9000710ef058dd0ea9f1d921629176e323ab37e68b7c516a2aadc9209d66ed00a379c6cee04fd3df131a405c830fede21d9439a0ad48d873091f9b818fe327665bc6dad3d01e1fbc73e6307a740ec9057b58fb3fedd047ee54bc3f2dee02bfeea225bab91d86cd1f6ea5ea4c130018d7461afaaa740fe887b0bc07a795636701010c", 0x1000, 0x1}, {&(0x7f0000001540)="fc448e0debfda233fefe26aefc435861092bb4bca7db9dd340ab2cdcb8d63ba964d5eccab14e910a27c368a9cee893a12368fde99e57ccdeec9e88ff637826d54cdd21b124cbbdf6cede934b756f315852cf8f94a3aae2d5e00e104e991623336f2379785391acad5858b77e5698a0cae56f66456cb091", 0x77, 0x9}, {&(0x7f00000015c0)="a932e60baabad77df0a8db0f1a89bb0830cbcd5b277d48e2e789e2a4a9081702c6d7895dc7694d1af669b1e0d43f4e", 0x2f, 0xc}, {&(0x7f0000001600)="983e4158a65b0d39f0204c532feab6cd14efb763b2d460d3da7086f3a15201caefea91eb2f48aa299a50e3d0fe9e54915310e888fa12fb3ccd029e893577dc6ea5b34f3ff452bef41b7160c9e93cb75a93d0079b0c38e624e8e8639483a81a60a80e14d07646dcca556029d644125ec2d9c54fbeb599c2e3", 0x78, 0x8000}], 0x1180002, &(0x7f0000001700)={[{@fmask={'fmask', 0x3d, 0x4e6}}, {@utf8='utf8'}, {@gid={'gid', 0x3d, r1}}, {@codepage={'codepage', 0x3d, 'cp863'}}], [{@dont_appraise='dont_appraise'}, {@hash='hash'}]}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x6, &(0x7f0000000000)=[{&(0x7f0000000200)="25bcc574769e620a2734fa0095e0612687ecb86a548802a902000000000000004e2f98b579a782d270146d0e0206e7ff9f5400d7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000240)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 483.604574][ T9899] hfsplus: unable to parse mount options [ 483.682722][ T9899] hfsplus: unable to parse mount options 09:43:52 executing program 0: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x44, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0x2}, {0xfff3, 0xfff1}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}]}}]}, 0x44}}, 0x0) r5 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000200), 0x4924924924926d3, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x0) 09:43:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast1=0xe0000306, @dev={0xac, 0x14, 0x14, 0xc}, @rand_addr=0x64010101}, 0xc) sendmsg$kcm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}, {0x0}], 0x2}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x32b, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) [ 484.012536][ T9717] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 484.021921][ T9717] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 484.047659][ T9907] EXT4-fs (loop2): Test dummy encryption mode enabled [ 484.070313][ T9907] EXT4-fs (loop2): Can't read superblock on 2nd try [ 484.152084][ T9717] usb 1-1: can't set config #1, error -71 [ 484.164876][ T9717] usb 1-1: USB disconnect, device number 6 [ 484.266758][ T9925] bridge0: port 2(bridge_slave_1) entered disabled state [ 484.275505][ T9925] bridge0: port 1(bridge_slave_0) entered disabled state [ 484.286261][ T9925] device bridge0 entered promiscuous mode 09:43:52 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x424d81, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000600)=0x14) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000180)=0x6) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) [ 484.731279][ T9926] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 484.806888][ T9925] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 484.817043][ T9925] bridge0: port 2(bridge_slave_1) entered blocking state [ 484.824553][ T9925] bridge0: port 2(bridge_slave_1) entered forwarding state [ 484.832791][ T9925] bridge0: port 1(bridge_slave_0) entered blocking state [ 484.840156][ T9925] bridge0: port 1(bridge_slave_0) entered forwarding state [ 484.849099][ T9925] device bridge0 left promiscuous mode [ 484.873090][ T9928] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 09:43:53 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7}}) write$tun(0xffffffffffffffff, &(0x7f00000000c0)={@void, @val={0x1, 0x3, 0x6, 0xfffa, 0xa3, 0x8}, @ipv6=@tipc_packet={0x8, 0x6, "a4eb8c", 0xf7, 0x6, 0x1, @dev={0xfe, 0x80, [], 0x3b}, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, {[@srh={0x3c, 0x8, 0x4, 0x4, 0x5a, 0x28, 0x6, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @dev={0xfe, 0x80, [], 0x3b}, @empty, @remote]}, @dstopts={0x16, 0x1, [], [@ra={0x5, 0x2, 0xa1}, @ra={0x5, 0x2, 0x1ff}]}, @hopopts={0x73, 0x5, [], [@pad1, @hao={0xc9, 0x10, @loopback}, @pad1, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, @srh={0x5e, 0x4, 0x4, 0x2, 0x2, 0x0, 0x7, [@mcast2, @mcast2]}, @fragment={0x4, 0x0, 0x5, 0x0, 0x0, 0xf, 0x65}, @fragment={0x16, 0x0, 0xa1, 0x0, 0x0, 0x0, 0x66}], @payload_mcast={{{{{{0x2f, 0x0, 0x1, 0x0, 0x1, 0xb, 0x2, 0x2, 0x6, 0x0, 0x2, 0x8, 0x2, 0x1, 0x800, 0x101, 0x0, 0x4e23, 0x4e21}, 0x3, 0x4}, 0x4}}}, [0x0, 0x0, 0x0]}}}}, 0x129) write$tun(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="0000000002400400000060bc7d9400542c00fc010000000000000000000000000000ff020000000000000000000000000001730000000000000000000000c4"], 0x86) r2 = getpid() pidfd_open(r2, 0x0) 09:43:53 executing program 0: getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xa, 0x3, 0x21c, 0x0, 0x0, 0x1c030011, 0x0, 0x64000000, 0x188, 0xb8, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote}, 0xa000000, 0x70, 0xb8, 0x0, {0x900000000000000, 0x3e00000000000000}}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0xfffffffd, 'syz1\x00', {0x3}}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0x0, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 09:43:53 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r2) r3 = memfd_create(&(0x7f0000000780)='\x00', 0x0) write(r3, &(0x7f00000000c0)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2000005, 0x11, r3, 0x0) dup3(r0, r1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x5, 0x0) 09:43:54 executing program 0: socket$alg(0x26, 0x5, 0x0) r0 = openat$bsg(0xffffff9c, &(0x7f00000000c0)='/dev/bsg\x00', 0x200200, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/bnep\x00') write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_OVERLAY(r1, 0x4004560e, 0x0) r2 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000040), 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) eventfd(0xe76d) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x23, &(0x7f0000000080), 0x8) setsockopt$sock_linger(r2, 0x1, 0xd, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f00000003c0)=""/4096, &(0x7f00000001c0)=0x1000) syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x8010, 0xffffffffffffffff, 0x8000000) perf_event_open(&(0x7f00000013c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000004, 0x2010, r0, 0x791c000) set_mempolicy(0x4002, &(0x7f0000000140)=0x10000101, 0x2) clone(0x4412c580, 0x0, 0x0, 0x0, 0x0) 09:43:54 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) [ 485.790514][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 486.026559][ T9956] IPVS: ftp: loaded support on port[0] = 21 09:43:55 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:43:55 executing program 2: syz_usb_connect$uac1(0x0, 0xb5, &(0x7f0000000040)=ANY=[@ANYBLOB="12010102000000106b1d01014000010203010902a30003010000000904000000010100000a2401000000020102132406000006000000000000000000000000000a24070000000008e53b0c24020000000000040000000c24020000000000000000000904010000010200000904010101010200000905010900000000040725010000000009040200000102000009080201010102000007240109000300082402010000000009058209ff0300000007"], &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}) r0 = openat$pfkey(0xffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x2082, 0x0) ioctl$DRM_IOCTL_MODE_SETPROPERTY(r0, 0xc01064ab, &(0x7f0000000140)={0x3, 0xfd3, 0x10000}) [ 487.824732][ T9717] usb 3-1: new high-speed USB device number 6 using dummy_hcd 09:43:56 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) [ 488.081722][ T9717] usb 3-1: Using ep0 maxpacket: 16 [ 488.821971][ T9717] usb 3-1: unable to get BOS descriptor or descriptor too short [ 488.913963][ T9717] usb 3-1: config 1 interface 1 altsetting 1 endpoint 0x1 has an invalid bInterval 0, changing to 7 [ 488.924989][ T9717] usb 3-1: config 1 interface 1 altsetting 1 endpoint 0x1 has invalid wMaxPacketSize 0 [ 488.935106][ T9717] usb 3-1: config 1 interface 2 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 489.192997][ T9717] usb 3-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 489.202440][ T9717] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 489.210573][ T9717] usb 3-1: Product: syz [ 489.215099][ T9717] usb 3-1: Manufacturer: syz [ 489.219836][ T9717] usb 3-1: SerialNumber: syz 09:43:57 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:43:57 executing program 0: ioctl$KVM_X86_SET_MCE(0xffffffffffffffff, 0x4040ae9e, &(0x7f00000000c0)={0x1400000000000000, 0x0, 0x80, 0x0, 0x8}) socket$inet(0x2, 0x0, 0x84) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20, 0x3}}, 0x0, 0x8, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8}]}, @IFLA_GROUP={0x8}]}, 0x34}}, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x20, 0x0, 0x0, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4002001}, 0x0) [ 489.858957][ T9717] usb 3-1: USB disconnect, device number 6 [ 490.051240][T10013] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 490.073793][T10013] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 490.082143][T10013] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 09:43:59 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) 09:43:59 executing program 0: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000980)=ANY=[], 0xa) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) fchdir(r2) ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f0000000000)) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0x2, &(0x7f0000000100)={[{@quiet='quiet'}, {@part={'part', 0x3d, 0x7}}, {@file_umask={'file_umask', 0x3d, 0x8}}]}) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000040)=@ccm_128={{0x304}, "89dd17f6f4814d0e", "3f7022d1840306ae094e271a26cbb542", "a21f33df", "b3eacc83ec062934"}, 0x28) [ 490.852753][ T9717] usb 3-1: new high-speed USB device number 7 using dummy_hcd 09:43:59 executing program 2: r0 = openat$proc_capi20ncci(0xffffff9c, &(0x7f0000000640)='/proc/capi/capi20ncci\x00', 0x10002, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0x75) r2 = openat$proc_capi20ncci(0xffffff9c, &(0x7f0000000740)='/proc/capi/capi20ncci\x00', 0x20000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) ioctl$VIDIOC_G_FMT(0xffffffffffffffff, 0xc0cc5604, &(0x7f0000000980)={0x5, @sdr={0x20385655, 0x20}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000000840)={'syztnl2\x00', &(0x7f00000007c0)={'ip6gre0\x00', 0x0, 0x29, 0x1f, 0x1f, 0x7, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private0={0xfc, 0x0, [], 0x1}, 0x1, 0x10, 0x7, 0x4}}) sendmsg$BATADV_CMD_SET_HARDIF(r2, &(0x7f0000000940)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000880)={0x68, 0x0, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x6}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r6}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x10001}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xc000}]}, 0x68}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r1, 0xc0045006, &(0x7f00000003c0)=0x1) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872d2b01000000", @ANYRESHEX=r1, @ANYRESOCT, @ANYRES32, @ANYBLOB="534fce983e5c2d7673b4958005e750e907d4fdc7bf13d088ad203bd736a956945b0f66f933a31733392547e20febfc8d209cbf74cd6243bf2406fae4ddbe02d390fffad64b012deb14b92f020709e51b3e84a45b53c64c5aa753b3531c693655564c9a8ddb7d983a19eb11b0803dced96346ee580ea4a890f90a69b44067df0949c216f3b291122bcd89a0777619426cacf7375a"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) openat$ttyprintk(0xffffff9c, &(0x7f0000000280)='/dev/ttyprintk\x00', 0x10041, 0x0) r7 = socket(0x10, 0x80002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={0xffffffffffffffff, 0xd, 0x0, 0x0, &(0x7f0000000400)=[0x0, 0x0], 0x2}, 0x20) r8 = openat$binder_debug(0xffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000600)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=@deltaction={0xd4, 0x31, 0x8, 0x70bd25, 0x25dfdbff, {}, [@TCA_ACT_TAB={0x78, 0x1, [{0xc, 0x2, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0xc, 0x1a, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xa37}}, {0xc, 0x1b, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7}}, {0x10, 0x16, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'police\x00'}}, {0x10, 0x16, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}, {0xc, 0x8, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7f}}, {0xc, 0x1b, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1ff}}, {0xc, 0x1a, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0xc, 0x3, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfffff048}}]}, @TCA_ACT_TAB={0x48, 0x1, [{0x10, 0x11, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'police\x00'}}, {0xc, 0x1b, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1f}}, {0x10, 0x18, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}, {0xc, 0x7, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x58b6}}, {0xc, 0x18, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9ef}}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x440c4}, 0x80) sendmsg$DEVLINK_CMD_PORT_GET(r8, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0xd0, 0x0, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}]}, 0xd0}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000004) sendmmsg$alg(r7, &(0x7f0000006080)=[{0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000680)="1f0e350fb33b1bafab22266f204f40d84c42ace8cfe264d9f0033bc47776d5a2a2cb6b1e0955be5cd75b5706fd3f3bfe8354f661926e4fd0c473d91a7f36b19f65dc12d50312c6fefdd709d78555e39a0871f936c322a4dc05783aa1692b37331865c054598034879d0bf2b3a81d50c56b8af1c16915c9c0bb5296bbbaf65e202101f7671f8e4c46097d39e2791f2fbd41f4faa2592b7f952805", 0x9a}], 0x1, &(0x7f0000000ac0)=[@iv={0x84, 0x117, 0x2, 0x73, "4e7912b6071ac2a77901ea2ee5f2c0b9d3b5fbace181c2622bda8144939bbca132a180cfb4a1b55827baa504a7b9ebabe6886e3f20f49eaff26e05a6968ccf658bbc6620400067b0f8646c4cd334b1eae2572ae61fffd3cafa3d110f98c95b3b2e101a06817ecbb2d853b8924ed05f3b94d3dd"}, @iv={0x1010, 0x117, 0x2, 0x1000, "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"}], 0x1094, 0x1}, {0x0, 0x0, &(0x7f0000001d80)=[{&(0x7f0000001b80)="164f105e19582ee2b9e0b1324b7b22627eb2206d0bd64221cf1f8b67915c8f3235ead03a402bb17240f105cafeb14da01b619de41e45557444e6ebe1d2db4f819acdb0199ece1ccae787162087ea638fdbec9fd9cd87529fae69185aef41f47a45e5fbe03d0fd57a736c373f3011a93dcffc925919d418f01aab4da38dc6ae073fb57ec77739e7a772b1da6e7668d1b74b4ecb6cd2cc233e35f5cc5a1699cbe53639eaf7a0028f3eb46c723c48340a6fd5864b35b5787127b94d", 0xba}, {&(0x7f0000001c40)="77dc3c97c6f91ed9ed11d61bc045afed02ae7082c560f081e954c5b304e93fafddfee6e2e5e4fd386debc07796a83c09aa79cd23a8a4c226bffaaa94f912143283cb8b757bc49f0fe356acbc7a556bae201ce5ab26decb5198d6d81fdd139de7ca07c825c1a284293def799bc317c362a787195dbc4719edcdc4987f6963733090188fd950d32ed73e986b282416641172aa107af11e15d92b0244020d41fd8bbf8b53c4420fa42b21d8fd71cbcc07174902bb0d2d574ff627341577", 0xbc}, {&(0x7f0000001d00)="85c93165af423060f2fc0bb913a37db1d2072594f62ff5a60a9e303c6d76ddce8551307dd6e1b1999c01192022f5ee98bb95a13e15ab3ed458af44a3cd1904775d3e38e88d41392e846876191bad1be6c0ecea5e6ac806b61ac0032b9386f9f2f4ab27f681bc2d", 0x67}], 0x3, &(0x7f0000001dc0)=[@assoc={0x10, 0x117, 0x4, 0x82}, @assoc={0x10, 0x117, 0x4, 0x2}, @op={0x10, 0x117, 0x3, 0x1}, @assoc={0x10, 0x117, 0x4, 0x8}, @assoc={0x10, 0x117, 0x4, 0x1}], 0x50, 0x40824}, {0x0, 0x0, &(0x7f00000020c0)=[{&(0x7f0000001e40)="49435a68a54481e4df02290d7ea8fb347e3ca141a437260f3d0b33be45b1ebdc63a606fcca8a055d7b42a03316b998e731fe33ee0f95d2e412d5fbe8eb15ab4759b76fd59418b1312cc15f8a50386d070ebc25b33f8c78ad210a06e4af1a7b6e42a71cfd325d64a67b37a6dd67987aa89974077d8c6119d3694dc64c274ea548714fa0ff844f8c2289c061a6489475276818c4839664b8e9e10b6976ba7f21efa0c78a3b4fdddaaf0fe724118b7ce32e29b71004583589067b08e420", 0xbc}, {&(0x7f0000001f00)="9d5891", 0x3}, {&(0x7f0000001f40)="a8ac6ff42914e9907df0026776dc6ef5705ac56372444c28ff69de177651bc5a4a5a032b688488fbe7d14f09c728b143aa9e46432a19c21ca9bb7949e096bb7da0625a42e76419bc924ec29365049f17", 0x50}, {&(0x7f0000001fc0)="5462c88afdff9250f932418a80541424f61ff118bb7e1ed79cdb3cae39d3347f2b9fea45f53d799392c5f8450341189e", 0x30}, {&(0x7f0000002000)="c088fbf801f41531c4414239cd16d8e73e55a1d144e02d9a39502757807547cba969d9576ae7de6a34c09505ebbfd9f3eef654653e4019dd6bf0bcf23163439e9a7afe8d3eb39a73b66395c1373203b2", 0x50}, {&(0x7f0000002080)="c0776b6a2506812123443ca54e781be5a0f9ec129356426726dc6b1c147c6082a3", 0x21}], 0x6, 0x0, 0x0, 0x80}, {0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002100)="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", 0x1000}, {&(0x7f0000003100)="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", 0x1000}, {&(0x7f0000004100)="2b32f5388c77ee7df183278d875e154aa9d0507a79dba6e4f850b1c197f45ee192c95858ee160f2084818e3688e8dee05daf9db41ef6c79475e3dce386fd6c14d16cc6404bbfd93e7d25e92fd2c31b98", 0x50}, {&(0x7f0000004180)="d5e6c688313e69dd151e5038b0f035af33b219f6424477e8872aab92605db04b1bde73a9e08db9228f757baf40ae22502cac2f0139b86be3fe0d353dddaff88999920c69af4d4305d836b1b0ae231094c29e5c765978d212cbf026abd7fac97a262f31a646fe8bcb0454dbf1938599d1a400c00a6edc701b3a140b85c87632a4a16f866491df814c05d0fb2f5e17cf", 0x8f}, {&(0x7f0000004240)="1ae1f7137d5b2c60bf3bdf00a63a41cb82a53b8821169554ebe9e9a3d9cd0983af4dff3264e49a1659b72e6707c3e41f95ba31b352e0a3234f05e85125d7109a95bb4e7ccfa048ebb8204c184f44e43f70287aa6ecf5266d007c390a2a6605b1ce25af08637f685311ae9a477dbf216a3b6b4940b4f99155bfda0c14b0c27f5be9228bcce8cf3452f2d886bf0ba86075b5d3da975a18ace83641b23448caa52b2a0ffba12249bbcdbb67d317131d62875e16a8e117c8", 0xb6}, {&(0x7f0000004300)="594a4cdb9d174621d48fcc5f39b3df243f9937c521d8e634c9cce381bd19dca07a64d994b7d104767810dcf1f233598edac7d47b6c33b867df2dce814ea659d5b79010b90ca0f03b715b48de546b410e6252951bbca452412731f808643c7469a653bbf00cf7293066022e08", 0x6c}], 0x6, &(0x7f00000043c0)=[@iv={0x3c, 0x117, 0x2, 0x2b, "ddbc306752ac7e381a9a6527ae5806b30e64b92594c8b31f351a2bf703b1ef56322729bc72f10a5c1786d5"}, @op={0x10}, @iv={0x1010, 0x117, 0x2, 0x1000, "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"}], 0x105c, 0x44090}, {0x0, 0x0, &(0x7f00000058c0)=[{&(0x7f0000005440)="cddbdc6643f3005d72839ac38e5e0f0b6083a29b18bfd7db913ffbd3c2019ef4a6b423456239c54b892a91f7662bc866f42672f654c62367b6f2e779d35489287c386b3804468ba3e5fe229b9b2defaa8cb171460cff5601935a22e1b81c7fecb5050ac1f868f3078d45996e227c944c078b0dffa9db6b86e4a3dfced906ca0f5b69c32893d4862f", 0x88}, {&(0x7f0000005500)="35ab488b3a16428a54c4b90332042441c2", 0x11}, {&(0x7f0000005540)="8b4dcaea3f4ca4793c5913d29f58105391fb67f4de743d513f151cef527c6ba6e6614ca0a9fbd6f7de1ec0b1faf7b31f5f59d8e409b9a6500a55f965e588e8d1d46029b53fdc175cb08e82e2abadbcd5cb462d11ba65611aac226337064219b4351061e0eb64d7a00a5212d65c7d1871244e79683e5b93311e0b768b3edbd8bcc3ae84be5710dac5d2fd5d49d9d278ca041f3afe32a6e890a8b6acb990a996417a4051725a218a2e490d992b58e97375aa50a18854deba9a8e8f8f90ac981187e674b8f79cf3b395a05435b1f741837349c3d289fca9a854262db874ddde1a2d7723fc61cbd1267835a2726c6238d20f39fd", 0xf2}, {&(0x7f0000005640)="e7c836a5dacec41a1aa7e7df0710d971a62eb9ba0bfa4db375c07353af1063cc408f59e0d838356412b5872bc75b9d4a915f0e1cd014c58aa5efe003856b94271d4e83634ed983b95d2fe0a50aa8e7063728219465c62179702cacd8f988f250d9db4dbd67838daeda9638afdba78b2ed523ef086023a29f779698f30db1a61ea61a2ad29ca20c1f3f3b6d87e147b718dbb0fe44cd30b5e3c517960e4a9839a585e9cda7dd133a2fd2e3a2242f92dee60111634a6d344751e9b3051896c67343e9989761", 0xc4}, {&(0x7f0000005740)="9d0997fb42862c08cc47de170c1129521e0aa81de86a17540f5ccb8e27df500973f9df7819fde717ec366ef4dd50bfb0db08a780229d95f3b691f58e2f2789eb3fb7c1fa8b7169049a0a736b1ca3fd6a60480a5173917856e671fc2f4d152ddc06cff5ac2858bad15b34", 0x6a}, {&(0x7f00000057c0)="2671a657e0a6028fb7d55a4725fce6f2c0b0e39e906fff3c6c499327fba47d4c7f600e2e02e969f6e894fcabc03a5b25b8a788ed1363b7f9a2e4c83ff45217a6d13922e5bf2d283416d085ff6b276204254f761f0b1e7cf93fae5ba2f59ef948924e9d04d25e9bc75fc65070be2cbb543e33153ecb96ecf637ffd716bde19a5b29c0bee8eba7afe851414c44471cbd85aea43a896b9de8157a76b1d81a89a3ea73a588e8b57abc4abcee6b646079fd22839d682df7c66ccb6d286e64ea219d8c842929dbecc4e49854fc1abed5c717aa890a4f59714a21c17410f01441bf3f9bc853e1d5b22d6c", 0xe7}], 0x6, 0x0, 0x0, 0x801}, {0x0, 0x0, &(0x7f0000005c80)=[{&(0x7f0000005900)="c6251d89433e70fae2b77a04885ac4a09a4e85720e1d268b18a02c6e9e3188652c131c709fa9fc08020d7bef3149581b447b29d5e9c87106c205a2d97af5661f065afeae86b6670a05b009ce4e33efdf069d349b4659ef90b31a165f79443319eada1b0eeb210165d3d578f0780248221607fb34b204a56f47cd8798dfc1201b60ac", 0x82}, {&(0x7f00000059c0)="6ee57f2a4fb0f10a9e01deb66f997f24578a8fdc70226736241da95144b2200391f5c6209558f3445c3f8d80c4c72323029e91730647145fbecb5339812d458ed4b663a7cef44eb7c87b9fbf58fbbf8ee8142a33e21ccf381185dfd15b380c7662b787e853daadd9210ec633f0eb6dae6ff27735c605c26b", 0x78}, {&(0x7f0000005a40)="fd52b3ab8fb85bdd80987115282e7cd48c3a1efd025c3c5812ceede9f966ab835075572df3", 0x25}, {&(0x7f0000005a80)="7ece3122fccd5912506bcbdd6b2b1b650c9c18ee5b4dec5585a4c334275d5ae95da8779f09c80a93fc0c2af35aaf0e21db61e53e65355961865e7edb9ed510c5ebfa4013456c04e4fc886b8b0d278e4af9fbd11d6dc581a8314409e49ea8ec396cf38dc2f3047ac8a44dc0ea237110ca4869440308b06f3b009c2ec7a7596d5a15dcdb49ca3b4a6d1f704fd09cfcd1a421c28af7ec8def8d2a849626beea6164e2e4c473cfb4fcfe68784cc331840cb63bbd8bd5e812f23c5ea744", 0xbb}, {&(0x7f0000005b40)="395577772a388cbdc029195bc6d6f58bdc2e39c06e6450c395b34f1ba6662af82ce1e399277ebf8e36b18d2b497a175a25844ce58293b3b4b2a5fe6726e3e19ab13872d1a3b401a3efb6d2a9e7a14fb4a5cbac9310f1619796acf4261ef84ab6591523f0f1bef056f820fe88169326ee89e3fea7427e", 0x76}, {&(0x7f0000005bc0)="d1b819966d31cba9f0d956666d9829d5f3b00cd08df9c46129651769df44ced130f719f90a340a2f905874eb0266c6e1c5245b1af3ad0fafae3f0fcd08b85a248022a2fb46a08a7c157a51", 0x4b}, {&(0x7f0000005c40)="f89076d93538752197e920752c3b558efd5434473b7f3bf29e62a5799ab203f935af059525b9492a6359a9326a7ca334f0cf5cabefe4", 0x36}], 0x7, &(0x7f0000005cc0)=ANY=[@ANYBLOB="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"], 0x1a4, 0x40800}, {0x0, 0x0, &(0x7f0000005e80), 0x0, &(0x7f0000005ec0)=[@iv={0xfffffffffffffcba, 0x117, 0x2, 0x2e, "9986b09c1cd8e2abe9e035764e8deb91ada924ade44345bdc5941e112803a772eba7b50922bc2b4cff710618effe"}, @op={0x10, 0x117, 0x3, 0x1}, @iv={0x44, 0x117, 0x2, 0x32, "baf8337ba6958e627b4103c3fa7fcf51a8897864802c7408899bfc434ad548bbba411a9065932d1e2f539d487319ef7f7ab5"}, @op={0x10, 0x117, 0x3, 0x1}, @iv={0xd8, 0x117, 0x2, 0xc7, "21a0a085aeddcd28c79d830a23a5e50a9aac5bc2ec8496835094c3d96ab6bdfb97931142d08c4d1ee6aa3f023c6491b766a0c5dcd569c8e5cacc2fdb17a6b27a91b2585c9ed8dc26b0d759ff277d4fdf66ab88ca482ef771a7f1dc5fc101f88eb729de080e725282d5efb4b3a1545867610d735fd7014fd36e0a963339cd44b0ba61918ae639758a063df717a940ab988e321c11d63ba725d800971e6898a24a963bddfa080240ab22febf9cc4230cae864f35053bd789e4fccc18e8c392947a1abe3e59592338"}, @assoc={0x10, 0x117, 0x4, 0x2}, @op={0x10, 0x117, 0x3, 0x1}], 0x19c, 0x8101}], 0x7, 0x4) [ 491.501947][ T9717] usb 3-1: Using ep0 maxpacket: 16 [ 491.561957][ T9717] usb 3-1: device descriptor read/all, error -71 [ 491.562892][T10032] hfs: can't find a HFS filesystem on dev loop0 09:44:00 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) 09:44:00 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000001580)={&(0x7f0000000240)=@newlink={0x38, 0x10, 0x80b, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x10, 0x1a, 0x0, 0x1, [@AF_INET6={0xc, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5}]}]}, @IFLA_GROUP={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x20040000}, 0x0) 09:44:00 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000014c0)=[{&(0x7f0000000100)=""/236, 0xec}], 0x1, 0x2f, 0x0) 09:44:00 executing program 3: r0 = openat$mice(0xffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x290880) ioctl$DRM_IOCTL_MODE_GETFB(r0, 0xc01c64ad, &(0x7f0000000040)={0xffff2202, 0x9, 0xaa, 0x5, 0x2, 0x73, 0x2}) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x3, 0x501000) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000000c0)={0x0, 0x7}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000140)={r2, 0x0, 0xa, [0x8001, 0x4, 0x3, 0xfffc, 0x7ff, 0x7f, 0x7b, 0x72, 0xfff7, 0x5]}, 0x1c) ioctl$vim2m_VIDIOC_QUERYBUF(r1, 0xc04c5609, &(0x7f0000000200)={0xfff, 0x1, 0x4, 0x8, 0x6, {0x77359400}, {0x4, 0x2, 0x4, 0x40, 0x40, 0x5, "2efe79c8"}, 0x8, 0x1, @fd=0xffffffffffffffff, 0xfea6, 0x0, r0}) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x8008, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@access_user='access=user'}], [{@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/vcs#\x00'}}, {@subj_user={'subj_user', 0x3d, '/dev/input/mice\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '\')/'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/input/mice\x00'}}, {@uid_lt={'uid<', 0xee01}}, {@context={'context', 0x3d, 'system_u'}}, {@euid_lt={'euid<'}}]}}) r4 = open(&(0x7f00000003c0)='./file0\x00', 0x600400, 0xd0) ioctl$IMHOLD_L1(r4, 0x80044948, &(0x7f0000000400)=0x5) ioctl$PPPIOCGFLAGS1(r4, 0x8004745a, &(0x7f0000000440)) fcntl$setlease(r0, 0x400, 0x2) socket$bt_bnep(0x1f, 0x3, 0x4) r5 = open_tree(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x1000) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r5, 0x80083313, &(0x7f00000004c0)) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000500)={r5}, 0x8) read$alg(r6, &(0x7f0000000540), 0x0) read$fb(r6, &(0x7f0000000580)=""/222, 0xde) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f0000000740)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x1c, 0x0, 0x2, 0x70bd28, 0x25dfdbfb, {}, [@ETHTOOL_A_COALESCE_TX_USECS_IRQ={0x8, 0x8, 0x8f6f}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040040}, 0x20040800) setsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, &(0x7f00000007c0)=0x6, 0x4) 09:44:01 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) 09:44:01 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x123c041, &(0x7f0000000380)=ANY=[]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x114, &(0x7f0000000140)=0x2, 0x0, 0x4) unlink(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000180)='./file0\x00', 0x10) 09:44:01 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept4$unix(r1, &(0x7f0000000040), &(0x7f00000000c0)=0x6e, 0x80000) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r2, 0xf502, 0x0) r3 = socket(0x1e, 0x4, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) 09:44:02 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:02 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x38, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xffff}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x38}, 0x1, 0x0, 0x0, 0x4010}, 0x4008000) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000000080)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)="9c88a8000000000000000000810008008100", 0x12}], 0x1}, 0x0) 09:44:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x1) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$VIDIOC_S_INPUT(0xffffffffffffffff, 0xc0045627, &(0x7f00000000c0)=0x8) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="1800000054000eed2e9100000000000007000000", @ANYRES32=r2], 0x18}}, 0x0) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) setsockopt$inet_udp_int(r3, 0x11, 0x1, &(0x7f0000000140)=0x4, 0x4) 09:44:02 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) [ 494.040615][T10069] batman_adv: batadv0: adding TT local entry 00:00:00:00:00:00 to non-existent VLAN 2048 [ 494.113928][T10071] batman_adv: batadv0: adding TT local entry 00:00:00:00:00:00 to non-existent VLAN 2048 09:44:02 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x1}, 0xe) shutdown(r0, 0x0) ioctl$MON_IOCQ_RING_SIZE(0xffffffffffffffff, 0x9205) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f00000000c0)=0xfffffffffffffdae) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0xd, &(0x7f0000000040)={r2}, 0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000040)={r2, 0x7}, 0x8) syz_usb_connect(0x0, 0x24, &(0x7f00000001c0)=ANY=[@ANYBLOB="120100000d38340ad50bc00ac4f501020301090212000100000000090b0000007f106e008928023f7fd6be03cb64d7f1a899e6620eae7197690d989bfc5e1a6a0a0fb3f1d4b0d64f73f7b665b9a835c139a37c01055186f6f7b2292a15974209b85dac78b967d616043e6460944be402f418567d648598433beebab30f0bc8ad3cac3ea14b9267bd5f1e5184190180e83671a4f67736794fa624924711c0626cbeb7cb8d4777cf6373a525c9134dc0cb712a3ce00e609ad2666366"], 0x0) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f00000002c0)='4', 0xba, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r3, r4}, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={'cbcmac(serpent)\x00'}}) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000080)={r3, 0xf8, 0x16}, &(0x7f0000000100)={'enc=', 'raw', ' hash=', {'tgr160\x00'}}, &(0x7f0000000300)="219b2b20c1578aa1d6200816a6fa58b920dfede09bf4cf4539b0430eb926de09bd9060ac9e13dce2b6e1e59532d35667b06813c28de9a9e45868b11e88443fc5ab8a4ead10a6b38d01f51c5c9d5d094e752242704e4635197b781bea868a8e3838d3af51590d5f1d9c1ce8a348f86c7711ec3d625e5166a23bd900427e2c9aaf01afc2b7bfae95b4456ec89ae04080f75a20f5d291702ae70e51a6842b4e561f6c8ed951056b1b24637111bc588bb22de48ecb9efda4210f58597ea4508639833af84cd8887cb01fdb2d037c7b4b667ff2ac3428304fe8344901c687ccf6bad521dee94b50f9a6f71c5a909db25be3bdc68ca937a81e9caf", &(0x7f0000000280)="f3a047db85c90a8fe3f1c297dd0bfab439388042dfdf") 09:44:02 executing program 0: r0 = socket(0x11, 0x5, 0x1) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f0000000000)) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000300)=@ipv4_newroute={0x28, 0x18, 0x35f32a6dfa748ddd, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x2}, [@RTA_MULTIPATH={0xc}]}, 0x28}}, 0x0) 09:44:02 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:03 executing program 0: r0 = memfd_create(&(0x7f0000000380)='+\x8b\x8a\xa9\x16\x11\xd0\x95\xab\x10\xe3\xe6\xadx\x06$JG\x1b\x9bO\xdd\xdfk(F6y\x99\xdf\xfd*>oJ\x02u\x9b\x94a\xace\xb5X\xbfX@\x1a\x8cI\x9f\xfec\x83\xd8\x98\xbc\xd4t\x0ey\x16;S&7I\x10\xd3F\b\x8dT\x9c\xde(d\x19\x00\xc1L\x11\x85#\xff4\b\x158QB\fY\xdc\x86\xcd$o\xf6\x00\x00\x00\x00\x00\x00\xd8\x1b\xcf\x05\xc5\xd8\x0e-\x88\xb7\x14.fu\x9f\xd5uo\xee\x81\xafMI\xfe\x8f\xdaT\xa8M\x89)5\xa4\x18bR%TG\xdb\x12pevQ\x02\xd0\xca\xf2\xdbL\x82\xfa\xa5\xc5\xac\xa8MP\x91\\maa^?\x97\x90|\x9c\x8cL\xaa\x88\xa6\'\xbc\xe0\x15\x89{\xd4\x9c/\xa6\xe4\xbc\x02\xba\xf2[I\v\n}\xc7\xc4\xea\xd1\xd8\xac_\xa9LE\xab\xab@\\\b\x19\xd3G5\xe0\xed[\x8d\xb3n\xe2\bS\xb5\xc1\xba\xe4]\x82[\xcdq\xbc\\?\x016\xde\x98\xcfr9\xc4\x8eT\x84JA\'\xa6\xb1\x05O\xf7\xdb\xc2.K\x84M\tWM\x88Owq\x14<\x19G0\x01E\x99}W\xc1\x850I\x88\x19\xee\xfb\xb1\xf7\x89\xcd\xd5\xa9\xf1-a\x1c(\x8dN\x06\xdd\xe9\x7f\xc4\xa3\xf2\x104\xd5w21N\x83\"\xf2\xea\x14_;\x1d\xc4\xc1*\xad\xa1<\x00\x00\x00\x00\x00\x00\x00\xb6\xc0\x03\x02C@\xc2\x8fl\x88\xe7Q\xe5\xcf\x9dR[W\xdc\x80>\x9e\"\x16\xf8\xc9N\xaf\x80\xd7\xd2`\xd6\xfa\x1e8\x93\xda\xda\xb4\xef\x18\xc4\xd5\xc6\xfd>[\xc9\xbf\x884\xf1r\xa7\x01\xddp\x89', 0x6) ioctl$FS_IOC_FSGETXATTR(r0, 0x40305829, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x4000004, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1400000010efa8c68d000000000000000000000a2000000002030100000000f787060000000000000900010001"], 0xcc}}, 0x0) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000b00)={0x20, 0x1, 0x3, 0x201, 0x0, 0x0, {}, [@NFQA_VERDICT_HDR={0xc}]}, 0x20}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1400000010efa8c68d000000000000000000000a2000000002030100000000f787060000000000000900010001"], 0xcc}}, 0x0) sendmsg$NFQNL_MSG_VERDICT(r2, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000b00)={0x20, 0x1, 0x3, 0x201, 0x0, 0x0, {}, [@NFQA_VERDICT_HDR={0xc}]}, 0x20}}, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8983, &(0x7f0000000180)={0x2, 'veth0_to_batadv\x00', {0x2}, 0x9ea}) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x80000001, 0x0) ioctl$TIOCMBIC(r3, 0x5417, &(0x7f0000000140)=0x5) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', 0x0, 0x0, 0x7, 0x2d, 0x10000, 0x4, @private2, @remote, 0x40, 0x7, 0x1, 0x101}}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'veth1\x00', r5}) [ 494.982552][ T8719] usb 3-1: new high-speed USB device number 9 using dummy_hcd [ 495.167062][T10064] IPVS: ftp: loaded support on port[0] = 21 [ 495.261498][ T8719] usb 3-1: device descriptor read/64, error 18 [ 495.672577][ T8719] usb 3-1: device descriptor read/64, error 18 [ 495.813808][T10064] chnl_net:caif_netlink_parms(): no params data found [ 495.943804][ T8719] usb 3-1: new high-speed USB device number 10 using dummy_hcd [ 496.085329][T10064] bridge0: port 1(bridge_slave_0) entered blocking state [ 496.093548][T10064] bridge0: port 1(bridge_slave_0) entered disabled state [ 496.103503][T10064] device bridge_slave_0 entered promiscuous mode [ 496.155254][T10064] bridge0: port 2(bridge_slave_1) entered blocking state [ 496.162747][T10064] bridge0: port 2(bridge_slave_1) entered disabled state [ 496.172740][T10064] device bridge_slave_1 entered promiscuous mode [ 496.223557][ T8719] usb 3-1: device descriptor read/64, error 18 [ 496.303601][T10064] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 496.344802][T10064] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 496.439232][T10064] team0: Port device team_slave_0 added [ 496.523321][T10064] team0: Port device team_slave_1 added [ 496.596656][T10064] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 496.604095][T10064] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 496.630539][T10064] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 496.650131][ T8719] usb 3-1: device descriptor read/64, error 18 [ 496.687603][T10064] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 496.695152][T10064] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 496.721622][T10064] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 496.779902][ T8719] usb usb3-port1: attempt power cycle [ 496.842642][T10064] device hsr_slave_0 entered promiscuous mode [ 496.883150][T10064] device hsr_slave_1 entered promiscuous mode [ 496.933308][T10064] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 496.941174][T10064] Cannot create hsr debugfs directory [ 497.105044][ T3228] Bluetooth: hci3: command 0x0409 tx timeout [ 497.561331][ T8719] usb 3-1: new high-speed USB device number 11 using dummy_hcd [ 497.861534][ T8719] usb 3-1: device descriptor read/8, error -71 [ 497.905225][T10064] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 498.026838][T10064] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 498.071629][ T8719] usb 3-1: device descriptor read/8, error -71 [ 498.113283][T10064] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 498.183660][T10064] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 498.860596][T10064] 8021q: adding VLAN 0 to HW filter on device bond0 [ 498.936796][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 498.946703][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 498.985446][T10064] 8021q: adding VLAN 0 to HW filter on device team0 [ 499.040851][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 499.050820][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 499.060312][ T9717] bridge0: port 1(bridge_slave_0) entered blocking state [ 499.068406][ T9717] bridge0: port 1(bridge_slave_0) entered forwarding state [ 499.164949][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 499.174379][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 499.184879][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 499.194876][ T9717] bridge0: port 2(bridge_slave_1) entered blocking state [ 499.202175][ T9717] bridge0: port 2(bridge_slave_1) entered forwarding state [ 499.211367][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 499.222436][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 499.319958][T10064] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 499.333444][T10064] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 499.359152][ T9717] Bluetooth: hci3: command 0x041b tx timeout [ 499.369012][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 499.380414][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 499.391130][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 499.401911][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 499.412210][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 499.421871][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 499.432453][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 499.442143][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 499.455277][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 499.465545][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 499.610848][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 499.618761][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 499.670540][T10064] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 499.766463][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 499.777324][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 499.875170][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 499.885390][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 499.922341][T10064] device veth0_vlan entered promiscuous mode [ 499.935651][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 499.945457][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 500.000119][T10064] device veth1_vlan entered promiscuous mode [ 500.186352][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 500.196738][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 500.228523][T10064] device veth0_macvtap entered promiscuous mode [ 500.258745][T10064] device veth1_macvtap entered promiscuous mode [ 500.327196][T10064] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 500.337788][T10064] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 500.347875][T10064] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 500.358478][T10064] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 500.373801][T10064] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 500.391379][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 500.401368][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 500.411327][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 500.421791][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 500.484309][T10064] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 500.505926][T10064] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 500.516088][T10064] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 500.526731][T10064] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 500.538299][T10064] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 500.548944][T10064] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 500.563640][T10064] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 500.572186][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 500.586346][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 09:44:09 executing program 3: r0 = syz_usb_connect(0x0, 0x24, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x7d, 0x92, 0x7f, 0x40, 0x1209, 0x2323, 0xc348, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x72, 0x45, 0x8a}}]}}]}}, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000980)=ANY=[], 0xa) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) ioctl$VIDIOC_S_DV_TIMINGS(r1, 0xc0845657, &(0x7f0000000000)={0x0, @reserved}) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000ac0)={0x44, &(0x7f0000000580)=ANY=[@ANYBLOB="00240400000018bdb52f"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 09:44:09 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x20000000000003, 0x300) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080844944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500801100000000000101013c5811039e157716f3f6db1c0001001305c3bd000049740400000000000006ad8e64cc326d3a09ffc2c65400"}, 0xffffffffffffffb4) r2 = openat$proc_capi20ncci(0xffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x602, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) bind$packet(r2, &(0x7f0000000180)={0x11, 0x6, r5, 0x1, 0x20, 0x6, @remote}, 0x14) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000040)={r6, 0x1, 0x6, @local}, 0x2c) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x3c}}, 0x0) pipe(&(0x7f0000000280)) 09:44:09 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r3 = fcntl$dupfd(r0, 0x406, r1) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000040)=0x30) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000800)=@newqdisc={0x88, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {0x0, 0x3}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mqprio={{0xb, 0x1, 'mqprio\x00'}, {0x58}}]}, 0x88}}, 0x0) [ 501.428088][ T9717] Bluetooth: hci3: command 0x040f tx timeout 09:44:10 executing program 2: r0 = gettid() rt_sigqueueinfo(r0, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x0, 0x100000000, 0x0, 0x0, 0x1}, r0, 0x3, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x900) r2 = openat$nvram(0xffffff9c, &(0x7f0000000100)='/dev/nvram\x00', 0x0, 0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000140)={0xffffffffffffffff, 0x5, 0x1ff}) ioctl$RTC_EPOCH_READ(r1, 0xc0287c02, &(0x7f0000000040)) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1400000010efa8c68d000000000000000000000a2000000002030100000000f787060000000000000900010001"], 0xcc}}, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000b00)={0x20, 0x1, 0x3, 0x201, 0x0, 0x0, {}, [@NFQA_VERDICT_HDR={0xc}]}, 0x20}}, 0x0) r4 = openat2(r2, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)={0xa0483, 0x2e0556fbbb6847c8, 0x7}, 0x18) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000480)={0x0, 0xc, 0x7, 0x5, 0x7ff, 0xfff7, 0x0, 0x0, {0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x9, 0x0, 0x8, 0x20, 0x1}}, &(0x7f0000000200)=0xb0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000380)={r5, 0xa2, 0xdf, 0x800, 0x4, 0x7}, &(0x7f00000003c0)=0x14) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1400000010efa8c68d000000000000000000000a2000000002030100000000f787060000000000000900010001"], 0xcc}}, 0x0) sendmsg$NFQNL_MSG_VERDICT(r6, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000b00)={0x20, 0x1, 0x3, 0x201, 0x0, 0x0, {}, [@NFQA_VERDICT_HDR={0xc}]}, 0x20}}, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="b3a223448ab664baeeb99135a2935b9484a11efc61cd7490fa05fdd81c9a2b54242c28a3c304d31a89c5", @ANYRES32=r0, @ANYRESDEC, @ANYRESOCT, @ANYRES64=r3, @ANYRESHEX=r6], 0x19) [ 502.042408][ T3692] usb 4-1: new high-speed USB device number 2 using dummy_hcd 09:44:10 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:10 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:10 executing program 2: bpf$BPF_LSM_PROG_LOAD(0x5, &(0x7f00000002c0)={0x13, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x5, 0x0, 0xb}]}, &(0x7f0000000540)='GPL\x00', 0x6, 0xf1, &(0x7f0000000340)=""/241, 0x0, 0xa, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) pipe(&(0x7f0000000040)) [ 502.432599][ T3692] usb 4-1: New USB device found, idVendor=1209, idProduct=2323, bcdDevice=c3.48 [ 502.442500][ T3692] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 502.531607][ T3692] usb 4-1: config 0 descriptor?? 09:44:11 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) [ 503.284238][ T3692] gs_usb 4-1:0.0: Configuring for 48 interfaces [ 503.292281][ T3692] gs_usb 4-1:0.0: Driver cannot handle more that 2 CAN interfaces [ 503.300441][ T3692] gs_usb: probe of 4-1:0.0 failed with error -22 09:44:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1400000010efa8c68d000000000000000000000a2000000002030100000000f787060000000000000900010001"], 0xcc}}, 0x0) sendmsg$NFQNL_MSG_VERDICT(r0, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000b00)={0x20, 0x1, 0x3, 0x201, 0x0, 0x0, {}, [@NFQA_VERDICT_HDR={0xc}]}, 0x20}}, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x6c, 0x0, 0xb, 0x101, 0x0, 0x0, {0x1, 0x0, 0x7}, [@NFTA_COMPAT_TYPE={0x8}, @NFTA_COMPAT_NAME={0xc, 0x1, 'ipvlan0\x00'}, @NFTA_COMPAT_NAME={0x5, 0x1, '\x00'}, @NFTA_COMPAT_NAME={0xe, 0x1, 'ip6gretap\x00'}, @NFTA_COMPAT_TYPE={0x8}, @NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_COMPAT_NAME={0x8, 0x1, '$[,\x00'}, @NFTA_COMPAT_NAME={0xc, 0x1, 'ipvlan0\x00'}, @NFTA_COMPAT_REV={0x8}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000810}, 0x20000804) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x34, 0x12, 0x0, 0x1, @ip6gretap={{0xe, 0x1, 'ip6gretap\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_GRE_OKEY={0x8}, @IFLA_GRE_LOCAL={0x14, 0x6, @mcast1}]}}}]}, 0x54}}, 0x0) r2 = accept4$phonet_pipe(r1, &(0x7f0000000040), &(0x7f0000000080)=0x10, 0xc0000) ioctl$sock_SIOCADDDLCI(r2, 0x8980, &(0x7f0000000140)={'ipvlan0\x00'}) 09:44:12 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) [ 503.681879][ T9717] Bluetooth: hci3: command 0x0419 tx timeout [ 503.689604][ T3228] usb 4-1: USB disconnect, device number 2 [ 503.819476][T10367] nft_compat: unsupported protocol 1 09:44:12 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) [ 503.884747][T10367] nft_compat: unsupported protocol 1 [ 504.271493][ T3228] usb 4-1: new high-speed USB device number 3 using dummy_hcd [ 504.655880][ T3228] usb 4-1: New USB device found, idVendor=1209, idProduct=2323, bcdDevice=c3.48 [ 504.665170][ T3228] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 504.810861][ T3228] usb 4-1: config 0 descriptor?? 