ T5076] ? kcsan_setup_watchpoint+0x41e/0x4a0 [ 182.004480][ T5076] ? fsnotify+0x171/0xe50 [ 182.008781][ T5076] ? __fsnotify_parent+0x3e3/0x470 [ 182.013864][ T5076] ? do_sys_openat2+0x492/0x500 [ 182.018681][ T5076] ? __x64_sys_open+0xe2/0x110 [ 182.023413][ T5076] ? do_syscall_64+0x39/0x80 [ 182.027971][ T5076] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 182.034013][ T5076] kcsan_setup_watchpoint+0x41e/0x4a0 [ 182.039352][ T5076] fsnotify+0x171/0xe50 [ 182.043480][ T5076] __fsnotify_parent+0x3e3/0x470 [ 182.048389][ T5076] do_sys_openat2+0x492/0x500 [ 182.053036][ T5076] __x64_sys_open+0xe2/0x110 [ 182.057598][ T5076] do_syscall_64+0x39/0x80 [ 182.061985][ T5076] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 182.067852][ T5076] RIP: 0033:0x7f110836e840 [ 182.072238][ T5076] Code: 73 01 c3 48 8b 0d 68 77 20 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 83 3d 89 bb 20 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 1e f6 ff ff 48 89 04 24 [ 182.091809][ T5076] RSP: 002b:00007ffd1297bfc8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 182.100184][ T5076] RAX: ffffffffffffffda RBX: 00007ffd1297c090 RCX: 00007f110836e840 [ 182.108166][ T5076] RDX: 00005590a5607fe3 RSI: 00000000000a0800 RDI: 00005590a5fe1530 [ 182.116108][ T5076] RBP: 00007ffd1297c500 R08: 00005590a5607670 R09: 0000000000000010 [ 182.124065][ T5076] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffd1297c170 [ 182.132009][ T5076] R13: 00005590a5fca010 R14: 00005590a5fd8670 R15: 00007ffd1297c040 [ 182.141116][ T5076] Kernel Offset: disabled [ 182.145418][ T5076] Rebooting in 86400 seconds..