09:44:13 executing program 3: r0 = syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000020000082505a1a440000102030109025c0002010000000904000000020d0000052406000105240000000d240f0100000000000000000006241a0000000905810308000000000904010000020d00000904010102020d0000090582020002000000090503020002"], 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000980)=ANY=[], 0xa) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000980)=ANY=[], 0xa) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="ba2000ed0f300f01c2f30f09650f72d0e926f30f08baf80c66b85a49b58766efbafc0cb008eee300b81d008ec0f390", 0x2f}], 0x1, 0x0, &(0x7f0000000100), 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f0000000380)={0x44, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x20, 0x80, 0x1c}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) 09:44:13 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\xb3\'\tG|\x00\x00\xff\x01\x00\x00\x00\x00#\x00\x00\x00\x00\x00\x00\xc6', 0x0) pwritev(r1, &(0x7f0000001e00)=[{&(0x7f0000000600)='0', 0x1}], 0x1, 0xfff, 0x0) openat$vsock(0xffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x400, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {0x17e}, 0x0, {}, 0x0, 0x1, 0x1c, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d79c301007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "5244534b0f000800574556820000a482ebf7888c305bee6fd600", [0x0, 0x5]}) 09:44:13 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) 09:44:13 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) [ 505.165074][ T3228] gs_usb 4-1:0.0: Couldn't send data format (err=-71) [ 505.172980][ T3228] gs_usb: probe of 4-1:0.0 failed with error -71 [ 505.241689][ T3228] usb 4-1: USB disconnect, device number 3 [ 505.812742][T10392] Dev loop0: unable to read partition block 188829292 [ 505.819900][T10392] loop0: RDSK (-336099328) unable to read partition table [ 505.827630][T10392] loop0: partition table beyond EOD, truncated [ 505.834168][T10392] loop_reread_partitions: partition scan of loop0 (°Jƒpf”§QTÆ)÷[q©Z;(’qÆ­²-MyÃ) failed (rc=-5) [ 505.898146][ T4881] Dev loop0: unable to read partition block 188829292 [ 505.906177][ T4881] loop0: RDSK (-336099328) unable to read partition table [ 505.913786][ T4881] loop0: partition table beyond EOD, truncated 09:44:14 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) [ 506.044422][T10391] Dev loop0: unable to read partition block 188829292 [ 506.051768][T10391] loop0: RDSK (-336099328) unable to read partition table [ 506.059181][T10391] loop0: partition table beyond EOD, truncated [ 506.065666][T10391] loop_reread_partitions: partition scan of loop0 (°Jƒpf”§QTÆ)÷[q©Z;(’qÆ­²-MyÃ) failed (rc=-5) 09:44:14 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) [ 506.302139][ T3228] usb 4-1: new high-speed USB device number 4 using dummy_hcd 09:44:14 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:15 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) [ 507.032797][ T3228] usb 4-1: Using ep0 maxpacket: 8 09:44:15 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) [ 507.173341][ T3228] usb 4-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 09:44:16 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) [ 507.924693][ T3228] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 507.934016][ T3228] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 507.942866][ T3228] usb 4-1: Product: syz [ 507.947185][ T3228] usb 4-1: Manufacturer: syz [ 507.951990][ T3228] usb 4-1: SerialNumber: syz 09:44:16 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:17 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) [ 509.555463][ T3228] cdc_ncm 4-1:1.0: bind() failure [ 509.593923][ T3228] cdc_ncm: probe of 4-1:1.1 failed with error -71 [ 509.631926][ T3228] cdc_mbim: probe of 4-1:1.1 failed with error -71 [ 509.674785][ T3228] usbtest: probe of 4-1:1.1 failed with error -71 [ 509.707534][ T3228] usb 4-1: USB disconnect, device number 4 [ 510.332931][ T3692] usb 4-1: new high-speed USB device number 5 using dummy_hcd [ 510.572075][ T3692] usb 4-1: Using ep0 maxpacket: 8 [ 510.692609][ T3692] usb 4-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 09:44:19 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) 09:44:19 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:19 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:19 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) [ 510.901941][ T3692] usb 4-1: string descriptor 0 read error: -71 [ 510.908529][ T3692] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 510.918008][ T3692] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 511.097340][ T3692] usb 4-1: can't set config #1, error -71 [ 511.184147][ T3692] usb 4-1: USB disconnect, device number 5 09:44:20 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) 09:44:20 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:20 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:20 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="ec0000001000010800"/20, @ANYRES32=r3, @ANYBLOB="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"], 0xec}}, 0x0) 09:44:20 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) 09:44:21 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:21 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:21 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:21 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) 09:44:22 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:22 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:22 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:22 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:23 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:23 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:23 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:23 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:24 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:24 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:24 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) 09:44:24 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:24 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:24 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) 09:44:24 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:25 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:25 executing program 4: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @remote}, @in6={0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xfff}, @in6={0xa, 0x4e23, 0x10000, @private0, 0x4}, @in6={0xa, 0x4e20, 0x6, @empty, 0x2}, @in6={0xa, 0x4e24, 0x1, @private2={0xfc, 0x2, [], 0x1}, 0x8001}, @in6={0xa, 0x4e21, 0x8, @ipv4={[], [], @private=0xa010100}, 0x1}, @in={0x2, 0x4e24, @local}, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e24, @private=0xa010102}, @in6={0xa, 0x4e20, 0x81, @loopback, 0x3}], 0xe8) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000100)=""/161, &(0x7f00000001c0)=0xa1) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000200)={0x7, 'tunl0\x00', {0x200020}, 0x20}) r0 = openat$nvram(0xffffff9c, &(0x7f0000000240)='/dev/nvram\x00', 0x200800, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000280)={0x0, 0xff, 0x1, [0x80]}, &(0x7f00000002c0)=0xa) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000300)={r1, 0x1}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000380)=@assoc_id=r2, 0x4) ioctl$KVM_CHECK_EXTENSION_VM(r0, 0xae03, 0x0) shutdown(r0, 0x0) connect$llc(r0, &(0x7f00000003c0)={0x1a, 0x305, 0x0, 0x1f, 0x51, 0x8, @remote}, 0x10) ioctl$DRM_IOCTL_INFO_BUFS(r0, 0xc0086418, &(0x7f0000000400)={0x3, 0x4, 0xdef, 0x9, 0x1, 0x5}) r3 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x22a000, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x4010, r3, 0x10000000) r4 = open(&(0x7f0000000480)='./file0\x00', 0x8000, 0x119) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x7fffffff) ioctl$KVM_GET_MSRS(r3, 0xc008ae88, &(0x7f00000004c0)={0x2, 0x0, [{}, {}]}) ioctl$KVM_GET_NESTED_STATE(r4, 0xc080aebe, &(0x7f0000000500)={{0x0, 0x0, 0x80}}) openat$hwrng(0xffffff9c, &(0x7f0000002580)='/dev/hwrng\x00', 0x381100, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000002600)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r4, &(0x7f00000026c0)={&(0x7f00000025c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000002680)={&(0x7f0000002640)={0x28, r5, 0x200, 0x70bd25, 0x25dfdbfd, {{}, {}, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x60000040}, 0x20008085) 09:44:25 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) 09:44:25 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:26 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:26 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:26 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:27 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:27 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:27 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:27 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:28 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:28 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) [ 520.520156][T10543] IPVS: ftp: loaded support on port[0] = 21 [ 521.316707][T10543] chnl_net:caif_netlink_parms(): no params data found [ 521.546473][T10543] bridge0: port 1(bridge_slave_0) entered blocking state [ 521.553968][T10543] bridge0: port 1(bridge_slave_0) entered disabled state [ 521.564002][T10543] device bridge_slave_0 entered promiscuous mode [ 521.625394][T10543] bridge0: port 2(bridge_slave_1) entered blocking state [ 521.632941][T10543] bridge0: port 2(bridge_slave_1) entered disabled state [ 521.643058][T10543] device bridge_slave_1 entered promiscuous mode [ 521.782121][T10543] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 521.824921][T10543] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 521.950888][T10543] team0: Port device team_slave_0 added [ 522.013450][T10543] team0: Port device team_slave_1 added [ 522.120695][T10543] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 522.127985][T10543] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 522.154871][T10543] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 522.180398][T10543] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 522.188890][T10543] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 522.215227][T10543] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 522.304630][T10543] device hsr_slave_0 entered promiscuous mode [ 522.315917][T10543] device hsr_slave_1 entered promiscuous mode [ 522.327622][T10543] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 522.335534][T10543] Cannot create hsr debugfs directory [ 522.401438][ T3228] Bluetooth: hci4: command 0x0409 tx timeout [ 523.006469][T10543] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 523.062228][T10543] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 523.103614][T10543] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 523.144058][T10543] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 523.933355][T10543] 8021q: adding VLAN 0 to HW filter on device bond0 [ 523.978187][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 523.987553][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 524.010870][T10543] 8021q: adding VLAN 0 to HW filter on device team0 [ 524.035680][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 524.049955][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 524.059578][ T3692] bridge0: port 1(bridge_slave_0) entered blocking state [ 524.066905][ T3692] bridge0: port 1(bridge_slave_0) entered forwarding state [ 524.112242][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 524.122121][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 524.132238][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 524.141955][ T3692] bridge0: port 2(bridge_slave_1) entered blocking state [ 524.149198][ T3692] bridge0: port 2(bridge_slave_1) entered forwarding state [ 524.158554][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 524.192041][ T8717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 524.225542][ T8717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 524.237151][ T8717] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 524.278902][ T8717] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 524.289321][ T8717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 524.300850][ T8717] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 524.367698][T10543] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 524.378919][T10543] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 524.409626][ T8717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 524.419710][ T8717] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 524.431130][ T8717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 524.440862][ T8717] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 524.465665][ T3228] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 524.475503][ T3228] Bluetooth: hci4: command 0x041b tx timeout [ 524.537057][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 524.545301][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 524.587615][T10543] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 524.828444][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 524.839029][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 524.935822][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 524.946381][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 524.968835][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 524.978736][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 525.014959][T10543] device veth0_vlan entered promiscuous mode [ 525.075700][T10543] device veth1_vlan entered promiscuous mode [ 525.198046][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 525.208377][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 525.218099][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 525.228166][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 525.272761][T10543] device veth0_macvtap entered promiscuous mode [ 525.287088][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 525.315128][T10543] device veth1_macvtap entered promiscuous mode [ 525.376785][T10543] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 525.387396][T10543] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 525.397532][T10543] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 525.408115][T10543] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 525.418274][T10543] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 525.428889][T10543] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 525.443706][T10543] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 525.457885][ T8717] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 525.468853][ T8717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 525.494137][T10543] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 525.505709][T10543] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 525.515770][T10543] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 525.526447][T10543] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 525.536676][T10543] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 525.547286][T10543] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 525.557321][T10543] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 525.567916][T10543] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 525.582621][T10543] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 525.595912][ T8717] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 525.606645][ T8717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 09:44:34 executing program 4: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:34 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:34 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:34 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:34 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:35 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:35 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) [ 527.191347][ T3228] Bluetooth: hci4: command 0x040f tx timeout 09:44:35 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:35 executing program 4: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc63e}, 0x4a404}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x22, 0x0, @thr={&(0x7f0000000380)="fe4764ee4d9df662e763c17af22dc59e51df3b1a84c82f7e7b7fc69363fc834c468c8bb5e5af466525ec5a2455252200ef9b021eda5e97ce72ac2f9399dacc821e38a2dcd2d2e32686039b6fc5ca0dc26bf61e6432a786e24185a2c8cefb63198ff0bcb4a003835047be110ef10c79e978dd8ce584999638ee4f9e2f025b8b06ac11435e4de22ceb6f0d4df1805ff2b467baf9fd90032a24aceedd497e2059bce49bf17be5ecbf4fed0ccb2fd8bb8585a8db9ffd4770d9ace8a3eb4395bb0bcd533a", &(0x7f0000000240)="e2c455924c44d56407db73ef975f7d753a620641743c1bad9be29e711904a45b7a7388cfe7bab4bff3c6c16a193daf7cade44bf52f35a1ce3fa9402951986bbcfe838b156c14ff75e703a29a404e8e415b6b30a42550712d9f78b3223c7f45f1ac7b100be4ec70d997c3fbadea0233d912a14d6ee4e60dd5686c8b828d93b6e591c241aeb11e5c713922df1209"}}, &(0x7f0000000040)) timer_getoverrun(0x0) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) keyctl$session_to_parent(0x12) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) getpid() openat$autofs(0xffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) io_uring_register$IORING_UNREGISTER_BUFFERS(r0, 0x1, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) openat$vsock(0xffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, r3, 0x0, 0x80000001, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r2, 0x8108551b, &(0x7f0000000680)={0x9, 0x0, "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"}) write$proc_mixer(r1, &(0x7f0000000480)=ANY=[@ANYBLOB='SYNTH \'Capture Volume\' 00000000000000000000\nIGAIN \'CD Capture\' 00000000000000000000\nVIDEO\nDIGITAL2\nPCM \'Mic Capture Switch\' 00000000010000000000\n'], 0x91) wait4(0x0, &(0x7f00000000c0), 0x40000009, &(0x7f0000000600)) 09:44:36 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:36 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) [ 528.027714][T10809] IPVS: ftp: loaded support on port[0] = 21 09:44:36 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:36 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0x64, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) [ 528.689795][T10811] IPVS: ftp: loaded support on port[0] = 21 09:44:37 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:37 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:37 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:38 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:38 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) [ 530.018844][ T9717] Bluetooth: hci4: command 0x0419 tx timeout [ 530.050286][ T8500] tipc: TX() has been purged, node left! 09:44:39 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:39 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0x64, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:41 executing program 4: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:41 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:41 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:41 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0x64, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:41 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:42 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0x96, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:42 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:42 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:42 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:43 executing program 4: syz_usb_connect(0x0, 0x36, &(0x7f0000000300)=ANY=[@ANYBLOB="1201000014da2108ab12a190eb09000000010902240001000000000904410002ff5d010009050f1f0100000000090583"], 0x0) r0 = syz_usb_connect(0x0, 0x36, &(0x7f0000000600)=ANY=[@ANYBLOB="1201000039542f108c07021047e6000000010902240001000000000904db00010a04c80009210300000000810009050a"], 0x0) syz_usb_control_io(r0, &(0x7f0000000300)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="000081"], 0x0, 0x0, 0x0, 0x0}, 0x0) syz_usb_control_io$cdc_ecm(r0, &(0x7f00000000c0)={0xc, &(0x7f0000000000)={0x40, 0x11, 0x75, {0x75, 0xf, "abd140e00abcda44d43b908b3f6cefedf3e894c8ac208d57175162c2dc2fbebf1a90ef8bf27ed2770a29fa033c3e7c532267cfeace0100111ad8da9f69cd3bbcdd38956f3db4402ffa53f284ee63f39b0cbc14aa9daf865b846e4188b89f8282b2284241ce30aef37ede7f20e010cbc7c49712"}}, &(0x7f0000000080)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f00000001c0)={0x10, &(0x7f0000000100)={0x20, 0x7, 0x21, "fc373cea7ab089ddd141cb261eb1601dd1e623a33a0f7073c4af55838a4989a531"}, &(0x7f0000000140)={0x0, 0xa, 0x1, 0x4}, &(0x7f0000000180)={0x0, 0x8, 0x1, 0x4}}) 09:44:43 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0x96, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:43 executing program 3: ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:43 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:44 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) [ 535.961377][ T9212] usb 5-1: new high-speed USB device number 2 using dummy_hcd [ 536.211620][ T9212] usb 5-1: Using ep0 maxpacket: 8 [ 536.332333][ T9212] usb 5-1: config 0 has an invalid interface number: 65 but max is 0 [ 536.340586][ T9212] usb 5-1: config 0 has no interface number 0 [ 536.347120][ T9212] usb 5-1: config 0 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 536.358308][ T9212] usb 5-1: config 0 interface 65 altsetting 0 endpoint 0x83 has invalid wMaxPacketSize 0 [ 536.368423][ T9212] usb 5-1: New USB device found, idVendor=12ab, idProduct=90a1, bcdDevice= 9.eb 09:44:44 executing program 3: ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) [ 536.377708][ T9212] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 09:44:45 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:45 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) [ 536.880286][ T9212] usb 5-1: config 0 descriptor?? [ 537.128815][T10897] udc-core: couldn't find an available UDC or it's busy [ 537.136308][T10897] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 537.293205][ T9212] usb 5-1: USB disconnect, device number 2 09:44:46 executing program 3: ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:46 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:46 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) [ 538.071753][ T3692] usb 5-1: new high-speed USB device number 3 using dummy_hcd [ 538.311422][ T3692] usb 5-1: Using ep0 maxpacket: 8 [ 538.432181][ T3692] usb 5-1: config 0 has an invalid interface number: 65 but max is 0 [ 538.440534][ T3692] usb 5-1: config 0 has no interface number 0 [ 538.447123][ T3692] usb 5-1: config 0 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 538.458271][ T3692] usb 5-1: config 0 interface 65 altsetting 0 endpoint 0x83 has invalid wMaxPacketSize 0 [ 538.468382][ T3692] usb 5-1: New USB device found, idVendor=12ab, idProduct=90a1, bcdDevice= 9.eb [ 538.477679][ T3692] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 09:44:47 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0x96, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:47 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:47 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:47 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) [ 539.075887][ T3692] usb 5-1: config 0 descriptor?? 09:44:47 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000004940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) ustat(0x3, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000004740)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000001f40)=[{&(0x7f0000000380)=""/237, 0xed}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000540)=""/96, 0x60}, {&(0x7f0000000480)=""/116, 0x74}, {&(0x7f0000000bc0)=""/79, 0x4f}, {&(0x7f0000000500)=""/25, 0x19}, {&(0x7f0000000c40)=""/236, 0xec}, {&(0x7f0000000d40)=""/226, 0xe2}, {&(0x7f0000000e40)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/207, 0xcf}], 0xa, &(0x7f0000001fc0)}, 0x800000}, {{&(0x7f0000002000)=@qipcrtr, 0x80, &(0x7f0000003480)=[{&(0x7f0000002080)=""/234, 0xea}, {&(0x7f0000002180)=""/172, 0xac}, {&(0x7f0000002240)=""/64, 0x40}, {&(0x7f0000002280)=""/192, 0xc0}, {&(0x7f0000002340)=""/99, 0x63}, {&(0x7f00000023c0)=""/4096, 0x1000}, {&(0x7f00000033c0)=""/163, 0xa3}], 0x7, &(0x7f00000034c0)=""/94, 0x5e}, 0x8001}, {{0x0, 0x0, &(0x7f0000003700)=[{&(0x7f0000003540)=""/149, 0x95}, {&(0x7f0000003600)=""/205, 0xcd}], 0x2, &(0x7f0000003740)=""/4096, 0x1000}, 0x2}], 0x3, 0x12000, &(0x7f00000047c0)={0x77359400}) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000004800)=0x8, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r3, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r3, &(0x7f0000000980)=ANY=[], 0xa) writev(r3, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) ioctl$HIDIOCGRAWNAME(r2, 0x80404804, &(0x7f0000000900)) ioctl$SNDCTL_SYNTH_INFO(r3, 0xc08c5102, &(0x7f00000007c0)={"a7e814395a6214025a277c4606ddfe36413601cf608f08fa7a06f871c8a9", 0x1000, 0x2, 0x1, 0x2, 0x0, 0x3deb, 0x4, 0x6, [0x4, 0x400, 0x0, 0x5, 0xba49ba8, 0x800, 0xcda, 0x6, 0xfffffffe, 0x61e, 0x7, 0x6, 0x5, 0x1, 0x9, 0x5, 0x40, 0x6, 0x3f]}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac141417ee", 0x0, 0x2f, 0x0, 0x0, 0xfffffffffffffe2a}, 0x28) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000004900)={&(0x7f0000001fc0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000048c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="440000003917", @ANYRES16=0x0, @ANYBLOB="000229bd7000fddbdf250300000006000a004e2100001400070000000000000000000000ffffac14142014000700fe8000000000000000000000000000bb"], 0x44}, 0x1, 0x0, 0x0, 0x1}, 0x40000815) r5 = syz_open_dev$vcsu(&(0x7f0000000740)='/dev/vcsu#\x00', 0x3, 0x490000) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={&(0x7f0000000180)="f70c0e0e582c97c1998a9c4e20853e0685c9bb289d5cf998c362e6393c86956dce6f680f753fc4d7c930fc03f23c95d201ec015761a3a35b8ad4f85348ba488a3de0b734dae46837def0e197961cba7468e11d0f4cd2ac6e911b42249fb4d725e98878fabb4e46", &(0x7f00000005c0)=""/205, &(0x7f00000006c0)="51d70e4f923ffe58c5503060d774c7586dfdd56082a93bae7e8a63695214136259a3fa5ce0741f3566b4a7e34fa5462b4f391ec013", &(0x7f0000000700)="8e8de27ba427", 0x9, r5}, 0x38) sendmsg$NFT_BATCH(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1400000010efa8c68d000000000000000000000a2000000002030100000000f787060000000000000900010001"], 0xcc}}, 0x0) sendmsg$NFQNL_MSG_VERDICT(r4, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000b00)={0x20, 0x1, 0x3, 0x201, 0x0, 0x0, {}, [@NFQA_VERDICT_HDR={0xc}]}, 0x20}}, 0x0) ioctl$FITHAW(r4, 0xc0045878) [ 539.183078][ T3692] usb 5-1: can't set config #0, error -71 [ 539.221980][ T3692] usb 5-1: USB disconnect, device number 3 09:44:48 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:48 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:48 executing program 4: bpf$BPF_LSM_PROG_LOAD(0x5, &(0x7f0000000180)={0x2, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@ldst={0x3, 0x0, 0x6, 0x0, 0x2}]}, &(0x7f0000000040)='GPL\x00', 0x4, 0xf1, &(0x7f0000000080)=""/241, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) r0 = openat$pfkey(0xffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x10b000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000340)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f0000000380)={r1, 0x1}) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wg0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'ip6gre0\x00', &(0x7f0000000240)={'ip6tnl0\x00', r2, 0x29, 0x40, 0xb7, 0x7, 0x2, @empty, @ipv4={[], [], @broadcast}, 0x10, 0x20, 0xb06, 0x1}}) 09:44:48 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xaf, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c205"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:48 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:49 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="7f454c46e1ac03153d455ab101886a0ee10b020000000000000000c4b40003003e000039a594249c1fd83d0000000000000000000000dfeb7bba00281293bd5d74dafc20380003a925c0fe6ce4eb20d96b7d8f03a0e429a88f28af65b93a913f2bd6b6d133b92449382fb7d63a8f3e480a57974958014609a2660f3646a0493db6208fa6010000000000000011df5b51fde769e9ace1963439e3cc6d3e80e8fcb2835659292c01000000040000000000000097897fe9e2570112fc88f4c679447d02194f9c7d0594d52f04909586de9f072f5ab941b1261ef79e39a587fe4038b4e8db877125e7fedaa50effdc254cf3b626103947f53d758167cbec744ba38444396a4bf37d312166f3a377335abc71e1f7b52ada18f53fb9d725c62693c7b79b3f518010ab246f0feb52ecf39d334f1a8d79932179718d64e0f7dab77b1f5913bbae64d5340c323b352147006fe7dc3d24b9d5502c074a316a8f30b060dd94fa5edd2f8a3b8f68f052f6c59e96624bab99722069f2e0d843369180d4f8012d6470996b05df3a5bba444ecdbce146637dc14a1e642ced555cd28ee6e7561c4ca2b2c3b5aae69d08563d43b8d6e2e4aa0c28975ebb21b88b001b771da07be1011e92b0be57aa81000000000000001bc351a141958bef4e8c43052e44f1ea303be20813f85a335976429d0d290d1ce273d97cc54885088b9ac9a76e25caff0c2a6200792a4867b77e463921f265258562b839ca04c49c8beceb3fe7d618510490cf8ff6883a2cb31bd70525e309222567b7ac9b298d5d2f4223dea9ae4f09f777b8d79c00ab7d46565900ba7474ca6021ebc2599a36ac133cc5bbe6c8fac9bd5f14e4f5d2f21cd310e5712f834762aa12a5f0f2e8e64ab196efd0422c725721575f4a69a942d8057d72440edee9d63b3b296d9d7fcd6213037dddb25a6ece7276a45127583f98864766bacad76a73bec59dcfdccf24fe61abf60a5108b6b874f28347ba"], 0x3c) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(0xffffffffffffffff) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000400)={0xa0, 0x19, 0x400, {0x0, {0x2, 0x1000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000001, 0x0, 0x0, 0x400, 0x1, 0x42c8, 0x0, 0x100000000, 0x1}}, 0xa0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x0, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r1}) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) get_robust_list(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_matches\x00') syz_emit_ethernet(0x4e, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3f, 0x62, 0x3f, 0x1f, 0x0, 0x8, 0x1c655, 0xa, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x9, 0xffffffffffffffff, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x1, 0x800a8, 0x7, 0x2, 0x9, 0x8}, r2, 0x3, r4, 0xe) 09:44:49 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xaf, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c205"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:50 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:50 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:50 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0x64, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:50 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xaf, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c205"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:51 executing program 4: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:51 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0x64, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:51 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:51 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:51 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xbc, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:52 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg$AUDIT_SIGNAL_INFO(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f2, 0x0, 0x70bd26}, 0x10}}, 0x0) io_setup(0x1, &(0x7f0000000300)=0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'\x00', 0x20000004003}) io_submit(r1, 0xa, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r2, &(0x7f0000000040), 0xff66}]) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) openat2(0xffffffffffffffff, 0x0, 0x0, 0x0) 09:44:53 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:53 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:53 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xbc, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) [ 545.025948][T11004] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 09:44:53 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:54 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xbc, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:54 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @dev}, 0x5, 0xfffffffc, 0x400000}}, 0x2e) r2 = fsmount(0xffffffffffffffff, 0x0, 0x81) r3 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r3, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @loopback}, 0x2, 0x4}}, 0x2e) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2) ioctl$PPPIOCGL2TPSTATS(r2, 0x80487436, &(0x7f0000000200)="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") 09:44:54 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0x64, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:54 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0x64, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:54 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0x64, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:55 executing program 4: openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKRRPART(r0, 0x125f, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006200)={0x2020}, 0xfffffc92) 09:44:55 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc2, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41a"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:55 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0x96, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:55 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0x64, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:56 executing program 4: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xbc, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:56 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc2, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41a"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:56 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0x64, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:56 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0x96, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:56 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0x64, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:57 executing program 4: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xbc, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:57 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc2, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41a"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:57 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0x96, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:57 executing program 4: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xbc, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:57 executing program 5: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0x96, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:57 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc5, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286c"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:57 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0x64, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:58 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc5, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286c"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:59 executing program 4: r0 = getpid() write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, {{0x0, 0x0, 0x0, r0}}}, 0x28) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="25bca2740a0000002734fa0095e0612687ecb86a548802a902000025020000000a0000000a000000250000000206e73ba8f4952bedc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='commit=0x000000,\x00']) 09:44:59 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0x96, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:59 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xaf, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c205"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:44:59 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0x96, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) [ 551.406244][T11082] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 551.415603][T11082] EXT4-fs (loop4): Invalid log block size: 620756994 09:44:59 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xaf, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c205"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:00 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0x96, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:00 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0x96, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:00 executing program 4: mknod(&(0x7f0000000040)='./file0\x00', 0x103e, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000280)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) creat(&(0x7f0000000240)='./file0\x00', 0x0) acct(&(0x7f00000000c0)='./file0\x00') timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, 0x0, 0x4004040) close(0xffffffffffffffff) unlink(&(0x7f0000000140)='./file0\x00') r1 = gettid() tkill(r1, 0x1000000000016) [ 552.744728][T11104] Process accounting resumed [ 552.912888][T11102] Process accounting resumed [ 553.105786][T11094] IPVS: ftp: loaded support on port[0] = 21 [ 553.514489][T11094] chnl_net:caif_netlink_parms(): no params data found [ 553.749578][T11094] bridge0: port 1(bridge_slave_0) entered blocking state [ 553.757081][T11094] bridge0: port 1(bridge_slave_0) entered disabled state [ 553.768249][T11094] device bridge_slave_0 entered promiscuous mode [ 553.790690][T11094] bridge0: port 2(bridge_slave_1) entered blocking state [ 553.799119][T11094] bridge0: port 2(bridge_slave_1) entered disabled state [ 553.809311][T11094] device bridge_slave_1 entered promiscuous mode [ 553.881989][T11094] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 553.904615][T11094] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 553.972958][T11094] team0: Port device team_slave_0 added [ 553.991730][T11094] team0: Port device team_slave_1 added [ 554.047606][T11094] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 554.054980][T11094] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 554.082520][T11094] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 554.228524][T11094] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 554.235763][T11094] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 554.261999][T11094] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 554.355466][T11094] device hsr_slave_0 entered promiscuous mode [ 554.366023][T11094] device hsr_slave_1 entered promiscuous mode [ 554.382937][T11094] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 554.390538][T11094] Cannot create hsr debugfs directory [ 554.792712][T11094] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 554.812424][T11094] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 554.834942][T11094] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 554.863256][T11094] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 554.943161][ T9212] Bluetooth: hci5: command 0x0409 tx timeout [ 555.377419][T11094] 8021q: adding VLAN 0 to HW filter on device bond0 [ 555.451420][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 555.460712][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 555.490480][T11094] 8021q: adding VLAN 0 to HW filter on device team0 [ 555.525212][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 555.536802][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 555.546470][ T3692] bridge0: port 1(bridge_slave_0) entered blocking state [ 555.553855][ T3692] bridge0: port 1(bridge_slave_0) entered forwarding state [ 555.628822][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 555.638858][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 555.649167][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 555.658743][ T3692] bridge0: port 2(bridge_slave_1) entered blocking state [ 555.666193][ T3692] bridge0: port 2(bridge_slave_1) entered forwarding state [ 555.675519][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 555.808422][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 555.819987][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 555.833705][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 555.844397][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 555.855594][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 555.866429][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 555.876690][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 555.904521][T11094] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 555.918570][T11094] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 555.992795][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 556.003066][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 556.013464][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 556.024661][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 556.032731][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 556.202275][T11094] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 556.711087][ T8717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 556.721330][ T8717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 556.814454][ T8717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 556.824334][ T8717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 556.848605][T11094] device veth0_vlan entered promiscuous mode [ 556.869252][ T8717] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 556.879212][ T8717] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 556.925089][T11094] device veth1_vlan entered promiscuous mode [ 557.011982][ T8717] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 557.022071][ T8717] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 557.031575][ T8717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 557.042654][ T8717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 557.079000][T11094] device veth0_macvtap entered promiscuous mode [ 557.155417][T11094] device veth1_macvtap entered promiscuous mode [ 557.168362][ T8717] Bluetooth: hci5: command 0x041b tx timeout [ 557.248417][T11094] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 557.260850][T11094] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 557.270766][T11094] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 557.281438][T11094] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 557.291381][T11094] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 557.301961][T11094] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 557.312012][T11094] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 557.322594][T11094] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 557.336202][T11094] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 557.346428][ T8717] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 557.356202][ T8717] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 557.365914][ T8717] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 557.376259][ T8717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 557.409664][T11094] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 557.420556][T11094] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 557.430669][T11094] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 557.441298][T11094] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 557.451456][T11094] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 557.462074][T11094] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 557.472122][T11094] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 557.482862][T11094] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 557.492910][T11094] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 557.503942][T11094] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 557.519093][T11094] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 557.537092][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 557.547468][ T3692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 09:45:07 executing program 5: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0x96, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:07 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0x96, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:07 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0x96, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:07 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x5, 0x0) bind(r0, &(0x7f0000000040)=@generic={0x1e, "0103000000000000000000000000000009a979f321b3107bc8790405c7bad62e0a43a632ed4938d36d73fb8f8411a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f20dcf160e7e58f358c000100000000009bf1314a8ef151622ca5bdb9c8ead2000077aeb890001d6d7c980ee590c8b9f70dc136cb184a00"}, 0x80) 09:45:07 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xaf, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c205"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:07 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc5, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286c"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) [ 559.182307][ T9717] Bluetooth: hci5: command 0x040f tx timeout 09:45:08 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xaf, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c205"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:08 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xbc, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:08 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xaf, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c205"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:08 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc7, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d7"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:08 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000100)={0x5, 0x7, 0x80, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000140)={r1}) 09:45:08 executing program 5: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0x96, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:09 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xbc, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:09 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc7, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d7"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:09 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xaf, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c205"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:09 executing program 5: syz_open_dev$sg(&(0x7f0000000380)='/dev/sg#\x00', 0x0, 0x10008002) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x204) clock_gettime(0x0, &(0x7f00000000c0)={0x0}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) clock_gettime(0x0, &(0x7f0000000240)) futex(&(0x7f0000000040), 0x8b, 0x0, &(0x7f0000000100)={r1}, 0x0, 0x0) 09:45:09 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r4, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r4, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03206023e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) [ 561.261225][ T9717] Bluetooth: hci5: command 0x0419 tx timeout 09:45:09 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xbc, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:10 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xaf, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c205"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:10 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc7, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d7"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:10 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xaf, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c205"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:10 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc2, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41a"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:11 executing program 4: msgget(0x3, 0x2c6) 09:45:11 executing program 5: 09:45:11 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:11 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xaf, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c205"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:11 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc2, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41a"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:11 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xbc, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:12 executing program 4: 09:45:12 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc2, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41a"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:12 executing program 5: 09:45:12 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xbc, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:12 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xbc, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:13 executing program 4: 09:45:13 executing program 5: 09:45:14 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc5, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286c"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:14 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:14 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xbc, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:14 executing program 4: 09:45:14 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc5, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286c"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:14 executing program 5: 09:45:14 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:14 executing program 4: 09:45:14 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xbc, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:15 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xbc, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:15 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc5, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286c"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:15 executing program 5: 09:45:15 executing program 4: 09:45:15 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:16 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc2, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41a"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:16 executing program 5: 09:45:16 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc2, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41a"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:16 executing program 4: 09:45:17 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc2, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41a"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:17 executing program 4: 09:45:17 executing program 5: 09:45:17 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc2, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41a"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:17 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc7, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d7"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:18 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc2, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41a"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:18 executing program 4: 09:45:18 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:18 executing program 5: 09:45:18 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc2, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41a"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:18 executing program 4: 09:45:19 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc7, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d7"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:19 executing program 5: 09:45:20 executing program 4: 09:45:20 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc5, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286c"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:20 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:20 executing program 5: 09:45:20 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc7, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d7"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:21 executing program 4: 09:45:21 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc5, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286c"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:21 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:21 executing program 5: 09:45:21 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc5, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286c"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:22 executing program 4: 09:45:22 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:22 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:23 executing program 5: [ 574.621788][ T5] Bluetooth: hci1: command 0x0406 tx timeout [ 574.633219][ T5] Bluetooth: hci0: command 0x0406 tx timeout 09:45:23 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc5, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286c"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:23 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc5, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286c"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:23 executing program 4: 09:45:23 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:23 executing program 5: 09:45:23 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:23 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc7, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d7"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:24 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc5, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286c"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:24 executing program 4: 09:45:24 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:24 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc7, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d7"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:24 executing program 5: 09:45:24 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc7, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d7"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:24 executing program 4: 09:45:24 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:25 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc7, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d7"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:25 executing program 5: 09:45:25 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc7, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d7"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:25 executing program 4: 09:45:25 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:25 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:26 executing program 5: 09:45:26 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc7, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d7"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:26 executing program 4: 09:45:26 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:26 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:26 executing program 5: 09:45:27 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:27 executing program 4: 09:45:27 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:27 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:27 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:27 executing program 5: 09:45:28 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:28 executing program 4: get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, 0x0) 09:45:28 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:28 executing program 5: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x600) sendfile(r0, r1, 0x0, 0x1c542) signalfd(0xffffffffffffffff, 0x0, 0x0) 09:45:28 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:28 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) [ 580.688099][ T28] audit: type=1804 audit(1599299129.125:17): pid=11613 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir260614908/syzkaller.s1zuRN/22/file0" dev="sda1" ino=16165 res=1 09:45:29 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x1409, 0x302338e8cde0439f}, 0x10}}, 0x0) 09:45:29 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:29 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:29 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) [ 581.438512][ T28] audit: type=1804 audit(1599299129.875:18): pid=11621 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir260614908/syzkaller.s1zuRN/22/file0" dev="sda1" ino=16165 res=1 09:45:29 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:30 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000380)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @mcast2={0xff, 0x5}}}) 09:45:30 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x2bf, 0x0, 0x32}, 0x9c) readv(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x220080, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="fe", 0xc38}], 0x1) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, 0x0) 09:45:30 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:30 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:30 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:31 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:31 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:31 executing program 5: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4808000010001fff3a4ee9cd283caf790000540b", @ANYRES32=0x0, @ANYBLOB="0000000000000000280012800a00010076786c616e000000180002"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) 09:45:31 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:32 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:32 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:32 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) [ 583.724950][T11661] netlink: 2048 bytes leftover after parsing attributes in process `syz-executor.5'. [ 583.734777][T11661] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 09:45:32 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) 09:45:32 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5411, &(0x7f0000000080)) 09:45:33 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:33 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:34 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:34 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:34 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:34 executing program 5: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2065) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r4}, 0x50) syz_fuse_handle_req(r0, &(0x7f0000000000)="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", 0x2000, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000004300)={0x90, 0x0, 0x0, {0x7, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000}}}, 0x0, 0x0, 0x0, 0x0}) openat(0xffffffffffffff9c, &(0x7f00000020c0)='./file0/file0\x00', 0x0, 0x0) 09:45:35 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000140)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000200)=[{&(0x7f00000000c0)="040000090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000003c0)="dfc1ea0eb8491c1b98ba", 0xa, 0x1b}], 0x0, &(0x7f0000000600)) mount$9p_tcp(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x1080027, 0x0) 09:45:35 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:35 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000300)=0x80000001fe, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto$inet6(r2, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) lsetxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, 0x0) ftruncate(r1, 0x80006) sendfile(r0, r1, 0x0, 0x8000fffffffe) 09:45:35 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:35 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) [ 587.367026][T11711] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 09:45:35 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:36 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000680)=@newtaction={0x68, 0x30, 0xffff, 0x0, 0x0, {0x0, 0x0, 0x1300}, [{0x54, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb, 0x1, 'mirred\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{}, 0x4}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) 09:45:36 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) [ 588.026574][T11727] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 09:45:36 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:36 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) [ 588.487711][ T28] audit: type=1800 audit(1599299136.925:19): pid=11724 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.5" name="bus" dev="sda1" ino=16189 res=0 09:45:37 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:37 executing program 5: setresuid(0xee01, 0xee00, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='setgroups\x00') 09:45:37 executing program 4: r0 = memfd_create(&(0x7f0000000000)='[wlan1keyring', 0x5) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x4d091, r0, 0x0) 09:45:37 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:37 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:37 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:37 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x4018920a, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x45d00, 0x80000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2b, 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x0) socketpair$unix(0x1, 0x8, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB='\x00\x00', @ANYRES16=0x0, @ANYBLOB="020025bd7000fddbdf25030000000c00080008000000000000000c000200df3b00000000000008000100000000000c10080009000000000000000c00050000800000000000000000000001000000000000002400078008000100", @ANYRES32=r1, @ANYRES32, @ANYBLOB, @ANYRES32=r3, @ANYBLOB="0c0004000004000000000000"], 0x88}, 0x1, 0x0, 0x0, 0x40}, 0x4044000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sched_rr_get_interval(0x0, &(0x7f0000000100)) unshare(0x600) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) 09:45:37 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000700)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000040)='ecryptfs\x00', 0x0, 0x0) 09:45:38 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:38 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:38 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) [ 590.552578][ T8716] Bluetooth: hci2: command 0x0406 tx timeout 09:45:39 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:39 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=@newqdisc={0x4c, 0x24, 0xd8b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, {0x6, 0x2, [0x0]}}]}]}, 0x4c}}, 0x0) 09:45:39 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:39 executing program 5: syz_open_procfs(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) r2 = socket(0xa, 0x5, 0x0) setsockopt$inet_int(r2, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000100)=0xc) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8, 0x1, r1}, @IFLA_HSR_SLAVE2={0x8, 0x2, r3}]}}}]}, 0x40}}, 0x0) syz_open_procfs(0x0, 0x0) 09:45:39 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) [ 591.485225][T11781] device batadv0 entered promiscuous mode [ 591.587832][T11781] device batadv0 left promiscuous mode 09:45:40 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:40 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:40 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:40 executing program 4: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r1, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 09:45:40 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000280), 0x400, r0}, 0x38) 09:45:40 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:40 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x0, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:40 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) [ 592.930618][T11807] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 09:45:41 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:41 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000040)=""/37, 0x25) 09:45:42 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x0, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:42 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:42 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:42 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="02010109080000000000000000000000030006001000000002000000e00000090000100000000000030005007217440502"], 0x40}}, 0x0) 09:45:42 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xfffffffffffffff5, &(0x7f0000000980)="b0ff08c66b0d698cb89e0bf088ca1f74ffff10000000636777fbac14140ce000000d46647b7954c4c06b580febc28eb143d0f6c0bad62d67a04402ba4125c7044f63fdb0b6c8ee826b4dfe6042a2f057c66cad677d850ea9928bcfcb47e585e427746ed3b27c40060cbd030a6d675c9926af53cd3085b24f9b7a486775c4f284f8c5a572ca115bce90c0ee9d4e7a07f5f1518092cb1f156694036f6618a59196631e6303fd5307d1112601d3641c9492f7dc3503416836b14590c53b1fc1ac149b70cc1142d6bc57fc3a76839fa2f96878b520fedfb9f64d81584a2e85ab4f6ec718b02d78f2ebf04e6b3b94610a21616181629a03c3dc0bf05e0a71f887833b81db7a10bc53259cb80716f6804934a411d424c1db98d454be1adb2776fdbb92b299d3b80af6987a871b4549fdb4c8297ee31ad925c8b0fb1a9d2589b08ed52602cbc26b56df71201bc4ea8621c56f33d251c1d4589af2dcd78fbb4e34bde02cb3920a30cee9489ee72c3e19304c16c2110e1839712d484b80abe77786a7e2ba834874a4e16b93dd07297554a06c2ad2c906f8ebb1db8730df096709184728d48f0a806696bd0d4b12d0064b933d9675353dae77fe8419451f85da63be78b70ca2a84a77f572d9f289d4313e6f6039fe756ac13a5d08838315dff44cda433cc7bc6b77449f8c", 0x0, 0x2f, 0x0, 0x0, 0xfffffffffffffe2a, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61301926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a210da2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559"}, 0x28) 09:45:42 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:42 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x0, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:42 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x0, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:43 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:43 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x0, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:43 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x2bf, 0x0, 0x32}, 0x9c) readv(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="fe", 0xc38}], 0x1) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000380)={0x3, 'erspan0\x00', {0xfffffeff}, 0xfff8}) 09:45:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(ecb-aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="729d192c4bb6467d7ad7a2cd3251f083e61cc606d96683cd7bc390a8f4535ab8", 0x20) 09:45:43 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:44 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:44 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:44 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x0, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:45 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:45 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:45 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:45 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:45 executing program 4: r0 = io_uring_setup(0x731c, &(0x7f0000001140)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='cpuset\x00') io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r0, 0x7, &(0x7f0000000000)=r1, 0x1) 09:45:45 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:46 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mknod(&(0x7f00000001c0)='./bus/file1\x00', 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) lsetxattr$system_posix_acl(&(0x7f0000000200)='./bus/file1\x00', &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000040), 0x24, 0x0) 09:45:46 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) 09:45:46 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:46 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:46 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000020000000000000000000000000000a"], 0xb8}, 0x1, 0xfffff000}, 0x0) 09:45:47 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:47 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:47 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000001740)=""/102400}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip_vti0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8947, &(0x7f0000000080)) 09:45:48 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x0, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)="0284ac", 0x3}], 0x1, 0x0, 0x0) fallocate(r1, 0x20, 0x0, 0xfffffeff000) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000002000)='./bus\x00', 0x46042, 0x0) sendfile(r2, r3, 0x0, 0x200fff) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0x9}, 0x8) 09:45:48 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:48 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) 09:45:48 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) 09:45:48 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x0, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:49 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:49 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) connect$l2tp(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=@newqdisc={0x74, 0x24, 0xd8b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@TCA_STAB={0x2c, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x0, 0x5, 0x47, 0x6, 0x0, 0x2d13, 0x0, 0x3}}, {0xa, 0x2, [0x0, 0x0, 0x0]}}]}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0xff}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x6}, @TCA_RATE={0x6, 0x5, {0x40, 0x6}}, @qdisc_kind_options=@q_clsact={0xb, 0x1, 'clsact\x00'}]}, 0x74}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'tunl0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB='gre0\x00'/16, @ANYRES32=r1, @ANYBLOB="0080008000000005000008bd3200006000670000012f90780a010101e00000028323740a010101e0000002e00000017f000001ac1414bbac1414aaffffffff640101020100442420d37f0000010000007f64010101000065cdffffffff000000060000000000000003000000"]}) 09:45:49 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) 09:45:49 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x0, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:49 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) 09:45:50 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x0, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:50 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) 09:45:52 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r1, 0x5, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) 09:45:52 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:52 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x0, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:52 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/time_for_children\x00') socket$kcm(0x29, 0x0, 0x0) 09:45:52 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x145, &(0x7f0000000180)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 09:45:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:45:52 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x0, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:52 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:52 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWSET={0x50, 0x9, 0xa, 0x6234f84c1300dfc9, 0x0, 0x0, {0x0, 0x0, 0x4}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2a}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x3, 0x1, 0x0, 0xdd}, @NFTA_SET_TIMEOUT={0xc, 0xb, 0x1, 0x0, 0x40030000000000}]}], {0x14}}, 0x78}}, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="4400000000010000000000000000000000000000300001002c000100140006"], 0x1}}, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@window={0x3, 0x21, 0x1f}, @mss, @mss], 0x3) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='E', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 09:45:52 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)={0x12c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0x6}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0x6}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}, {0x6}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}, {0x6}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0x6}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0x6}}]}, 0x12c}}, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x1f2c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) ioctl$FIBMAP(r0, 0x40086602, &(0x7f00000000c0)) 09:45:52 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @empty}, 0x1c) r2 = open(&(0x7f0000000180)='./bus\x00', 0x11250c2, 0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r3, 0x208200) sendfile(r0, r2, 0x0, 0x80000000) 09:45:52 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x408, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x3) [ 604.773471][T11981] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 604.782421][T11981] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.1'. 09:45:53 executing program 5: chdir(0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') 09:45:53 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:53 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:53 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x1f2c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f00000000c0)) 09:45:53 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x1f2c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) ioctl$FIBMAP(r0, 0x40086602, &(0x7f00000000c0)) 09:45:54 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0xd5) close(r1) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x0) ioctl$int_out(r2, 0x0, &(0x7f00000006c0)) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) close(0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r3 = getpgid(0xffffffffffffffff) sched_setaffinity(r3, 0x8, &(0x7f0000000000)=0x2) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 09:45:54 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) 09:45:54 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:54 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0x1f2c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) 09:45:54 executing program 4: syz_emit_ethernet(0x1311, &(0x7f0000001380)=ANY=[@ANYBLOB="ffffffffffff00000000000086dd66"], 0x0) 09:45:55 executing program 1: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x458, 0x138, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}}}]}}]}}, 0x0) syz_usb_disconnect(r0) r1 = syz_usb_connect(0x0, 0x24, &(0x7f0000000380)=ANY=[], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r1, &(0x7f0000000040)={0x24, 0x0, 0x0, &(0x7f0000001380)={0x0, 0x22, 0x5, {[@main=@item_012={0x2, 0x0, 0xa, '@<'}, @global=@item_012={0x1, 0x1, 0x0, "b3"}]}}, 0x0}, 0x0) [ 606.708737][T12015] ptrace attach of "/root/syz-executor.5"[12014] was attempted by "/root/syz-executor.5"[12015] 09:45:55 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'tunl0\x00', 0x0}) 09:45:55 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0x1f2c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) 09:45:55 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000272000)) 09:45:55 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) [ 607.464257][ T5] usb 2-1: new high-speed USB device number 10 using dummy_hcd 09:45:55 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/fib_trie\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x4000000000dc) 09:45:56 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0x1f2c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) [ 608.342940][ T5] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 608.354298][ T5] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 608.364689][ T5] usb 2-1: New USB device found, idVendor=0458, idProduct=0138, bcdDevice= 0.40 [ 608.374118][ T5] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 09:45:56 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000272000)) 09:45:57 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) 09:45:57 executing program 4: r0 = syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000039542f108c07021047e6000000010902240001000000000904db00010a04c80009210300000000810009050a"], 0x0) syz_usb_control_io(r0, &(0x7f0000000300)={0x2c, &(0x7f0000000140)=ANY=[@ANYBLOB="000081"], 0x0, 0x0, 0x0, 0x0}, 0x0) [ 608.654126][ T5] usb 2-1: config 0 descriptor?? 09:45:57 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0x1f2c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) 09:45:57 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) [ 609.001659][ T5] usbhid 2-1:0.0: can't add hid device: -71 [ 609.008220][ T5] usbhid: probe of 2-1:0.0 failed with error -71 [ 609.401692][ T9717] usb 5-1: new full-speed USB device number 4 using dummy_hcd [ 609.595543][ T5] usb 2-1: USB disconnect, device number 10 [ 609.819934][ T9717] usb 5-1: config 0 has an invalid interface number: 219 but max is 0 [ 609.828969][ T9717] usb 5-1: config 0 has no interface number 0 [ 609.835553][ T9717] usb 5-1: config 0 interface 219 altsetting 0 endpoint 0xA has invalid wMaxPacketSize 0 [ 609.845693][ T9717] usb 5-1: New USB device found, idVendor=078c, idProduct=1002, bcdDevice=e6.47 [ 609.854990][ T9717] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 609.971082][ T5] usb 2-1: new high-speed USB device number 11 using dummy_hcd [ 609.995930][ T9717] usb 5-1: config 0 descriptor?? [ 610.276997][ T9717] input: GTCO_CalComp as /devices/platform/dummy_hcd.4/usb5/5-1/5-1:0.219/input/input5 09:45:58 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0x1f2c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ioctl$TIOCSETD(r0, 0x5416, &(0x7f0000000080)) 09:45:58 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000000980), 0x10a9) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) lseek(r1, 0x4200, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffb) sendfile(r0, r0, &(0x7f0000000100), 0x8080ffffff7e) 09:45:58 executing program 3: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0xffffffff, 0x21c, 0x1c030011, 0x0, 0x1c030011, 0x64, 0x64000000, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@ip={@multicast1, @remote}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x278) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) 09:45:58 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={{0x0, 0x0, @descriptor="9b63df4709699831"}, 0xc8, 0x0, [], "8b9ebef4b194fba158f559ea08ddc1c9c046233897f8bf0b9d00c39ccb090c37135ca3538035e5d66d0f89d706747670e74f97482ecab4e076bd0e9335f623465332def3635b7148d80b267cd221bb21648e62b38d436f3d92ebe339801f3a47c69a2753917923439dc30547b8583238e5449db55c96d042bde2b9e185df5e7ed556a6732a3df6ea0899abe02d4a952b8fbc972bdeea633642f5d9dd7ac688e5d13b890eb0ef86357d5c966593c2054dd6fdd45555d4eebf4e3c20a9e01c54ddc41ad7286cd2d771"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) 09:45:58 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0x1f2c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) [ 610.411263][ T5] usb 2-1: device descriptor read/all, error -71 [ 610.478870][ T8716] usb 5-1: USB disconnect, device number 4 [ 610.533022][ T8716] gtco 5-1:0.219: gtco driver disconnected 09:45:59 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0x1f2c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) [ 611.359820][ T28] audit: type=1804 audit(1599299159.795:20): pid=12103 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir260614908/syzkaller.s1zuRN/44/bus" dev="sda1" ino=16310 res=1 09:45:59 executing program 2: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x8d, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8, 0x3}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000041c0)=[{{0x0, 0x0, 0x0}, 0x401}], 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) clone(0x40000080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 611.493497][ T28] audit: type=1804 audit(1599299159.865:21): pid=12105 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir260614908/syzkaller.s1zuRN/44/bus" dev="sda1" ino=16310 res=1 09:46:00 executing program 1: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x8d, 0x400000008d}, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x0, 0x0, 0x0, 0x8}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f00000041c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000700)='net/dev_snmp6\x00') fstat(r3, &(0x7f00000022c0)) ioctl$TCFLSH(r3, 0x540b, 0x9d) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000400)=@raw={'raw\x00', 0x2, 0x3, 0x2d8, 0x190, 0x190, 0x1d, 0xcbffffff, 0x3b, 0x20a, 0x240, 0x214, 0x240, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x130, 0x190, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "bdc74c01369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa6ecab6b1d2cc05e3182f64694d7d05fb8b8c8f56627a54f905d564eeeb8334f650ca0f3c44f7fda4d20a55050342ea85ecc8838e7088de33582f36a0a375bb7008adc297a5ece1bb2df53d17bef26bb6f800", 0x7f}}]}, @common=@SET={0x60, 'SET\x00'}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, 0x0, 0x0, 'veth0_to_batadv\x00', 'ip6gretap0\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x338) 09:46:00 executing program 5: r0 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x802) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000080)={0x4c, 0x0, &(0x7f0000000240)=[@reply_sg={0x40486312, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x1, 0xfffffdfd, &(0x7f00000000c0)="bb"}) [ 611.761309][ T8716] usb 5-1: new full-speed USB device number 5 using dummy_hcd [ 611.908263][T12115] IPVS: ftp: loaded support on port[0] = 21 09:46:00 executing program 4: r0 = syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000039542f108c07021047e6000000010902240001000000000904db00010a04c80009210300000000810009050a"], 0x0) syz_usb_control_io(r0, &(0x7f0000000300)={0x2c, &(0x7f0000000140)=ANY=[@ANYBLOB="000081"], 0x0, 0x0, 0x0, 0x0}, 0x0) 09:46:00 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0x1f2c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) [ 612.192228][T12143] binder: 12118:12143 ioctl c0306201 20000080 returned -14 [ 612.213796][T12144] binder: 12118:12144 ioctl c0306201 20000080 returned -14 [ 612.222127][ T8716] usb 5-1: device descriptor read/all, error -71 09:46:00 executing program 5: 09:46:01 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f00007bb000/0x2000)=nil, 0x2000, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) 09:46:01 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) [ 612.687547][T12153] IPVS: ftp: loaded support on port[0] = 21 09:46:01 executing program 1: syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x7fff, 0x0) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') lseek(r2, 0x0, 0x1) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') lseek(r3, 0x0, 0x1) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') lseek(r4, 0x0, 0x1) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x200, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') lseek(r5, 0x0, 0x1) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') lseek(r6, 0x0, 0x1) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') lseek(r7, 0x0, 0x1) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r7) [ 612.909352][ T1684] tipc: TX() has been purged, node left! [ 612.954960][ T8716] usb 5-1: new full-speed USB device number 6 using dummy_hcd 09:46:01 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000480)=@filter={'filter\x00', 0xe, 0x4, 0x310, 0x0, 0x180, 0x98, 0x0, 0x178, 0x240, 0x278, 0x278, 0x278, 0x240, 0x4, 0x0, {[{{@ip={@remote, @multicast2, 0x0, 0x0, '\x00', 'ip6erspan0\x00'}, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0xb8, 0xe8, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x9}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@uncond, 0x0, 0xb0, 0xf8, 0x0, {}, [@common=@unspec=@connlimit={{0x40, 'connlimit\x00'}, {[], 0xfffffffa, 0x1}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast1, 'veth0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x21f) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) 09:46:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local, 0x2}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 613.351796][ T8716] usb 5-1: config 0 has an invalid interface number: 219 but max is 0 [ 613.360169][ T8716] usb 5-1: config 0 has no interface number 0 [ 613.366656][ T8716] usb 5-1: config 0 interface 219 altsetting 0 endpoint 0xA has invalid wMaxPacketSize 0 [ 613.376773][ T8716] usb 5-1: New USB device found, idVendor=078c, idProduct=1002, bcdDevice=e6.47 [ 613.386083][ T8716] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 09:46:01 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) [ 613.628503][ T8716] usb 5-1: config 0 descriptor?? 09:46:02 executing program 2: 09:46:02 executing program 1: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) chdir(&(0x7f0000000440)='./file0\x00') r0 = creat(&(0x7f00000000c0)='./file1\x00', 0x0) write$FUSE_ATTR(r0, &(0x7f0000000140)={0x78}, 0x78) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000080)={0x0, r0}) [ 613.893863][ T8716] input: GTCO_CalComp as /devices/platform/dummy_hcd.4/usb5/5-1/5-1:0.219/input/input6 09:46:02 executing program 5: [ 614.182532][ T8716] usb 5-1: USB disconnect, device number 6 [ 614.242668][ T8716] gtco 5-1:0.219: gtco driver disconnected 09:46:03 executing program 4: r0 = syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000039542f108c07021047e6000000010902240001000000000904db00010a04c80009210300000000810009050a"], 0x0) syz_usb_control_io(r0, &(0x7f0000000300)={0x2c, &(0x7f0000000140)=ANY=[@ANYBLOB="000081"], 0x0, 0x0, 0x0, 0x0}, 0x0) 09:46:03 executing program 3: 09:46:03 executing program 2: 09:46:03 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) 09:46:03 executing program 1: 09:46:03 executing program 5: 09:46:03 executing program 1: 09:46:03 executing program 2: 09:46:03 executing program 3: 09:46:03 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x1f2c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) 09:46:03 executing program 5: [ 615.611635][ T8716] usb 5-1: new full-speed USB device number 7 using dummy_hcd 09:46:04 executing program 3: [ 616.006218][ T8716] usb 5-1: config 0 has an invalid interface number: 219 but max is 0 [ 616.014666][ T8716] usb 5-1: config 0 has no interface number 0 [ 616.021274][ T8716] usb 5-1: config 0 interface 219 altsetting 0 endpoint 0xA has invalid wMaxPacketSize 0 [ 616.031394][ T8716] usb 5-1: New USB device found, idVendor=078c, idProduct=1002, bcdDevice=e6.47 [ 616.040579][ T8716] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 616.268860][ T8716] usb 5-1: config 0 descriptor?? [ 616.534881][ T8716] input: GTCO_CalComp as /devices/platform/dummy_hcd.4/usb5/5-1/5-1:0.219/input/input7 [ 616.751414][ T12] usb 5-1: USB disconnect, device number 7 [ 616.790267][ T12] gtco 5-1:0.219: gtco driver disconnected 09:46:05 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x1c, 0x7, 0x6, 0x5, 0x0, 0x0, {0x7, 0x0, 0x5}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048040}, 0x0) 09:46:05 executing program 5: 09:46:05 executing program 2: 09:46:05 executing program 4: r0 = syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000039542f108c07021047e6000000010902240001000000000904db00010a04c80009210300000000810009050a"], 0x0) syz_usb_control_io(r0, &(0x7f0000000300)={0x2c, &(0x7f0000000140)=ANY=[@ANYBLOB="000081"], 0x0, 0x0, 0x0, 0x0}, 0x0) 09:46:05 executing program 3: 09:46:05 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x1f2c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) 09:46:06 executing program 1: 09:46:06 executing program 3: 09:46:06 executing program 5: 09:46:06 executing program 2: 09:46:06 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x1f2c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) 09:46:06 executing program 1: [ 618.130921][ T8716] usb 5-1: new full-speed USB device number 8 using dummy_hcd 09:46:06 executing program 3: [ 618.502162][ T8716] usb 5-1: config 0 has an invalid interface number: 219 but max is 0 [ 618.510537][ T8716] usb 5-1: config 0 has no interface number 0 [ 618.517382][ T8716] usb 5-1: config 0 interface 219 altsetting 0 endpoint 0xA has invalid wMaxPacketSize 0 [ 618.527530][ T8716] usb 5-1: New USB device found, idVendor=078c, idProduct=1002, bcdDevice=e6.47 [ 618.536930][ T8716] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 618.692819][ T8716] usb 5-1: config 0 descriptor?? [ 618.963559][ T8716] input: GTCO_CalComp as /devices/platform/dummy_hcd.4/usb5/5-1/5-1:0.219/input/input8 [ 619.194126][ T8716] usb 5-1: USB disconnect, device number 8 [ 619.220070][ T8716] gtco 5-1:0.219: gtco driver disconnected 09:46:08 executing program 4: syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000039542f108c07021047e6000000010902240001000000000904db00010a04c80009210300000000810009050a"], 0x0) 09:46:08 executing program 2: 09:46:08 executing program 5: 09:46:08 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x1f2c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)) 09:46:08 executing program 1: 09:46:08 executing program 3: 09:46:08 executing program 2: 09:46:08 executing program 1: 09:46:08 executing program 3: 09:46:08 executing program 5: 09:46:08 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x1f2c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)) [ 620.460937][ T8404] usb 5-1: new full-speed USB device number 9 using dummy_hcd 09:46:08 executing program 2: [ 620.712010][ T9201] Bluetooth: hci3: command 0x0406 tx timeout [ 620.823944][ T8404] usb 5-1: config 0 has an invalid interface number: 219 but max is 0 [ 620.832515][ T8404] usb 5-1: config 0 has no interface number 0 [ 620.838779][ T8404] usb 5-1: config 0 interface 219 altsetting 0 endpoint 0xA has invalid wMaxPacketSize 0 [ 620.849068][ T8404] usb 5-1: New USB device found, idVendor=078c, idProduct=1002, bcdDevice=e6.47 [ 620.858422][ T8404] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 621.055188][ T8404] usb 5-1: config 0 descriptor?? [ 621.351476][ T8404] gtco 5-1:0.219: Failed to get HID Report Descriptor of size: 129 [ 621.359783][ T8404] gtco: probe of 5-1:0.219 failed with error -5 [ 621.392018][ T8404] usb 5-1: USB disconnect, device number 9 09:46:10 executing program 4: syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000039542f108c07021047e6000000010902240001000000000904db00010a04c80009210300000000810009050a"], 0x0) 09:46:10 executing program 1: 09:46:10 executing program 3: 09:46:10 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x1f2c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)) 09:46:10 executing program 5: 09:46:10 executing program 2: 09:46:10 executing program 2: 09:46:10 executing program 1: 09:46:10 executing program 5: 09:46:10 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0x1f2c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) 09:46:10 executing program 3: 09:46:11 executing program 2: [ 622.601434][ T8716] usb 5-1: new full-speed USB device number 10 using dummy_hcd [ 622.981904][ T8716] usb 5-1: config 0 has an invalid interface number: 219 but max is 0 [ 622.990335][ T8716] usb 5-1: config 0 has no interface number 0 [ 622.997261][ T8716] usb 5-1: config 0 interface 219 altsetting 0 endpoint 0xA has invalid wMaxPacketSize 0 [ 623.007459][ T8716] usb 5-1: New USB device found, idVendor=078c, idProduct=1002, bcdDevice=e6.47 [ 623.016832][ T8716] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 623.123865][ T8716] usb 5-1: config 0 descriptor?? [ 623.431928][ T8716] gtco 5-1:0.219: Failed to get HID Report Descriptor of size: 129 [ 623.440387][ T8716] gtco: probe of 5-1:0.219 failed with error -5 [ 623.480475][ T8716] usb 5-1: USB disconnect, device number 10 09:46:12 executing program 4: syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000039542f108c07021047e6000000010902240001000000000904db00010a04c80009210300000000810009050a"], 0x0) 09:46:12 executing program 1: 09:46:12 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0x1f2c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) 09:46:12 executing program 3: 09:46:12 executing program 5: 09:46:12 executing program 2: 09:46:12 executing program 3: 09:46:12 executing program 1: 09:46:12 executing program 5: 09:46:12 executing program 2: 09:46:12 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0x1f2c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) [ 624.694094][ T9717] usb 5-1: new full-speed USB device number 11 using dummy_hcd 09:46:13 executing program 3: [ 625.122100][ T9717] usb 5-1: config 0 has an invalid interface number: 219 but max is 0 [ 625.130593][ T9717] usb 5-1: config 0 has no interface number 0 [ 625.137061][ T9717] usb 5-1: config 0 interface 219 altsetting 0 endpoint 0xA has invalid wMaxPacketSize 0 [ 625.147215][ T9717] usb 5-1: New USB device found, idVendor=078c, idProduct=1002, bcdDevice=e6.47 [ 625.156567][ T9717] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 625.306441][ T9717] usb 5-1: config 0 descriptor?? [ 625.644320][ T9717] gtco 5-1:0.219: Failed to get HID Report Descriptor of size: 129 [ 625.653755][ T9717] gtco: probe of 5-1:0.219 failed with error -5 [ 625.697205][ T9717] usb 5-1: USB disconnect, device number 11 09:46:14 executing program 4: syz_usb_control_io(0xffffffffffffffff, &(0x7f0000000300)={0x2c, &(0x7f0000000140)=ANY=[@ANYBLOB="000081"], 0x0, 0x0, 0x0, 0x0}, 0x0) 09:46:14 executing program 1: 09:46:14 executing program 2: 09:46:14 executing program 5: 09:46:14 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0x1f2c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) 09:46:14 executing program 3: 09:46:14 executing program 5: 09:46:14 executing program 2: 09:46:14 executing program 3: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000000)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000008000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000009000/0x3000)=nil, &(0x7f0000000000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x0}, 0x68) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='cmdline\x00') r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="54000000000100004500000000ffff000000000024000180fa00018008000100ffffffff08000200ac1414040c0002800c000100000000801c00188008eb01f983307900080001400000080008000340"], 0x54}}, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="540000000206010000000000000000000000000005000400000000000900020073797a3100000000050005000000000005000100060000000d0003006c6973743a736574000000000c000780080017"], 0x1}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x80000002) 09:46:14 executing program 1: r0 = socket(0x10, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r1 = socket$inet(0x2, 0x3, 0x1b) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_msfilter(r1, 0x0, 0x16, &(0x7f0000000100)=ANY=[], 0x18) write(r1, 0x0, 0x0) 09:46:15 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0x1f2c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) 09:46:15 executing program 2: lsetxattr(&(0x7f0000fc0000)='./file1\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="757365722e757365722efbdea3d1145d87e255bdba66422a818698512947da0b7e5d4428"], &(0x7f0000fc0000)='//selinux\x00\x00\x01\x10', 0xd, 0x0) 09:46:15 executing program 4: syz_usb_control_io(0xffffffffffffffff, &(0x7f0000000300)={0x2c, &(0x7f0000000140)=ANY=[@ANYBLOB="000081"], 0x0, 0x0, 0x0, 0x0}, 0x0) 09:46:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) 09:46:15 executing program 3: 09:46:15 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0x1f2c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) 09:46:15 executing program 1: 09:46:16 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@flushpolicy={0x10, 0x12, 0x4e326d0846e0c13d}, 0x10}, 0x8}, 0x0) 09:46:16 executing program 3: mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) get_mempolicy(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000ffa000/0x4000)=nil, 0x3) 09:46:16 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000100), 0xc, &(0x7f00000005c0)={0x0, 0x58}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005cc0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000ac0)=""/148, 0x94}], 0x1}}], 0x1, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0), 0xc, 0x0}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x528}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 09:46:16 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x1f2c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) 09:46:16 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 09:46:16 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="c40000000b06010100000000010bfdff1d000000070001000600f2ff9b000780180001808000000000000000ff1002000000000000001c0006000442000000000c00040000000140acdc14aa140017007665746800000000616e000000008000050007008800000014000800000063616e3100000000001b0277d1522100120000007a32000000000c001b4072dcf77b001980000c00148008200140ee0000a5a00000000004028aab860000000000000000322a3d9cbf3d0900020073797a30"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x883715, 0x0) 09:46:16 executing program 3: shmat(0x0, &(0x7f0000323000/0x1000)=nil, 0x6000) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8003, &(0x7f0000000000)=0x5e13, 0x8, 0x0) 09:46:17 executing program 4: syz_usb_control_io(0xffffffffffffffff, &(0x7f0000000300)={0x2c, &(0x7f0000000140)=ANY=[@ANYBLOB="000081"], 0x0, 0x0, 0x0, 0x0}, 0x0) 09:46:17 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x1f2c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) 09:46:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8, 0x1, 'drr\x00'}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@delchain={0x30, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0xffff}, {0x0, 0xffff}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@delchain={0x24, 0x29, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0xffff}, {0x0, 0xffff}}}, 0x24}}, 0x0) [ 628.783412][T12454] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 09:46:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2011815, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1010c20, &(0x7f00000001c0)={[{@min_batch_time={'min_batch_time'}}]}) 09:46:17 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x1f2c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) [ 629.259577][T12462] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 09:46:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2011815, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f00000016c0)=[{&(0x7f0000000200)="e46423b7e4d6ad0588584b4baf95ac5ec9694b68105ed9649af7b7404c10bf842740f946e7cfaf5343c968384be3f7d492551b01a8c649918594ba9ff7511e0c865e9dc1eb8e39f8c9b94332410c714368409a2e29f5f07469e78d6657d9df60914f2412b859fe911415ebba0d2782fd9afd813fcba88922136c828ab16bada3ad2737b5b3f71257594aadcb5e7d00392ff1bd", 0x93}, {&(0x7f0000000300)}], 0x100000, &(0x7f0000001780)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x8}}, {@delalloc='delalloc'}]}) 09:46:18 executing program 5: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x40) tkill(r0, 0x8) 09:46:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x40, 0xb, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @IPSET_ATTR_PORT={0x6}]}]}, 0x40}}, 0x0) 09:46:18 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(r1, 0x0, 0x1f2c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) 09:46:18 executing program 4: r0 = syz_usb_connect(0x0, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000039542f108c07021047e6000000010902240001000000000904db00010a04c80009210300000000810009050a"], 0x0) syz_usb_control_io(r0, &(0x7f0000000300)={0x2c, &(0x7f0000000140)=ANY=[@ANYBLOB="000081"], 0x0, 0x0, 0x0, 0x0}, 0x0) 09:46:18 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') sendfile(r0, r1, 0x0, 0x1ff) [ 630.252926][T12473] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue 09:46:18 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, 0x0, 0x10) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x4800, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@index_on='index=on'}]}) mkdirat(0xffffffffffffff9c, 0x0, 0x100) fstat(0xffffffffffffffff, &(0x7f0000000080)) sched_setattr(0xffffffffffffffff, &(0x7f0000000480)={0x38, 0x1, 0x4, 0x7, 0x20, 0x0, 0x0, 0x0, 0x1, 0x1}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet(0x2, 0x2, 0x0) setxattr$system_posix_acl(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x2}, {0x20, 0x6}}, 0x34, 0x1) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) 09:46:18 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(r1, 0x0, 0x1f2c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) 09:46:18 executing program 3: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x1000) ioctl$TIOCEXCL(r0, 0x540c) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0xa0, 0x0, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x1}, @MPTCP_PM_ATTR_ADDR={0x48, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_PORT={0x6}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @broadcast}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x6}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @loopback}]}, @MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @remote}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x5}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0xa0}, 0x1, 0x0, 0x0, 0x8005}, 0x11) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f00000000c0)=';e\x00\x00\xa4\xd8\xe0\x9c\x7f9\x8aZ]3N\xbb\xe1^\x9c\xe1\x9b6s$0Y\xf8\x90\x00\x00\x00\x00\xd2~l\xf6\x12\xde\xdd\xd5\x1d\x96\xb0a\xad\xcd\x16\xd8G\xae\xd9DZm\xabO\xad\x11%\x7f`@\x16c\xc0\xb6\x1f\xe3\x00\x1a_\xc7\xbf\xa7T\xbe\x13\x8b\xb3r\x8fL\xe6\xba\xe7\x18\xb4$BIj\xa3\xc9\xc6|\x9b\x88\xddPx\x02I\xde\xe8\xcd\x02\xc1\xedc2\x06\xcbM\xfb\x13jZ\x96\xeej\x9b\xe4XjN\xb9>\xdf3U\r \x8dh8T/h)\x90\xff\x8d\xd9\x89\xab\xf8P\xacYtk\xa3\xed\xfa*8\x13\b\xce\xe0z\xed\xadnz\x96\xa3\x9a9R\xd9]\xe11We\xfe3\xe06\x1a^\x04^\xef\xa3\x0fU\x9b1\xc6J\x83\x9d[\\a\xfd\xdc\xa1\xcd', 0x0) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r1}, 0x8) ioctl$KVM_GET_REG_LIST(r3, 0xc008aeb0, &(0x7f0000000300)) write(0xffffffffffffffff, 0x0, 0x0) fcntl$addseals(r2, 0x804, 0x8) 09:46:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8, 0x1, 'drr\x00'}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@delchain={0x30, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0xffff}, {0x0, 0xffff}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@delchain={0x24, 0x29, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0xffff}, {0x0, 0xffff}}}, 0x24}}, 0x0) 09:46:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x4800, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./bus/file1\x00', 0x100) fstat(0xffffffffffffffff, &(0x7f0000000080)) sched_setattr(0xffffffffffffffff, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet(0x2, 0x0, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4008044}, 0x4000090) setxattr$system_posix_acl(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}, {}], {}, [], {0x10, 0x2}, {0x20, 0x6}}, 0x34, 0x1) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x0, {0x303, {0x0, 0x0, 0x4}, 0x76, 0xffffffffffffffff, 0x0, 0x7, 0x8, 0x0, 0x68c5e3b9, 0x0, 0x1, 0x0, 0x101, 0xffffffff, 0x9, 0x51f, 0xb68, 0x9}}, 0xa0) [ 630.984459][ T8404] usb 5-1: new high-speed USB device number 12 using dummy_hcd [ 631.230001][T12505] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 631.251038][ T8404] usb 5-1: Using ep0 maxpacket: 16 [ 631.441934][ T8404] usb 5-1: config 0 has an invalid interface number: 219 but max is 0 [ 631.450351][ T8404] usb 5-1: config 0 has no interface number 0 [ 631.456893][ T8404] usb 5-1: config 0 interface 219 altsetting 0 endpoint 0xA has invalid wMaxPacketSize 0 [ 631.467117][ T8404] usb 5-1: New USB device found, idVendor=078c, idProduct=1002, bcdDevice=e6.47 [ 631.476617][ T8404] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 09:46:20 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(r1, 0x0, 0x1f2c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) 09:46:20 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000004500)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) openat(0xffffffffffffff9c, &(0x7f00000020c0)='./file0/file0\x00', 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) syz_fuse_handle_req(r0, &(0x7f0000000000)="9eda438838743bd4e9720bee57093515dc189a5ea685e9556c1c2c3cfc4df50d66d31a48aa312663b68d18c5826b5b55fb738208863dac0f10f423aee7a5d8ddc45ebdfeb7424bae859d7c37ecfc4b63914d5a56d91017dd22bc84f759a15969951aef9d5c88c96560896988fa18cd946cfcc3a0f1c993348377904eac32c980bdf7976ebca2b499cab63c4e841514277fc71d4620e29a92523402485de0e82896484c0ae497a4d686df23ca7b68c3fd5e624d3510d7f94838e54af877ca58a00c5a672bba11f5aa1ed1980dfef47b9973d0bf456ded5e72f1702b3dc5197fce39cba53a038d8dc0ec783ce70577107dc5e8b299e64a0b7f1191f0926bd25762370191710bab2f44e9069f55f8a3f87e4cb488a2fb3348c0bf3b3874291f83e4776b160ea73aafa3919c7c069c73c0052173a63158db8b65541d161f9c964926ad7f06bdd6cb6a32135b04e35701c2e13c49c1f75dc7a25d623378860692d172ec3f1e1f2d9dc77c015c13721efcb101c2390abb847e871132f472a37cc0163b39b1d575a5444e246a08a1afb1a696cabab29498a314429a3b9f44c43ba29f71fac1fbe0d01c3c16d22730932704bcfb0c1b7a432bc51dd3f5dd5afc3b342cbe6a6ff899039e28f9a51881b1d46fdcf31767cb6f5c5c69ab3c80615d77c4d1664fc4ec831b8cea2e752bbb7a9ce79df875b29f1e232751daf32a1a0c4ff8bd0688e2b8e2d668b8a77e20a9eb6ec2e2c23b94e507baeacbcfa31fb6e1ca3343668f43e3aa6d85e7c29bf0bb4dbdabddc92be7f4a6f5d21b19e6da17bfb6cc926e3847532fae29c7b62fb909130ec372d3c16cfe6aaf3ce2af0fe7610fde7aad61bc80d2f96b999c8ccf6d22cf903ca8ae8b879ec4a416f334982e9810c0140a18d4dc81b5edaae23e9f4abaf40ed71512aebbba5bb251545e188db789558a845a2877b14bdaeec3c738b7d730c0860531bf5517d4f0e8f95ed3571f8a35816d5116fcb8d7cbf42b7d5d5e65541508c898bb2e0fe96297d2ab7135662de39df099ebaed5871111f5346278cee5728cec512e6c0a0d65b51e3d627873195b84103341c2bc83b6c8fdd8ba17f5957413f61c69d618c9b9d0b1f08dc81921b6c662ee1da3bfa019b095e9a03c2db4d645ccb7364e895098cbf7d932c72d80663c7a1694d122f7348393079223c11d36c64a5856eae0397ab9a9d948204b74e56525a9d552dd0916de81cbb5af3c59b3d7f8f9154423ce2cb45a5bc808e24bef13212019a19545fe54ba84d01534358380192b8c7b0eda907810375bb66a578a58fec392b47991271c8367b91d710e8a176bc1a4e96f0e137d4c25fbb03eddc392f9f170dd744472b864fbbae7c93d86e682308b21b73c5652065d72cf02e1152b44024a90a3b52eb0bb3cb412e518d37a68aa4c7f46789c54ab30d3a73d0a8712fde612294cda2aa1ccf164930b9b1d17801d4fbb06e849d39bf2b5141330caa0d2618b616f1c67e1ca57080e79ed9092ba7a55e8121cfc825cd26a0199a479a7ab1b7b23d2a4dd82fa6d04ee41ca680435efc934f0451e865e8632ac2f1115f4cdd33b0fccb7a2326127faf20cba37c828613dba5a98f4e1ad25eb6b91078cf73d873df9ef91531476f64b83559ff7ccdc4c070d478b18196ea05fe8d4ea0216ee5273dfabbd04582f40f064c9781afd2cbf30901f28cd09cc934f1b2d50883778274177e3dba8af0a1b931d80ce1a6c4085780ea2195b65ecfd2953f78a5290fe560d0cd6a5e73890a5a82dc410b92a3ef2be05ec5607820fd4ca6b9c3aa258d59022fdcb21665f1ce4e8aad8fd918c43bd3c2afe3dc223ff9f48831d401c8b6996190793d1dd7551f8511b69283992398d8f9b4bd2b3398d3b8c6f3c5d8b802ca5282b70242df2b7be4b38e70c3065f8da888631375afcc05ce578089c4f783776b286b7a60d1b5e189e2742a3240c1036a953d886885422eef01413c38099b64505fd5a73488acb4e611820674c58ae74d6c64a885d4beda9bd7903bcdc71e3711e2a057c0eab2100c321050ab14c6e453c53182577ad3178603cd9afde40a701120e9a36074fd582428c74e02781318e6c65450f8f020bd22475696fe13b8c59260e53a06d16eabd135e887a0a6bbc8ad21be7661df76fec5b13844f68b8eed1a7379713738beac9f23c7a26520e19797a910cde9fb285179526889b908b7eb49bb06f70f6271fba8712c1a4269ebcf4b7d043e924e3d2c4c753fd7e547d95841e335179836f76424e728810d7f32b78256ea30c79d9238a6588426e1f2d4c0b03d5605bd826ed24f0f11326b4cf958632b86e017aa80e142db1580c44f76d9c98196f3f6852ab2bfc6a01a3553a130c2d171957f5a45c3550fbbc990ef8742a98a86b280a57b9f198ff436bc01161ada50e6f23026c3254adf2321bff7e20aa54080bbb57d8d52c6a6df6107706a2e5bc6da68f17b474c0edd39401d765086e885cf7992405f856557915603cbe8894676e996bbadbb649a5e7498b91f9bd2f697dd9ebbe4d386050258b9f4c94781e61c660651c3f1e3ae51f8c035eca365bf15d6db48ea9ce183515f4a208d010f7c23dcacbd6e225490d7e9c133525f5c9018d752b21b4897bf18b64b6a9936f538a0a8958fc934440aeeaad2b68ac844d76f0900a6c95bd0b353d85d4fb62eb88360112237fd8c636a80e3130b21d66ae8ec58a4b76cba0602f96da919f7e84fd37e3ec2379f58e389a39c78d2482e03c379e3c4649ad63a76e3707ecff07d2fcb0c9dfc524cab49e69a09c92e4f88714335cb57d3f6184d07bef9657280fb5c9fd2d8f940f7ac6c5407e3077aa2e4ba8e217e0ee19e302d6d90e3be05a86dade35d2e454e511afb5cf5936f1d11f2fa6be6ceaa817dbdc7a6aabf2fad8ff3efa8382a25099f0c5989d2ad56ae0f4968b2cfcfc67b4f1c161c75900b4848f59a3c0376dfcb7997bf28e9e85d6dd942a360516de38e1c1a038a796f9a77ff2b0c7e5e8f4932391a0e58e76dacc6f9764178a211dfde3e75d367d2911ff398126ffdf83cf2fbdf1ad5232bed9155f7a168638a572094a9e934d4969b358cf6e121d7fd2aeae2f499068b42c152f0e3403a230885d6f92f038ddaa23499f804ffb06abdbabb51f6c38c92fb1a6271a4b13d6d11125b8ec12efa5907dc65062797fb9cca15e2f254e76b182d3fcdb4e96ac4de36d6df7e7bba5c32f422286b1be3b79bffb6fd693761952d195a84ad9ceb07287a0fbefab9e0347b513c5f60233ccd4b52d90ec144a2f896d9dc7f279f8aa93038f3efa286e1c3006933a4d7183d952f8d28b141b28b2af355b5bd8198dfde1ffb8d09202aff0d16ca3fec194662892a49f829813970a4520f1228aa03d211a45bed3b2e05bf1f10b1a152761e7b6c6ddea863a3c02224256092c70ca70dc185c4c385dd98b09e2682661e1e66f71d9c4037048eb70e8a1cbe57de87ec43713abf5fdcf63b9c482f318e3bec37e878dadbae15a02d731e6c8574eb14c059d72f73be5174add786d06b585a28a06d349d8e434a491b34897b3c1ad786ec8280d7f57edd4fbc6aea5485d659b59d393e331cf91e6ed76f340fcf7cf460892fa7318fc42b883f61d888ad982a751accb613c66661fba5f3d6de751a6a9ef8a4700316aaad04e991aab7903f4ef012ec2a8c092234e74ef335daf360ae47bbd2bbc6ad8c1a4f81efe8bbd703cb55ef36b32b4e30cb5a3b165c02ba295d0e1c40ce6ff8f479a74f01275f113ebfa8ade37a59ce70e6ca2a6f48f1be085f61bf772e2c2da523a2cfe63e99c57bdb1ff23139d4fca49eff7547e9880eefd3f7511a677efa23b52098ba89037c48dfcda2e8c1cfb9f892161049e53f8cee55256279512aecab8c441600dae0fd957883273047cf5c66ba209f830aa2ce0cbe41ca08c0cef4aed7f4324009200661a7ce680e5a8df2d051c1d8b2f63d25d8d74d05c75c46c8f3f24d625539e63459650960498a54ec3b16225bbbf4d3930009df265839d72611f5332a904cdebada108236e4414a2909ad01ec44b9d7f75de4385ad7ca5152e890a0919b3639fd1bcbca3b737ebb8d9ae541b1271cf2166ba15830e66f3d3afd3b754a7f81ad4f0999704ae99c114907c5be4a4797f13b80564f234723a34dbe137dabfd7fa23562df679f54a6ab54def6d63deae9844f72fd73efd0413551f5c4b9ee826eb3b7faf92a59ea34a16723b4fea14d1c8815a4e2d39fc48d1dbce526a7c53f5a96d0ef6463a0cee73fd3505f5c764a264b83c4a21f80e8b61c82d24442d13da99d18dc1b2538e7a510f6093d9ef2bc5cc777d4f98411e93919eddfd69d6e20d227cb61c50f358ea227f4de941fb080c1cf6b1f6e25533768fe133dbfc3f9d29c603bed38aa3c5af5b81a706b0067b40b88f992610d04c7cc36b8f649697cd6a93fae51138161891ae75a7147780fc59af5a6e18c54f9d2a4fe7fa92314b399afba9a40d0cc24f70a2593acf8d179215e06b7a9a88224bafcb2cbf60caf5fe4ff38208a70793b5dc33cd572956260e1c86312d3ba9b3a4b2b44376f2e78c616a6c0880ac8dcbaa30b9f761d500fd03a8518dd0509157b184a2d95e0caf3ffc8ac2db6c54d80c71a1e5b9ea3bf51071e2118af204123daceeb04e4f6f31f32a4d3fbb76ee49440cabda2c121c1b99acab5b87cecc37c3f9066af34ab29d6598bbfd91047a2ac7ce3a8f3027ff5e6d743506f161087278896a98ed37122ba208b61cf54d3929555ab06b564cd5e4f46f4755a6cfa2ef2b30d29ea66f2749d4060d411fa9160c91b6f55cf071ac8222c6313df18759e2958cddfe3db4cbeb9cd39abcf5f0beaecae8437813995cb7ed0b87d42ca942ff7245ece204798d01361c5f008e0d82bdf76660515bc78f7f8f409ccf68614b2cb50f5af2615661326fd971bc57eeeade60ea906b8df1cb0dfafd318cd2c396309c329d0469ca192aa8f51d7c4227685440f073983255baf054b97b9d7be1d1470d7eabd5c09b2116b4e86b0567b7e97e088717a4fe3dbdd310a1c39136ea4d2c47492001f9885dba03bf97e7da376171d666441cdc2f999db137603d57df32b4260fa0165e82917bb1631ea314e7a7437e66fc68cef22cda8f456d6e583f6e3237e0bc79987a9103f7cf0918e26881f67ea582e1ff3a49177599d385bf6e42572a2547933aeddb826530e9adf30dd84c3a7fae5c4c26f6c6f3a9f0906decd314e2407825abef959c5416d18a92ff34e6c521a16e8a0a29937c77d4ee99b41d530a732acbe0bf5d274df9d496b47a9a624546bdcf9976cde12ec989cb2a70b33a7c8a3a77652023164695f9db30dfcf587f0cd4f73e385730bcbdd688f6dcb08ba0efbb9f579220afefa4acfea522e864fce9b1782ce9f14824d16e9d33a2609c23ba3c5a1af02549357a0dcc12e37819d778021762cf895abeac1125b744c8b8225a091e7be9ded9993cfa3ca9abb83e25c8f559009977a2ed9374a89619fae5ef6d164bb73d242004dc8428e44689b33ee3bbe88bb4962ab0a32a90e7aea044f08410752cb2d7aeaf3196648a3a99092665b478bb394b48f79b36db0efc7f50d6a5179c945f5298cfaac5e5dea715296f92abce7281d48a0c9c6b785a35ef5f1697c047ddb254fe9a8ab9f498b0c1ae09ffd01a3d8d427fee7e36c51e0e5c2fee2245fb8464626ab5c9857ebce91f7d22bf024d10c2d71021cd69268472de419e6cefd970cc3a8e4d1bbe6496799aa7f100411766e712aff08b731460f14f9d7356db12cf8e1c6121968dc68b1d81c086b325ca4ce6fe1f476707e08fa913144b757c6be17cf93150db29544d207f09a896f33b7335d9339215da751e7af2c6bdd19db6f521af2c8a5998dc607f97026d07111488741134c1c86eba123273d1fd5ee4b471e86f9ae9478a04c7482076ab34a1eca5c64f89e5106eed44bceec019c67c12fb4db4fdac153f4ac3b63ffeb6d30de58ec039e2dd3c181e254cd94d0a2b0b44490384cc5915b54ee1db2b6d059879bf8126c9ca976d0f7862da07ecd350930a081810a7afd72b2ad3f65b96ae9c7f91227a2b5513a559f36b90fe01be9ae5ad3ca65e2c26f358fc26b858a3633fda7ae49a5fb705220a5819b3cca41b1ccc21d7c40f5fa9c422288efa5394e4312675899d704a2aab62b8363f58fd4bc12a8bea6ffc45b4414237bf5f019321206dbba439acb5ef26641f30fdac20f964354bce94e4c9d73e137f9806deefaf6f4acaa0e76ad4fef9f6cb7fc01bbabda9612c05adbe46afcf94819e8a4b4b49ff764784fa432d47fb6d4230900043d1b4521cd6839fe8c5df4d1899fdfb13880e207cac73f0a29020bdd563bd9c2f6bcd1ec523b3e03ebf6164fc65af001830c51396f9df2d346f83a59cfc82201cf1150ea57259d579fc2ed199b3fbe42d5188c84e4354610743e5b23a265246313cc63913f17412fa00d98b379b80b96d936969572e11316bc8926cb23115186f3b2387b82c3898fa41bf16a308da62d5a3eb3609af1943fddde08a4036eb2a41b7292caad9eb082614b02a1fa255bc7abd4d0e3b4ec1801e131e68c7aa9da1a0ff10f9de87dec8fad1ad8bfa99caa49e203a7b9c33e044d4544a537471e7a452468b821959bc488c6b8cbf81e90081a26de273ad1203cc06adb6af242ab19f96c1c66b58c37e2c9309704fba63af99a8d9c5efc651afb631fe9f546b938cc3b8e526c4159e5c9f7afb29fd1d55fabf09367ce2a63a35e7a2062d1c772ed981fd77157a847f687a177cf9886ce41df8cc509302b46bc1e2ba896b1c1656a1bbfdf4cd9ac39cf8510d1c823075f16550fd044aacc8d42a56f03718f7b18475cdc3999faeb25ab3dd8a807ee04d8e5d831d08b4e309dff50330685138797e10c6362636f53f22bfc1f3d5090a5d369282d9de36bb4e2505411ccc6ea395afa1567b15a2fb4be2adeea7126b1a8e80034105e0d98bdd78e796ce1cdc06a4ae666fc0baec5c52614340ed997673e26ec47c88846c000bb7c9077337cd44f5c041fdcc64986e5e1c0f488148f0ee6f842c44c0b72e82109270341bba6e9080b70fcf930d0f10be5a36798e70111fed72727b72282ff164fc08319d74f1f57cde71b57cb397a9e753f87b97729bafba017a24cbfdee5dfe7fc296c112e93bb8fce560ca80a3afd8370baaa79ad783b51352b5440b144a47378c9ae22eda5794328e95bcca220fd07bb56915529b155c61858efe89ad36a79288e74c0e251addcfaf797432175a5562b46eff5e3aebeb74623e18beef85389383c604d8884431b07dc4bea0174aadc337ff41f558a63f16690feae47efa2a5d1318b7397e1e4ba398727d286791b71610e1d78d32800e7e113c12abf0f60b6ca4401ecd23b7aacd990633b2b017daf6bfef1b2361ece74b7dbcbb1a73d4bc1f9d2e5c9fb0b7980d25cc44d1b10c09ef5a6a05c84669294a5cadf0cd88ab449f9f0bcdd8c48590d416c5c1feaa494a2145949c2a3373df7c6014225f2745bbeb20ff294d22c0d96ca111e6926946207cab56a03162a49e68968e398f70690188ee3ca847ef421742d60b9a6ad029e8a3d607950b2bf8ad8ff297cb39acc94905635770436e134435e28205140331b5100d9f64469792fffac87bca0835cbc617446ff86a7b50418c305f32e658b32130e491e38709fd3697017ac8084cdf1ed81a28375aed092ab4e32ca88a933154dd3a9e99351acbada926b67b310c7070ac1a414a28c5abfe1f45476249a12f18ca2d981528d881ed3c5072e46a6eff3cdf37dcbc89c7f79c88a1f8d15d15beb66a0e4440c7b93e379c4e2bac1d5c8e85f1852887e2cfeb178fba1c67dc2adb0c87df8ca4444ca7f455509f492effb5001328b8cc696e2933207a2d78bbce8562ca34a248193c914406b161c8141479d891b0c6110ec1e25cad38299b489f2ec437017cadba67dcb58abd4933c95b3526f1d4747b8701a7d71e446e4b62e2941d4281faca0cf22914be5aad80f47100000000ceb24e82508fe55a92fb6db70d03d1c1ec09cfee31639341756a4630a0eaaecac7bfbddf9d30c42cbd45eb181d5bd341307ad26f496bb042e2b655c03ac3dcc587acbf50f79b5c239be9938b62d3251b199f8413b020605d5d0552cfd9c39c9132719d6d0a326b000e12fcb51bc274df79d11430060d05978cdd50583f1bca82c57dbee605e2d00fcb5414af13a596d35cb5ba62de6a28cbccc857d23547b1c7fd5ac8fbf6758d5b8451fa46d9acc00344dc2e565674b1dd3547eb8f8aa5fff99042f8d1d59e6ad2f53379211e6832fcb68f5777eb2db85b28f724f4e4ce6342cf55713ff7b0cb4f7f47dd12a6566b86709eaefae024373267ce72a89e7f3e42ab48edcccc96b5d0403fe93a927e5ccf470014f220b8257393226cd7b996f20e6a34f81206733a9fdce03b701943c1b560d3eab68c2c225cf7f7f2b56123be2bb173e9e5b37f4d3348f6b987764ad07c2acd44514ff264d7eda31e5e517a179414841ad4553d51c08f435e05f10aa82d74b97a9ba3a133e6c9175fdcd4f3dc9c16d3be1d5bbaf13240177081ac1d56681bfa988a93af09868afd608520c0bfd71d857a6661fdaf6f2e166987eb007449dd26334ae932c5003fefc0f983b9e49cbfcea325f2de16a9ae935caa46f5b3433957fb370971ed957f138f08a60fed5b84995e428e7ae7d5c22021ff016baef0e713a118344c016a99ad469313ba7f2452da0dd82e019f64aa229cf80a69b3e08ac5847f10d247179855546313232f23e055c2f74ecef14e0fdcc29a9bf0976fbb249bd5c7903183d2a53c70960a183630e7d4928daa7091a85ad987d2a4a5b8f6be6612fa72d9fbb33c67bb38eff19f2e784f94e0354cf6d35a5b2c62233c039de3734b38e97ec72bd673fef09fd56fec329818cc68cdf12cb52f7d37a8350c16e94208880bfcd3e895d7aa4489e3dd15db4a9026f0d2a46f1e89c35845dbd976a1992b87c15a0c7580e6424b8792a7bb7b933d7c5433d4133ba4dbbcf7995d6ed3feaa32f876a287feeb9cc6107778c1f83e0119d980b9e994c2a3ae3de24a103efb3cacb746b49d1ad85746b233ab4aaf0e988ec2a786bc93f32040d3bdc3008031634cdfded5ac95b2279e096243228296591e7ba53c4a127772cc4620e6b238ccad250629194533d0a669ff3366c52d64928693e0b0cbb0b8e2c6029089d4dfe2b4b6c5dcd85f1a02770611e65001e48a32a8b0431a3b9d77fa3a95be38a0436a704c05a8e0183f3214c25531a63796f679bf72885aa766468d42b2543542d7e82544efc5c5e81e6a91a0f5d4e68000cff687d63e45c9a11d4ef515050daa592c9a828ac7c0488e7cdb3d6fdaef5e9176ee68d981ea50d386d74df3b40660351736deb03bfceb721878cf9894b0302df15964242ab6b9f77f98ba1c7993735983d2b022600ab74a19e3636e1400d08ba45d3a5c2774cb06a1c358bbfc11d27efaf7ca53c2e7757c8c76da24707d91a4a5244262898d68083ff91c514d9b9b1ebaa0cb0b10254fda1b1e82b9a1a47f117b5b280ddbec1f6732d11117ef1a7a674699df87fe795d1243cb9c4527e364e2b711b6562a87fafc130ce0baf1701686639b05f0c8dc708f008b1e6ab89e8d623bb83f3d54b7bcdbdacd055ac4eccbd36bbe0af0f65a00e3d6dd985ae8851d176976cfb5816d1fc2a63d3546aecaa4e712ca6961d1f181315d553de6b53485faed0dcfcf819a1ba3badffe797377d3d1ddaed8e7a0acc0c3d277762262a139f94de49faca167b11bf04f2104a5ab9a73367a6461f7124c91a2c4229ef98e6ebde9aac283c7d029400d71293f488ba169b62c1e94689cf5b248ed4aea62b88d65bb764cfe27d5231a58486e7381df518f4ed81cb905108c54a5050a94ca0e94da20d3794bc5fab9127dc95b6404b1e27b4e28136fc27806f7be798444c33aca88ffd45b860eba0d5033839f5a092863954604f1952bd61dad23b11643fe14f3ade08116aa2c13eee701ccd13e506bd65a1060bf69579aea8c8143cd38c0891a3065f251eba0c20ab9c69ddf28e3bd6400cc203bac8de1882239ad4e1b97b0ae2f1abb7bac7c0d8ef82b97ebfb1f5577f06a3a1377b09ada4db87d342f20ab0eca4b9c206042471307511429cb57a578211f92d3647189861cad9145f5eb26ab696abe50a2a6c1b469df97da28aba4e79b586c348a430f5ea61c4be1032fa61d18581f05a07fb8707c8996e0fff1c3eda59b992687fa12483b9327e10224b20d42e8b3fc4670bf070ced602283273d6818acd1f6da567c44d3f5e1377065d43d87d889843ae48e7fa8ba1634815695b8c480ca271e6e833799c70da80fd79acc09b989667a2294de5da73f0363df9a33ad4dab8d27cf7bed0a06838672e3d07d52b6396e9b5576021d5e925abd533bf161c944795065fdd44e8462e3070c479f1c118276653488dd9b2f1a673f8cad3612ca1fab4388ec9c8f834a01a499adb7b3a9a977672f6d75b41bbdd7f91ceb7e7a88568d17bb432be9e4e96e115075bce197ef4754d2914c2c59e2d7f4c08f0dbe34d31f229428f211bf1d7e8f5c319ed4a8273cb6255eb318851ac4557b0278fac63107a54d407c42f300b843a12abd3b893b46c7efac2e388ab42b87aebe2543bd4c15f459bc50aad10ffe1c1196fb52c26e54bdaa7fbd52451f207ffb073ef4b3f71eedd7da40c89505019739e3fa733bcdc84ff4919e8fe2358129ef28291be1d6426b8bafe88463b1d3cd7273745381c7f65221898e6ad361e88b24c54ccc7ac9a830145b6dc096e2d71ef71ec4f03524cb870b724e08d223bdec2f6fdde6200217a13b5136004d455d66547f5a1793e0cad85677d49e5c558852107007c8136812cf021afaf6f7e8f59883371be46cda412dd9c6fcf187c31252ceb5758901d39cd5355ab386d9a7fe6ea46ebf277aaf809c3023211ea9aa189de4d422080ebb9fec50ffab6b95ba4ae5018accc497e79149ed6047ce561ccc10e9194cdccd5c9fb75175c8dbc9d0a916ad59288f010defbbb50d263041ab37aac0f93253bef6f898cd0825d99d27224f26181f9713b8979da64756c95e7505f25a2688960d6155c3613dcc31b6c337a6dbfc6b12cfde1db22b93bbd5e48534fb0bda8b212577a14dcf665c834b0bd24e5f624d2455fe048dbe930328d7cb632db3b0e244bb5d43390b420b15157a339487fc78976f867d3a361aafdd3f50a93c01882da7c220089a544381db22e2c86b228dc2be01820468460437588952a549d37498e529e62aa62bad1580546bcb1e9a6ed1870b7838d05d12f6e3a041e78b1bdb80894626f20889ccb3a468aa4fb24b9c87cbb28623ce59c6b3c6286db366d08004551a25fe4d8d194a2bb7c52e1c85a5fbe4cb15b171489da121bea1c469a6bb185d63213084e3a81ee54dc03a94dc5ecdda7bfaad1df68021aaf4627c9d529f13e5c81b5ee4dd228949ca16b9a61d186211d153294470907557e5e14ae665013f285fe4d3766e7b3d8ce5e2a14692072d4d8f79354bcc8db8a2a36c8bcd", 0x2000, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000066c0)={0x90, 0x0, 0x0, {0x7, 0x0, 0x2, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000, 0x0, 0x0, 0x0, 0x100}}}, 0x0, 0x0, 0x0, 0x0}) openat(0xffffffffffffff9c, &(0x7f0000004400)='./file0/file0\x00', 0x185842, 0x0) 09:46:20 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xdf0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open$dir(&(0x7f0000000140)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000340)='./file1\x00', 0x2) keyctl$KEYCTL_CAPABILITIES(0x1f, 0x0, 0x0) [ 631.944457][ T8404] usb 5-1: config 0 descriptor?? 09:46:20 executing program 3: pipe2$9p(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) close(r0) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x529302, 0x0) write$P9_RSETATTR(r0, 0x0, 0x0) 09:46:20 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0x1f2c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) [ 632.204892][ T8404] input: GTCO_CalComp as /devices/platform/dummy_hcd.4/usb5/5-1/5-1:0.219/input/input12 [ 632.414587][ T8716] usb 5-1: USB disconnect, device number 12 [ 632.444080][T12540] FAT-fs (loop1): Directory bread(block 11) failed [ 632.451334][T12540] FAT-fs (loop1): Directory bread(block 12) failed [ 632.457957][T12540] FAT-fs (loop1): Directory bread(block 13) failed [ 632.464900][T12540] FAT-fs (loop1): Directory bread(block 14) failed [ 632.471655][T12540] FAT-fs (loop1): Directory bread(block 15) failed [ 632.478356][T12540] FAT-fs (loop1): Directory bread(block 16) failed [ 632.485219][T12540] FAT-fs (loop1): Directory bread(block 17) failed [ 632.492060][T12540] FAT-fs (loop1): Directory bread(block 18) failed [ 632.498668][T12540] FAT-fs (loop1): Directory bread(block 19) failed [ 632.505550][T12540] FAT-fs (loop1): Directory bread(block 20) failed [ 632.533827][T12540] FAT-fs (loop1): FAT read failed (blocknr 9) [ 632.550035][T12546] FAT-fs (loop1): FAT read failed (blocknr 9) [ 632.592647][ T8716] gtco 5-1:0.219: gtco driver disconnected 09:46:21 executing program 4: r0 = syz_usb_connect(0x0, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000039542f108c07021047e6000000010902240001000000000904db00010a04c80009210300000000810009050a"], 0x0) syz_usb_control_io(r0, &(0x7f0000000300)={0x2c, &(0x7f0000000140)=ANY=[@ANYBLOB="000081"], 0x0, 0x0, 0x0, 0x0}, 0x0) 09:46:21 executing program 3: pipe2$9p(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) close(r0) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x40002, 0x0) write$P9_RWRITE(r0, 0x0, 0x0) 09:46:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x4800, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./bus/file1\x00', 0x100) fstat(0xffffffffffffffff, &(0x7f0000000080)) sched_setattr(0xffffffffffffffff, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet(0x2, 0x0, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4008044}, 0x4000090) setxattr$system_posix_acl(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}, {}], {}, [], {0x10, 0x2}, {0x20, 0x6}}, 0x34, 0x1) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x0, {0x303, {0x0, 0x0, 0x4}, 0x76, 0xffffffffffffffff, 0x0, 0x7, 0x8, 0x0, 0x68c5e3b9, 0x0, 0x1, 0x0, 0x101, 0xffffffff, 0x9, 0x51f, 0xb68, 0x9}}, 0xa0) 09:46:21 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0x1f2c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) 09:46:21 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xdf0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open$dir(&(0x7f0000000140)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000340)='./file1\x00', 0x2) keyctl$KEYCTL_CAPABILITIES(0x1f, 0x0, 0x0) 09:46:21 executing program 2: pipe2$9p(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) close(r0) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x40002, 0x0) write$P9_RSYMLINK(r0, 0x0, 0x0) [ 633.491964][T12577] FAT-fs (loop1): Directory bread(block 11) failed [ 633.498856][T12577] FAT-fs (loop1): Directory bread(block 12) failed [ 633.505883][T12577] FAT-fs (loop1): Directory bread(block 13) failed [ 633.512884][T12577] FAT-fs (loop1): Directory bread(block 14) failed [ 633.519486][T12577] FAT-fs (loop1): Directory bread(block 15) failed [ 633.526353][T12577] FAT-fs (loop1): Directory bread(block 16) failed [ 633.533240][T12577] FAT-fs (loop1): Directory bread(block 17) failed [ 633.539846][T12577] FAT-fs (loop1): Directory bread(block 18) failed [ 633.546652][T12577] FAT-fs (loop1): Directory bread(block 19) failed [ 633.553505][T12577] FAT-fs (loop1): Directory bread(block 20) failed 09:46:22 executing program 3: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000340)='/dev/urandom\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r1, r0, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, 0x0, 0x0) 09:46:22 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0x1f2c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) [ 633.791836][ T9717] usb 5-1: new high-speed USB device number 13 using dummy_hcd 09:46:22 executing program 1: pipe2$9p(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) close(r0) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x40002, 0x0) write$P9_RRENAMEAT(r0, 0x0, 0x0) 09:46:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x541b, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFBR(r1, 0x5451, 0x0) 09:46:22 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xf42, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) [ 634.070977][ T9717] usb 5-1: Using ep0 maxpacket: 16 09:46:22 executing program 3: r0 = openat$random(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) dup3(r1, r0, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, 0x0) [ 634.201926][ T9717] usb 5-1: config 0 has an invalid interface number: 219 but max is 0 [ 634.210390][ T9717] usb 5-1: config 0 has no interface number 0 [ 634.216832][ T9717] usb 5-1: config 0 interface 219 altsetting 0 endpoint 0xA has invalid wMaxPacketSize 0 [ 634.229020][ T9717] usb 5-1: New USB device found, idVendor=078c, idProduct=1002, bcdDevice=e6.47 [ 634.238364][ T9717] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 634.413055][ T9717] usb 5-1: config 0 descriptor?? [ 634.674201][ T9717] input: GTCO_CalComp as /devices/platform/dummy_hcd.4/usb5/5-1/5-1:0.219/input/input13 [ 634.877125][ T5] usb 5-1: USB disconnect, device number 13 [ 634.919009][ T5] gtco 5-1:0.219: gtco driver disconnected 09:46:23 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x5450) 09:46:23 executing program 1: pipe2$9p(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000000)={0x7}, 0x69ff9a93bfc25838) write$P9_RREADLINK(r0, &(0x7f0000000040)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) close(r0) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x40002, 0x0) timer_create(0x0, &(0x7f0000000780)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r1 = gettid() tkill(r1, 0x1000000000016) 09:46:23 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0x1f2c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10, r1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) 09:46:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x541b, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x5450, 0x0) 09:46:23 executing program 4: r0 = syz_usb_connect(0x0, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000039542f108c07021047e6000000010902240001000000000904db00010a04c80009210300000000810009050a"], 0x0) syz_usb_control_io(r0, &(0x7f0000000300)={0x2c, &(0x7f0000000140)=ANY=[@ANYBLOB="000081"], 0x0, 0x0, 0x0, 0x0}, 0x0) 09:46:23 executing program 5: pipe2$9p(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) close(r0) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x40002, 0x0) write$P9_RREAD(r0, 0x0, 0x0) 09:46:24 executing program 3: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xac, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/nf_conntrack\x00') lseek(r0, 0x0, 0x1) 09:46:24 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xac, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000000500)={0x0, 0x0, "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", "68e8080781cb13bae17b1eb9d8b660b8ece8c179359029e856b904211dd539d77f8238d069f155c5103623ff80304bfecc9639ef47a0145486ff7f6e9b8a8850b3239b2c8edfc5033e85c4dcfbc25b992ebdb7cfb733077eaaba31d38ee078390cb51e5c5857ecb9c54cbf9c078a7b757183ba2cb8fcd3e56c7de896c80f48314512e45caa020751e747f0cad5d9b3689ede655031cb0a5739c27a19f608d190b77af3b4fc81ec9ae88187bf321d330f5a85c7237d2a36d73807b25010fac07af8f0de6b3d48524ea86493d29b05b6bdb42c9102a324125f07fddd2b9c87ff8a12fb7f901d955903cc49ef184c5a0faafdf3f76b9a35e323fc2b90e937c4aa6e83c79d342f1ab6f8a21b3eead0d4d5d97b1ca2fa447e3334902303f42208b5b6052dbf3c38cbd29aa94e0232c5c23e886aed8d7d2ca4d667b441749cb6b67eb3520c67d5b8e4a2e09e4d10224ea285a2c3baa11954f0182bc8d5c5c8457cff36988637b9e357ae99695e6b9d3a977a06db6c61707c8c3ff55f4502357ab7aa64f14ba2855ef4f247ff70e418a02fe151e3edea25a93bd673cb91d0e223222488e22026d1f1117f5dafcdabee5353ec2821ff5babdf05ce5cb775080d2370411f2bd9354abf247ffeba237dd0506e243731ad5d2d071269cefc236bb36c57e9d23c07dc80946a09817f50358f24f61edb43ff7c634ebd7c698b28ec06aac9fdbacc18aa63a1dfc0026aa160d3fae2c8763d5ed1c33a344e07e437267949c2797df140b40d904dca34ab3dda1690d0f970b2c243776522d18e271463c0c0a231d1e24696a56f8e43448d38958cf7afa89223398662eecffd4604a50b65230ba5ee8bcbc123e467abf9a7e68e9e7fa634eb1e5aff6d4a0d4004536e808972736ffa89143dca61d251502b83458365c5b677fb2a3ae926734879467ede7fa2298094747f1a78046f3e15f88f6dcca47fbc52469af0dd04f9902a18e0a13acecb8df8dd3f5cb303ccbe94a9761110989fe5b2a2e606ed469209eb7ba2ba46e099a06a4a160907300e645115eced408d1fc087b0a2580e4b9ec14343fa692b98f587d65537b478e43a5764eb12e71e23ded9583f943b288ed8b6f90a1df170cdbb5dc0661cca0e0c8c83f66c780ac17fff7f2ea983435832a2acd2328869779d8f5a0b6c3252610dbf269ed8162db01bcf4d2ec5dab230da53b13f701e21cc50a21d2c59c06db67da4c7a061428fdb39f9e4210b2dc506a1189c3b1cabdbb1a6345d3a19dd9738381da7e95256a1454cb1fbd9e716916a6f38390591a020fc39e479088462fff3cec853e7c757a12d2128cb434f15986e691c9b07ebbe58b349a3b554d97d53d334b393fa88847edbd249d269653fb0d93f42c11ed9abac8bc74303d6fe446c65e139da095b5fba5a75c2ea8457343bb343078230e2e6ce1162b1a8a2a8d7734a20cbfb7010efe8bc7f841da8d5b0e2937db3970fd9f3200a8e65fd043174defa4c0dd6701d88ee41dff2f28e6ec349d121765a7f1ad72b761968d2bc358604d7c23b242c2267188d6ebc6a9d0be895a11e8929b1c6c41cd779198a1a47703e540f9b561ce1d0f21caf19185b8b2b84a7ebcbabacd887bcd99eb376d561bf3b55536b4d4779f7c16b819fa410fc5d55fc5a0aaccefeb61762e87d83de207dbb01f8b27dc73e262c18abe2779c410bc5eec2cc0f578cd2bcc538c716570f11387dd6141642ee7a5cd8597e8fd3aed8ea9ee075b7e668090df14e41435b7da20a12ab9093eda21f2e12517dbaff01392e92d82ab320873ade5d83f5575e0372ad4022811c7bc04fb373901f04ee3c99b57843b0f61350b22ab6870c7dfbe83263e65f3c474086eb04b9a974189fea3862258d56f95113d7cecedb7f5d3da478cb7ae085c7706b0818b996d9f0825f8e945076837f68268b93b082f592c0d5bf607adc75ee14c4ade33fb55371c9ae8398cd2cc6946039d241c0d70cda7f78563990346ec11824e2493cd91ee11f59a5176df8ff3e7fcfe26e5ffbdbab11424fbe62bb81a884e52b66323136ac49b9d2ae9654aaf2ede65ff37dbac90ed15cafc242928a6d709a1caef6be1ce92185d417da95724f32eec92b030cb7b9a8b1451123bb885e0a3c0a4e59a24a1b2a720f0d794be596248dc31b67f6cb853f61012cfd5b2c117a78296800854e38a6749ce0165dbd8907391902fc164673dd6c906cea2bd6ab7e98cf8dfc005976e23a980ca329215a20ec3277cbfcad4b16e4569d435f675f55b1ce314391c503b571e02b0e8162b5a9573a197b6b3e7c995ad2d8b41b71f390580f471235a09e6870b753dd2d7385c808e5b872a5b357a33e8c7ee5da0237b2e9271421b2ca9b4943c2285a068eeddbf0505963a4abda17a65d7cd9a91d2c60e7e76fdd1b6679b7f9d8f1dcece5336f480103df4cbb50f4b9f726bd32abc6d3bed87ca296d32499fce057ad0e3e3645f857f54caa34f24be1c02a6a46e2b9c92aaf35aca3b1c7b50607426c2d67575dc0546c37d726293ba82d11052cc8acd44abadbc64a6d67c74a27efefca6a839e4c35eea0c89ca647b7ad1ab62a7300778196f15c7ba61a22b6562e4d5fe3bd1487a5c0dc3e43b5f48545aab734bc0efd401a44c948b7ac4d4f13e9766e1288e790902bb439e82307271f204e909dde75f80badaa9a702db8320f4b1b651185444282c6cf1fb29c869ad49db31a74b40bb40c9e62e7bd5342dca1b20b3bd4544a89b7f6efa1100740c10e3c08e0cdff59e3080af03c952e39a53aaef25d288553eb7a98f2d3ae264f765952cd52dbf9f81d2b41b833be85fe7751c45284c70c00a6009853af71529df036718b1ccf565b284293ce6a8b544cf0f82e2369846289ab990f31884fc30a05c46afeedd6ec3c8827869d6d846fe20d56c466b01fb592343e37958f583ec4770c69827937db1ebafb2cadbdb2bd2b1cce87af287aa6ee41ac9afe13344ecb67c879ead6bdedfa1ed6ff63275a6e270493bff59ccae09cc05b823b94cef60e4e7b1044a27f8d0111f891b103728e98a407367e0b19a5188efb08c4f00e4d99489ff977f210901d14cf7ec6289595d71fa678c6d47595a03d2bd79b1032d337997ae411739b2a0519bbfa87b5a4c57920ec1cbd6b95775794fd84752eb82e880c7defc96451b9dd62338dcd9271169706c9377f40d7a301ddd59ee66c8a62c48bf5369f54bc79f528bb214b1d4aba965f1890771a09ab47ab81a5387a45a3fbaa6cd2d74096e44a711b762a970206bce2f6a156e32045353d8b06d359bd7828da3314f61176f3746bb0e0ce69b4f23ba5ceba77c0b07cd475b047d6e1b0fd9eeb4738cd92e243d09e77593db0daea55d3aa34a7522d1bae4e8a0ed789509516551598ebbd499f2b569b22cca8fc9641353d6bdaaf261dda3600995a4da9ba4645bebe61f20c9127ae8057836a0a3004ef77ec585aaf2418c3d4abbd09de891b1cc95eac83e272d5ba82f52052bd7f234b82f05224fc83ba95456f346fd9aced98413bac5b490b706241a81fe55c716097579955dbea95fb5f2902ac7f2ff8b16ba47c51f4f5e2580e7c3785a4bfcd3e653d017274a80702ac1eabc25c258a7ba49b2171451a638f4fb571e2cda87f4835585f2f00c5e9cfc4090d4ad8be517c1634c3f331dc1863617e443a91dfbcf0799f8699bd1d779a740304903fbb51e271165ad647170ba416097fb26236fded971a6ba251f46bef6aada8e28c73e4f0193da8227d3e69a3d5d5287c5cf933a36d197b490b73dcd3698e31b125e7c00d4e9fbfe4118b44d8d562ad560c0bd5d614cc6ee7db98fbd2d3497e6ab7b9d698cc6962c31648aa43efc337d21777058daedbbffb76637f33313dbd89ef49cbce9f5bc792d2b1fd94b227f773a6fe7151f5cfbf46c601619a6b6a06982d33f5baff90cf8b656b08a9cbdeef2b4115061758e46b51c689952083e51847b878f766b94a4f750d9eae20bea7a66067229eab68c0598c07bc71f78dd42ba09afb308bc62522c481baa34c0352d7a0bcef5558464eb404cad5def638ff65b0c4f4a447e6b03fda5537129f55964f22dafa51b0fb018e75e0f35eb626bb41f9f70631a75a6af1ab38353edc0ae0d840e4922fc7e6ba938b42c373a72fdca8813ad5210dd782108dc0ffe847844a5c9a65172266dc081680958e5fba881c398f0709aac01e4d9900c91f6999492d862e45a10ea9420110b4f031f6f8cdfe9ac123ad8e5aa347c77d44168ed5cf53096586868a010b0a3676b8f08b33944b81441d6044b610b330b1535728101bc2ed71a35d37e532ece8293b8a84cb7e779bf909cb3022e1b690ee34395f50a278066a04389b42e8a99d7371905844652ddb163a140f37eca46db5d6122cd33935f311fc0c5bc7e35f7afdae17b5027506fe57d0b4a0c1fdc39fa8f9ad2dec737084097091320984e822b3835c39bfbd0159ab486576f64c1c72d48f4382ae6c989d0ea1764e6700ba9af271220503e5182ab1fe360f46fbaaaec5675b26d52673163a61f6c59bad5d1ccdab37995d4b89da9c56b7fa937c37de5e97a03275c307ce9cc504f742da89f0ebf5340fd347f20f13a22a9128e6ea238df35ad4cccef57af6ba5650fc741e90d3f120eaf86300042e4d4793d8a1caef4802fdc8619641a28d50f23759837f9a0c4a4e29fc59992da52a79f6044f94affe71e6cd748fb54ab2710f59dffea0b20752b36d908d5f02f6b3d0063a9eaf3c6f256f250b6b5ca18114ab660406aceb33b638ad983e3fce2144f2c65b57b2ebe069b7c180e16532406cd6ccf8a5681466328fcdb1d28bb73c8168f7ec54d35d3052317df8666461c1cde610dfb7a5a97991013a108397383809d101158c227e1bac146e0955bcb9e7a0548e5694b0af789b46525ed48b24db2e053dac4cec387104bdd6eff39aacb496a868f5950bacbf51f65659310500c5a2f7ac52accc352921341019b42033f4a5d1f178e37a756651670104a87677b4cbdc64277f84ac50d2d9676e42c09b6a466fad70e0b74a84d761b8517dd0d0aa96fbb355a71d7f632bb4e87329e0c87347392338055f48a03068de9b7229776d5fff69fc26c51df61de1893ce497c5887c3ed21145d526f560b0a3b957eca1bee2596276b7365e3e8ade49c95b2bb0717e7cd8f84840dc276aee833ff77c5e3c0b9df9adaf355749a092df6f2ad9f6bc741dabe095f147cfc1ab75e226427a9cd5dd1efd83245a7f8cbed5734676a935446598e57507202d326217e30f5414899b41168b1a3459a925c932c5ce5895956d610fc2946fa0bbce3e7d94f04d46f41a0d9eb41208df3c02d4a5c3f1cf13a23cf15ead0d47bfa74b2737f632dfd1312ab518ed239140ddc2773c2877bfb1d8aa917811"}) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0xaf02, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 09:46:24 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0x1f2c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10, r1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) 09:46:24 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0xa001, &(0x7f0000000780)={&(0x7f0000000240)=@newqdisc={0x6c, 0x24, 0xd8b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@TCA_STAB={0x2c, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x0, 0x5, 0x47, 0x0, 0x0, 0x0, 0x0, 0x3}}, {0xa, 0x2, [0x0, 0x0, 0x0]}}]}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0xff}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x6}, @qdisc_kind_options=@q_clsact={0xb, 0x1, 'clsact\x00'}]}, 0x6c}}, 0x0) 09:46:24 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xac, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0x2, &(0x7f0000000500)={0x0, 0x0, "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", "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"}) [ 636.281852][ T5] usb 5-1: new high-speed USB device number 14 using dummy_hcd [ 636.523215][ T5] usb 5-1: Using ep0 maxpacket: 16 09:46:25 executing program 3: pipe2$9p(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) close(r0) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x40002, 0x0) write$P9_RLINK(r0, 0x0, 0x0) 09:46:25 executing program 5: pipe2$9p(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) close(r0) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x40002, 0x0) write$P9_RLCREATE(r0, 0x0, 0x0) [ 636.645904][ T5] usb 5-1: config 0 has an invalid interface number: 219 but max is 0 [ 636.654861][ T5] usb 5-1: config 0 has no interface number 0 [ 636.661412][ T5] usb 5-1: config 0 interface 219 altsetting 0 endpoint 0xA has invalid wMaxPacketSize 0 [ 636.671744][ T5] usb 5-1: New USB device found, idVendor=078c, idProduct=1002, bcdDevice=e6.47 [ 636.681185][ T5] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 636.914791][ T5] usb 5-1: config 0 descriptor?? [ 637.168204][ T5] input: GTCO_CalComp as /devices/platform/dummy_hcd.4/usb5/5-1/5-1:0.219/input/input14 [ 637.374662][ T3692] usb 5-1: USB disconnect, device number 14 [ 637.400131][ T3692] gtco 5-1:0.219: gtco driver disconnected 09:46:26 executing program 4: r0 = syz_usb_connect(0x2, 0x36, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000300)={0x2c, &(0x7f0000000140)=ANY=[@ANYBLOB="000081"], 0x0, 0x0, 0x0, 0x0}, 0x0) 09:46:26 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0x1f2c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10, r1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) 09:46:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000340)={0x14}, 0x14) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000080)='.\x00', 0x400017e) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0xf) write$binfmt_elf64(r2, &(0x7f00000002c0)=ANY=[], 0x8) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) open$dir(&(0x7f00000000c0)='./file0\x00', 0x121781, 0x0) r3 = perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = fcntl$dupfd(r3, 0x406, 0xffffffffffffffff) setsockopt$inet6_MCAST_MSFILTER(r4, 0x29, 0x30, &(0x7f0000000000)={0x101, {{0xa, 0x4e21, 0x6, @private1, 0x80000001}}, 0x1}, 0x90) sendmsg$nl_generic(r4, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0xa0, 0x23, 0x200, 0x70bd25, 0x25dfdbfb, {0x15}, [@typed={0x7, 0x40, 0x0, 0x0, @str='![\x00'}, @nested={0x83, 0x9, 0x0, 0x1, [@typed={0x4, 0x1}, @generic="330ec4c25e40b0b6bd8c440a9434bdf2f610397fa67789bad1b80567881e1817b60dce577a8a4182d5599d09cffd27fcbba307f4547d2fa8ec12c3e6bd7319628cf428306a78ea2e22dee9c02c2e0ebecb1087120426c2d20d3a28eb851959e61b7980d351bfc8fa7c42ce89ebca4d1cf4a4fe06e685b2089e9f12"]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x44040000}, 0xc0) 09:46:26 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000380)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 09:46:26 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000006c0), 0x1591, 0x0, 0x0) 09:46:26 executing program 5: r0 = socket(0x10, 0x803, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r2, 0x4b72, &(0x7f0000000400)) 09:46:26 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0x1f2c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) 09:46:26 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000380)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='mountinfo\x00') keyctl$chown(0x4, 0x0, 0xee00, 0x0) preadv(r0, &(0x7f00000017c0), 0x375, 0x0, 0x0) mknod(0x0, 0x10, 0x0) 09:46:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0) r2 = openat$null(0xffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x442080, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, 0x140a, 0x100, 0x70bd2b, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_RES_LQPN={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}, @RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x3}]}, 0x30}}, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) syz_emit_ethernet(0x4a, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaabbbbbbbbbbbb86dd60209211001406fffe800e00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50c2000090780000"], 0x0) ioctl$VFIO_SET_IOMMU(0xffffffffffffffff, 0x3b66, 0x4) ioctl$CHAR_RAW_BSZSET(0xffffffffffffffff, 0x40041271, 0x0) 09:46:27 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0x1f2c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) 09:46:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ashmem\x00', 0x105300, 0x0) ppoll(&(0x7f0000000000), 0x0, 0x0, &(0x7f0000000080), 0x8) 09:46:27 executing program 4: r0 = syz_usb_connect(0x2, 0x36, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000300)={0x2c, &(0x7f0000000140)=ANY=[@ANYBLOB="000081"], 0x0, 0x0, 0x0, 0x0}, 0x0) 09:46:28 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0x1f2c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) 09:46:28 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ashmem\x00', 0x105300, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x8000) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) 09:46:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000340)={0x14}, 0x14) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000080)='.\x00', 0x400017e) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0xf) write$binfmt_elf64(r2, &(0x7f00000002c0)=ANY=[], 0x8) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) open$dir(&(0x7f00000000c0)='./file0\x00', 0x121781, 0x0) r3 = perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = fcntl$dupfd(r3, 0x406, 0xffffffffffffffff) setsockopt$inet6_MCAST_MSFILTER(r4, 0x29, 0x30, &(0x7f0000000000)={0x101, {{0xa, 0x4e21, 0x6, @private1, 0x80000001}}, 0x1}, 0x90) sendmsg$nl_generic(r4, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0xa0, 0x23, 0x200, 0x70bd25, 0x25dfdbfb, {0x15}, [@typed={0x7, 0x40, 0x0, 0x0, @str='![\x00'}, @nested={0x83, 0x9, 0x0, 0x1, [@typed={0x4, 0x1}, @generic="330ec4c25e40b0b6bd8c440a9434bdf2f610397fa67789bad1b80567881e1817b60dce577a8a4182d5599d09cffd27fcbba307f4547d2fa8ec12c3e6bd7319628cf428306a78ea2e22dee9c02c2e0ebecb1087120426c2d20d3a28eb851959e61b7980d351bfc8fa7c42ce89ebca4d1cf4a4fe06e685b2089e9f12"]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x44040000}, 0xc0) 09:46:29 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000380)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='mountinfo\x00') ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000200)={0x7fff, 0x939, 0x0, {0x7ff, 0xffffffff}, 0x1, 0x6}) preadv(r0, &(0x7f00000017c0), 0x375, 0x0, 0x0) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="3400000002030101000000000000000000000001080005400000000808000440000208000540000000100800034000000002"], 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000180)=0xa9, 0x4) 09:46:29 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x1f2c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)) 09:46:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ashmem\x00', 0x0, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, 0x0) 09:46:29 executing program 4: r0 = syz_usb_connect(0x2, 0x36, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000300)={0x2c, &(0x7f0000000140)=ANY=[@ANYBLOB="000081"], 0x0, 0x0, 0x0, 0x0}, 0x0) 09:46:29 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='mountinfo\x00') r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x5442, 0x801) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, 0x0) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, 0x0, 0x0) 09:46:29 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) write$FUSE_LSEEK(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000a40)=ANY=[], 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x101}}, 0x18) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000380)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x6}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdd3, 0x200007fc, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1, 0x0, 0xf080}, 0x100) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x21, 0x0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(0xffffffffffffffff, 0xc01064b3, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, 0x0) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES16=0x0, @ANYRESDEC], 0x1000001bd) 09:46:30 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x1f2c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)) 09:46:30 executing program 4: r0 = syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[], 0x0) syz_usb_control_io(r0, &(0x7f0000000300)={0x2c, &(0x7f0000000140)=ANY=[@ANYBLOB="000081"], 0x0, 0x0, 0x0, 0x0}, 0x0) 09:46:30 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7}}) write$tun(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="3f00000000000000000060a7ee6f00303a0000000000000000000200000000000000ff04"], 0x62) 09:46:30 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x483, &(0x7f0000000000)={0x11, @multicast1, 0x0, 0x0, 'sh\x00'}, 0x2c) 09:46:30 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x1f2c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)) [ 642.641846][ T9201] usb 5-1: new full-speed USB device number 15 using dummy_hcd [ 642.947629][ T9201] usb 5-1: device descriptor read/64, error 18 [ 643.341002][ T9201] usb 5-1: device descriptor read/64, error 18 [ 643.610998][ T9201] usb 5-1: new full-speed USB device number 16 using dummy_hcd [ 643.917257][ T9201] usb 5-1: device descriptor read/64, error 18 [ 644.341582][ T9201] usb 5-1: device descriptor read/64, error 18 [ 644.462283][ T9201] usb usb5-port1: attempt power cycle [ 645.194894][ T9201] usb 5-1: new full-speed USB device number 17 using dummy_hcd [ 645.464267][ T9201] usb 5-1: device descriptor read/8, error -71 09:46:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000340)={0x14}, 0x14) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000080)='.\x00', 0x400017e) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0xf) write$binfmt_elf64(r2, &(0x7f00000002c0)=ANY=[], 0x8) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) open$dir(&(0x7f00000000c0)='./file0\x00', 0x121781, 0x0) r3 = perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = fcntl$dupfd(r3, 0x406, 0xffffffffffffffff) setsockopt$inet6_MCAST_MSFILTER(r4, 0x29, 0x30, &(0x7f0000000000)={0x101, {{0xa, 0x4e21, 0x6, @private1, 0x80000001}}, 0x1}, 0x90) sendmsg$nl_generic(r4, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0xa0, 0x23, 0x200, 0x70bd25, 0x25dfdbfb, {0x15}, [@typed={0x7, 0x40, 0x0, 0x0, @str='![\x00'}, @nested={0x83, 0x9, 0x0, 0x1, [@typed={0x4, 0x1}, @generic="330ec4c25e40b0b6bd8c440a9434bdf2f610397fa67789bad1b80567881e1817b60dce577a8a4182d5599d09cffd27fcbba307f4547d2fa8ec12c3e6bd7319628cf428306a78ea2e22dee9c02c2e0ebecb1087120426c2d20d3a28eb851959e61b7980d351bfc8fa7c42ce89ebca4d1cf4a4fe06e685b2089e9f12"]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x44040000}, 0xc0) 09:46:34 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="c00000000001190500000600000000000a0000003c0001002c0001001400030016e8bad33edad6b8000900000000000014000400fe8000000000000000000000000000bb0c00020005000100000000003c0002000c00020005000100000000002c00010014000300fe88000000000000000000000000000114000400ff01000000000000000000ac00000001080007"], 0xc0}}, 0x0) 09:46:34 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0xe22, 0x0, @mcast2, 0x7}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @dev}, 0x1c) syz_emit_ethernet(0x46, &(0x7f0000000080)={@local, @random, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "010008", 0x10, 0x11, 0x0, @dev, @mcast2, {[], {0x4e20, 0xe22, 0x10, 0x0, @gue={{0x2}}}}}}}}, 0x0) 09:46:34 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0x1f2c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) 09:46:34 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=ANY=[@ANYBLOB="600000001000014d14f2cb97ab75470eb0d9d046", @ANYRES32=0x0, @ANYBLOB="bb0e0000000000003000128009000100766c616e000000002000028006000100000000000c000200160000000e0000000600050088a8000008000500", @ANYRES32], 0x60}, 0x1, 0x0, 0x0, 0x10}, 0x0) r0 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r0, &(0x7f0000000000), 0x40000000000024a, 0x0) 09:46:34 executing program 4: r0 = syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[], 0x0) syz_usb_control_io(r0, &(0x7f0000000300)={0x2c, &(0x7f0000000140)=ANY=[@ANYBLOB="000081"], 0x0, 0x0, 0x0, 0x0}, 0x0) [ 645.671704][ T9201] usb 5-1: device descriptor read/8, error -71 [ 645.826647][T12805] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 645.850775][T12806] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.5'. [ 645.857395][T12808] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 09:46:34 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000c80)="3312", 0x598}], 0x1}, 0x0) 09:46:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x4, 0x7, 0xa, 0x3, 0x1c6, 0xffffffffffffffff, 0x3}, 0x40) r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'wg1\x00', @remote}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext={0x0, 0x7}, 0x8008, 0x0, 0x5cf32be2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='memory.current\x00', 0x0, 0x0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={0x0}, 0x10) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000080)='FREEZING\x00', 0x9) 09:46:34 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0x1f2c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) [ 646.171500][ T9201] usb 5-1: new full-speed USB device number 18 using dummy_hcd 09:46:34 executing program 2: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xd00000000000000, 0x0, 0x0) bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x20000000007ffd, 0x7c, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) [ 646.320799][ T8716] Bluetooth: hci4: command 0x0406 tx timeout [ 646.374897][ T9201] usb 5-1: device descriptor read/8, error -61 [ 646.662554][ T9201] usb 5-1: device descriptor read/8, error -61 [ 646.785156][ T9201] usb usb5-port1: unable to enumerate USB device 09:46:35 executing program 3: ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\xf7\x00') r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000280)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x5}, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x72}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe2c, 0x10, &(0x7f0000000000), 0x32}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x0, 0x2e, 0x0, &(0x7f0000000040)="e1865d0d", 0x0, 0xac1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000200)) 09:46:35 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0x1f2c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) [ 647.261781][T12827] [ 647.264289][T12827] ********************************************************** [ 647.271933][T12827] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 647.279448][T12827] ** ** [ 647.287088][T12827] ** trace_printk() being used. Allocating extra memory. ** [ 647.294672][T12827] ** ** [ 647.302288][T12827] ** This means that this is a DEBUG kernel and it is ** [ 647.309801][T12827] ** unsafe for production use. ** [ 647.317377][T12827] ** ** [ 647.325009][T12827] ** If you see this message and you are not debugging ** [ 647.332600][T12827] ** the kernel, report this immediately to your vendor! ** [ 647.340113][T12827] ** ** [ 647.347948][T12827] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 647.355731][T12827] ********************************************************** [ 648.049317][T12829] [ 648.052537][T12829] ********************************************************** [ 648.060047][T12829] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 648.067787][T12829] ** ** [ 648.075417][T12829] ** trace_printk() being used. Allocating extra memory. ** [ 648.083022][T12829] ** ** [ 648.090693][T12829] ** This means that this is a DEBUG kernel and it is ** [ 648.098204][T12829] ** unsafe for production use. ** [ 648.106106][T12829] ** ** [ 648.113721][T12829] ** If you see this message and you are not debugging ** [ 648.121412][T12829] ** the kernel, report this immediately to your vendor! ** [ 648.129046][T12829] ** ** [ 648.136682][T12829] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 648.144307][T12829] ********************************************************** 09:46:36 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x95, 0x100007}, 0x41002, 0x7c4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x10, 0x3, 0x0, 0x0, 0x0, 0x1ff, 0x4110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f0000000300), 0xa}, 0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x5, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x24000844) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f0000000500)=@isdn={0x22, 0x0, 0x94, 0x88, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000580)="7696f06172d3fe50dcbaac4a16fb28b44e0c3de7fccb60a1301e6b14603659fc247cb8a57b932d00b5151e7176821177ae6bbddb23610b2c51532426628e0902bc063e5e9e0a39823537325705c8300043c9ac6b1461c9975fdac6d9dd56b9fd5ce3f882bf2496520b569035026d51a650aa6c050f20fb649b50b3ccd604e7e37517c3389cbef8bfd25f16fb4f4bc85eecf2dc3a19", 0x95}, {&(0x7f0000001700)="8eba8bcf688df9221ee8f452e1b07c6fe1058f69ef3a6e49b7dffacd7ecc240adf0ab85121a86c6d5b64b63dfd939e35f4d19de14f234a97cd9dc1b3393ea6c77ac6e555df61c1870311018afc2702d149bfd5fa1e2d81df62316c5d89a535a66cba28be018c73b698567d44a3b2561d176a3ea57b9af6ef51fc9c613f80a5b0943fb3e80fa51f52a07171a5da8a0e6d98fea6f55b453cf8a6480230dad895c59dc11605f4ed6191028ea9627933935f1711616743275e4d", 0xb8}], 0x2, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"/673], 0x298}, 0x8000) socket$kcm(0xa, 0x6, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc87,\x00\xd2\x97\x04\x03\xdc\r') bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={&(0x7f0000000380)="c70e1249e1e8a92daf5fc5873622e258198c4f332cdd80c0bad0975f4f626a169fe67469938954ba150936ce9cdf4360a80d308f0afae649dea93e0ea56dbb3882bbbc5d86caa53cab0480dc85c6541beb6f15b2044e2154f7260c52de0f0b610e557aa5907181cc183531bc7dad23bc49c76e60952a99c6f0eec1285b272da376b6f9b82c6d35ed756ad99327a36eb9a7cec5f7f5748ac663ad2c1ade9aea0116bb9e35c072fd759b5395ed32e8e4dbbeb9e8df180555d2ba52c3232c5c1dd5354bc3385458c9640b2f708b36bc26d2a4e700cb097a94fe72515c1c3c1c79b01dcd59fcecd1d9d2b084f1add8bf7f73ffceb6989c23", &(0x7f0000000640)=""/147, &(0x7f0000000700)="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", 0x0, 0x9, r3}, 0x38) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40305829, &(0x7f0000000040)) close(r4) openat$cgroup_ro(r4, &(0x7f00000000c0)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000b40)='lo\x00\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) r3 = socket(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000000)={0x11, @multicast1, 0x0, 0x8800, 'sh\x00'}, 0x2c) ioctl$SIOCAX25GETINFO(r3, 0x89ed, &(0x7f0000000400)) r4 = socket$inet_smc(0x2b, 0x1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000240)={"0aef5633f0291e8dab7eaa2ee6d3035f", 0x0, 0x0, {0x7, 0x4}, {0x6, 0x3}, 0x2, [0xfffffffffffffff7, 0x3, 0x2, 0x4, 0x3, 0x80, 0x1000, 0x1, 0x200, 0x8, 0x4c8, 0x100000000, 0x101, 0x287, 0x7, 0xfffffffffffffc01]}) ioctl$BTRFS_IOC_RM_DEV_V2(r1, 0x5000943a, &(0x7f0000000880)={{r4}, r5, 0x1e, @inherit={0x68, &(0x7f0000000340)={0x1, 0x4, 0x1, 0x8, {0x29, 0x4, 0x80000000, 0x9, 0x7}, [0xfffffffffffffffc, 0x6, 0x800, 0xe8ec]}}, @name="74d20b8c246f7d6523c5e2a8124099de1224bc529ee19501a4ca79e15ba5c622c0e8f0ffdccfbbe3b07ba46cac1db632b5afe73e02c7f09bd9516a5bd4dfad59b319108d52422c9a8f71af1d25818bebc3c628c8c98f8f2bb02e5a7e8b842e6950a26892652cd4371de13c956fa9e9c8fe2c11edf0fb09073e5e671b1034fa3da9a1599994ba53da4b910df9098f7e64b0b5cfe4f1cf2e6d32741cfbd6d332db6253e9cf9f2af95d53d55d99192bc6c2fed562b090ef9fb5df04006bf7fd111eb6677f4889939ad1f3451ab28bdbe4d7ef5aa182815f415867ffa2e8c26a08c9867e64931280251e70065d85adbe17bf2c44985f85da357a9467517b80ed8b3ade13d061bc08230e0660769c4dfcbc483db4a4a150ee772f422d35091b42e7e6c902e4dd43db5d9703a9cb64de4209f49a08c922a6323a57207b406440e8abc2e6c216ea2b4c6d82d4508883b1966c07ab5cae9946b69c781e4187cc01104def1eb715ba60e13c263907d29b8b389855f24b0d4b5d5dc9b69327e256fe5234d8f74e4662c26006f85d714f91399edf79e8d8882c9cf404e3c4c059602aaf438b391cae850c1b943db05b082961a19e28c72fbe2aefd3c27fc234ed132c59f71ab4b0b2c3af7a9bc6be2a443b8acc5ed7407343287b1707039c3a2cde7cd156cc49bb0c6784ffbeb09aba400f50c6a8a854795f7e3f743897acab310eada6d1255e9f4674575651d3d7cb028b8ec1f05433bdf44b1f43ccfa57a1ff847591d7589722da35d191505638ed245d35f7fb1f4de3e024ddce1ba2eecb3b8e0342e144f528b1be14d5084c332753e3d45e8cbf20953451290f708cf81d23c920da11e1d9b7e9d209c41bc03e00ea990c9bee6013db0ab39bf5e2e1f0b3e82d40515a583de24ae91a19407a3138938e73b585ea87df8c4829b3fbe04ac8cd2370e6f79392f865da6fc98e935573de7ee2b69b075262e578159b46456b0ada94ad8f0aefcb2fc22356c30be060ffc95dbc1621f646c69da3bfb981da242645556f850908789a0dd8e2cff15294a934366efa35078218a0fd36b26cf025b6b616e283a10afb3d49ffa939d28b6d0a454b3a7469cffac150d663f70c31d7d837f988a0dfa6bcb2067ddfb915bf3f72548a605a69c6b239a55b9512eab756dbd5e7c73dc0829eb277f3a502ed8ba84c50e84c1b010e888e8737984a4f9db485a2d4d15f986bd3f1f7f15a4d1e77ec6eba71c6dc234e957e5839c181f45ded730a05dcf482b862f7b94d8ef98de58abc17c7704945f4610705f11c557161f5729cd3771e776cac9dcab8959735d030d34b7ebaddeea3f04191ab900b41acd4dc40e08e30a5babe671d465951c1804c3ea565cd46e4fd3ad87a1f8120799e074355c8b0f1ee19448c286004c5b1de4b73b77ef34ffef1e000c7aacce6b2b513ed095fe6b1866f24309dac18cbf01c4c2ee017b881ab693aba6838d26bb995c05b1d71a4318e1d80ad84ff50ffbdcb5b1c14c1c6e677201a00db8194e6bcb1fa6c51d05cb626b282bea0295b53c3847296ea26ad70e515fcfe30b767dd9a9a37da5afe8f1e4060adce02df8eea1d2768b6103096c1b4cb28c83d163526477619ebf32f039e35ba7170b329cb11d72c4b12d13ffdd813d09c431c961ca99c7bb0c54b1b0a518d3b1c13c519c624a2a4884956703204de9801e1eff3c806232eed549c6b59cbbec75ad9139b70accb80adbe754d7c7c90b995c91bb83c3b32b233356ce6b6289f22df85c19538c29babd69bd2c97e35db76f9d1d5521400a5fba719972865ebe391ea45db36735b790729f26bec1681b8d8d20aa9b3475e105c2726c28ea6c2717698fddebffbdd4c19948ab9da88c627d4e31d5044b8d1d9e2f1a0728346cfeef0ba27d8bd508539505a2fa3bfcb91bea8cb22bbd7dcc744e83b28adcdaa4f7be15345fdd9f03a6907a47c259572f9ee3b22fda566d69a1bf400a0b098d07568707e2e461ccf4ae687e96e7654896c64e7f316cc483cb6c92e0820fa987cbe5ab1821336c1980a3544c800ae98360c5f16caa44b5d6416c156292b1d27d0cb70b28af8d34a41e77e0f9da7c563487c1a5446b212d41c650ab9f3b7c45241fe34f3b14e17aab2ca20bc6f4bfddc2ffc1d012ae577ddeaa923911e736f4ae8f5a18813c38a6be94ad0d5cef2985105538ed3d37cf16c41b5084ee36ad2f91cbc3b7740ef50020409de5d9acc8b90d58bbfab4f131c5fdf757b545de95269cb76df6c610c7e54096ab02556a81f65d245c1cef181d1a5a4033b4d3d648f89705201e2d969cfd3a2cce491161c3f654f55b8b69bbc7dcf45aacf2962c2eec9c700166ee8a7fdf566946577111461767f489682715ab0da038bfce0f33a3fd20bb01fe7a59440279cff3a3bc4f347a70961d457afb2cb9e9f33a46c1f22ff3eb6776c0de5cc83d947813d2a0c3a5cb3e88597987ac70e0870885d98fb90d7c8027d378bc4f9dcdee6f39255ccc4f6c12a55ced136cde434544e45d082ba66082dbd373a14efff3e028c4eacda74e4a14ec68ea26a03b652710d78be2a6b5ef11dc31be8ace71762180c35b50d59b74e76ac75d0415ba88d3d36bc129307b242b874ae9f3110a855217b2152ef2fb3d19ea7ecd83e365e9254af66573fedd08451b6d7ab14cdb745001e0a653fa951a50b292bd4ec821c1732b3290bb7d9aae628c0cc51b3797b78ac91c363b31c9c768fefd5fa8c39ebb6c7407657178397a8456e3951aa491701603ddc571097f90b64c958ea09616b1deee0e8766471c1f2f68443289cad8cbcd8083a49e845b87137a5b28f0a8a335a7363763dcabcd32d2950f615c7c0e4de53560f460672e4613567652aa290421894af219a76c65d7380850751e46c8f7d3e89930dd131529c148dd402de5f4d6354c4e278d8f89bb46cbe79189b3d4df739f01d1566efcfa76e3718619bbfbc33c722c5296dd1abf94daba0261f58055a575ef32b5d91e3e23ed575d885a8ee93ff450c3fc55f799bc73f2f009bc8a148dc2585354ad73fd6d8df89aa270539f8fb086ceecf12a36d6246a16cc43d8520201110c3d843697f71e86c1b64d0d95bed28e6214d068568ed6f5c36070a8ef5207765ccff37e96aee073d2ad27beebc049c8b1abc9f216a5d65ab3253d9350eead271ff92a3d71047af3bdee41a7cd166a7319d0bd70f7f724e149b36088099eed9da87512c335275c0d3676f779be76a4f3703814544ef12544e0bbfe3b8de18ceebe68ebe6d67d554dcb703af0b2eb0e3f6b230d0700913819ab9ce623995e491efefb234ac843a0357f3dfa945be80978919a63db8d125a5c2dc5a779da226597891ee6493d54f1c7cd6f4048c59a99d2f75e5c39911a076108ac784e7f01f4ef2e7b4aa01c86255e29904521a135654e3afa0a9c95c9af3c836923f67520531be79478760191ad717e2c76ccac357dc23a4ca8b8522f41f889e2c0d26fbd60e7bd65000d7240fda489a6d669de3a486cfa5bad0bb3a20c6b351f78ac1efda0f01cbc30d452c94893a98b570f068c113de29d83d8affd11400ee585f932963290ae5b9a74d9e6f4849a0d521be48d96430f20be9d579c0af117db18779fb2546a6489b7a50a9b86b3f586c2b00a6bf01454f574fb064ec187c7864906ce336eb2ddff7e942a8aec610a54302bcadf85acfbaac8561d6d530191fb4c388991590de8f8b8b9fed398ad0656d9c90315248f3ee574cd7145a566d61438382cbe33caa01a63760ad9e7478eeea15e73bb502c6cae04f5e6e87db6e7dd7524a5404736a499f70503794b25463f54e722e75cb5a2c4bf381aec5bafe373bcdc721214a078135ae6dc4f86af80d461aa02541e34e4135ca9b9e643fdbe4620faf79092abb197cf9a7931aaa71db563183bcf746fdd0dd667aa87335f5fed53a901179d2d7b66d42bdfbe83d2f65be32bb8052494a58eb3f0f3b0ecb7f51ab6417dfc03f313029f453c380fdd9e4f99f447d98b06062e8bce5ae0f649d9331a239eb793100d7f32f60f71327f76193e062d28a688938b60669b5f7c26147adc49baa86d2e220e6dfd8d796a89789974fabf2e84d945fd5d07ab14287958f48257ba9003d2e82acc5b3ac68370e70114eb133afd9eedbd21740742f392d475123aacccca4f278ff8cd39971decf4d271c10cbeb8d8d1087574275dc578fafda92f09987ed5d4990dfc9d0ca4291f23bc82770be51bfed45cec00d3a08f4c0912d0bc07333ca02eb3693fef446d9e0367d2305ceecd95cc345564187e2e0031abd8389edb6c045573e80947f8b18bd6a9ffde7ee9d76a241f265b11b70db5b72e42d928fcd209b58c3631f155665ecb74847bc658fe4eb01e42f7489334ed16fbb8f1e8c997b246f2ee9793849fc5203220afbfe575bd9147d2f310c141550c1260ac5fc954e43e004a5d8fd416337696c0c750fb7c5ed09bb589987a8264811104bd0398e952fd92679331c82df02ba49cc3aaa458d86d15c2a9fc5e5b072017d31e81edcb8e6c514bfef3a3fde71490dd0a2279c5e9efe6163a8c98bfd8311b0b5265bc91d189b27457b00adbcfd4c6bc442e17bdcb59668f3242737a3d476be930bad69526625a67c5f82b2f7ded57969c0c33afeaa524aa41ad962c4b03281d12779383679cd137deaf3dc45d5518cecf95448e20b38d8ec464f7ec2548b32c01f31f61fac50afb65d1b137d2276130a6e75de0f5566f461c75ef13ac8fc66c251e621a961e4a878491ffb0ea502f27787658969598aead65daf2d47d18d943384cdd50ec81cd179176f3b79d4827ca75c0f47ee3982ef3fb4a47c920f9b804bccb440e8eee25d7fd996608c20e8558de38199f17eecbed58898ba1511a4f434456cab1d80b632543ec7bc464353634fbc51a8156fed2ec9b6b29c868c35e5b8577509bc457ed639fa51601594d3bda29e73ef28f2e916d88803963c0523c814c58010fd887a4a155b5b35a8b52327f143e49c45247d661aab98affa48017f453665b5b2fd3726e316f8a8b0eccd434cbdb50648bdd010895a41838b2068412573e7b19273ea02a9b688e071fe1cb3a37e71f1e3647a11bdf16610d30f5082d47ea240e0fa8cf9f2560e37d171461f6c903dc07e6ca63be9ff2cfffe2963867b653d25cec1970b7f56e8c7ebb2718b7c212144774fbb818394884a97ecb9af0e372a2fe246fce50f550b0a684a58e33cb15b982be9d312d2090de531fbdb7773197cfcbe60acd6380dd1950d1933afef329dc78431fee5636052dc0c07695d294b529febf5739307c7f715d3eff8415ac80f3af7c601d770c0a277a926a41e8ddb2d091f0219624af50ae298f74eef02be0b0d97cfe5a5eada410ba7a932551010209d820a393d5554eb76204356d2226dd2c454b15f9acfaca2f62cc29c8369a786d21fe4e5168b8a07fe80d88b2d8407efc36628dcdd26d0ee2bb5e7bcb0be50e8c358080af7703fa35deea889b94397b8a0eb33453013ccb8d2e704f21846e5c874394b802425dddb72d54fb54f7fd0ad2030079a8451ced4ab1c77e431abae1741f0c8fe72df9fa7066d0effc31e84153985493b5ead6d4646d365b11a3422d205f910924c5cf1041c8b34ee52ffd9a3e655484b8233e73b19669aad6733bd08ab8fa00377fdd29ccbb18e8310ba399240d96de5b248ab4389256e70440d0e08f729da"}) r6 = socket(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @multicast1, 0x0, 0x87ff, 'ovf\x00', 0x0, 0xffffffff}, 0x2c) r7 = socket$inet(0x2, 0x80000, 0x2) ioctl$BTRFS_IOC_SNAP_CREATE(r6, 0x50009401, &(0x7f0000001880)={{r7}, "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"}) ioctl$sock_ifreq(r0, 0x8931, &(0x7f00000003c0)={'ipvlan1\x00', @ifru_addrs=@tipc=@nameseq={0x1e, 0x1, 0x3, {0x2, 0x0, 0x4}}}) sendmmsg$inet(r0, &(0x7f0000000800)=[{{&(0x7f0000000000)={0x2, 0x4e21, @rand_addr=0x64010100}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @broadcast, @multicast2}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @dev}}}], 0x40}}, {{&(0x7f0000000200)={0x2, 0x4e21, @local}, 0x10, 0x0}}], 0x2, 0x0) 09:46:36 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000480)="89000000120081ae08060c0f006b3f007f03e3f70000000000e2ffca1b4e0906a6bd7c493872f750375ed08a56331d3f64700169381ad6e747033a4497b837dc6cc01e32ef1b04febb1182c807000200190077a0bdad446b9bbc19c7e3988281dc2ff613b34203f859cea4e4558b000000000000007ee2b49e566f8afa8af92347510f0b56a20ff27f", 0x89}], 0x1}, 0x0) 09:46:36 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 09:46:36 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6, 0x6a, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x9, 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) perf_event_open(&(0x7f0000001800)={0x3, 0x70, 0x9, 0x81, 0x0, 0x0, 0x0, 0x3, 0x21100, 0xc, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffffffb, 0x4, @perf_bp={&(0x7f00000017c0)}, 0x20, 0x81, 0x80000001, 0x0, 0x46, 0x800000, 0xfff}, 0x0, 0x7, 0xffffffffffffffff, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x488c5) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$inet(r2, &(0x7f0000001780)={&(0x7f0000000040)={0x2, 0x4e24, @empty}, 0x10, &(0x7f00000015c0)=[{&(0x7f0000001880)="968b092eb5e5467adf00fb96231da0d4df69375d616f5d83089e5aba5453fc54413bc8c6d5288cddf4c995049743201e3f9e5c13bb3f776ae99c1c2365fd", 0x3e}, {&(0x7f0000000280)="df835e62692959176b1eb2097c303e3579b3c9ddc96a08c619f85806d54db8fa220a9b0165c4dee8f337", 0x2a}, {&(0x7f0000000380)="7fbdedce7f8962718697a6298a68aa22c30adfec4e638c9f4a9fb50d0850edab96e7e6310729b1c04e0ca10d28050734f59493b40d67f57a3eb2fc29c1fd275ac2700fcc0ab8590f76420127d32001dce8cc5fac865965f7f5f0e61702fd4ec21822218b78a255d8506f2f7d64066fb8b8843c6184fd68eb", 0x78}, {&(0x7f0000000400)="2ec5fa8ed5badb8ede660da4b4f612634bd928297c4d8cb31c36901031e71ca51b040980334800f14cb23bb74db44e48d111e442", 0x34}, {&(0x7f0000000440)="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", 0xfa}, {&(0x7f0000000540)}, {&(0x7f0000001540)="9c48bdc797ff6f14cae0e3f184e477260da41c94443e6b675464e47be69bee7398a1591e252450361d658dbdbaa793467a6f7ca09f838adab9a3e34dcdfcd3b4d5acca7caac19bc03df6775c5fb538d87d908b485df01b41246617338c242ee01fa378b0dd0fb5d2e00eb8762ded7c3ecee4e9", 0x73}], 0x7, &(0x7f0000001640)=[@ip_retopts={{0x6c, 0x0, 0x7, {[@rr={0x7, 0xb, 0x7a, [@remote, @empty]}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x38, 0x0, [{0x7, 0xe, "a7bc09c5c96afda7bfa17b7b"}, {0x5, 0x5, "22878a"}, {0x2, 0x2}, {0x0, 0xd, "ed672845083fb8ec5ff040"}, {0x5, 0x2}, {0x6, 0xe, "4bc32951b381aaf28a1f3a0b"}]}, @ssrr={0x89, 0x7, 0x2c, [@multicast1]}, @noop, @timestamp_addr={0x44, 0xc, 0xd8, 0x1, 0x8, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x2}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast1, @private=0xa010102}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x80}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x20}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8001}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}], 0x110}, 0x44084) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000240)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) [ 649.023954][T12858] device lo entered promiscuous mode 09:46:37 executing program 4: r0 = syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[], 0x0) syz_usb_control_io(r0, &(0x7f0000000300)={0x2c, &(0x7f0000000140)=ANY=[@ANYBLOB="000081"], 0x0, 0x0, 0x0, 0x0}, 0x0) 09:46:37 executing program 3: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f00000001c0)=@in6={0x2, 0x0, 0x0, @remote}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r0, &(0x7f0000000180)={&(0x7f00000001c0)=@nl=@unspec, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000240)="82c2178d", 0xfc9e}], 0x1}, 0x0) r1 = socket$kcm(0x2, 0x200000000000003, 0x0) sendmsg$inet(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x2, 0x4001, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10, 0x0}, 0x200400c4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000cacbf0b9c4b88449c3a926042512e17e46f7071a4631eec42107f2e6ddbe1152296c6a6db4afa7c81b2636b1c5fbe24ec8831700000000000000addb35cfdbe22fb6f8804104c39ae5803ac80ea369736a96b0ab2d2a45070b5041c64998b65eff5f9c9bee0b9c71fe1af74b162fc7d8e37028b00457782e60fa1ef56a60e65288c377527c44277565f3cf691b5d000ff11b6f1e99c3c8efd60d58bf6ef50e275939ce2e28b4316fcdc47a40d9524f471508f68f03000000000000009de0598d65ce31c9e1560d948d57ab2c51527e5f82858ffb3e2f285f97457df03f865c6643fe2f75766a3b75cb01920e293282e8911c0535298ef1353956e038d7f074442103000000c28368c751db3503ac0ec16004c777a751551cc10d25b659005809a3414522d64fb7d8d31a1ba1abf16839f72c6cef03656593ec7a174857b0e8e50ef06aad2f33c63dabfad570f2d18f8ef0428de16036b1c64d580f07483cc505a633574837b36cddc7f62861c9ad0e489283257a3aaa4bc299b88aeaf62468794d58773ec554a3155d76e7c7cba6b179eeee2e4d7261bab7042a7e9cd49eab2871cb497e74739f1613ac9e8704"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0xfe, 0x0, 0xff, 0xa0210, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300), 0x6}, 0x0, 0x7fff, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x55, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x41000, 0xe, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, r2}, 0x78) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f5, &(0x7f0000000080)) sendmsg$kcm(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000009c0)="7b350cbbc7734536d010e3eaf328db20c8fd20dbca4d9a31d0fbfa00d6f53fcc6aacc99830792708f799add58b87a1b250ed7aa6f3dd3578270303998d5ceac249b6440ca31044af460d67af066127276469d8bee851a742ac105dc7fd56f205b8b7ab944716777a5be665667d0064d85a9eaf9b9eb661ea934ce168d4b10e298191dee203f1fe5c51adcc9609a0bd92d23dd52fbdaf815622652bbe91350e865f8c", 0xa2}, {&(0x7f0000000400)="44ef07a02a56a235bd41646d213daa5bf627c9b1752212b20b3dedf9b3da03c5669c1fc3ca0cdb27c450134a59dd6a7ad3a58b0843c931d5c0b768063f2882fc06112c82a340d0b47feb335ad6b128e2b687b64d491fa2fa52327d3ff599ac595bbe27d5fb42eda533655c0dcbcf863034a708829265f6b1c47067a2784aefb0f0eb268ed810594f0cdac551c56b02", 0x8f}], 0x2, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x48}, 0x20004004) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x80, 0x6, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x6, 0x8}, 0x4004, 0x0, 0x4000000, 0x3, 0x7, 0x4, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpu.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) 09:46:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000003000)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r2, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)={r2, r1}) 09:46:37 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x76}, [@call={0x27}]}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x62, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) [ 650.051098][ T3692] usb 5-1: new full-speed USB device number 19 using dummy_hcd [ 650.321489][ T3692] usb 5-1: device descriptor read/64, error 18 09:46:38 executing program 0: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6, 0x6a, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x9, 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) perf_event_open(&(0x7f0000001800)={0x3, 0x70, 0x9, 0x81, 0x0, 0x0, 0x0, 0x3, 0x21100, 0xc, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffffffb, 0x4, @perf_bp={&(0x7f00000017c0)}, 0x20, 0x81, 0x80000001, 0x0, 0x46, 0x800000, 0xfff}, 0x0, 0x7, 0xffffffffffffffff, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x488c5) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$inet(r2, &(0x7f0000001780)={&(0x7f0000000040)={0x2, 0x4e24, @empty}, 0x10, &(0x7f00000015c0)=[{&(0x7f0000001880)="968b092eb5e5467adf00fb96231da0d4df69375d616f5d83089e5aba5453fc54413bc8c6d5288cddf4c995049743201e3f9e5c13bb3f776ae99c1c2365fd", 0x3e}, {&(0x7f0000000280)="df835e62692959176b1eb2097c303e3579b3c9ddc96a08c619f85806d54db8fa220a9b0165c4dee8f337", 0x2a}, {&(0x7f0000000380)="7fbdedce7f8962718697a6298a68aa22c30adfec4e638c9f4a9fb50d0850edab96e7e6310729b1c04e0ca10d28050734f59493b40d67f57a3eb2fc29c1fd275ac2700fcc0ab8590f76420127d32001dce8cc5fac865965f7f5f0e61702fd4ec21822218b78a255d8506f2f7d64066fb8b8843c6184fd68eb", 0x78}, {&(0x7f0000000400)="2ec5fa8ed5badb8ede660da4b4f612634bd928297c4d8cb31c36901031e71ca51b040980334800f14cb23bb74db44e48d111e442", 0x34}, {&(0x7f0000000440)="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", 0xfa}, {&(0x7f0000000540)}, {&(0x7f0000001540)="9c48bdc797ff6f14cae0e3f184e477260da41c94443e6b675464e47be69bee7398a1591e252450361d658dbdbaa793467a6f7ca09f838adab9a3e34dcdfcd3b4d5acca7caac19bc03df6775c5fb538d87d908b485df01b41246617338c242ee01fa378b0dd0fb5d2e00eb8762ded7c3ecee4e9", 0x73}], 0x7, &(0x7f0000001640)=[@ip_retopts={{0x6c, 0x0, 0x7, {[@rr={0x7, 0xb, 0x7a, [@remote, @empty]}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x38, 0x0, [{0x7, 0xe, "a7bc09c5c96afda7bfa17b7b"}, {0x5, 0x5, "22878a"}, {0x2, 0x2}, {0x0, 0xd, "ed672845083fb8ec5ff040"}, {0x5, 0x2}, {0x6, 0xe, "4bc32951b381aaf28a1f3a0b"}]}, @ssrr={0x89, 0x7, 0x2c, [@multicast1]}, @noop, @timestamp_addr={0x44, 0xc, 0xd8, 0x1, 0x8, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x2}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast1, @private}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x80}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x20}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8001}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}], 0x110}, 0x44084) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000240)) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup(r3, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) [ 650.710845][ T3692] usb 5-1: device descriptor read/64, error 18 09:46:39 executing program 1: r0 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\b\x00\x00\x00\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe9\xaa\x9b\xc3\x14\xd2\xd1y\x1f\x9e\x856\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce(\xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(\xb8\xd9\xa3\xc4p\xf4\\>A\x11U\x99\x8d\xa3\x86\xb7\x1d\x87z\xd3\xc4\xdf\x13/\x97Yy\x8b{\x1df\x8d/\x90\xd3<\xf8\x18\xa4\x88\xcf\x048\xb4\xbe\xfa\xa5\xb7\xd6\xa5&);\x1br\xd2a\xf2\x8b\xa7\x15\xbe\x95\xeb\x1bB\xacoyP\xbb\x1c\xb9S-\xe0oK\xac\x00;S\x8a\x01\xd2\xca<\x04\xaf\x04\x9a\x9d\x84\xa5\x94J>F\xc5V\xc6\xfa\x8e\v\xe1\x82\x03`\xf8\xca\xf4\x89\r^Z44\x91\xeb\xf4$\xf3\x1d\xd5\xbd\xb6ZZ\xd8\xfdS\r\x98\x06/\x9a%m\xcf\xab u\xa6Fw\xde\xb4?\r\xbdK\xfb\xf2\x13\xb3\xfa\x00\xaaP\xc9t\x7f\'\xba\x12', 0x0) pwrite64(r0, &(0x7f00000006c0)="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", 0x101, 0x0) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x100000c, 0x11, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000040)='./file0\x00') rename(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f0000000180)='./file0\x00') [ 650.981431][ T3692] usb 5-1: new full-speed USB device number 20 using dummy_hcd 09:46:39 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = ioctl$TIOCGPTPEER(r0, 0x5414, 0x20000004) fcntl$setown(r1, 0x8, 0xffffffffffffffff) [ 651.251345][ T3692] usb 5-1: device descriptor read/64, error 18 09:46:40 executing program 0: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xcd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x27, 0x304, &(0x7f0000000040)="b9030360e000f000009e0ff043051fffffe100004000633a77fbac141441e0000001be3e7d2a182fff", 0x0, 0x104, 0xa000000, 0xe0ffffff, 0xfeb9, &(0x7f0000000640)="9209558f0c5fb25cd57f98113135c3171b8b331fbc04f0e6955a796ff8e3aae3cac46cec3030dfc999058aea01f0e6dcf2f9d480d328655aca003927bd50ed49d4843c8a0a2a4b26ceb747947200bd644c85e7a8a7d7cfce840c02a7d69c9e0bca410f64d43290abbbf3131e1fa8bd8c3e5f19d5a491d3d4c1a0fe47de9eebaf073ac3da6256bdb681d18fbd607c9b0d710442bcf78bc36fd3c035812bde582a262bff0e4d6181c818fccf542868c6e602d97bea23a101955dc76bcc984142ab305387aa348566d688edd291a3e9d08952adbdf60462bb7f7faebcdfccf17115708b0d73d0f3a469ce7d8374219b3f92c92bcec4958d474bb281c26691949d054b784a5866f081e53eb9cfd7", &(0x7f0000000100)}, 0x28) [ 651.640784][ T3692] usb 5-1: device descriptor read/64, error 18 09:46:40 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6, 0x6a, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x9, 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0x12) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001800)={0x3, 0x70, 0x9, 0x81, 0x0, 0x0, 0x0, 0x3, 0x21100, 0xc, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffffffb, 0x4, @perf_bp={&(0x7f00000017c0)}, 0x20, 0x81, 0x80000001, 0x0, 0x46, 0x800000, 0xfff}, 0x0, 0x7, 0xffffffffffffffff, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x488c5) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$inet(r3, &(0x7f0000001780)={&(0x7f0000000040)={0x2, 0x4e24, @empty}, 0x10, &(0x7f00000015c0)=[{&(0x7f0000001880)="968b092eb5e5467adf00fb96231da0d4df69375d616f5d83089e5aba5453fc54413bc8c6d5288cddf4c995049743201e3f9e5c13bb3f776ae99c1c2365fd", 0x3e}, {&(0x7f0000000280)="df835e62692959176b1eb2097c303e3579b3c9ddc96a08c619f85806d54db8fa220a9b0165c4dee8f337", 0x2a}, {&(0x7f0000000380)="7fbdedce7f8962718697a6298a68aa22c30adfec4e638c9f4a9fb50d0850edab96e7e6310729b1c04e0ca10d28050734f59493b40d67f57a3eb2fc29c1fd275ac2700fcc0ab8590f76420127d32001dce8cc5fac865965f7f5f0e61702fd4ec21822218b78a255d8506f2f7d64066fb8b8843c6184fd68eb", 0x78}, {&(0x7f0000000400)="2ec5fa8ed5badb8ede660da4b4f612634bd928297c4d8cb31c36901031e71ca51b040980334800f14cb23bb74db44e48d111e442", 0x34}, {&(0x7f0000000440)="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", 0xfa}, {&(0x7f0000000540)}, {&(0x7f0000001540)="9c48bdc797ff6f14cae0e3f184e477260da41c94443e6b675464e47be69bee7398a1591e252450361d658dbdbaa793467a6f7ca09f838adab9a3e34dcdfcd3b4d5acca7caac19bc03df6775c5fb538d87d908b485df01b41246617338c242ee01fa378b0dd", 0x65}], 0x7, &(0x7f0000001640)=[@ip_retopts={{0x6c, 0x0, 0x7, {[@rr={0x7, 0xb, 0x7a, [@remote, @empty]}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x38, 0x0, [{0x7, 0xe, "a7bc09c5c96afda7bfa17b7b"}, {0x5, 0x5, "22878a"}, {0x2, 0x2}, {0x0, 0xd, "ed672845083fb8ec5ff040"}, {0x5, 0x2}, {0x6, 0xe, "4bc32951b381aaf28a1f3a0b"}]}, @ssrr={0x89, 0x7, 0x2c, [@multicast1]}, @noop, @timestamp_addr={0x44, 0xc, 0xd8, 0x1, 0x8, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x2}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast1, @private}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x80}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x20}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8001}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}], 0x110}, 0x44084) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000240)) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup(r4, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) 09:46:40 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6a, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x9, 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) perf_event_open(&(0x7f0000001800)={0x3, 0x70, 0x9, 0x81, 0x0, 0x0, 0x0, 0x3, 0x21100, 0xc, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffffffb, 0x4, @perf_bp={&(0x7f00000017c0)}, 0x20, 0x81, 0x80000001, 0x0, 0x46, 0x800000, 0xfff}, 0x0, 0x7, 0xffffffffffffffff, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x488c5) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x4, 0x9, 0x5, 0xc9, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x20, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1000, 0x1, 0x0, 0x8, 0x1}, 0x0, 0x7, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4202, 0xd, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_bp={0x0}, 0x20, 0x401, 0x2, 0x0, 0x6, 0x7, 0x83}, 0xffffffffffffffff, 0x8, r3, 0xc) r4 = openat$cgroup_ro(r0, &(0x7f0000000100)='devices.list\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r4) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$inet(r2, &(0x7f0000001780)={&(0x7f0000000040)={0x2, 0x4e24, @empty}, 0x10, &(0x7f00000015c0)=[{&(0x7f0000001880)="968b092eb5e5467adf00fb96231da0d4df69375d616f5d83089e5aba5453fc54413bc8c6d5288cddf4c995049743201e3f9e5c13bb3f776ae99c1c2365fd", 0x3e}, {&(0x7f0000000280)="df835e62692959176b1eb2097c303e3579b3c9ddc96a08c619f85806d54db8fa220a9b0165c4dee8f337", 0x2a}, {0x0}, {&(0x7f0000000440)="a5d0cd85a9d652f63016636e776eea7e730c1f9eb36922d684484e0d58c26318cbaef0f9e34995aca55b24041485c357a109538cf6a219eaaa163b5feab0df99f537805507578a45b999b3c55039ef19a00831fa3d61c5e7d594438a420319b338ee6a026dbfcd40962f2555c5304cb6f9ebfc19014b90d6013546a0ca51e50bac8b1cad1f6c8ff5a2c047a81cf03dc0a61d2873ef66005d384006180ccb0d7efbcdf3774700b1f22b6f55eef0e1c39ac3a502fc21c8dd1ac5f712453c16f7d2660b9ed479b7d18a2113c112d21a19dd27fd055e593ea8dc35752d3470266f26704cc924a7267bb5c7f10afa2fcd120d969437a77be2f10447", 0xf9}, {&(0x7f0000000540)}, {&(0x7f0000001540)="9c48bdc797ff6f14cae0e3f184e477260da41c94443e6b675464e47be69bee7398a1591e252450361d658dbdbaa793467a6f7ca09f838adab9a3e34dcdfcd3b4d5acca7caac19bc03df6775c5fb538d87d908b485df01b41246617338c242ee01fa378b0dd0fb5d2e00eb8762ded7c3ecee4e9", 0x73}], 0x6, &(0x7f0000001640)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x8001}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast1, @private=0xa010102}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x80}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x20}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8001}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}], 0xb8}, 0x44084) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) 09:46:40 executing program 1: r0 = socket$kcm(0xa, 0x5, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="c4", 0x34000}], 0x1, &(0x7f0000000380)=[{0x18, 0x0, 0x0, "02"}], 0x18, 0xfe80}, 0xfc) 09:46:40 executing program 5: [ 651.761360][ T3692] usb usb5-port1: attempt power cycle [ 652.502100][ T3692] usb 5-1: new full-speed USB device number 21 using dummy_hcd 09:46:41 executing program 4: r0 = syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) syz_usb_control_io(r0, &(0x7f0000000300)={0x2c, &(0x7f0000000140)=ANY=[@ANYBLOB="000081"], 0x0, 0x0, 0x0, 0x0}, 0x0) 09:46:41 executing program 3: 09:46:41 executing program 5: 09:46:41 executing program 1: 09:46:41 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = ioctl$TIOCGPTPEER(r0, 0x5414, 0x20000007) ioctl$BTRFS_IOC_QUOTA_RESCAN(r1, 0x5451, 0x0) [ 652.869377][ T3692] usb 5-1: device descriptor read/8, error -71 09:46:41 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = ioctl$TIOCGPTPEER(r0, 0x5414, 0x20000007) ioctl$FICLONERANGE(r1, 0x5452, &(0x7f0000000080)) [ 653.081090][ T3692] usb 5-1: device descriptor read/8, error -71 09:46:41 executing program 3: 09:46:41 executing program 5: 09:46:41 executing program 1: 09:46:41 executing program 2: [ 653.574414][ T3692] usb 5-1: new full-speed USB device number 22 using dummy_hcd 09:46:42 executing program 0: 09:46:42 executing program 3: [ 653.761629][ T3692] usb 5-1: device descriptor read/8, error -61 [ 654.031750][ T3692] usb 5-1: device descriptor read/8, error -61 [ 654.151277][ T3692] usb usb5-port1: unable to enumerate USB device 09:46:44 executing program 4: r0 = syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) syz_usb_control_io(r0, &(0x7f0000000300)={0x2c, &(0x7f0000000140)=ANY=[@ANYBLOB="000081"], 0x0, 0x0, 0x0, 0x0}, 0x0) 09:46:44 executing program 5: 09:46:44 executing program 1: 09:46:44 executing program 2: 09:46:44 executing program 0: 09:46:44 executing program 3: 09:46:45 executing program 0: 09:46:45 executing program 5: 09:46:45 executing program 2: 09:46:45 executing program 1: 09:46:45 executing program 3: 09:46:45 executing program 0: [ 657.431997][ T5] usb 5-1: new full-speed USB device number 23 using dummy_hcd [ 657.701492][ T5] usb 5-1: device descriptor read/64, error 18 [ 658.121562][ T5] usb 5-1: device descriptor read/64, error 18 [ 658.392480][ T5] usb 5-1: new full-speed USB device number 24 using dummy_hcd [ 658.660822][ T5] usb 5-1: device descriptor read/64, error 18 [ 659.050885][ T5] usb 5-1: device descriptor read/64, error 18 [ 659.171502][ T5] usb usb5-port1: attempt power cycle [ 659.881011][ T5] usb 5-1: new full-speed USB device number 25 using dummy_hcd [ 660.054609][ T5] usb 5-1: device descriptor read/8, error -61 09:46:48 executing program 4: r0 = syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) syz_usb_control_io(r0, &(0x7f0000000300)={0x2c, &(0x7f0000000140)=ANY=[@ANYBLOB="000081"], 0x0, 0x0, 0x0, 0x0}, 0x0) 09:46:48 executing program 5: 09:46:48 executing program 2: 09:46:48 executing program 1: 09:46:48 executing program 3: 09:46:48 executing program 0: [ 660.351070][ T5] usb 5-1: device descriptor read/8, error -71 09:46:49 executing program 1: 09:46:49 executing program 3: 09:46:49 executing program 5: 09:46:49 executing program 0: 09:46:49 executing program 2: [ 661.360841][ T5] usb 5-1: new full-speed USB device number 26 using dummy_hcd 09:46:49 executing program 1: [ 661.551670][ T5] usb 5-1: device descriptor read/8, error -61 [ 661.822605][ T5] usb 5-1: device descriptor read/8, error -61 [ 661.941713][ T5] usb usb5-port1: unable to enumerate USB device 09:46:52 executing program 4: r0 = syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000039542f108c07021047e600000001090224000100"], 0x0) syz_usb_control_io(r0, &(0x7f0000000300)={0x2c, &(0x7f0000000140)=ANY=[@ANYBLOB="000081"], 0x0, 0x0, 0x0, 0x0}, 0x0) 09:46:52 executing program 0: 09:46:52 executing program 3: 09:46:52 executing program 5: 09:46:52 executing program 2: 09:46:52 executing program 1: 09:46:52 executing program 5: 09:46:52 executing program 1: 09:46:52 executing program 0: 09:46:52 executing program 3: 09:46:52 executing program 2: [ 664.791073][ T9717] usb 5-1: new full-speed USB device number 27 using dummy_hcd 09:46:53 executing program 5: [ 665.167383][ T9717] usb 5-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 665.179149][ T9717] usb 5-1: config 0 has 0 interfaces, different from the descriptor's value: 1 [ 665.188749][ T9717] usb 5-1: New USB device found, idVendor=078c, idProduct=1002, bcdDevice=e6.47 [ 665.198279][ T9717] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 665.345222][ T9717] usb 5-1: config 0 descriptor?? 09:46:55 executing program 4: r0 = syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000039542f108c07021047e600000001090224000100"], 0x0) syz_usb_control_io(r0, &(0x7f0000000300)={0x2c, &(0x7f0000000140)=ANY=[@ANYBLOB="000081"], 0x0, 0x0, 0x0, 0x0}, 0x0) 09:46:55 executing program 1: 09:46:55 executing program 3: 09:46:55 executing program 2: 09:46:55 executing program 0: 09:46:55 executing program 5: [ 667.450762][ T9717] usb 5-1: USB disconnect, device number 27 09:46:56 executing program 0: 09:46:56 executing program 3: 09:46:56 executing program 1: 09:46:56 executing program 5: 09:46:56 executing program 2: [ 668.285839][ T8716] usb 5-1: new full-speed USB device number 28 using dummy_hcd 09:46:56 executing program 1: [ 668.704852][ T8716] usb 5-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 668.716779][ T8716] usb 5-1: config 0 has 0 interfaces, different from the descriptor's value: 1 [ 668.726885][ T8716] usb 5-1: New USB device found, idVendor=078c, idProduct=1002, bcdDevice=e6.47 [ 668.737482][ T8716] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 668.837067][ T8716] usb 5-1: config 0 descriptor?? 09:46:59 executing program 4: r0 = syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000039542f108c07021047e600000001090224000100"], 0x0) syz_usb_control_io(r0, &(0x7f0000000300)={0x2c, &(0x7f0000000140)=ANY=[@ANYBLOB="000081"], 0x0, 0x0, 0x0, 0x0}, 0x0) 09:46:59 executing program 1: 09:46:59 executing program 5: 09:46:59 executing program 3: 09:46:59 executing program 2: 09:46:59 executing program 0: [ 670.954364][ T8404] usb 5-1: USB disconnect, device number 28 09:46:59 executing program 0: 09:46:59 executing program 3: 09:46:59 executing program 1: 09:46:59 executing program 2: 09:46:59 executing program 5: 09:47:00 executing program 0: [ 671.750828][ T5] usb 5-1: new full-speed USB device number 29 using dummy_hcd [ 672.111813][ T5] usb 5-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 672.122513][ T5] usb 5-1: config 0 has 0 interfaces, different from the descriptor's value: 1 [ 672.132329][ T5] usb 5-1: New USB device found, idVendor=078c, idProduct=1002, bcdDevice=e6.47 [ 672.141968][ T5] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 672.259014][ T5] usb 5-1: config 0 descriptor?? 09:47:02 executing program 4: r0 = syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000039542f108c07021047e6000000010902240001000000000904db00010a04c800"], 0x0) syz_usb_control_io(r0, &(0x7f0000000300)={0x2c, &(0x7f0000000140)=ANY=[@ANYBLOB="000081"], 0x0, 0x0, 0x0, 0x0}, 0x0) 09:47:02 executing program 1: 09:47:02 executing program 3: 09:47:02 executing program 2: 09:47:02 executing program 5: 09:47:02 executing program 0: [ 674.347359][ T8716] usb 5-1: USB disconnect, device number 29 09:47:03 executing program 3: 09:47:03 executing program 1: 09:47:03 executing program 5: 09:47:03 executing program 2: 09:47:03 executing program 0: [ 675.130939][ T8719] usb 5-1: new full-speed USB device number 30 using dummy_hcd 09:47:03 executing program 2: [ 675.492216][ T8719] usb 5-1: config 0 has an invalid interface number: 219 but max is 0 [ 675.500937][ T8719] usb 5-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 675.515773][ T8719] usb 5-1: config 0 has no interface number 0 [ 675.522629][ T8719] usb 5-1: config 0 interface 219 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 1 [ 675.536693][ T8719] usb 5-1: New USB device found, idVendor=078c, idProduct=1002, bcdDevice=e6.47 [ 675.546918][ T8719] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 675.652346][ T8719] usb 5-1: config 0 descriptor?? [ 675.698259][ T8719] gtco 5-1:0.219: Invalid number of endpoints [ 675.705099][ T8719] gtco: probe of 5-1:0.219 failed with error -22 [ 677.020792][ T3228] Bluetooth: hci5: command 0x0406 tx timeout 09:47:06 executing program 4: r0 = syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000039542f108c07021047e6000000010902240001000000000904db00010a04c800"], 0x0) syz_usb_control_io(r0, &(0x7f0000000300)={0x2c, &(0x7f0000000140)=ANY=[@ANYBLOB="000081"], 0x0, 0x0, 0x0, 0x0}, 0x0) 09:47:06 executing program 3: 09:47:06 executing program 1: 09:47:06 executing program 5: 09:47:06 executing program 0: 09:47:06 executing program 2: [ 677.838907][ T5] usb 5-1: USB disconnect, device number 30 09:47:06 executing program 2: 09:47:06 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = getpid() sendmsg$unix(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@cred={{0x1c, 0x1, 0x2, {r1, 0x0, 0xee01}}}], 0x20}, 0x20000045) 09:47:06 executing program 0: socketpair(0x2c51aec6e983de, 0x0, 0x0, &(0x7f0000000000)) 09:47:06 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000001480)={&(0x7f0000000040), 0xc, &(0x7f0000001440)={0x0, 0x13a4}}, 0x0) 09:47:06 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000580)='fuse\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000046c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040001,user_id=+']) 09:47:07 executing program 2: [ 678.721371][ T5] usb 5-1: new full-speed USB device number 31 using dummy_hcd [ 678.888703][T13161] fuse: Bad value for 'user_id' [ 679.091581][ T5] usb 5-1: config 0 has an invalid interface number: 219 but max is 0 [ 679.101464][ T5] usb 5-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 679.113137][ T5] usb 5-1: config 0 has no interface number 0 [ 679.121259][ T5] usb 5-1: config 0 interface 219 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 1 [ 679.136016][ T5] usb 5-1: New USB device found, idVendor=078c, idProduct=1002, bcdDevice=e6.47 [ 679.145544][ T5] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 679.353179][ T5] usb 5-1: config 0 descriptor?? [ 679.395804][ T5] gtco 5-1:0.219: Invalid number of endpoints [ 679.403700][ T5] gtco: probe of 5-1:0.219 failed with error -22 09:47:09 executing program 4: r0 = syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000039542f108c07021047e6000000010902240001000000000904db00010a04c800"], 0x0) syz_usb_control_io(r0, &(0x7f0000000300)={0x2c, &(0x7f0000000140)=ANY=[@ANYBLOB="000081"], 0x0, 0x0, 0x0, 0x0}, 0x0) 09:47:09 executing program 3: 09:47:09 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x82, 0x0, 0x0) 09:47:09 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x71, 0x0, 0x0) 09:47:09 executing program 1: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) read$FUSE(r0, &(0x7f0000004640)={0x2020}, 0x2020) 09:47:09 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = dup(r0) sendmsg$BATADV_CMD_GET_HARDIF(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0, 0xffffff7f}}, 0x0) [ 681.379988][ T9717] usb 5-1: USB disconnect, device number 31 09:47:10 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x12) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f00000001c0)={0x11, 0x10, 0xfa00, {0x0}}, 0x3fffff) 09:47:10 executing program 5: r0 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0xc020660b, 0x0) 09:47:10 executing program 3: 09:47:10 executing program 2: r0 = fsopen(&(0x7f00000000c0)='debugfs\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000000)='devpts\x00', &(0x7f0000000080)='devpts\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) 09:47:10 executing program 1: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001600)=@deltaction={0x14, 0x12, 0x1}, 0x14}}, 0x0) [ 682.266179][ T9717] usb 5-1: new full-speed USB device number 32 using dummy_hcd 09:47:10 executing program 3: r0 = socket(0x22, 0x2, 0x2) getpeername$ax25(r0, 0x0, 0x0) [ 682.641857][ T9717] usb 5-1: config 0 has an invalid interface number: 219 but max is 0 [ 682.650942][ T9717] usb 5-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 682.662380][ T9717] usb 5-1: config 0 has no interface number 0 [ 682.669202][ T9717] usb 5-1: config 0 interface 219 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 1 [ 682.683190][ T9717] usb 5-1: New USB device found, idVendor=078c, idProduct=1002, bcdDevice=e6.47 [ 682.693094][ T9717] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 682.903747][ T9717] usb 5-1: config 0 descriptor?? [ 682.947905][ T9717] gtco 5-1:0.219: Invalid number of endpoints [ 682.956241][ T9717] gtco: probe of 5-1:0.219 failed with error -22 09:47:13 executing program 4: r0 = syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000039542f108c07021047e6000000010902240001000000000904db00010a04c800092103000000"], 0x0) syz_usb_control_io(r0, &(0x7f0000000300)={0x2c, &(0x7f0000000140)=ANY=[@ANYBLOB="000081"], 0x0, 0x0, 0x0, 0x0}, 0x0) 09:47:13 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000080)={'veth1_to_bond\x00', 0x400}) ioctl$TUNSETVNETHDRSZ(r0, 0x401054d6, 0xfffffffffffffffe) 09:47:13 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r0, 0x10c, 0x2, &(0x7f0000000180)=0x10000002, 0x4) 09:47:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000000)={'tunl0\x00', @ifru_mtu=0x531101}) syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x4, 0x24240) 09:47:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x8, 0x3, 0x1f0, 0x0, 0xa, 0xd0e0000, 0x0, 0x100, 0x158, 0x1d8, 0x1d8, 0x158, 0x1d8, 0x3, 0x0, {[{{@ip={@broadcast, @dev, 0x0, 0x0, 'veth1_to_batadv\x00', 'veth0_to_team\x00'}, 0x0, 0xa, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa0, 0xc0, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x250) 09:47:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000040)={'tunl0\x00', @ifru_mtu=0x531101}) madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x14) [ 684.879227][ T5] usb 5-1: USB disconnect, device number 32 09:47:13 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_TMR_TEMPO(r0, 0x40045108, &(0x7f0000000040)) 09:47:13 executing program 0: prctl$PR_SET_MM_MAP_SIZE(0x16, 0xf, 0x0) 09:47:13 executing program 3: r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_RELOAD(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)={0x3c, r0, 0x1, 0x0, 0x0, {0xf}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8}}]}, 0x3c}}, 0x0) 09:47:13 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='comm\x00') write$cgroup_pid(r0, &(0x7f0000000000), 0x12) 09:47:14 executing program 5: r0 = socket(0x26, 0x5, 0x0) setsockopt$PNPIPE_HANDLE(r0, 0x6, 0xd, 0x0, 0x0) [ 685.751442][ T9717] usb 5-1: new full-speed USB device number 33 using dummy_hcd 09:47:14 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000041c0)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_mount_image$fuse(&(0x7f0000000040)='fuse\x00', &(0x7f0000000080)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$DRM_IOCTL_ADD_CTX(r1, 0x40806685, 0x0) [ 686.112879][ T9717] usb 5-1: config 0 has an invalid interface number: 219 but max is 0 [ 686.123726][ T9717] usb 5-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 686.134554][ T9717] usb 5-1: config 0 has no interface number 0 [ 686.141752][ T9717] usb 5-1: config 0 interface 219 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 1 [ 686.155900][ T9717] usb 5-1: New USB device found, idVendor=078c, idProduct=1002, bcdDevice=e6.47 [ 686.166042][ T9717] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 686.425540][ T9717] usb 5-1: config 0 descriptor?? [ 686.483815][ T9717] gtco 5-1:0.219: Invalid number of endpoints [ 686.490872][ T9717] gtco: probe of 5-1:0.219 failed with error -22 09:47:16 executing program 4: r0 = syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000039542f108c07021047e6000000010902240001000000000904db00010a04c800092103000000"], 0x0) syz_usb_control_io(r0, &(0x7f0000000300)={0x2c, &(0x7f0000000140)=ANY=[@ANYBLOB="000081"], 0x0, 0x0, 0x0, 0x0}, 0x0) 09:47:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000040)}, 0x24) 09:47:16 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x20, 0x1405, 0x917, 0x0, 0x0, "", [{{0x8}, {0x8}}]}, 0x20}}, 0x0) 09:47:16 executing program 3: syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x0, 0xd6958248554f249d) 09:47:16 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000580)='SMC_PNETID\x00') sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)={0x20, r1, 0x19, 0x0, 0x0, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) 09:47:16 executing program 1: prctl$PR_MCE_KILL(0x18, 0x0, 0x0) [ 688.442265][ T8719] usb 5-1: USB disconnect, device number 33 09:47:17 executing program 1: r0 = socket(0xa, 0x3, 0x6) setsockopt$PNPIPE_HANDLE(r0, 0x29, 0x4c, 0x0, 0x0) 09:47:17 executing program 5: r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000080)='./file\x00', 0x1000, 0x0) open$dir(&(0x7f0000000040)='./file\x00', 0x109b42, 0x0) open$dir(&(0x7f0000001240)='./file\x00', 0x2, 0x0) 09:47:17 executing program 2: setresuid(0xee01, 0xee00, 0x0) r0 = geteuid() setresuid(0x0, 0x0, 0x0) geteuid() getresuid(0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) setresuid(r0, 0x0, 0x0) ioprio_set$uid(0x3, r0, 0x0) 09:47:17 executing program 3: r0 = socket(0x18, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)={0x3c, r2, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r0}]}, 0x3c}}, 0x0) [ 689.251032][ T8716] usb 5-1: new full-speed USB device number 34 using dummy_hcd [ 689.631923][ T8716] usb 5-1: config 0 has an invalid interface number: 219 but max is 0 [ 689.640463][ T8716] usb 5-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 689.651903][ T8716] usb 5-1: config 0 has no interface number 0 [ 689.658182][ T8716] usb 5-1: config 0 interface 219 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 1 [ 689.672060][ T8716] usb 5-1: New USB device found, idVendor=078c, idProduct=1002, bcdDevice=e6.47 [ 689.681372][ T8716] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 09:47:18 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000000)={'tunl0\x00', @ifru_mtu=0x531101}) sched_getaffinity(0x0, 0x8, &(0x7f0000000000)) 09:47:18 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) getsockname$llc(r0, 0x0, 0x0) [ 690.043105][ T8716] usb 5-1: config 0 descriptor?? [ 690.088230][ T8716] gtco 5-1:0.219: Invalid number of endpoints [ 690.095073][ T8716] gtco: probe of 5-1:0.219 failed with error -22 09:47:20 executing program 4: r0 = syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000039542f108c07021047e6000000010902240001000000000904db00010a04c800092103000000"], 0x0) syz_usb_control_io(r0, &(0x7f0000000300)={0x2c, &(0x7f0000000140)=ANY=[@ANYBLOB="000081"], 0x0, 0x0, 0x0, 0x0}, 0x0) 09:47:20 executing program 3: setuid(0xee01) socket$inet(0x2, 0x3, 0x40) 09:47:20 executing program 2: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xfffffffffffffecb) 09:47:20 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000001c0), 0x4) 09:47:20 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080), 0x4) syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') 09:47:20 executing program 1: openat$drirender128(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 691.914585][ T8404] usb 5-1: USB disconnect, device number 34 09:47:20 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f00000001c0)={0xf, 0x8}, 0x10) 09:47:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xae64, 0x0) 09:47:20 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xc0ed0000, &(0x7f00000001c0)) 09:47:20 executing program 0: r0 = socket(0xa, 0x5, 0x0) bind$l2tp6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback}, 0x20) sendto$l2tp6(r0, &(0x7f0000000480)='5', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0xfc]}, 0x1}, 0x20) 09:47:20 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000040)={'tunl0\x00', @ifru_mtu=0x531101}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x63ccbcee3bd525b2, 0xffffffffffffffff, 0x0) [ 692.722127][ T9717] usb 5-1: new full-speed USB device number 35 using dummy_hcd 09:47:21 executing program 1: r0 = socket(0x2, 0x3, 0x3) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000002700)) [ 693.081975][ T9717] usb 5-1: config 0 has an invalid interface number: 219 but max is 0 [ 693.090428][ T9717] usb 5-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 693.101262][ T9717] usb 5-1: config 0 has no interface number 0 [ 693.107540][ T9717] usb 5-1: config 0 interface 219 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 1 [ 693.120899][ T9717] usb 5-1: New USB device found, idVendor=078c, idProduct=1002, bcdDevice=e6.47 [ 693.131508][ T9717] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 693.324527][ T9717] usb 5-1: config 0 descriptor?? [ 693.378664][ T9717] gtco 5-1:0.219: Invalid number of endpoints [ 693.385459][ T9717] gtco: probe of 5-1:0.219 failed with error -22 09:47:23 executing program 4: r0 = syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000039542f108c07021047e6000000010902240001000000000904db00010a04c800092103000000008100"], 0x0) syz_usb_control_io(r0, &(0x7f0000000300)={0x2c, &(0x7f0000000140)=ANY=[@ANYBLOB="000081"], 0x0, 0x0, 0x0, 0x0}, 0x0) 09:47:23 executing program 2: r0 = memfd_create(&(0x7f0000000000)='[wlan1keyring', 0x0) ioctl$sock_ifreq(r0, 0x40305839, 0x0) 09:47:23 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x2, 0x0, 0x0) 09:47:23 executing program 3: r0 = socket(0xa, 0x3, 0x1) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 09:47:23 executing program 1: r0 = socket$inet6_udplite(0x2, 0x3, 0x88) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, 0x0, 0x0) 09:47:23 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_opts(r0, 0x29, 0x35, 0x0, 0x0) [ 695.354403][ T8716] usb 5-1: USB disconnect, device number 35 09:47:24 executing program 1: r0 = syz_open_dev$vim2m(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_DQBUF(r0, 0x541b, 0x0) 09:47:24 executing program 5: r0 = socket(0x1, 0x1, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000280)={&(0x7f0000000100), 0xc, &(0x7f0000000240)={0x0}}, 0x0) 09:47:24 executing program 2: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000000)={0x0, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @private}}}, 0x108) 09:47:24 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_SIOCDELRT(r0, 0x8916, 0x0) 09:47:24 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) sendmsg$can_j1939(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) [ 696.231608][ T8404] usb 5-1: new full-speed USB device number 36 using dummy_hcd 09:47:24 executing program 1: r0 = gettid() seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) [ 696.593370][ T8404] usb 5-1: config 0 has an invalid interface number: 219 but max is 0 [ 696.602317][ T8404] usb 5-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 696.612961][ T8404] usb 5-1: config 0 has no interface number 0 [ 696.619244][ T8404] usb 5-1: config 0 interface 219 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 1 [ 696.632824][ T8404] usb 5-1: New USB device found, idVendor=078c, idProduct=1002, bcdDevice=e6.47 [ 696.645324][ T8404] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 696.716662][ T28] audit: type=1326 audit(1599299245.155:22): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=13432 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=40000003 syscall=265 compat=1 ip=0xf7f64549 code=0x0 [ 696.815423][ T8404] usb 5-1: config 0 descriptor?? [ 696.873905][ T8404] gtco 5-1:0.219: Invalid number of endpoints [ 696.880811][ T8404] gtco: probe of 5-1:0.219 failed with error -22 [ 697.501388][ T28] audit: type=1326 audit(1599299245.935:23): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=13432 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=40000003 syscall=265 compat=1 ip=0xf7f64549 code=0x0 09:47:27 executing program 4: r0 = syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000039542f108c07021047e6000000010902240001000000000904db00010a04c800092103000000008100"], 0x0) syz_usb_control_io(r0, &(0x7f0000000300)={0x2c, &(0x7f0000000140)=ANY=[@ANYBLOB="000081"], 0x0, 0x0, 0x0, 0x0}, 0x0) 09:47:27 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/igmp\x00') preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000180)=""/113, 0x71}], 0x1, 0x300, 0x0) 09:47:27 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$KVM_SET_PIT2(r0, 0x4070aea0, 0x0) 09:47:27 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000400)='net/ip6_tables_names\x00') preadv(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/119, 0x77}], 0x1, 0x10, 0x0) 09:47:27 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_proto_private(r0, 0x89e1, &(0x7f0000000140)="d7") 09:47:27 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000002740)={&(0x7f0000000040)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x80, 0x0}, 0x0) [ 698.789098][ T8404] usb 5-1: USB disconnect, device number 36 09:47:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000000)={'tunl0\x00', @ifru_mtu=0x531101}) recvfrom$phonet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 09:47:27 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) connect$phonet_pipe(0xffffffffffffffff, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xaea2, 0x80002) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, 0x0, 0x0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x0, 0x3}, 0x6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000100)='mptcp_pm\x00') sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, 0x0, 0x0) 09:47:27 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x1536, 0x4) 09:47:27 executing program 2: r0 = socket(0xa, 0x3, 0x6) setsockopt$PNPIPE_HANDLE(r0, 0x29, 0x2, 0x0, 0x0) 09:47:27 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000400)='net/ip6_tables_names\x00') preadv(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/119, 0x77}], 0x1, 0x10, 0x0) [ 699.641781][ T9717] usb 5-1: new full-speed USB device number 37 using dummy_hcd 09:47:28 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000001040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, 0x0) [ 700.022384][ T9717] usb 5-1: config 0 has an invalid interface number: 219 but max is 0 [ 700.030960][ T9717] usb 5-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 700.042439][ T9717] usb 5-1: config 0 has no interface number 0 [ 700.048729][ T9717] usb 5-1: config 0 interface 219 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 1 [ 700.062121][ T9717] usb 5-1: New USB device found, idVendor=078c, idProduct=1002, bcdDevice=e6.47 [ 700.071856][ T9717] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 700.241236][ T9717] usb 5-1: config 0 descriptor?? [ 700.288344][ T9717] gtco 5-1:0.219: Invalid number of endpoints [ 700.295219][ T9717] gtco: probe of 5-1:0.219 failed with error -22 09:47:30 executing program 4: r0 = syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000039542f108c07021047e6000000010902240001000000000904db00010a04c800092103000000008100"], 0x0) syz_usb_control_io(r0, &(0x7f0000000300)={0x2c, &(0x7f0000000140)=ANY=[@ANYBLOB="000081"], 0x0, 0x0, 0x0, 0x0}, 0x0) 09:47:30 executing program 0: r0 = socket(0xa, 0x3, 0x6) setsockopt$PNPIPE_HANDLE(r0, 0x29, 0x16, 0x0, 0x300) 09:47:30 executing program 5: bpf$MAP_CREATE(0xe, &(0x7f0000000000), 0x40) 09:47:30 executing program 2: bpf$PROG_LOAD(0x1c, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000040)}, 0x24) 09:47:30 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000940)='gtp\x00') sendmsg$GTP_CMD_DELPDP(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="080002000200000008"], 0x34}}, 0x0) 09:47:30 executing program 1: syz_mount_image$gfs2(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/igmp6\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x4, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 702.356926][ T9717] usb 5-1: USB disconnect, device number 37 [ 702.548365][T13521] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 702.709183][T13527] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 09:47:31 executing program 0: r0 = socket(0x18, 0x0, 0x0) r1 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x6, r1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8940, &(0x7f0000000080)={'vcan0\x00'}) 09:47:31 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$inet_sctp(r0, &(0x7f0000005f80)=[{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000000040)="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", 0xec0}, {0x0}, {&(0x7f00000010c0)="93", 0x1}], 0x3, &(0x7f00000012c0)=[@dstaddrv6={0x20, 0x84, 0x8, @mcast2}, @dstaddrv4={0x18, 0x84, 0x7, @dev}], 0x38}], 0x1, 0x0) 09:47:31 executing program 2: r0 = socket(0x23, 0x5, 0x0) setsockopt$MISDN_TIME_STAMP(r0, 0x113, 0x3, 0x0, 0x0) 09:47:31 executing program 3: r0 = socket(0x2, 0x2, 0x0) recvmsg$can_bcm(r0, &(0x7f00000043c0)={0x0, 0x0, 0x0}, 0x82) [ 703.241960][ T9717] usb 5-1: new full-speed USB device number 38 using dummy_hcd 09:47:31 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x802) write$FUSE_INIT(r0, &(0x7f0000000000)={0x50}, 0x50) read$FUSE(r0, &(0x7f0000006240)={0x2020}, 0x250) 09:47:32 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f0000002500)=[{{&(0x7f0000000040)=@qipcrtr={0x2a, 0x1}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)="95877ca56e9bf749e705f2ea6193", 0xe}], 0x1}}], 0x1, 0x0) [ 703.632575][ T9717] usb 5-1: config 0 has an invalid interface number: 219 but max is 0 [ 703.641131][ T9717] usb 5-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 703.651543][ T9717] usb 5-1: config 0 has no interface number 0 [ 703.657836][ T9717] usb 5-1: config 0 interface 219 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 1 [ 703.671222][ T9717] usb 5-1: New USB device found, idVendor=078c, idProduct=1002, bcdDevice=e6.47 [ 703.680457][ T9717] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 703.875466][ T9717] usb 5-1: config 0 descriptor?? [ 703.938688][ T9717] gtco 5-1:0.219: Invalid number of endpoints [ 703.945561][ T9717] gtco: probe of 5-1:0.219 failed with error -22 09:47:34 executing program 4: r0 = syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000039542f108c07021047e6000000010902240001000000000904db00010a04c8000921030000000081000905"], 0x0) syz_usb_control_io(r0, &(0x7f0000000300)={0x2c, &(0x7f0000000140)=ANY=[@ANYBLOB="000081"], 0x0, 0x0, 0x0, 0x0}, 0x0) 09:47:34 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfff, 0x0) read$char_usb(r0, &(0x7f0000000100)=""/135, 0x7fff) 09:47:34 executing program 0: bpf$PROG_LOAD(0x14, 0x0, 0x0) 09:47:34 executing program 5: syz_mount_image$ocfs2(&(0x7f0000000000)='ocfs2\x00', &(0x7f0000000040)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)='\x00') 09:47:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='environ\x00') read$char_usb(r0, 0x0, 0x0) 09:47:34 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000000)={'tunl0\x00', @ifru_mtu=0x531101}) socket$alg(0x26, 0x5, 0x0) [ 705.871724][ T3228] usb 5-1: USB disconnect, device number 38 09:47:34 executing program 0: r0 = socket(0x2, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8910, &(0x7f0000003580)={'ip6gre0\x00', 0x0}) 09:47:34 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_SET(r0, 0x0, 0x0) 09:47:34 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x6}]}) 09:47:34 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x21, &(0x7f0000000280), 0x10) 09:47:34 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x30, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast1}}}, 0x108) [ 706.650752][ T3228] usb 5-1: new full-speed USB device number 39 using dummy_hcd 09:47:35 executing program 0: prctl$PR_SET_NAME(0x27, 0x0) [ 707.042097][ T3228] usb 5-1: config 0 has an invalid interface number: 219 but max is 0 [ 707.050908][ T3228] usb 5-1: config 0 has no interface number 0 [ 707.057182][ T3228] usb 5-1: config 0 interface 219 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 707.068438][ T3228] usb 5-1: New USB device found, idVendor=078c, idProduct=1002, bcdDevice=e6.47 [ 707.078551][ T3228] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 707.182880][ T3228] usb 5-1: config 0 descriptor?? [ 707.242330][ T3228] gtco 5-1:0.219: Invalid number of endpoints [ 707.249065][ T3228] gtco: probe of 5-1:0.219 failed with error -22 09:47:37 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0xe, &(0x7f0000000000)="08000000000000d60000000000003300", 0x10) 09:47:37 executing program 4: r0 = syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000039542f108c07021047e6000000010902240001000000000904db00010a04c8000921030000000081000905"], 0x0) syz_usb_control_io(r0, &(0x7f0000000300)={0x2c, &(0x7f0000000140)=ANY=[@ANYBLOB="000081"], 0x0, 0x0, 0x0, 0x0}, 0x0) 09:47:37 executing program 1: socketpair(0x0, 0x0, 0x0, 0x0) 09:47:37 executing program 0: r0 = syz_open_dev$vim2m(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_DQBUF(r0, 0xc050565d, &(0x7f0000000040)={0x0, 0x0, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\a\x00'}, 0x0, 0x0, @userptr}) 09:47:37 executing program 2: r0 = io_uring_setup(0x77ea, &(0x7f0000000000)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x5, 0x0, 0x0) 09:47:37 executing program 5: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dri/renderD128\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0x400448dd, 0x0) [ 709.266918][ T8404] usb 5-1: USB disconnect, device number 39 09:47:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0x54, 0x0, 0x0, 0x0, 0x0, {}, [@GTPA_MS_ADDRESS={0x0, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @GTPA_TID={0xc}, @GTPA_LINK={0x8}, @GTPA_TID={0xc}, @GTPA_O_TEI={0x8}, @GTPA_O_TEI={0x8}, @GTPA_O_TEI={0x8}]}, 0x33fe0}}, 0x0) 09:47:38 executing program 5: getresgid(&(0x7f0000000780), 0xffffffffffffffff, 0x0) 09:47:38 executing program 3: socketpair(0x15, 0x0, 0x0, &(0x7f00000000c0)) 09:47:38 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x64, &(0x7f0000000280)}) 09:47:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc0189436, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffa000/0x1000)=nil}) [ 710.113167][ T5] usb 5-1: new full-speed USB device number 40 using dummy_hcd 09:47:38 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_TMR_TEMPO(r0, 0xc004510e, &(0x7f0000000040)) 09:47:38 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) ustat(0x7, &(0x7f0000000000)) [ 710.521754][ T5] usb 5-1: config 0 has an invalid interface number: 219 but max is 0 [ 710.530214][ T5] usb 5-1: config 0 has no interface number 0 [ 710.536965][ T5] usb 5-1: config 0 interface 219 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 710.548494][ T5] usb 5-1: New USB device found, idVendor=078c, idProduct=1002, bcdDevice=e6.47 [ 710.557911][ T5] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 710.803469][ T5] usb 5-1: config 0 descriptor?? [ 710.857988][ T5] gtco 5-1:0.219: Invalid number of endpoints [ 710.865764][ T5] gtco: probe of 5-1:0.219 failed with error -22 09:47:41 executing program 4: r0 = syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000039542f108c07021047e6000000010902240001000000000904db00010a04c8000921030000000081000905"], 0x0) syz_usb_control_io(r0, &(0x7f0000000300)={0x2c, &(0x7f0000000140)=ANY=[@ANYBLOB="000081"], 0x0, 0x0, 0x0, 0x0}, 0x0) 09:47:41 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x9, 0x0, 0x0, 0x0, 0x207, 0x1}, 0x40) 09:47:41 executing program 2: bpf$BPF_GET_BTF_INFO(0x15, &(0x7f0000000240)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000300)=""/71, 0xfffffffffffffea8}}, 0x62) 09:47:41 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$rose(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x1, @default}, 0x531000) 09:47:41 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) 09:47:41 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_opts(r0, 0x29, 0x4, 0x0, 0x0) [ 712.779681][ T3228] usb 5-1: USB disconnect, device number 40 09:47:41 executing program 5: bpf$BPF_LSM_PROG_LOAD(0x5, &(0x7f0000000200)={0x1d, 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="18200000", @ANYRES32=0x1, @ANYBLOB="00eab06508"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x890c, &(0x7f0000000000)={'wg1\x00'}) 09:47:41 executing program 1: r0 = socket(0x18, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f00000001c0)={'ip6_vti0\x00', @ifru_mtu=0x531100}) socket(0x2a, 0x2, 0x0) 09:47:41 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@deltaction={0x14, 0x12, 0x511}, 0x14}}, 0x0) recvmsg$can_raw(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/134, 0x86}, {&(0x7f0000001480)=""/210, 0xf5}, {&(0x7f0000001580)=""/240, 0xf0}], 0x3}, 0x0) 09:47:41 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000000)='[wlan1keyring', 0x5) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x4d091, r1, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 09:47:41 executing program 0: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000001840)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x5}}, 0x80) [ 713.680852][ T5] usb 5-1: new full-speed USB device number 41 using dummy_hcd 09:47:42 executing program 1: r0 = syz_open_dev$vim2m(&(0x7f0000001280)='/dev/video#\x00', 0x0, 0x2) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, 0x0) [ 714.091828][ T5] usb 5-1: config 0 has an invalid interface number: 219 but max is 0 [ 714.100264][ T5] usb 5-1: config 0 has no interface number 0 [ 714.106767][ T5] usb 5-1: config 0 interface 219 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 714.117759][ T5] usb 5-1: New USB device found, idVendor=078c, idProduct=1002, bcdDevice=e6.47 [ 714.128313][ T5] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 714.309721][ T5] usb 5-1: config 0 descriptor?? [ 714.357694][ T5] gtco 5-1:0.219: Invalid number of endpoints [ 714.365315][ T5] gtco: probe of 5-1:0.219 failed with error -22 09:47:44 executing program 4: syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000039542f108c07021047e6000000010902240001000000000904db00010a04c80009210300000000810009050a"], 0x0) syz_usb_control_io(0xffffffffffffffff, &(0x7f0000000300)={0x2c, &(0x7f0000000140)=ANY=[@ANYBLOB="000081"], 0x0, 0x0, 0x0, 0x0}, 0x0) 09:47:44 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00') preadv(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/119, 0x77}], 0x1, 0x0, 0x0) 09:47:44 executing program 5: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000000000)=@tipc=@name={0x1e, 0x2, 0x0, {{0x1}}}, 0x80) 09:47:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0xc020660b, 0x0) 09:47:44 executing program 3: r0 = fsopen(&(0x7f0000000000)='securityfs\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x6, 0x0, 0x0, 0x0) 09:47:44 executing program 1: r0 = socket(0x18, 0x0, 0x2) sendmsg$kcm(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) [ 716.249667][ T8716] usb 5-1: USB disconnect, device number 41 09:47:45 executing program 1: r0 = io_uring_setup(0x77ea, &(0x7f0000000000)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x2, 0x0, 0x4) 09:47:45 executing program 2: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) 09:47:45 executing program 5: r0 = socket(0x23, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x541b, &(0x7f0000000000)={0x3, @default, 0xffffffffffffffff}) 09:47:45 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000041c0)='/dev/fuse\x00', 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040)='fuse\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4068, 0x0) 09:47:45 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={0x0, @isdn, @ipx={0x4, 0x0, 0x0, "3000e0fe7e64"}, @phonet={0x23, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x0, 0x0, 0x0, 0x1000000}) [ 717.207644][ T8404] usb 5-1: new full-speed USB device number 42 using dummy_hcd 09:47:45 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x2}, 0x20) [ 717.572092][ T8404] usb 5-1: config 0 has an invalid interface number: 219 but max is 0 [ 717.580896][ T8404] usb 5-1: config 0 has no interface number 0 [ 717.587155][ T8404] usb 5-1: config 0 interface 219 altsetting 0 endpoint 0xA has invalid wMaxPacketSize 0 [ 717.597419][ T8404] usb 5-1: New USB device found, idVendor=078c, idProduct=1002, bcdDevice=e6.47 [ 717.606832][ T8404] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 717.898307][ T8404] usb 5-1: config 0 descriptor?? [ 718.191664][ T8404] gtco 5-1:0.219: Failed to get HID Report Descriptor of size: 129 [ 718.200351][ T8404] gtco: probe of 5-1:0.219 failed with error -5 [ 718.289826][ T8404] usb 5-1: USB disconnect, device number 42 09:47:47 executing program 4: syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000039542f108c07021047e6000000010902240001000000000904db00010a04c80009210300000000810009050a"], 0x0) syz_usb_control_io(0xffffffffffffffff, &(0x7f0000000300)={0x2c, &(0x7f0000000140)=ANY=[@ANYBLOB="000081"], 0x0, 0x0, 0x0, 0x0}, 0x0) 09:47:47 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)) r1 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000003000/0x1000)=nil, 0x1001000, 0x0, 0x13, r1, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000000)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}) 09:47:47 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x1f, 0x802) write$FUSE_INIT(r0, &(0x7f0000000000)={0x50}, 0x50) 09:47:47 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000041c0)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_mount_image$fuse(&(0x7f0000000040)='fuse\x00', &(0x7f0000000080)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0096616, 0x0) 09:47:47 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/net/pfkey\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001740)=[{&(0x7f0000000440)=""/36, 0x24}], 0x1, 0xf4, 0x0) 09:47:47 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000400)='/dev/nbd#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0xffffffff, 0x2, 0x0, 0x0, 0xffffffffffffffff}) [ 718.901375][T13818] fuse: Bad value for 'fd' 09:47:47 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x802) write$FUSE_INIT(r0, &(0x7f0000000000)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x15}}, 0x50) 09:47:47 executing program 3: r0 = socket(0x10, 0x803, 0x4) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x3, 0x2, 0x801}, 0x14}}, 0x0) 09:47:47 executing program 0: symlinkat(&(0x7f0000000200)='./file\x00', 0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00') r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) syz_mount_image$xfs(0x0, &(0x7f0000000380)='./file\x00', 0x0, 0x0, 0x0, 0x0, 0x0) renameat2(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000100)='./file\x00', 0x0) 09:47:47 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001640)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0xc9c0dddd7bb2f2ec) sendmmsg$inet6(r0, &(0x7f0000003f80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000300)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0}}], 0x2, 0x0) 09:47:47 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0205647, &(0x7f0000000100)={0x0, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "29ac5760"}, 0x0, 0x0, @fd}) [ 719.441208][ T3692] usb 5-1: new full-speed USB device number 43 using dummy_hcd [ 719.484948][T13829] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=515 sclass=netlink_tcpdiag_socket pid=13829 comm=syz-executor.3 [ 719.595705][T13834] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 09:47:48 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000040)={'tunl0\x00', @ifru_mtu=0x531101}) socket$inet6(0xa, 0x1, 0x106) [ 719.817742][ T3692] usb 5-1: config 0 has an invalid interface number: 219 but max is 0 [ 719.826978][ T3692] usb 5-1: config 0 has no interface number 0 [ 719.834147][ T3692] usb 5-1: config 0 interface 219 altsetting 0 endpoint 0xA has invalid wMaxPacketSize 0 [ 719.845193][ T3692] usb 5-1: New USB device found, idVendor=078c, idProduct=1002, bcdDevice=e6.47 [ 719.855132][ T3692] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 720.126163][ T3692] usb 5-1: config 0 descriptor?? [ 720.441038][ T3692] gtco 5-1:0.219: Failed to get HID Report Descriptor of size: 129 [ 720.449718][ T3692] gtco: probe of 5-1:0.219 failed with error -5 [ 720.482013][ T3692] usb 5-1: USB disconnect, device number 43 09:47:49 executing program 4: syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000039542f108c07021047e6000000010902240001000000000904db00010a04c80009210300000000810009050a"], 0x0) syz_usb_control_io(0xffffffffffffffff, &(0x7f0000000300)={0x2c, &(0x7f0000000140)=ANY=[@ANYBLOB="000081"], 0x0, 0x0, 0x0, 0x0}, 0x0) 09:47:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x14, 0x3, 0x2, 0x5}, 0x14}}, 0x0) 09:47:49 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000000)={&(0x7f0000000040)={0x2}, 0x23, &(0x7f0000001440)={0x0, 0x800}}, 0x0) 09:47:49 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x20, 0x2, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x20}}, 0x0) 09:47:49 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@qipcrtr={0x2a, 0x4}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000140)="57316962e51b15559b794fb188ca", 0xe}], 0x1}}], 0x1, 0x0) 09:47:49 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8912, &(0x7f0000000080)={'vcan0\x00'}) 09:47:49 executing program 3: r0 = getpgid(0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r1, 0x89f0, &(0x7f0000000000)={'tunl0\x00', @ifru_mtu=0x531101}) sched_getaffinity(r0, 0x8, &(0x7f0000000000)) 09:47:49 executing program 0: r0 = syz_open_dev$vim2m(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0x541b, 0x0) 09:47:49 executing program 1: r0 = socket(0x15, 0x5, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x0, 0x0, 0x0) 09:47:49 executing program 5: r0 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x5452, 0x0) 09:47:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00T\f)'], 0x34}}, 0x0) [ 721.811197][ T3692] usb 5-1: new full-speed USB device number 44 using dummy_hcd 09:47:50 executing program 3: r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000080)='./file\x00', 0x1000, 0x0) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00') r1 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000100)='./file\x00', 0x0) [ 722.181829][ T3692] usb 5-1: config 0 has an invalid interface number: 219 but max is 0 [ 722.192341][ T3692] usb 5-1: config 0 has no interface number 0 [ 722.198604][ T3692] usb 5-1: config 0 interface 219 altsetting 0 endpoint 0xA has invalid wMaxPacketSize 0 [ 722.208918][ T3692] usb 5-1: New USB device found, idVendor=078c, idProduct=1002, bcdDevice=e6.47 [ 722.218771][ T3692] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 722.291533][ T3692] usb 5-1: config 0 descriptor?? [ 722.591019][ T3692] gtco 5-1:0.219: Failed to get HID Report Descriptor of size: 129 [ 722.600254][ T3692] gtco: probe of 5-1:0.219 failed with error -5 [ 722.653816][ T3692] usb 5-1: USB disconnect, device number 44 09:47:51 executing program 4: r0 = syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000039542f108c07021047e6000000010902240001000000000904db00010a04c80009210300000000810009050a"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) 09:47:51 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000000)={'tunl0\x00', @ifru_mtu=0x531101}) mmap$perf(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x100000001) 09:47:51 executing program 5: r0 = socket$kcm(0x2, 0x5, 0x0) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x31, 0x0, &(0x7f0000000080)) 09:47:51 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_SIOCDELRT(r0, 0x890c, 0x0) 09:47:51 executing program 2: prctl$PR_MCE_KILL(0x2a, 0x0, 0x0) 09:47:51 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000012c0)='net/ip6_mr_cache\x00') read$char_usb(r0, &(0x7f0000000100)=""/135, 0x87) read$eventfd(r0, 0x0, 0x0) 09:47:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000000)={'tunl0\x00', @ifru_mtu=0x531101}) syz_open_dev$audion(&(0x7f00000022c0)='/dev/audio#\x00', 0x0, 0x101000) 09:47:52 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f0000002000)={0x0, 0x0, &(0x7f0000001fc0)={0x0}}, 0x2000c0d1) 09:47:52 executing program 0: r0 = socket(0x18, 0x0, 0x0) bind$bt_l2cap(r0, 0x0, 0x1) 09:47:52 executing program 3: pkey_mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, &(0x7f0000000000), 0x5, 0x0) 09:47:52 executing program 1: symlinkat(&(0x7f0000000200)='./file\x00', 0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00') r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000080)='./file\x00', 0x40, 0x0) execveat(r0, &(0x7f00000000c0)='./file\x00', 0x0, 0x0, 0x0) renameat2(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000100)='./file\x00', 0x0) [ 723.771582][ T5] usb 5-1: new full-speed USB device number 45 using dummy_hcd 09:47:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280)='batadv\x00') r2 = socket(0x2a, 0x2, 0x0) getsockname(r2, &(0x7f0000016d40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000016dc0)=0x80) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x1c, r1, 0xdbce7f53df2f5f01, 0x0, 0x0, {0x5}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) [ 724.154793][ T5] usb 5-1: config 0 has an invalid interface number: 219 but max is 0 [ 724.163428][ T5] usb 5-1: config 0 has no interface number 0 [ 724.170866][ T5] usb 5-1: config 0 interface 219 altsetting 0 endpoint 0xA has invalid wMaxPacketSize 0 [ 724.186246][ T5] usb 5-1: New USB device found, idVendor=078c, idProduct=1002, bcdDevice=e6.47 [ 724.195718][ T5] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 724.457220][ T5] usb 5-1: config 0 descriptor?? [ 724.751990][ T5] gtco 5-1:0.219: Failed to get HID Report Descriptor of size: 129 [ 724.765009][ T5] gtco: probe of 5-1:0.219 failed with error -5 [ 724.835751][ T5] usb 5-1: USB disconnect, device number 45 09:47:53 executing program 4: r0 = syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000039542f108c07021047e6000000010902240001000000000904db00010a04c80009210300000000810009050a"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) 09:47:53 executing program 3: r0 = socket$kcm(0x2, 0x5, 0x0) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x2, 0x0, &(0x7f0000000080)) 09:47:53 executing program 0: r0 = syz_open_dev$vim2m(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_DQBUF(r0, 0xc0405602, &(0x7f0000000040)={0x0, 0x0, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\a\x00'}, 0x0, 0x0, @userptr}) 09:47:53 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_opts(r0, 0x29, 0x1b, 0x0, 0x0) 09:47:53 executing program 1: r0 = socket(0xa, 0x3, 0x6) setsockopt$PNPIPE_HANDLE(r0, 0x29, 0x4b, 0x0, 0x300) 09:47:53 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_TMR_START(r0, 0x5402) ioctl$SNDCTL_TMR_TEMPO(r0, 0xc0045405, &(0x7f0000000040)) 09:47:54 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000780)='/dev/autofs\x00', 0x0, 0x0) read$fb(r0, 0x0, 0x0) 09:47:54 executing program 2: mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) utimensat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0xea60}}, 0x0) 09:47:54 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xa, &(0x7f0000000140)={&(0x7f0000000040)={0x54, 0x0, 0x0, 0x0, 0x0, {}, [@GTPA_MS_ADDRESS={0x0, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @GTPA_TID={0xc}, @GTPA_LINK={0x8}, @GTPA_TID={0xc}, @GTPA_O_TEI={0x8}, @GTPA_O_TEI={0x8}, @GTPA_O_TEI={0x8}]}, 0x6b}}, 0x0) 09:47:54 executing program 5: socket(0x1d, 0x0, 0x45635b09) 09:47:54 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000012c0)='net/softnet_stat\x00') read$char_usb(r0, &(0x7f0000000100)=""/135, 0x87) read$eventfd(r0, 0x0, 0x0) [ 725.891234][ T5] usb 5-1: new full-speed USB device number 46 using dummy_hcd [ 726.261823][ T5] usb 5-1: config 0 has an invalid interface number: 219 but max is 0 [ 726.271612][ T5] usb 5-1: config 0 has no interface number 0 [ 726.279071][ T5] usb 5-1: config 0 interface 219 altsetting 0 endpoint 0xA has invalid wMaxPacketSize 0 [ 726.290459][ T5] usb 5-1: New USB device found, idVendor=078c, idProduct=1002, bcdDevice=e6.47 [ 726.299894][ T5] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 09:47:54 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/wireless\x00') preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/240, 0xf0}], 0x1, 0x95e, 0x0) [ 726.590862][ T5] usb 5-1: config 0 descriptor?? [ 726.881887][ T5] gtco 5-1:0.219: Failed to get HID Report Descriptor of size: 129 [ 726.890781][ T5] gtco: probe of 5-1:0.219 failed with error -5 [ 726.914095][ T5] usb 5-1: USB disconnect, device number 46 09:47:55 executing program 4: r0 = syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000039542f108c07021047e6000000010902240001000000000904db00010a04c80009210300000000810009050a"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) 09:47:55 executing program 1: bpf$PROG_LOAD(0x19, 0x0, 0x0) 09:47:55 executing program 2: r0 = syz_open_dev$vim2m(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0145608, &(0x7f00000000c0)={0x0, 0xd, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "c87400"}}) 09:47:55 executing program 0: r0 = socket(0xa, 0x3, 0x6) connect$phonet_pipe(r0, &(0x7f0000000180)={0xa}, 0x10) 09:47:55 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000800)={&(0x7f00000004c0)=@in={0x2, 0x4e23, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001b80)=[{0x10, 0x0, 0x1}], 0x10}, 0x0) 09:47:55 executing program 5: bpf$BPF_GET_BTF_INFO(0x12, &(0x7f0000000240)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000300)=""/71, 0xfffffffffffffea8}}, 0x62) 09:47:56 executing program 1: open_tree(0xffffffffffffff9c, &(0x7f0000000140)='\x00', 0x1800) 09:47:56 executing program 2: r0 = socket(0xa, 0x3, 0x6) setsockopt$PNPIPE_HANDLE(r0, 0x29, 0x1b, 0x0, 0x0) 09:47:56 executing program 3: r0 = socket$inet(0x2, 0x3, 0x5) getpeername$inet(r0, 0x0, 0x0) 09:47:56 executing program 5: r0 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x3, 0x7) r1 = socket$inet(0x2, 0x3, 0x5) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x0, {0x2, 0x0, @remote}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x400000000000000}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, 0x0) 09:47:56 executing program 0: r0 = socket(0xa, 0x2, 0x0) connect$l2tp6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @mcast1, 0x20}, 0x20) connect$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x4}, 0x20) [ 728.224739][ T8716] usb 5-1: new full-speed USB device number 47 using dummy_hcd 09:47:56 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, 0x0, 0x0) [ 728.601647][ T8716] usb 5-1: config 0 has an invalid interface number: 219 but max is 0 [ 728.610113][ T8716] usb 5-1: config 0 has no interface number 0 [ 728.616740][ T8716] usb 5-1: config 0 interface 219 altsetting 0 endpoint 0xA has invalid wMaxPacketSize 0 [ 728.627032][ T8716] usb 5-1: New USB device found, idVendor=078c, idProduct=1002, bcdDevice=e6.47 [ 728.637469][ T8716] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 728.847139][ T8716] usb 5-1: config 0 descriptor?? [ 729.161198][ T8716] gtco 5-1:0.219: Failed to get HID Report Descriptor of size: 129 [ 729.170064][ T8716] gtco: probe of 5-1:0.219 failed with error -5 [ 729.213925][ T8716] usb 5-1: USB disconnect, device number 47 09:47:58 executing program 4: r0 = syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000039542f108c07021047e6000000010902240001000000000904db00010a04c80009210300000000810009050a"], 0x0) syz_usb_control_io(r0, &(0x7f0000000300)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 09:47:58 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0xc, 0x0, 0x0) 09:47:58 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) r1 = dup(r0) read$snapshot(r1, 0x0, 0x0) 09:47:58 executing program 5: r0 = fanotify_init(0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000300)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 09:47:58 executing program 3: r0 = socket(0xa, 0x3, 0x6) setsockopt$PNPIPE_HANDLE(r0, 0x29, 0x10, 0x0, 0x300) 09:47:58 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp\x00') read$char_usb(r0, &(0x7f0000000100)=""/135, 0x87) 09:47:58 executing program 5: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvme-fabrics\x00', 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x0) 09:47:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000300)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, r1, 0x1, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) 09:47:58 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, 0x0, &(0x7f0000002100)) 09:47:58 executing program 1: socket$inet6(0xa, 0x1, 0x106) 09:47:58 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r0, &(0x7f00000002c0)=@abs, 0x6e) [ 730.521808][ T8719] usb 5-1: new full-speed USB device number 48 using dummy_hcd 09:47:59 executing program 5: syz_mount_image$nfs(&(0x7f00000014c0)='nfs\x00', &(0x7f0000001880)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001c00)='\x04\x00\x00\x00er_xattr') [ 730.882684][ T8719] usb 5-1: config 0 has an invalid interface number: 219 but max is 0 [ 730.891182][ T8719] usb 5-1: config 0 has no interface number 0 [ 730.897539][ T8719] usb 5-1: config 0 interface 219 altsetting 0 endpoint 0xA has invalid wMaxPacketSize 0 [ 730.907774][ T8719] usb 5-1: New USB device found, idVendor=078c, idProduct=1002, bcdDevice=e6.47 [ 730.917095][ T8719] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 731.101507][ T8719] usb 5-1: config 0 descriptor?? [ 731.188082][T14050] NFS: mount program didn't pass remote address [ 731.213925][T14050] NFS: mount program didn't pass remote address [ 731.391782][ T8719] gtco 5-1:0.219: Failed to get HID Report Descriptor of size: 129 [ 731.400356][ T8719] gtco: probe of 5-1:0.219 failed with error -5 [ 731.431924][ T8719] usb 5-1: USB disconnect, device number 48 09:48:00 executing program 4: r0 = syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000039542f108c07021047e6000000010902240001000000000904db00010a04c80009210300000000810009050a"], 0x0) syz_usb_control_io(r0, &(0x7f0000000300)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 09:48:00 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDCTL_TMR_TEMPO(r0, 0x40085112, &(0x7f0000000040)=0x8) read$sequencer(r0, &(0x7f0000000080)=""/96, 0x4) 09:48:00 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0x5450, 0xfffffffffffffffe) 09:48:00 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000540)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x340}, 0x0) 09:48:00 executing program 2: r0 = socket(0xa, 0x3, 0x6) setsockopt$PNPIPE_HANDLE(r0, 0x29, 0x21, 0x0, 0x0) 09:48:00 executing program 5: r0 = socket$kcm(0x2, 0x5, 0x0) getsockopt$bt_hci(r0, 0x84, 0x25, 0x0, &(0x7f0000000040)=0x300) 09:48:00 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) syncfs(r0) 09:48:00 executing program 1: prctl$PR_SET_MM_MAP_SIZE(0x19, 0xf, 0x0) 09:48:00 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000041c0)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_mount_image$fuse(&(0x7f0000000040)='fuse\x00', &(0x7f0000000080)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$DRM_IOCTL_ADD_CTX(r1, 0x6611, 0x0) 09:48:01 executing program 5: r0 = socket$kcm(0x2, 0x5, 0x0) getsockopt$bt_hci(r0, 0x84, 0x6c, 0x0, &(0x7f0000000040)=0x300) [ 732.531533][ T3692] usb 5-1: new full-speed USB device number 49 using dummy_hcd [ 732.891830][ T3692] usb 5-1: config 0 has an invalid interface number: 219 but max is 0 [ 732.900267][ T3692] usb 5-1: config 0 has no interface number 0 [ 732.906897][ T3692] usb 5-1: config 0 interface 219 altsetting 0 endpoint 0xA has invalid wMaxPacketSize 0 [ 732.917054][ T3692] usb 5-1: New USB device found, idVendor=078c, idProduct=1002, bcdDevice=e6.47 [ 732.926450][ T3692] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 733.131278][ T3692] usb 5-1: config 0 descriptor?? 09:48:01 executing program 5: r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000080)='./file\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) r2 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000002c0)='./file\x00', r2, &(0x7f0000000300)='./file0/file0\x00', 0x0) 09:48:01 executing program 0: setrlimit(0x7, &(0x7f0000000080)) open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) [ 733.431986][ T3692] gtco 5-1:0.219: Failed to get HID Report Descriptor of size: 129 [ 733.441081][ T3692] gtco: probe of 5-1:0.219 failed with error -5 [ 733.539693][ T3692] usb 5-1: USB disconnect, device number 49 09:48:02 executing program 4: r0 = syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000039542f108c07021047e6000000010902240001000000000904db00010a04c80009210300000000810009050a"], 0x0) syz_usb_control_io(r0, &(0x7f0000000300)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 09:48:02 executing program 2: r0 = socket(0x2, 0x2, 0x0) sendmsg$can_j1939(r0, &(0x7f0000000f40)={0x0, 0x0, &(0x7f0000000f00)={0x0}}, 0x0) 09:48:02 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x65, &(0x7f0000000280), 0x10) 09:48:02 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$XDP_TX_RING(r0, 0x10c, 0x3, 0x0, 0x0) 09:48:02 executing program 0: r0 = syz_open_dev$vim2m(&(0x7f0000000200)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_DQBUF(r0, 0xc008561c, &(0x7f0000000180)={0x0, 0x0, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "ff0f00"}, 0x0, 0x0, @fd}) 09:48:02 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') read$char_usb(r0, &(0x7f0000000100)=""/135, 0x20000187) read$char_usb(r0, 0x0, 0x0) 09:48:02 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/sockcreate\x00') read$char_usb(r0, 0x0, 0x0) 09:48:02 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0xa, 0x0, &(0x7f0000000040)) 09:48:03 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000240), &(0x7f0000000280)=0x8) 09:48:03 executing program 0: prctl$PR_SET_MM_MAP_SIZE(0x24, 0xf, 0x0) [ 734.773843][ T8719] usb 5-1: new full-speed USB device number 50 using dummy_hcd 09:48:03 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28, 0x0, 0x0, 0xfffff00c}, {0x6}]}) 09:48:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1a, 0x0, &(0x7f0000000080)) [ 735.143857][ T8719] usb 5-1: config 0 has an invalid interface number: 219 but max is 0 [ 735.152378][ T8719] usb 5-1: config 0 has no interface number 0 [ 735.158637][ T8719] usb 5-1: config 0 interface 219 altsetting 0 endpoint 0xA has invalid wMaxPacketSize 0 [ 735.168928][ T8719] usb 5-1: New USB device found, idVendor=078c, idProduct=1002, bcdDevice=e6.47 [ 735.178326][ T8719] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 735.272771][ T8719] usb 5-1: config 0 descriptor?? [ 735.571499][ T8719] gtco 5-1:0.219: Failed to get HID Report Descriptor of size: 129 [ 735.579970][ T8719] gtco: probe of 5-1:0.219 failed with error -5 [ 735.667754][ T8719] usb 5-1: USB disconnect, device number 50 09:48:04 executing program 4: r0 = syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000039542f108c07021047e6000000010902240001000000000904db00010a04c80009210300000000810009050a"], 0x0) syz_usb_control_io(r0, &(0x7f0000000300)={0x18, &(0x7f0000000140)=ANY=[], 0x0, 0x0, 0x0, 0x0}, 0x0) 09:48:04 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='environ\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)=""/67, 0x43}, {&(0x7f0000000140)=""/96, 0x60}, {&(0x7f00000001c0)=""/171, 0xab}], 0x3, 0x0, 0x0) 09:48:04 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_buf(r0, 0x107, 0x1, &(0x7f0000000000)="a647aba971d4fd3239d0969f14a338b7", 0x10) 09:48:04 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000400)='net/ip6_tables_names\x00') preadv(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/119, 0x77}], 0x1, 0x0, 0x0) 09:48:04 executing program 5: prctl$PR_SET_MM_MAP_SIZE(0x28, 0xf, 0x0) 09:48:04 executing program 3: r0 = socket$inet(0x2, 0x3, 0x5) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000100)={'filter\x00', 0x4, "31a4627d"}, &(0x7f00000001c0)=0x28) 09:48:04 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000800)={&(0x7f00000004c0)=@in={0x2, 0x4e23, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001b80)=[{0x10, 0x1, 0x24}], 0x10}, 0x0) 09:48:05 executing program 1: r0 = socket(0xa, 0x2, 0x0) connect$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x4}, 0x20) connect$l2tp6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, 0x20) 09:48:05 executing program 5: socket$packet(0x11, 0x2, 0x300) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 09:48:05 executing program 3: bpf$BPF_GET_BTF_INFO(0x13, &(0x7f0000000240)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={0x0}}, 0x10) 09:48:05 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0x5452, &(0x7f0000000440)={"8bd16ad342973ffe4e2d3ea57a46d96b"}) [ 736.951132][ T3228] usb 5-1: new full-speed USB device number 51 using dummy_hcd 09:48:05 executing program 2: r0 = fsopen(&(0x7f0000000480)='bpf\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) [ 737.331667][ T3228] usb 5-1: config 0 has an invalid interface number: 219 but max is 0 [ 737.340093][ T3228] usb 5-1: config 0 has no interface number 0 [ 737.346755][ T3228] usb 5-1: config 0 interface 219 altsetting 0 endpoint 0xA has invalid wMaxPacketSize 0 [ 737.356915][ T3228] usb 5-1: New USB device found, idVendor=078c, idProduct=1002, bcdDevice=e6.47 [ 737.366256][ T3228] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 737.557588][ T3228] usb 5-1: config 0 descriptor?? [ 738.051949][ T3228] gtco 5-1:0.219: Failed to get HID Report Descriptor of size: 129 [ 738.060327][ T3228] gtco: probe of 5-1:0.219 failed with error -5 [ 738.107547][ T3228] usb 5-1: USB disconnect, device number 51 09:48:07 executing program 4: r0 = syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000039542f108c07021047e6000000010902240001000000000904db00010a04c80009210300000000810009050a"], 0x0) syz_usb_control_io(r0, &(0x7f0000000300)={0x18, &(0x7f0000000140)=ANY=[], 0x0, 0x0, 0x0, 0x0}, 0x0) 09:48:07 executing program 1: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dri/renderD128\x00', 0x0, 0x0) ioctl(r0, 0x0, 0x0) 09:48:07 executing program 5: bpf$BPF_GET_BTF_INFO(0x22, &(0x7f0000000240)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={0x0}}, 0x10) 09:48:07 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) io_uring_setup(0x1486, &(0x7f0000000000)) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x890c, &(0x7f0000000000)={'wg1\x00'}) 09:48:07 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0xc00caee0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000ffc000/0x2000)=nil}) 09:48:07 executing program 2: r0 = fanotify_init(0x0, 0x0) r1 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) fanotify_mark(r0, 0x1, 0x40001031, r1, 0x0) open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) 09:48:07 executing program 3: prctl$PR_SET_MM_MAP_SIZE(0x29, 0xf, &(0x7f0000000200)) 09:48:07 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket(0x18, 0x0, 0x0) ioctl$sock_ifreq(r1, 0x89f0, &(0x7f00000001c0)={'ip6_vti0\x00', @ifru_mtu=0x531100}) connect$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x0, @local}, 0x10) 09:48:07 executing program 5: openat$audio1(0xffffffffffffff9c, 0x0, 0x400000, 0x0) 09:48:07 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0x40047438, 0x0) 09:48:07 executing program 1: prctl$PR_SET_MM_MAP_SIZE(0x2f, 0xf, &(0x7f0000000200)) [ 739.581057][ T9201] usb 5-1: new full-speed USB device number 52 using dummy_hcd 09:48:08 executing program 2: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x80108906, 0x0) [ 739.971894][ T9201] usb 5-1: config 0 has an invalid interface number: 219 but max is 0 [ 739.981866][ T9201] usb 5-1: config 0 has no interface number 0 [ 739.988244][ T9201] usb 5-1: config 0 interface 219 altsetting 0 endpoint 0xA has invalid wMaxPacketSize 0 [ 739.998629][ T9201] usb 5-1: New USB device found, idVendor=078c, idProduct=1002, bcdDevice=e6.47 [ 740.008252][ T9201] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 740.127039][ T9201] usb 5-1: config 0 descriptor?? [ 740.611138][ T9201] gtco 5-1:0.219: Failed to get HID Report Descriptor of size: 129 [ 740.619752][ T9201] gtco: probe of 5-1:0.219 failed with error -5 [ 740.638302][ T9201] usb 5-1: USB disconnect, device number 52 09:48:09 executing program 4: r0 = syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000039542f108c07021047e6000000010902240001000000000904db00010a04c80009210300000000810009050a"], 0x0) syz_usb_control_io(r0, &(0x7f0000000300)={0x18, &(0x7f0000000140)=ANY=[], 0x0, 0x0, 0x0, 0x0}, 0x0) 09:48:09 executing program 3: r0 = socket(0x18, 0x0, 0x1) r1 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x6, r1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8946, &(0x7f0000000080)={'vcan0\x00'}) 09:48:09 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001000/0x1000)=nil}) 09:48:09 executing program 0: r0 = socket(0x15, 0x5, 0x0) sendmsg$can_j1939(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001580)={0x0}}, 0x200000c4) 09:48:09 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/240, 0xf0}], 0x1, 0x95e, 0x0) 09:48:09 executing program 2: r0 = socket(0x2, 0x1, 0x0) accept4(r0, 0x0, 0x0, 0x0) 09:48:10 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x8000}, 0x20) 09:48:10 executing program 0: socketpair(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 09:48:10 executing program 3: bpf$PROG_LOAD(0x11, &(0x7f0000000200)={0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:48:10 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newae={0x40, 0x1e, 0x1, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @in=@private}}, 0x40}}, 0x0) 09:48:10 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='/dev/dlm_plock\x00') [ 742.065349][ T8719] usb 5-1: new full-speed USB device number 53 using dummy_hcd 09:48:10 executing program 5: r0 = socket(0xa, 0x3, 0x6) setsockopt$PNPIPE_HANDLE(r0, 0x29, 0x4, 0x0, 0x300) [ 742.432424][ T8719] usb 5-1: config 0 has an invalid interface number: 219 but max is 0 [ 742.441197][ T8719] usb 5-1: config 0 has no interface number 0 [ 742.447468][ T8719] usb 5-1: config 0 interface 219 altsetting 0 endpoint 0xA has invalid wMaxPacketSize 0 [ 742.457705][ T8719] usb 5-1: New USB device found, idVendor=078c, idProduct=1002, bcdDevice=e6.47 [ 742.467272][ T8719] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 742.710348][ T8719] usb 5-1: config 0 descriptor?? [ 743.202113][ T8719] gtco 5-1:0.219: Failed to get HID Report Descriptor of size: 129 [ 743.211194][ T8719] gtco: probe of 5-1:0.219 failed with error -5 [ 743.287249][ T8719] usb 5-1: USB disconnect, device number 53 09:48:12 executing program 4: r0 = syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000039542f108c07021047e6000000010902240001000000000904db00010a04c80009210300000000810009050a"], 0x0) syz_usb_control_io(r0, &(0x7f0000000300)={0x18, &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0}, 0x0) 09:48:12 executing program 3: r0 = socket(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8932, 0x0) 09:48:12 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_opts(r0, 0x29, 0xb, 0x0, 0x0) 09:48:12 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/38, 0x26}], 0x1, 0x0, 0x0) 09:48:12 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x20, r1, 0x1, 0x0, 0x0, {0xa}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x20}}, 0x0) 09:48:12 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendmmsg$unix(r0, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@cred={{0x1c, 0x2}}], 0x20}], 0x1, 0x0) 09:48:12 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/packet\x00') read$proc_mixer(r0, 0x0, 0x0) 09:48:12 executing program 3: r0 = socket(0x2, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000003c0)={'ip6tnl0\x00', 0x0}) 09:48:12 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000041c0)='/dev/fuse\x00', 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040)='fuse\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_fuse_handle_req(r0, &(0x7f0000006980)="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", 0x2000, &(0x7f0000002a80)={&(0x7f0000000140)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x1a00}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 09:48:12 executing program 2: io_pgetevents(0x0, 0x0, 0x6, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}], 0x0, &(0x7f0000000140)={&(0x7f00000001c0), 0x54}) 09:48:12 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x16, 0x0, 0x0) [ 744.466836][ T8719] usb 5-1: new full-speed USB device number 54 using dummy_hcd 09:48:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000140)={0x48, 0x8, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x10, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0xfffffffffffffdc0}]}, 0x48}}, 0x0) [ 744.827088][T14333] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. [ 744.831946][ T8719] usb 5-1: config 0 has an invalid interface number: 219 but max is 0 [ 744.846300][ T8719] usb 5-1: config 0 has no interface number 0 [ 744.852937][ T8719] usb 5-1: config 0 interface 219 altsetting 0 endpoint 0xA has invalid wMaxPacketSize 0 [ 744.863551][ T8719] usb 5-1: New USB device found, idVendor=078c, idProduct=1002, bcdDevice=e6.47 [ 744.873003][ T8719] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 744.895093][ T8719] usb 5-1: config 0 descriptor?? [ 745.401427][ T8719] gtco 5-1:0.219: Failed to get HID Report Descriptor of size: 129 [ 745.415551][ T8719] gtco: probe of 5-1:0.219 failed with error -5 [ 745.434562][ T8719] usb 5-1: USB disconnect, device number 54 09:48:14 executing program 4: r0 = syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000039542f108c07021047e6000000010902240001000000000904db00010a04c80009210300000000810009050a"], 0x0) syz_usb_control_io(r0, &(0x7f0000000300)={0x18, &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0}, 0x0) 09:48:14 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, 0x0, &(0x7f0000000080)) 09:48:14 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000040)={'tunl0\x00', @ifru_mtu=0x531101}) r1 = socket$caif_stream(0x25, 0x1, 0x0) setsockopt$CAIFSO_LINK_SELECT(r1, 0x116, 0x7f, &(0x7f00000002c0), 0x4) 09:48:14 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_opts(r0, 0x29, 0x4a, 0x0, 0x0) 09:48:14 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_opts(r0, 0x29, 0x43, 0x0, 0x0) 09:48:14 executing program 5: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f00000000c0)={0x0, {{0x3, 0x0, @multicast2}}, {{0x2, 0x0, @multicast1}}}, 0x108) 09:48:14 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x0, 0x0) read$snapshot(r0, 0x0, 0x0) 09:48:14 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x3c, r1, 0x1, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'wg2\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) 09:48:14 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) 09:48:14 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000001500)='/dev/vcs#\x00', 0x0, 0x0) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) 09:48:15 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) r1 = dup(r0) sendmsg$BATADV_CMD_GET_HARDIF(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}, 0x1, 0x0, 0xf0ff7f}, 0x0) [ 746.781316][ T12] usb 5-1: new full-speed USB device number 55 using dummy_hcd 09:48:15 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mountinfo\x00') read$char_usb(r0, &(0x7f0000000100)=""/135, 0x20000187) [ 746.949217][T14373] IPVS: sync thread started: state = MASTER, mcast_ifn = wg2, syncid = 0, id = 0 [ 747.141813][ T12] usb 5-1: config 0 has an invalid interface number: 219 but max is 0 [ 747.150244][ T12] usb 5-1: config 0 has no interface number 0 [ 747.166832][ T12] usb 5-1: config 0 interface 219 altsetting 0 endpoint 0xA has invalid wMaxPacketSize 0 [ 747.177167][ T12] usb 5-1: New USB device found, idVendor=078c, idProduct=1002, bcdDevice=e6.47 [ 747.186559][ T12] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 747.389123][ T12] usb 5-1: config 0 descriptor?? [ 747.881590][ T12] gtco 5-1:0.219: Failed to get HID Report Descriptor of size: 129 [ 747.894990][ T12] gtco: probe of 5-1:0.219 failed with error -5 [ 747.934768][ T12] usb 5-1: USB disconnect, device number 55 09:48:16 executing program 4: r0 = syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000039542f108c07021047e6000000010902240001000000000904db00010a04c80009210300000000810009050a"], 0x0) syz_usb_control_io(r0, &(0x7f0000000300)={0x18, &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0}, 0x0) 09:48:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000040)={'tunl0\x00', @ifru_mtu=0x531101}) sigaltstack(&(0x7f0000ffc000/0x4000)=nil, 0x0) r1 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x2013, r1, 0x0) 09:48:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09042bbd7000fedbdf2511"], 0x30}}, 0x0) 09:48:16 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@qipcrtr={0x2a, 0x4}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000140)="57316962e51b15559b794fb186dd", 0xe}], 0x1}}], 0x1, 0x0) 09:48:16 executing program 2: r0 = socket$kcm(0x2, 0x5, 0x0) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x1c, 0x0, &(0x7f0000000080)) 09:48:16 executing program 5: r0 = fsopen(&(0x7f0000000080)='btrfs\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, 0x0, 0x0, 0x0) [ 748.677300][T14401] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. [ 748.780732][T14406] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. 09:48:17 executing program 0: r0 = socket$inet(0x2, 0x3, 0x5) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000080)=0x44) 09:48:17 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000002480)={'batadv0\x00'}) 09:48:17 executing program 5: r0 = fsopen(&(0x7f0000000080)='btrfs\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, 0x0, 0x0, 0x0) 09:48:17 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0xc, 0x4, 0x80000008, 0x0, 0x1}, 0x40) 09:48:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09042bbd7000fedbdf2511"], 0x30}}, 0x0) [ 749.300795][ T3228] usb 5-1: new full-speed USB device number 56 using dummy_hcd 09:48:17 executing program 0: syz_open_dev$loop(0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000100)) [ 749.600209][T14419] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. [ 749.711464][ T3228] usb 5-1: config 0 has an invalid interface number: 219 but max is 0 [ 749.720036][ T3228] usb 5-1: config 0 has no interface number 0 [ 749.726493][ T3228] usb 5-1: config 0 interface 219 altsetting 0 endpoint 0xA has invalid wMaxPacketSize 0 [ 749.736574][ T3228] usb 5-1: New USB device found, idVendor=078c, idProduct=1002, bcdDevice=e6.47 [ 749.745833][ T3228] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 749.942178][ T3228] usb 5-1: config 0 descriptor?? [ 750.431861][ T3228] gtco 5-1:0.219: Failed to get HID Report Descriptor of size: 129 [ 750.440260][ T3228] gtco: probe of 5-1:0.219 failed with error -5 [ 750.498441][ T3228] usb 5-1: USB disconnect, device number 56 09:48:19 executing program 4: r0 = syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000039542f108c07021047e6000000010902240001000000000904db00010a04c80009210300000000810009050a"], 0x0) syz_usb_control_io(r0, &(0x7f0000000300)={0x18, &(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00'], 0x0, 0x0, 0x0, 0x0}, 0x0) 09:48:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WDEV={0xc}]}, 0x28}}, 0x0) 09:48:19 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28, 0x0, 0x0, 0xfffff02c}, {0x6}]}) 09:48:19 executing program 1: r0 = fsopen(&(0x7f0000000040)='devpts\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000000)='devpts\x00', &(0x7f0000000080)='devpts\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) 09:48:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09042bbd7000fedbdf2511"], 0x30}}, 0x0) 09:48:19 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000140)=@in6={0xa, 0x4e24, 0x0, @empty, 0x101}, 0x80, 0x0}, 0x20048040) [ 751.162952][T14443] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. [ 751.259803][T14445] devpts: called with bogus options [ 751.342510][T14455] devpts: called with bogus options 09:48:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09042bbd7000fedbdf2511"], 0x30}}, 0x0) 09:48:20 executing program 0: r0 = fsopen(&(0x7f0000000080)='overlay\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, 0x0, 0x0, 0x0) 09:48:20 executing program 1: r0 = socket(0x23, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x89e0, 0x0) 09:48:20 executing program 2: r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000080)='./file\x00', 0x1000, 0x0) open$dir(&(0x7f0000000140)='./file\x00', 0x149b02, 0x0) open$dir(&(0x7f0000000040)='./file\x00', 0x0, 0x0) 09:48:20 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000000)={'tunl0\x00', @ifru_mtu=0x531101}) sendto$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) [ 752.040636][T14466] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. [ 752.070927][ T3228] usb 5-1: new full-speed USB device number 57 using dummy_hcd [ 752.298967][T14473] overlayfs: missing 'lowerdir' 09:48:20 executing program 1: r0 = socket$kcm(0x2, 0x5, 0x0) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x1e, 0x0, &(0x7f0000000080)) [ 752.451840][ T3228] usb 5-1: config 0 has an invalid interface number: 219 but max is 0 [ 752.460251][ T3228] usb 5-1: config 0 has no interface number 0 [ 752.466818][ T3228] usb 5-1: config 0 interface 219 altsetting 0 endpoint 0xA has invalid wMaxPacketSize 0 [ 752.476971][ T3228] usb 5-1: New USB device found, idVendor=078c, idProduct=1002, bcdDevice=e6.47 [ 752.486441][ T3228] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 752.683026][ T3228] usb 5-1: config 0 descriptor?? [ 753.181478][ T3228] gtco 5-1:0.219: Failed to get HID Report Descriptor of size: 129 [ 753.189966][ T3228] gtco: probe of 5-1:0.219 failed with error -5 [ 753.231709][ T3228] usb 5-1: USB disconnect, device number 57 09:48:22 executing program 4: r0 = syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000039542f108c07021047e6000000010902240001000000000904db00010a04c80009210300000000810009050a"], 0x0) syz_usb_control_io(r0, &(0x7f0000000300)={0x18, &(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00'], 0x0, 0x0, 0x0, 0x0}, 0x0) 09:48:22 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16, @ANYBLOB="09042bbd7000fedbdf2511"], 0x30}}, 0x0) 09:48:22 executing program 5: syz_mount_image$gfs2(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = inotify_init1(0x0) r1 = inotify_add_watch(r0, &(0x7f0000000300)='./file0\x00', 0x4000400) inotify_rm_watch(r0, r1) 09:48:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)={0x14, r1, 0xb33}, 0x14}}, 0x0) 09:48:22 executing program 0: r0 = socket(0x29, 0x2, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x0, 0x0, 0x0) 09:48:22 executing program 1: r0 = socket(0x1, 0x2, 0x0) bind(r0, &(0x7f0000001840)=@tipc, 0x80) 09:48:22 executing program 1: r0 = fanotify_init(0x0, 0x0) fanotify_mark(r0, 0x5d, 0x4800003a, 0xffffffffffffff9c, &(0x7f0000000000)='.\x00') fanotify_mark(r0, 0x5e, 0x4800003a, 0xffffffffffffff9c, &(0x7f0000000000)='.\x00') 09:48:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x8, 0x3, 0x1f0, 0x0, 0xa, 0xd0e0000, 0x0, 0x100, 0x158, 0x1d8, 0x1d8, 0x158, 0x1d8, 0x3, 0x0, {[{{@ip={@broadcast, @dev, 0x0, 0x0, 'veth1_to_batadv\x00', 'veth0_to_team\x00'}, 0x0, 0x78, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa0, 0xc0, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x250) 09:48:22 executing program 0: r0 = socket$inet6_udplite(0x2, 0x3, 0x88) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000100)="3559509c0007a9e2", 0x8}], 0x1}, 0x0) 09:48:22 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16, @ANYBLOB="09042bbd7000fedbdf2511"], 0x30}}, 0x0) 09:48:22 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_opts(r0, 0x29, 0x48, 0x0, 0x0) [ 754.540843][ T3228] usb 5-1: new full-speed USB device number 58 using dummy_hcd 09:48:23 executing program 1: openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x6000) [ 754.701806][T14516] raw_sendmsg: syz-executor.0 forgot to set AF_INET. Fix it! [ 754.924619][ T3228] usb 5-1: config 0 has an invalid interface number: 219 but max is 0 [ 754.933293][ T3228] usb 5-1: config 0 has no interface number 0 [ 754.939566][ T3228] usb 5-1: config 0 interface 219 altsetting 0 endpoint 0xA has invalid wMaxPacketSize 0 [ 754.950022][ T3228] usb 5-1: New USB device found, idVendor=078c, idProduct=1002, bcdDevice=e6.47 [ 754.959394][ T3228] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 755.212088][ T3228] usb 5-1: config 0 descriptor?? [ 755.731332][ T3228] gtco 5-1:0.219: Failed to get HID Report Descriptor of size: 129 [ 755.739833][ T3228] gtco: probe of 5-1:0.219 failed with error -5 [ 755.764491][ T3228] usb 5-1: USB disconnect, device number 58 09:48:24 executing program 4: r0 = syz_usb_connect(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000039542f108c07021047e6000000010902240001000000000904db00010a04c80009210300000000810009050a"], 0x0) syz_usb_control_io(r0, &(0x7f0000000300)={0x18, &(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00'], 0x0, 0x0, 0x0, 0x0}, 0x0) 09:48:24 executing program 2: syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x20000000, 0x20480) 09:48:24 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16, @ANYBLOB="09042bbd7000fedbdf2511"], 0x30}}, 0x0) 09:48:24 executing program 0: syz_mount_image$nfs(&(0x7f00000014c0)='nfs\x00', &(0x7f0000001880)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001c00)='nouser_xattr') 09:48:24 executing program 5: r0 = socket(0x2, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f0000003580)={'ip6gre0\x00', &(0x7f0000003500)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @local, 0x0, 0x707274057f99b1af}}) 09:48:24 executing program 1: symlinkat(&(0x7f0000000200)='./file\x00', 0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00') r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000080)='./file\x00', 0x1000, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x143402, 0x0) [ 756.507947][T14544] nfs: Unknown parameter 'nouser_xattr' [ 756.572992][T14544] nfs: Unknown parameter 'nouser_xattr' 09:48:25 executing program 3: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="09042bbd7000fedbdf2511"], 0x30}}, 0x0) 09:48:25 executing program 5: r0 = socket(0xa, 0x2, 0x0) connect$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x4}, 0x20) sendto$l2tp6(r0, &(0x7f0000000040)="e5", 0x1, 0xa2ffff, 0x0, 0x0) 09:48:25 executing program 2: socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$inet_sctp(r0, &(0x7f0000005f80)=[{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000000040)="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", 0xec1}], 0x1}], 0x1, 0x0) 09:48:25 executing program 0: symlinkat(&(0x7f0000000200)='./file\x00', 0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00') r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000080)='./file\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000001c0)='./file\x00', r0, &(0x7f0000000280)='./file0\x00', 0x5) 09:48:25 executing program 1: r0 = socket$kcm(0x2, 0x5, 0x0) getsockopt$SO_TIMESTAMP(r0, 0x1, 0xf, 0x0, &(0x7f0000000080)) [ 757.091077][ T8404] usb 5-1: new full-speed USB device number 59 using dummy_hcd [ 757.494210][ T8404] usb 5-1: config 0 has an invalid interface number: 219 but max is 0 [ 757.504188][ T8404] usb 5-1: config 0 has no interface number 0 [ 757.510442][ T8404] usb 5-1: config 0 interface 219 altsetting 0 endpoint 0xA has invalid wMaxPacketSize 0 [ 757.520896][ T8404] usb 5-1: New USB device found, idVendor=078c, idProduct=1002, bcdDevice=e6.47 [ 757.530147][ T8404] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 09:48:26 executing program 1: r0 = socket$kcm(0x2, 0x5, 0x0) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x37, 0x0, &(0x7f0000000080)) [ 757.849274][ T8404] usb 5-1: config 0 descriptor?? [ 758.341501][ T8404] gtco 5-1:0.219: Failed to get HID Report Descriptor of size: 129 [ 758.350020][ T8404] gtco: probe of 5-1:0.219 failed with error -5 [ 758.428416][ T8404] usb 5-1: USB disconnect, device number 59 09:48:27 executing program 5: mbind(&(0x7f0000000000/0x10000)=nil, 0x10000, 0x2, &(0x7f0000000000)=0x9, 0x710b, 0x1) 09:48:27 executing program 3: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="09042bbd7000fedbdf2511"], 0x30}}, 0x0) 09:48:27 executing program 2: prctl$PR_SET_MM_AUXV(0x16, 0xc, 0x0, 0x0) 09:48:27 executing program 0: r0 = socket(0x18, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f00000001c0)={'ip6_vti0\x00', @ifru_mtu=0x531100}) r1 = mq_open(&(0x7f0000000380)='ip6_vti0\x00', 0x0, 0x0, 0x0) mq_notify(r1, &(0x7f0000001600)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}) 09:48:27 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/icmp\x00') read$proc_mixer(r0, 0x0, 0x0) 09:48:27 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/raw\x00') preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000180)=""/113, 0x71}], 0x1, 0x0, 0x0) 09:48:27 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) connect$llc(r0, 0x0, 0x0) 09:48:27 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_OBJ_SETPROPERTY(r0, 0xc01864ba, &(0x7f0000000000)) 09:48:27 executing program 3: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="09042bbd7000fedbdf2511"], 0x30}}, 0x0) 09:48:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0)='ethtool\x00') sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000540)={0x34, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x34}}, 0x0) 09:48:28 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) write$input_event(0xffffffffffffffff, 0x0, 0x23) 09:48:28 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000041c0)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_mount_image$fuse(&(0x7f0000000040)='fuse\x00', &(0x7f0000000080)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$DRM_IOCTL_ADD_CTX(r1, 0x400c6615, 0x0) 09:48:28 executing program 2: r0 = fanotify_init(0x8, 0x0) r1 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) fanotify_mark(r0, 0x1, 0x40001031, r1, 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x5d, 0x4800003a, 0xffffffffffffff9c, &(0x7f0000000000)='.\x00') open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) 09:48:28 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09042bbd7000fedbdf2511"], 0x30}}, 0x0) 09:48:28 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000380)={'batadv_slave_0\x00', 0x0}) sendto$packet(r0, &(0x7f0000000040)="b2e69f18ec7af257e79ba3c7996e", 0xe, 0x0, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) 09:48:28 executing program 1: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x30, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast1}}}, 0x200001c8) 09:48:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8912, &(0x7f0000000000)={'batadv_slave_0\x00', @ifru_mtu}) 09:48:29 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09042bbd7000fedbdf2511"], 0x30}}, 0x0) 09:48:29 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000041c0)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_mount_image$fuse(&(0x7f0000000040)='fuse\x00', &(0x7f0000000080)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0c0583b, 0x0) 09:48:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0x1, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) 09:48:29 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x5452, &(0x7f0000000000)={'batadv_slave_0\x00', @ifru_mtu}) 09:48:29 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x80081270, &(0x7f0000000040)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "1073db9c0f014659714593b9685ed3198ac6ee287081cfd58fa870dd09454366e500cf982caeb4b0f000782f83e87418c30b80db925929651d1b28814fb5d5d9", "799c85a711139f79e9281e278bf187b9864092758d8967c161ee925a941bc3f1"}) 09:48:30 executing program 0: sendmmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0, 0x803e0000) 09:48:30 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09042bbd7000fedbdf2511"], 0x30}}, 0x0) 09:48:30 executing program 5: prctl$PR_SET_MM_MAP_SIZE(0x4, 0xf, 0x0) 09:48:30 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8982, 0x0) 09:48:30 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000041c0)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_mount_image$fuse(&(0x7f0000000040)='fuse\x00', &(0x7f0000000080)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setreuid(0xee01, 0x0) r2 = getuid() setreuid(0xee01, r2) ioctl$DRM_IOCTL_ADD_CTX(r1, 0x40086604, 0x0) 09:48:30 executing program 4: r0 = socket(0x18, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f00000001c0)={'ip6_vti0\x00', @ifru_mtu=0x531100}) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000480)='/dev/snd/seq\x00', 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f00000003c0)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0xfffffee4) syz_usb_connect$uac1(0x0, 0x0, 0x0, 0x0) 09:48:30 executing program 0: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) select(0x40, &(0x7f0000000040)={0x8}, 0x0, 0x0, 0x0) 09:48:30 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="09042bbd7000fedbdf2511"], 0x30}}, 0x0) 09:48:30 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000080)={{0x0, 0xe1}}) 09:48:31 executing program 1: r0 = socket(0xa, 0x3, 0x1) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, 0x0, 0x0) 09:48:31 executing program 2: prctl$PR_SET_NAME(0x28, &(0x7f00000000c0)='/dev/dlm_plock\x00') 09:48:31 executing program 0: bpf$BPF_LSM_PROG_LOAD(0x5, &(0x7f0000000200)={0x1d, 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="18200000", @ANYRES32=0x1, @ANYBLOB="9102593d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x890b, &(0x7f0000000000)={'wg1\x00'}) 09:48:32 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, &(0x7f0000000000)={0x0, 0x4, 0x2, 0x0, 0x0, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv4={[], [], @dev}]}, 0x28) 09:48:32 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$DEVLINK_CMD_SB_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 09:48:32 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="09042bbd7000fedbdf2511"], 0x30}}, 0x0) 09:48:34 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000000)={{{@in6=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa, 0xa0}}, {{@in=@private}, 0x0, @in6=@loopback}}, 0xe8) 09:48:48 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x1, 0x101041) write$selinux_attr(r0, &(0x7f0000000180)='system_u:object_r:locale_t:s0\x00', 0x2000019e) 09:48:48 executing program 4: r0 = fsopen(&(0x7f0000000080)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, 0x0, 0x0, 0x0) 09:48:48 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x17, 0x0, 0x0) 09:48:48 executing program 1: r0 = fsopen(&(0x7f0000000000)='f2fs\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, 0x0, 0x0, 0x0) 09:48:48 executing program 0: prctl$PR_SET_MM_MAP_SIZE(0x18, 0xf, 0x0) 09:48:48 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="09042bbd7000fedbdf2511"], 0x30}}, 0x0) 09:48:48 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f0000000200)) 09:48:48 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp6\x00') read$char_usb(r0, 0x0, 0x0) 09:48:48 executing program 5: r0 = socket(0x2, 0xa, 0x0) bind$rds(r0, 0x0, 0x0) 09:48:48 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r1, 0x89f0, &(0x7f0000000040)={'tunl0\x00', @ifru_mtu=0x531101}) setsockopt$XDP_TX_RING(r0, 0x10c, 0x3, 0x0, 0x4) 09:48:49 executing program 0: r0 = fanotify_init(0x0, 0x0) fanotify_mark(r0, 0x5d, 0x4800003a, 0xffffffffffffff9c, &(0x7f0000000000)='.\x00') r1 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000080)='./file\x00', 0x1000, 0x0) open$dir(&(0x7f0000000040)='./file\x00', 0x200001, 0x0) [ 780.620203][T14715] syz-executor.5 uses obsolete (PF_INET,SOCK_PACKET) 09:48:49 executing program 5: r0 = fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, &(0x7f00000000c0)='tmpfm&F\xaaM\xcf\xc9\x1f\x16\xean\x00', &(0x7f0000000080)='?', 0x1) 09:48:49 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, 0x0, 0x0) 09:48:49 executing program 1: bpf$MAP_CREATE(0x11, &(0x7f0000000000), 0x40) 09:48:49 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0xf, 0x321}, 0x10}}, 0x0) 09:48:49 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280)='batadv\x00') r2 = socket(0x2a, 0x2, 0x0) getsockname(r2, &(0x7f0000016d40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000016dc0)=0x80) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x1c, r1, 0xdbce7f53df2f5f01, 0x0, 0x0, {0x8}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) [ 781.341009][ T28] audit: type=1326 audit(1599299329.776:24): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14709 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=40000003 syscall=265 compat=1 ip=0xf7f14549 code=0x7fc00000 [ 781.364192][ T28] audit: type=1326 audit(1599299329.776:25): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14709 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=40000003 syscall=4 compat=1 ip=0xf7f14549 code=0x7fc00000 [ 781.387598][ T28] audit: type=1326 audit(1599299329.776:26): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14709 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=40000003 syscall=4 compat=1 ip=0xf7f14549 code=0x7fc00000 [ 781.417593][ T28] audit: type=1326 audit(1599299329.776:27): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14709 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=40000003 syscall=252 compat=1 ip=0xf7f14549 code=0x7fc00000 09:48:50 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, 0x0, 0x0) 09:48:50 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x802) write$FUSE_INIT(r0, &(0x7f0000000000)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x3}}, 0x50) 09:48:50 executing program 4: r0 = socket(0x18, 0x0, 0x1) r1 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x6, r1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8923, &(0x7f0000000080)={'vcan0\x00'}) 09:48:50 executing program 1: r0 = socket(0xa, 0x2, 0x0) connect$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x4}, 0x20) sendto$l2tp6(r0, 0x0, 0x0, 0xb605, 0x0, 0x0) sendto$l2tp6(r0, &(0x7f0000000040)="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", 0x587, 0x0, 0x0, 0x0) 09:48:50 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x60}, {0x6}]}) [ 781.841699][ T28] audit: type=1326 audit(1599299329.956:28): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14709 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=40000003 syscall=265 compat=1 ip=0xf7f14549 code=0x7fc00000 09:48:50 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000800)={&(0x7f00000004c0)=@in={0x2, 0x4e23, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001b80)=[{0x24}], 0x10}, 0x0) 09:48:50 executing program 5: r0 = socket$kcm(0x2, 0x5, 0x0) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x7, 0x0, &(0x7f0000000080)) 09:48:50 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xc, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000240)={r2}, &(0x7f0000000280)=0x8) 09:48:50 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, 0x0, 0x0) 09:48:50 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) r1 = dup(r0) sendmsg$BATADV_CMD_GET_HARDIF(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 09:48:51 executing program 2: r0 = socket(0x15, 0x5, 0x0) recvmsg$can_j1939(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x2041) 09:48:51 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x0) setresuid(0x0, 0x0, 0x0) read$FUSE(r0, 0x0, 0x300) 09:48:51 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 09:48:51 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nvram\x00', 0x0, 0x0) ioctl$KVM_IRQFD(r1, 0xc018aec0, &(0x7f0000000280)={r2, 0x0, 0x3}) 09:48:51 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) recvfrom$ax25(r0, 0x0, 0x0, 0x2140, 0x0, 0x0) 09:48:51 executing program 4: bpf$BPF_GET_BTF_INFO(0x6, &(0x7f0000000240)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000300)=""/71, 0xfffffffffffffea8}}, 0x62) [ 783.259483][T14780] sg_read: process 617 (syz-executor.0) changed security contexts after opening file descriptor, this is not allowed. 09:48:51 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ion\x00', 0x0, 0x0) vmsplice(r0, &(0x7f0000000640)=[{&(0x7f00000001c0)='E', 0x1}], 0x1, 0x0) 09:48:51 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) recvfrom$rose(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="f9", 0x1}], 0x1}, 0x20008090) 09:48:52 executing program 5: r0 = socket(0x2, 0x5, 0x0) connect$unix(r0, 0x0, 0x0) 09:48:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 09:48:52 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendmsg$NFT_MSG_GETRULE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) bind$bt_hci(r0, &(0x7f0000000040)={0x10}, 0x52) 09:48:52 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16, @ANYBLOB="01"], 0x34}}, 0x0) 09:48:52 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000400)='net/udplite\x00') preadv(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/119, 0x77}], 0x1, 0x2, 0x0) 09:48:52 executing program 5: r0 = socket(0xa, 0x3, 0x6) setsockopt$PNPIPE_HANDLE(r0, 0x29, 0x48, 0x0, 0x0) 09:48:53 executing program 1: bpf$BPF_LSM_PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x3}}, &(0x7f00000002c0)='syzkaller\x00', 0x4, 0xe5, &(0x7f0000000080)=""/229, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:48:53 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 09:48:53 executing program 4: r0 = socket(0x29, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(r0, 0x111, 0x3, 0x0, 0x4) 09:48:53 executing program 0: setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, 0x0, 0x0) 09:48:53 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x18, 0x0, 0x0) 09:48:53 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000300)={'wg0\x00', 0x0}) sendto$packet(r0, &(0x7f0000000140)="6b885ea2ec388eee448bbecd9f3d39b4f5dbced6d30ba844b435653979421acb64be15a07c12e57c", 0x28, 0x0, &(0x7f0000000340)={0x11, 0x5, r1, 0x1, 0x0, 0x6, @remote}, 0x14) 09:48:53 executing program 1: r0 = syz_open_dev$vim2m(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_DQBUF(r0, 0xc0405602, &(0x7f0000000040)={0x0, 0x8, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\a\x00'}, 0x0, 0x0, @userptr}) 09:48:53 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x30}}, 0x0) 09:48:53 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_HYPERV_EVENTFD(r2, 0x4018aebd, &(0x7f00000000c0)={0x0, r0}) 09:48:53 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, 0x0, &(0x7f0000000140)) 09:48:54 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8929, &(0x7f0000000300)={'ip_vti0\x00', 0x0}) 09:48:54 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x1f, 0x802) write$FUSE_INIT(r0, &(0x7f0000000000)={0x50, 0x4000000}, 0x50) 09:48:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x30}}, 0x0) 09:48:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x24, &(0x7f00000006c0)=@raw={'raw\x00', 0x8, 0x3, 0x1c0, 0x0, 0xa, 0xd0e0000, 0x0, 0x100, 0x158, 0x1d8, 0x1d8, 0x158, 0x1d8, 0x3, 0x0, {[{{@ip={@broadcast, @dev, 0x0, 0x0, 'veth1_to_batadv\x00', 'veth0_to_team\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0xb) 09:48:54 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x1f, 0x802) write$FUSE_INIT(r0, &(0x7f0000000000)={0x50, 0x2000000}, 0x50) 09:48:54 executing program 4: socket(0x25, 0x1, 0x0) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0xa}, 0x0, 0x0, 0x0) 09:48:54 executing program 2: r0 = socket(0x25, 0x5, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x24002001) 09:48:55 executing program 5: r0 = socket(0xa, 0x5, 0x0) bind$l2tp6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback}, 0x20) sendto$l2tp6(r0, &(0x7f0000000480)='5', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x60]}, 0x1}, 0x20) 09:48:55 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x30}}, 0x0) 09:48:55 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x10000, 0x20001000, &(0x7f0000000000/0x1000)=nil}) 09:48:55 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x0) setresuid(0x0, 0xee00, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x2284, 0x0) 09:48:55 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, 0x0, &(0x7f0000000240)) 09:48:55 executing program 2: rt_sigqueueinfo(0x0, 0x0, &(0x7f0000002200)={0x0, 0x0, 0x81}) 09:48:55 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1], 0x30}}, 0x0) 09:48:55 executing program 1: read$midi(0xffffffffffffffff, 0x0, 0x0) 09:48:55 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/rt_cache\x00') read$char_usb(r0, 0x0, 0x0) 09:48:55 executing program 4: syz_mount_image$gfs2(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/igmp6\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 09:48:56 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000540)={&(0x7f0000000000)={0xa, 0x0, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000100)=ANY=[], 0x340}, 0x0) 09:48:56 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1], 0x30}}, 0x0) 09:48:56 executing program 5: r0 = socket(0x18, 0x0, 0x0) r1 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x6, r1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8901, &(0x7f0000000080)={'vcan0\x00'}) 09:48:56 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000140)={0x18, 0x0, {0x0, @local, 'ip_vti0\x00'}}) 09:48:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x13, 0x0, 0x0, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}]}, 0x13}}, 0x0) 09:48:56 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000400)='/dev/nbd#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) 09:48:56 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f00000000c0)={'wg0\x00'}) 09:48:56 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1], 0x30}}, 0x0) 09:48:57 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) sendto$packet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x6558, r1, 0x1, 0x0, 0x6, @local}, 0x14) 09:48:57 executing program 5: select(0xffffffffffffff77, &(0x7f0000000040), &(0x7f0000000880), &(0x7f00000008c0), 0x0) 09:48:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000040)={'tunl0\x00', @ifru_mtu=0x531109}) 09:48:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x24, &(0x7f00000006c0)=@raw={'raw\x00', 0x8, 0x3, 0x1c0, 0x0, 0xa, 0xd0e0000, 0x0, 0x100, 0x158, 0x1d8, 0x1d8, 0x158, 0x1d8, 0x3, 0x0, {[{{@ip={@broadcast, @dev, 0x0, 0x0, 'veth1_to_batadv\x00', 'veth0_to_team\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x220) 09:48:57 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x8, 0x0, 0x0) 09:48:57 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB], 0x30}}, 0x0) 09:48:57 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000500)={&(0x7f0000000080)={0xa, 0x4e23, 0x0, @local, 0xd6}, 0x1c, 0x0, 0x0, &(0x7f0000000400)=[@pktinfo={{0x24, 0x29, 0x32, {@remote}}}], 0x28}, 0x0) 09:48:57 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f00000000c0)={0x18, 0x2, {0x0, @dev}}, 0x1e) bind$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x0, @remote}}, 0x1e) 09:48:57 executing program 2: r0 = fsopen(&(0x7f0000000040)='reiserfs\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, 0x0, 0x0, 0x0) 09:48:57 executing program 0: prctl$PR_MCE_KILL(0x34, 0x2, 0x0) 09:48:58 executing program 4: r0 = fanotify_init(0x0, 0x0) fanotify_mark(r0, 0x41, 0x20, 0xffffffffffffff9c, &(0x7f00000000c0)='.\x00') fanotify_mark(r0, 0x41, 0x8000031, 0xffffffffffffff9c, &(0x7f00000000c0)='.\x00') 09:48:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB], 0x30}}, 0x0) 09:48:58 executing program 1: r0 = pkey_alloc(0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0}, 0x0) pkey_mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x6, r0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000004a40)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x0, 0x0}, 0x10) 09:48:58 executing program 0: symlinkat(&(0x7f0000000200)='./file\x00', 0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00') ioctl$SIOCAX25ADDFWD(0xffffffffffffffff, 0x89ea, 0x0) r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000080)='./file\x00', 0x0, 0x0) utimensat(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 09:48:58 executing program 5: r0 = socket(0x18, 0x0, 0x0) getsockname$packet(r0, 0x0, &(0x7f0000000140)) 09:48:58 executing program 2: r0 = socket(0xa, 0x3, 0x6) setsockopt$PNPIPE_HANDLE(r0, 0x29, 0x14, 0x0, 0x0) 09:48:58 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)) r1 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000003000/0x1000)=nil, 0x1001000, 0x0, 0x13, r1, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc018aa06, &(0x7f0000000080)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}}) 09:48:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB], 0x30}}, 0x0) 09:48:59 executing program 1: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x0, 0x0) r0 = socket(0x18, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f00000001c0)={'ip6_vti0\x00', @ifru_mtu=0x531100}) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x8}, 0x0, &(0x7f00000000c0)={0x0, 0x3938700}, 0x0) 09:48:59 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000100), 0x8) 09:48:59 executing program 0: ioperm(0x0, 0x200, 0x40) membarrier(0x40, 0x0) 09:48:59 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x802) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x4, 0x0) 09:48:59 executing program 4: syz_open_dev$vim2m(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x2) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x8}, 0x0, &(0x7f00000000c0)={0x0, 0x3938700}, 0x0) r0 = socket(0x18, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f00000001c0)={'ip6_vti0\x00', @ifru_mtu=0x531100}) 09:48:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09042bbd7000"], 0x30}}, 0x0) [ 791.457671][T14961] program syz-executor.2 is using a deprecated SCSI ioctl, please convert it to SG_IO 09:49:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x8, 0x3, 0x158, 0x0, 0xa, 0xd0e0000, 0x0, 0x100, 0x158, 0x1d8, 0x1d8, 0x158, 0x1d8, 0x3, 0x0, {[{{@ip={@broadcast, @dev, 0x0, 0x0, 'veth1_to_batadv\x00', 'veth0_to_team\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa0, 0xc0, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x250) 09:49:00 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="02010109080000000000000000000000030006"], 0x40}}, 0x0) 09:49:00 executing program 0: r0 = socket(0x2, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8903, &(0x7f0000003580)={'ip6gre0\x00', 0x0}) 09:49:00 executing program 2: r0 = socket(0x18, 0x0, 0x2) getpeername$packet(r0, 0x0, &(0x7f0000000080)) 09:49:00 executing program 4: r0 = socket(0x25, 0x1, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 09:49:00 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09042bbd7000"], 0x30}}, 0x0) 09:49:00 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0xb, &(0x7f0000000400), 0x4) 09:49:00 executing program 2: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) 09:49:00 executing program 0: pkey_mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x6, 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x2, 0x0) mbind(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, &(0x7f0000000000), 0x5, 0x3) 09:49:00 executing program 1: r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000200)='./file\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknodat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000100)='./file\x00', 0x2) 09:49:00 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f00000007c0)={&(0x7f0000000000)=@in6={0xa, 0x4e23, 0x0, @mcast1={0xff, 0x2}}, 0x80, 0x0}, 0xf401) sendmsg$kcm(r0, &(0x7f0000002840)={&(0x7f00000001c0)=@un=@abs, 0x80, 0x0}, 0x0) 09:49:01 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09042bbd7000"], 0x30}}, 0x0) 09:49:01 executing program 5: r0 = socket(0x2, 0x6, 0x0) bind$packet(r0, 0x0, 0xfffffffffffffd7d) 09:49:01 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00') preadv(r0, &(0x7f00000014c0)=[{&(0x7f0000000140)=""/71, 0x47}], 0x1, 0xfffffffd, 0x0) 09:49:01 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000880)='net/rt_acct\x00') preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000040)=""/157, 0x9d}], 0x1, 0xafd6, 0x0) 09:49:01 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x7, 0xc0842) write$FUSE_INIT(r0, &(0x7f0000000000)={0x50}, 0xfffffdef) 09:49:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280)='batadv\x00') sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x1c, r1, 0xdbce7f53df2f5f01, 0x0, 0x0, {0x8}, [@BATADV_ATTR_MESH_IFINDEX={0x4}]}, 0x1c}}, 0x0) 09:49:01 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09042bbd7000fedbdf"], 0x30}}, 0x0) 09:49:02 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) read$snapshot(r0, 0x0, 0x0) 09:49:02 executing program 5: prctl$PR_SET_MM_MAP_SIZE(0x2a, 0xf, 0x0) 09:49:02 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_OBJ_SETPROPERTY(r0, 0xc01864ba, &(0x7f0000000000)) 09:49:02 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mounts\x00') preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000180)=""/113, 0x71}], 0x1, 0x1, 0x0) 09:49:02 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09042bbd7000fedbdf"], 0x30}}, 0x0) 09:49:02 executing program 5: r0 = add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$search(0xa, r0, &(0x7f0000001300)='cifs.idmap\x00', &(0x7f0000001340)={'syz', 0x0}, r0) 09:49:02 executing program 0: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket(0x1a, 0x0, 0x0) 09:49:03 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x6, 0x0, 0x0) 09:49:03 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x71, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) 09:49:03 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000012c0)='net/softnet_stat\x00') read$char_usb(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x5) dup3(r1, r0, 0x0) 09:49:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09042bbd7000fedbdf"], 0x30}}, 0x0) 09:49:03 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, r1, 0x1, 0x0, 0x0, {0xf}}, 0x14}}, 0x0) 09:49:03 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) 09:49:03 executing program 2: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dri/renderD128\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc10c5541, &(0x7f00000000c0)={"f8d30f79fe1d88a4d6c5f882fbd8a752"}) 09:49:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09042bbd7000fedbdf25"], 0x30}}, 0x0) 09:49:04 executing program 1: r0 = socket(0xa, 0x3, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x541b, &(0x7f0000000040)={'batadv0\x00'}) 09:49:04 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip6_tables_matches\x00') preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/240, 0xf0}], 0x1, 0x95e, 0x0) 09:49:04 executing program 5: r0 = socket(0x28, 0x1, 0x0) getsockopt$inet6_dccp_buf(r0, 0x21, 0x0, 0x0, 0x0) 09:49:04 executing program 0: ioperm(0x0, 0x200, 0x3) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 09:49:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09042bbd7000fedbdf25"], 0x30}}, 0x0) 09:49:04 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x6, &(0x7f0000000000)="08000000000000d60000000000003300", 0x10) 09:49:04 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$inet_sctp(r0, &(0x7f0000005f80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)=[@dstaddrv6={0x20, 0x84, 0x8, @mcast2}, @dstaddrv4={0x18, 0x84, 0x7, @dev}], 0x30}], 0x1, 0x0) 09:49:04 executing program 5: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x29, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast1}}}, 0x200001c8) 09:49:04 executing program 4: r0 = socket(0x10, 0x803, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000680)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x28, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_COOKIE={0xc}, @L2TP_ATTR_SEND_SEQ={0x5}]}, 0x28}}, 0x0) 09:49:05 executing program 0: r0 = socket(0xa, 0x3, 0x3f) sendmsg$nl_route_sched(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x81) 09:49:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="8f"], 0x14}}, 0x0) read$char_raw(r0, &(0x7f0000000600)={""/35935}, 0x8e00) 09:49:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="09042bbd7000fedbdf25"], 0x30}}, 0x0) [ 796.792621][T15076] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 796.914916][T15081] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 09:49:05 executing program 1: r0 = socket(0xa, 0x3, 0x6) setsockopt$PNPIPE_HANDLE(r0, 0x29, 0x3, 0x0, 0x300) 09:49:05 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f0000002500)=[{{&(0x7f0000000040)=@qipcrtr={0x2a, 0x1}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)="95877ca56e9bf749e705f2ea6193", 0xe}], 0x1}}, {{&(0x7f0000000580)=@phonet={0x23, 0x0, 0x0, 0x7}, 0x80, 0x0}}], 0x2, 0x0) 09:49:05 executing program 5: socket(0x1, 0x0, 0x0) 09:49:05 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0xfff, 0x0, 0x1}, 0x40) 09:49:05 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_SYNTH_ID(r0, 0xc08c5114, &(0x7f0000000680)={"09e178b8781c6784d63f67d7b95c9d32f67d7c3b1e76df8a7f5010a5286f", 0x80000000}) 09:49:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYBLOB="09042bbd7000fedbdf2511"], 0x30}}, 0x0) 09:49:06 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000041c0)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_mount_image$fuse(&(0x7f0000000040)='fuse\x00', &(0x7f0000000080)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0406619, 0x0) 09:49:06 executing program 4: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x0, 0x0) setns(r0, 0x0) 09:49:06 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = socket(0x18, 0x0, 0x0) ioctl$sock_ifreq(r1, 0x89f0, &(0x7f00000001c0)={'ip6_vti0\x00', @ifru_mtu=0x531100}) bind$bt_l2cap(r0, 0x0, 0x0) 09:49:06 executing program 0: r0 = socket(0xa, 0x3, 0x6) setsockopt$PNPIPE_HANDLE(r0, 0x29, 0x33, 0x0, 0x0) 09:49:06 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, &(0x7f0000000000)={0x0, 0x2, 0x2, 0x1, 0x0, [@private1]}, 0x18) 09:49:06 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYBLOB="09042bbd7000fedbdf2511"], 0x30}}, 0x0) 09:49:06 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, 0x0, &(0x7f00000001c0)) 09:49:06 executing program 1: ioperm(0x0, 0x8d3, 0x81) ioperm(0x0, 0x6, 0x0) 09:49:06 executing program 5: prctl$PR_SET_MM_MAP_SIZE(0x39, 0xf, &(0x7f0000000200)) 09:49:07 executing program 0: r0 = socket(0x18, 0x0, 0x0) getsockname$unix(r0, 0x0, &(0x7f0000000100)) 09:49:07 executing program 2: r0 = syz_open_dev$vim2m(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_DQBUF(r0, 0xc050565d, &(0x7f0000000040)={0x0, 0x1, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\a\x00'}, 0x0, 0x0, @planes=0x0}) 09:49:07 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYBLOB="09042bbd7000fedbdf2511"], 0x30}}, 0x0) 09:49:07 executing program 4: r0 = syz_open_dev$vim2m(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_DQBUF(r0, 0xc0285628, &(0x7f0000000040)={0x0, 0x0, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\a\x00'}, 0x0, 0x0, @userptr}) 09:49:07 executing program 5: socketpair(0x0, 0x80c, 0x0, &(0x7f0000000000)) 09:49:07 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000300)={'wg0\x00', 0x0}) sendto$packet(r0, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) 09:49:07 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00') read$proc_mixer(r0, 0x0, 0x0) 09:49:07 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16, @ANYBLOB="09042bbd7000fedbdf2511"], 0x30}}, 0x0) 09:49:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000040)={'tunl0\x00', @ifru_mtu=0x531101}) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:49:08 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x22, 0x0, 0x0) 09:49:08 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, 0x0, 0x0) 09:49:08 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000940)='gtp\x00') sendmsg$GTP_CMD_DELPDP(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="ff7febde2f64e78e019549"], 0x34}}, 0x0) 09:49:08 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) connect$llc(r0, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x10) 09:49:08 executing program 2: socketpair(0x22, 0x0, 0x520, &(0x7f0000000180)) 09:49:08 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16, @ANYBLOB="09042bbd7000fedbdf2511"], 0x30}}, 0x0) 09:49:08 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="05003ef572e6e3188e9c3400060002"], 0x2c}}, 0x0) 09:49:08 executing program 1: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) io_submit(0x0, 0x0, 0x0) 09:49:08 executing program 5: r0 = socket(0x2, 0x5, 0x0) getpeername$unix(r0, 0x0, 0x0) 09:49:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000040)={'tunl0\x00', @ifru_mtu=0x531101}) move_pages(0x0, 0x4, &(0x7f0000000000)=[&(0x7f0000001000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000080), 0x0) 09:49:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16, @ANYBLOB="09042bbd7000fedbdf2511"], 0x30}}, 0x0) [ 800.794348][T15166] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 09:49:09 executing program 2: r0 = socket(0x15, 0x5, 0x0) recvmsg$can_j1939(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x12103) [ 800.885694][T15168] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 09:49:09 executing program 1: r0 = fanotify_init(0x0, 0x0) r1 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) fanotify_mark(r0, 0x1, 0x1021, r1, 0x0) open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) 09:49:09 executing program 5: r0 = socket(0xa, 0x6, 0x0) setsockopt$PNPIPE_HANDLE(r0, 0x29, 0x6, 0x0, 0x0) 09:49:09 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x2040, &(0x7f0000000400)) 09:49:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYRES16=r1, @ANYBLOB="09042bbd7000fedbdf2511"], 0x30}}, 0x0) 09:49:09 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000400)='net/udp\x00') preadv(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/119, 0x77}], 0x1, 0x0, 0x0) 09:49:10 executing program 1: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000001700), 0x0, &(0x7f0000001800)={[{@usrquota='usrquota'}]}) 09:49:10 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f00000001c0)={0x2d, 0x10, 0xfa00, {0x0}}, 0x18) 09:49:10 executing program 5: r0 = socket(0xa, 0x5, 0x0) bind$l2tp6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback}, 0x20) sendto$l2tp6(r0, &(0x7f0000000480)='5', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x3]}, 0x1}, 0x20) 09:49:10 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYRES16=r1, @ANYBLOB="09042bbd7000fedbdf2511"], 0x30}}, 0x0) 09:49:10 executing program 4: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0xa8a81) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000140)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"8e6f2cdc01a63a3fb831cf5015b5e9a9"}}}}, 0xa0) select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x9}, &(0x7f00000000c0)) 09:49:10 executing program 0: bpf$PROG_LOAD(0xd, &(0x7f0000000200)={0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 802.236376][T15196] XFS (loop1): Invalid superblock magic number [ 802.400341][T15196] XFS (loop1): Invalid superblock magic number 09:49:10 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000180)={0x0, 0x0}) 09:49:11 executing program 0: syz_mount_image$gfs2(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x1, &(0x7f0000000a40)=[{&(0x7f0000000440)="e7", 0xfffffffffffffdef, 0x8000}], 0x0, 0x0) 09:49:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYRES16=r1, @ANYBLOB="09042bbd7000fedbdf2511"], 0x30}}, 0x0) 09:49:11 executing program 1: setresuid(0xffffffffffffffff, 0xee01, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 09:49:11 executing program 4: r0 = socket(0x18, 0x0, 0x0) r1 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x6, r1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x5421, &(0x7f0000000080)={'vcan0\x00'}) 09:49:11 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x4}, 0x4) syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') 09:49:11 executing program 5: r0 = socket(0xa, 0x5, 0x0) sendmmsg$unix(r0, &(0x7f0000000280)=[{0x0, 0x0, 0x0}], 0x1, 0x0) 09:49:12 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) pipe2$9p(&(0x7f0000000000), 0x0) select(0x40, &(0x7f0000000840), &(0x7f0000000880)={0x2}, &(0x7f00000008c0)={0x1f}, 0x0) 09:49:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRES16=r1, @ANYBLOB="09042bbd7000fedbdf2511"], 0x30}}, 0x0) 09:49:13 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x29, 0x33, 0x0, 0x300) 09:49:13 executing program 2: bpf$BPF_LSM_PROG_LOAD(0x5, &(0x7f0000000180)={0x2, 0x20000084, &(0x7f0000000200)=@framed={{}, [@ldst]}, &(0x7f0000000040)='GPL\x00', 0x0, 0xf1, &(0x7f0000000080)=""/241, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:49:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000000)={'batadv_slave_0\x00', @ifru_mtu}) 09:49:13 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000000)={'erspan0\x00', 0x0}) 09:49:13 executing program 0: ioperm(0x0, 0x7, 0x400006) read$hiddev(0xffffffffffffffff, 0x0, 0x0) 09:49:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRES16=r1, @ANYBLOB="09042bbd7000fedbdf2511"], 0x30}}, 0x0) 09:49:13 executing program 1: r0 = socket(0x25, 0x1, 0x0) getpeername$packet(r0, 0x0, 0x0) [ 805.239716][T15260] batadv_slave_0: mtu less than device minimum 09:49:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') read$char_usb(r0, 0x0, 0x0) 09:49:13 executing program 5: r0 = socket$kcm(0x2, 0x5, 0x0) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x5, 0x0, &(0x7f0000000080)) 09:49:13 executing program 0: r0 = socket(0x23, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x89e0, &(0x7f0000000040)={'batadv0\x00'}) 09:49:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0)='ethtool\x00') sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000540)={0x14, r1, 0x1}, 0x14}}, 0x0) 09:49:14 executing program 1: r0 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) connect$nfc_raw(r0, &(0x7f0000001ec0), 0x10) 09:49:14 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRES16=r1, @ANYBLOB="09042bbd7000fedbdf2511"], 0x30}}, 0x0) 09:49:14 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)=""/67, 0x43}], 0x1, 0x0, 0x0) 09:49:14 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$inet6_dccp_buf(r0, 0x21, 0x0, 0x0, 0x0) 09:49:14 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_opts(r0, 0x29, 0x32, 0x0, 0x0) 09:49:14 executing program 4: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) setresuid(0x0, 0xee01, 0xee01) ioctl$sock_SIOCGIFINDEX(r0, 0x8922, &(0x7f0000000000)={'caif0\x00'}) 09:49:15 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00', @ANYRES16=r1, @ANYBLOB="09042bbd7000fedbdf2511"], 0x30}}, 0x0) 09:49:15 executing program 1: r0 = socket$inet(0x2, 0xa, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, 0x0, 0x0) 09:49:15 executing program 0: recvfrom$llc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 09:49:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000880)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000001040)={&(0x7f0000000000), 0xc, &(0x7f0000001000)={&(0x7f00000008c0)={0x528, r2, 0x1, 0x0, 0x0, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}]}}, {{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8}, {0x184, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @notify_peers_interval={{0x0, 0x1, 'notify_peers_interval\x00'}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8}}}]}}, {{0x8}, {0x25c, 0x2, 0x0, 0x1, [{0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x4}}, {{0x8, 0x1, r3}, {0x3c, 0x2, 0x0, 0x1, [{0x3, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8}}}]}}]}, 0x528}}, 0x0) 09:49:15 executing program 4: r0 = socket(0x1e, 0x2, 0x0) bind$packet(r0, 0x0, 0x0) 09:49:15 executing program 5: sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [@NL80211_ATTR_IFNAME={0x14, 0x4, 'ip6tnl0\x00'}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x5}}]}, 0x3c}}, 0x0) bpf$BPF_LSM_PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:49:15 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00', @ANYRES16=r1, @ANYBLOB="09042bbd7000fedbdf2511"], 0x30}}, 0x0) [ 807.265925][T15297] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 09:49:15 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000001280)={0x0, 0x11d0}}, 0x0) [ 807.376195][T15300] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 09:49:16 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_TMR_TEMPO(r0, 0xc0046d00, &(0x7f0000000040)) 09:49:16 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, 0x0, 0x0) 09:49:16 executing program 4: write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) 09:49:16 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/snmp\x00') preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000180)=""/113, 0x71}], 0x1, 0x1, 0x0) 09:49:16 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, 0x0) 09:49:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00', @ANYRES16=r1, @ANYBLOB="09042bbd7000fedbdf2511"], 0x30}}, 0x0) 09:49:16 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_TMR_TEMPO(r0, 0xc0046d00, &(0x7f0000000040)) 09:49:16 executing program 2: r0 = socket(0xa, 0x3, 0x6) setsockopt$PNPIPE_HANDLE(r0, 0x29, 0x3, 0x0, 0x0) 09:49:16 executing program 5: r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r0, &(0x7f0000000800)={&(0x7f00000004c0)=@in={0x2, 0x0, @empty}, 0x80, 0x0}, 0x0) 09:49:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x1c, r1, 0x42d, 0x0, 0x0, {}, [@WGDEVICE_A_IFINDEX={0x8}]}, 0x1c}}, 0x0) 09:49:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000000)={'tunl0\x00', @ifru_mtu=0x531101}) getpgid(0x0) 09:49:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00', @ANYRES16=r1, @ANYBLOB="09042bbd7000fedbdf2511"], 0x30}}, 0x0) 09:49:17 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') read$proc_mixer(r0, 0x0, 0x7ffffffff000) 09:49:17 executing program 2: prctl$PR_SET_NAME(0x4, 0x0) 09:49:17 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000000)={'tunl0\x00', @ifru_mtu=0x531101}) mmap$perf(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 09:49:17 executing program 4: io_setup(0x1, &(0x7f00000000c0)=0x0) r1 = socket$inet(0x2, 0xa, 0x0) io_submit(r0, 0x1, &(0x7f0000000480)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x2, 0x0, r1, 0x0}]) 09:49:17 executing program 1: r0 = socket(0x11, 0x803, 0x0) bind$bt_hci(r0, 0x0, 0x0) 09:49:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00', @ANYRES16=r1, @ANYBLOB="09042bbd7000fedbdf2511"], 0x30}}, 0x0) 09:49:17 executing program 2: r0 = socket(0x2, 0x6, 0x0) ftruncate(r0, 0x0) 09:49:18 executing program 0: socket(0x1e, 0x0, 0x5) 09:49:18 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0xb}, 0x1c) 09:49:18 executing program 4: r0 = socket(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, 0x0, 0x0) 09:49:18 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0xb, 0x0, &(0x7f0000000040)) 09:49:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00', @ANYRES16=r1, @ANYBLOB="09042bbd7000fedbdf2511"], 0x30}}, 0x0) 09:49:18 executing program 2: r0 = fsopen(&(0x7f0000000040)='nfsd\x00', 0x0) fsconfig$FSCONFIG_SET_PATH(r0, 0x6, 0x0, 0x0, 0xffffffffffffffff) 09:49:18 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) r1 = dup(r0) sendmsg$BATADV_CMD_GET_HARDIF(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0, 0xf0ff7f00000000}}, 0x0) 09:49:18 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r0, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) 09:49:18 executing program 4: r0 = socket(0x18, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f00000001c0)={'ip6_vti0\x00', @ifru_mtu=0x531100}) r1 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000002000/0x2000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0x4000) 09:49:19 executing program 1: r0 = socket(0x1d, 0x3, 0x1) accept4$phonet_pipe(r0, 0x0, 0x0, 0x0) 09:49:19 executing program 3: sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000200)) 09:49:19 executing program 2: getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x1, 0x101041) write$selinux_attr(r0, &(0x7f0000000180)='system_u:object_r:locale_t:s0\x00', 0x2000019e) 09:49:19 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x802) write$FUSE_INIT(r0, &(0x7f0000000000)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xf01f}}, 0x50) 09:49:19 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='cmdline\x00') preadv(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/119, 0x77}], 0x1, 0xfffffffe, 0x0) 09:49:19 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x125d, &(0x7f0000000040)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "1073db9c0f014659714593b9685ed3198ac6ee287081cfd58fa870dd09454366e500cf982caeb4b0f000782f83e87418c30b80db925929651d1b28814fb5d5d9", "799c85a711139f79e9281e278bf187b9864092758d8967c161ee925a941bc3f1"}) 09:49:19 executing program 4: r0 = socket(0x2, 0x2, 0x0) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) 09:49:20 executing program 3: r0 = syz_open_dev$vim2m(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0145608, &(0x7f00000000c0)={0x0, 0xb, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "c87400"}}) 09:49:20 executing program 2: r0 = socket$kcm(0x2, 0x5, 0x0) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x3c, 0x0, &(0x7f0000000080)) 09:49:20 executing program 0: r0 = socket(0xa, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x541b, &(0x7f0000000000)={'batadv_slave_1\x00'}) 09:49:20 executing program 1: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dri/renderD128\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0x541b, 0x0) 09:49:20 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/udp\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)=""/67, 0x20000103}, {&(0x7f0000000140)=""/96, 0x60}], 0x2, 0x0, 0x0) 09:49:20 executing program 4: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@deltaction={0x14, 0x12, 0x511}, 0x14}}, 0x0) recvmsg$can_raw(r0, &(0x7f0000003880)={0x0, 0x0, &(0x7f0000003800)=[{&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f0000002800)=""/4096, 0x1000}], 0x2}, 0x0) recvmsg$can_raw(r0, &(0x7f00000026c0)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/134, 0x7fffe000}, {&(0x7f0000001480)=""/210, 0xd2}, {&(0x7f0000001580)=""/240, 0xf0}], 0x4}, 0x0) 09:49:20 executing program 3: r0 = socket(0x2, 0x3, 0x2) connect$bt_sco(r0, &(0x7f0000000000)={0x1f, @none}, 0x8) 09:49:20 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="05003ef572e6e3188e9c3400060002000000080005000000fe"], 0x2c}}, 0x0) 09:49:21 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000040)={'tunl0\x00', @ifru_mtu=0x531101}) 09:49:21 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="10000000", @ANYRES16=r1, @ANYBLOB=')'], 0x14}}, 0x0) 09:49:21 executing program 5: symlinkat(&(0x7f00000001c0)='.\x00', 0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00') open$dir(&(0x7f0000000100)='./file0/file0\x00', 0x0, 0xd8) 09:49:21 executing program 4: bpf$OBJ_GET_MAP(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00'}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) [ 812.980284][T15409] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 09:49:21 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4068aea3, &(0x7f0000000000)={0xb6, 0x0, 0x80ffff00000000, 0x2000, &(0x7f0000000000/0x2000)=nil}) [ 813.066885][T15411] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 09:49:21 executing program 0: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dri/renderD128\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc10c5541, &(0x7f00000000c0)) 09:49:21 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e0, 0x0, 0x130, 0x88020005, 0x148, 0x130, 0x210, 0x220, 0x220, 0x210, 0x220, 0x3, 0x0, {[{{@ipv6={@dev, @rand_addr=' \x01\x00', [], [], 'macsec0\x00', 'syzkaller0\x00'}, 0x0, 0x128, 0x148, 0x0, {}, [@common=@frag={{0x30, 'frag\x00'}}, @common=@inet=@set3={{0x50, 'set\x00'}, {{0x0, 0x5}, {0x80, 0x5}}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20, 'TRACE\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x340) 09:49:21 executing program 1: prctl$PR_SET_MM_MAP_SIZE(0x34, 0xf, &(0x7f0000000200)) 09:49:22 executing program 5: prctl$PR_SET_MM_MAP_SIZE(0x2f, 0xf, 0x0) 09:49:22 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000300)=ANY=[], 0x16f) 09:49:22 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4068aea3, &(0x7f0000000000)={0xb6, 0x0, 0x80ffff00000000, 0x2000, &(0x7f0000000000/0x2000)=nil}) 09:49:22 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='statm\x00') read$char_usb(r0, 0x0, 0x0) 09:49:22 executing program 2: socketpair(0x1, 0x100000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000002580)={0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f00000000c0)="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", 0x221}], 0x1, &(0x7f0000003000)=ANY=[@ANYBLOB="1010"], 0x1010}, 0x0) recvmsg$kcm(r1, &(0x7f0000002c80)={0x0, 0x0, 0x0}, 0x0) 09:49:22 executing program 1: bpf$BPF_LSM_PROG_LOAD(0x5, &(0x7f0000000180)={0x1a, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000040)='GPL\x00', 0x5, 0xf1, &(0x7f0000000080)=""/241, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:49:22 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0x83, 0x202, 0x9f, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x40) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, 0x0, 0x0}, 0x20) 09:49:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000040)}, 0x24) 09:49:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x30, &(0x7f00000006c0)=@raw={'raw\x00', 0x8, 0x3, 0x1c0, 0x0, 0xa, 0xd0e0000, 0x0, 0x100, 0x158, 0x1d8, 0x1d8, 0x158, 0x1d8, 0x3, 0x0, {[{{@ip={@broadcast, @dev, 0x0, 0x0, 'veth1_to_batadv\x00', 'veth0_to_team\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x220) 09:49:23 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x802) write$FUSE_INIT(r0, &(0x7f0000000000)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x2f}}, 0x50) 09:49:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4068aea3, &(0x7f0000000000)={0xb6, 0x0, 0x80ffff00000000, 0x2000, &(0x7f0000000000/0x2000)=nil}) 09:49:23 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000040)={'tunl0\x00', @ifru_mtu=0x531101}) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3ff, 0x0) 09:49:23 executing program 4: bpf$MAP_CREATE(0x1b, 0x0, 0x0) 09:49:24 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000800)={&(0x7f00000004c0)=@in={0x2, 0x4e23, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001b80)=[{0x10}], 0xf}, 0x0) 09:49:24 executing program 3: r0 = socket(0xa, 0x3, 0x6) setsockopt$PNPIPE_HANDLE(r0, 0x29, 0x3e, 0x0, 0x0) 09:49:24 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000041c0)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_mount_image$fuse(&(0x7f0000000040)='fuse\x00', &(0x7f0000000080)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$DRM_IOCTL_ADD_CTX(r1, 0x6612, 0x0) 09:49:24 executing program 2: pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='.\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 09:49:24 executing program 5: socketpair(0x1, 0x100000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) mmap$xdp(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x86852, r0, 0x0) madvise(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) 09:49:24 executing program 4: r0 = socket(0x23, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x8906, 0x0) 09:49:24 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000800)={&(0x7f00000004c0)=@in={0x2, 0x0, @empty}, 0xf, 0x0, 0x0, &(0x7f0000001b80)=[{0x10}], 0x10}, 0x0) 09:49:24 executing program 3: prctl$PR_SET_MM_MAP_SIZE(0x35, 0xf, 0x0) 09:49:24 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000012c0)='net/sockstat\x00') read$char_usb(r0, 0x0, 0x0) 09:49:25 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000000)=@in6={0xa, 0x4e21, 0x0, @private2}, 0x80, 0x0, 0x0, &(0x7f0000004980)=ANY=[@ANYBLOB="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"], 0x22d8}, 0x0) 09:49:25 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000480)={0x6, 0xb6, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 09:49:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x20000141, &(0x7f0000000240)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:49:25 executing program 0: r0 = socket(0x10, 0x80002, 0x6) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@deltaction={0x14, 0x12, 0x511}, 0x14}}, 0x0) 09:49:25 executing program 2: r0 = socket(0x15, 0x5, 0x0) bind$can_j1939(r0, 0x0, 0x0) 09:49:25 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@deltaction={0x14, 0x12, 0x511}, 0x14}}, 0x0) recvmsg$can_raw(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f00000003c0)=""/4096, 0x4f05}, {&(0x7f00000013c0)=""/134, 0x86}, {&(0x7f0000001480)=""/210, 0xf5}, {&(0x7f0000001580)=""/240, 0xf0}], 0x3}, 0x0) 09:49:25 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000580)='SMC_PNETID\x00') sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r1, 0x19}, 0x14}}, 0x0) read$FUSE(r0, &(0x7f0000004640)={0x2020}, 0x2020) [ 817.357108][T15507] ===================================================== [ 817.364211][T15507] BUG: KMSAN: uninit-value in ucma_connect+0x458/0xc30 [ 817.371095][T15507] CPU: 1 PID: 15507 Comm: syz-executor.5 Not tainted 5.8.0-rc5-syzkaller #0 [ 817.380476][T15507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 817.390551][T15507] Call Trace: [ 817.393990][T15507] dump_stack+0x21c/0x280 [ 817.398534][T15507] kmsan_report+0xf7/0x1e0 [ 817.404216][T15507] __msan_warning+0x58/0xa0 [ 817.408842][T15507] ucma_connect+0x458/0xc30 [ 817.413392][T15507] ? kmsan_get_metadata+0x116/0x180 [ 817.418739][T15507] ? _copy_from_user+0x201/0x310 [ 817.423724][T15507] ? kmsan_get_metadata+0x116/0x180 [ 817.428962][T15507] ucma_write+0x64d/0x6e0 [ 817.433709][T15507] ? ucma_get_global_nl_info+0xe0/0xe0 [ 817.440324][T15507] vfs_write+0x6a3/0x17c0 [ 817.445159][T15507] ? __msan_poison_alloca+0xf0/0x120 [ 817.450477][T15507] ? kmsan_get_metadata+0x116/0x180 [ 817.455722][T15507] ksys_write+0x275/0x500 [ 817.460124][T15507] ? kmsan_get_metadata+0x116/0x180 [ 817.465463][T15507] __se_sys_write+0x92/0xb0 [ 817.470114][T15507] __ia32_sys_write+0x4a/0x70 [ 817.474909][T15507] __do_fast_syscall_32+0x2af/0x480 [ 817.480240][T15507] do_fast_syscall_32+0x6b/0xd0 [ 817.485140][T15507] do_SYSENTER_32+0x73/0x90 [ 817.489860][T15507] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 817.496958][T15507] RIP: 0023:0xf7f2e549 [ 817.501918][T15507] Code: Bad RIP value. [ 817.506004][T15507] RSP: 002b:00000000f55280cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 817.514531][T15507] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000480 [ 817.522526][T15507] RDX: 0000000000000120 RSI: 0000000000000000 RDI: 0000000000000000 [ 817.530521][T15507] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 817.539226][T15507] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 817.547322][T15507] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 817.555941][T15507] [ 817.558284][T15507] Local variable ----cmd@ucma_connect created at: [ 817.564981][T15507] ucma_connect+0xde/0xc30 [ 817.569941][T15507] ucma_connect+0xde/0xc30 [ 817.575687][T15507] ===================================================== [ 817.583869][T15507] Disabling lock debugging due to kernel taint [ 817.590484][T15507] Kernel panic - not syncing: panic_on_warn set ... [ 817.597116][T15507] CPU: 1 PID: 15507 Comm: syz-executor.5 Tainted: G B 5.8.0-rc5-syzkaller #0 [ 817.607213][T15507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 817.617290][T15507] Call Trace: [ 817.622848][T15507] dump_stack+0x21c/0x280 [ 817.628698][T15507] panic+0x4d7/0xef7 [ 817.633184][T15507] ? add_taint+0x17c/0x210 [ 817.637892][T15507] kmsan_report+0x1df/0x1e0 [ 817.642432][T15507] __msan_warning+0x58/0xa0 [ 817.646957][T15507] ucma_connect+0x458/0xc30 [ 817.651505][T15507] ? kmsan_get_metadata+0x116/0x180 [ 817.656742][T15507] ? _copy_from_user+0x201/0x310 [ 817.661707][T15507] ? kmsan_get_metadata+0x116/0x180 [ 817.667308][T15507] ucma_write+0x64d/0x6e0 [ 817.671667][T15507] ? ucma_get_global_nl_info+0xe0/0xe0 [ 817.677140][T15507] vfs_write+0x6a3/0x17c0 [ 817.681508][T15507] ? __msan_poison_alloca+0xf0/0x120 [ 817.686812][T15507] ? kmsan_get_metadata+0x116/0x180 [ 817.692035][T15507] ksys_write+0x275/0x500 [ 817.696410][T15507] ? kmsan_get_metadata+0x116/0x180 [ 817.701662][T15507] __se_sys_write+0x92/0xb0 [ 817.706198][T15507] __ia32_sys_write+0x4a/0x70 [ 817.710911][T15507] __do_fast_syscall_32+0x2af/0x480 [ 817.716144][T15507] do_fast_syscall_32+0x6b/0xd0 [ 817.721041][T15507] do_SYSENTER_32+0x73/0x90 [ 817.726178][T15507] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 817.733300][T15507] RIP: 0023:0xf7f2e549 [ 817.737386][T15507] Code: Bad RIP value. [ 817.741465][T15507] RSP: 002b:00000000f55280cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 817.749907][T15507] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000480 [ 817.757911][T15507] RDX: 0000000000000120 RSI: 0000000000000000 RDI: 0000000000000000 [ 817.765905][T15507] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 817.773898][T15507] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 817.781909][T15507] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 817.792188][T15507] Kernel Offset: disabled [ 817.797420][T15507] Rebooting in 86400 seconds..