0x1, 0x310, 0x0, 0x0, 0x0, 0x10, 0xb05, 0x1854, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x29, 0xa8, 0x1f, [{{0x9, 0x4, 0x0, 0x3, 0x2, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x47, 0xd5, 0x1, {0x22, 0x923}}, {{{0x9, 0x5, 0x81, 0x3, 0x400, 0xa8, 0x4, 0x3}}}}}]}}]}}, &(0x7f0000000ec0)={0xa, &(0x7f0000000d40)={0xa, 0x6, 0x300, 0x5, 0xff, 0x1, 0x8, 0xfd}, 0x4a, &(0x7f0000000d80)={0x5, 0xf, 0x4a, 0x2, [@wireless={0xb, 0x10, 0x1, 0x4, 0x0, 0x7, 0x0, 0x0, 0xee}, @generic={0x3a, 0x10, 0x3, "f7d74a4c8036c1a8b4e26c5188039d025143c138b31e07b7f34097c90a14f7e6c6f47cecb8264afb72d3925a3e22de9a12080b946456e9"}]}, 0x1, [{0xbf, &(0x7f0000000e00)=@string={0xbf, 0x3, "344f23e358bd3547aa247d1bba456d86df0c3afdbeb57a15bc22fb5af6233b32b5f1796f9d049e608cccac50f09b8fbf3f4a085f6ade2f5b9a9503ecdd3f4f53e04773d90693ad568bb9387a3ec6b60987389bee34eb303c91f84966bf524825cc6e86a507b3186ec9bffa6dc614c25ea18fff853b866b6799ad4e3ab9fcd4f2f293e3ce2a4993b8c1ba1e5beaff85e561f0a4d269893b16ea12430112e5c841efb9ab751961c0ba07b6dd448e5e4ad1ff7ed0c575033375d9d6be8aa2"}}]}) syz_open_dev$evdev(&(0x7f0000000f00), 0x6, 0x80000) syz_usb_connect$hid(0x1, 0x36, &(0x7f0000000f40)={{0x12, 0x1, 0x310, 0x0, 0x0, 0x0, 0xff, 0x4b4, 0xde61, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x3, 0x10, 0xec, [{{0x9, 0x4, 0x0, 0x5, 0x1, 0x3, 0x1, 0x1, 0xeb, {0x9, 0x21, 0x1000, 0x4, 0x1, {0x22, 0xe2}}, {{{0x9, 0x5, 0x81, 0x3, 0x1a7, 0x0, 0x9, 0x8}}}}}]}}]}}, &(0x7f0000001300)={0xa, &(0x7f0000000f80)={0xa, 0x6, 0x310, 0x1, 0x3f, 0x9, 0x10, 0x19}, 0xa8, &(0x7f0000000fc0)={0x5, 0xf, 0xa8, 0x1, [@generic={0xa3, 0x10, 0xb, "9c484c119e0d8eb1b4ea76716d24c9c8a0f64c8ff470d0c899eb5cc4efead1ff3cd37e3d0fce2d09b43498c8a18a86dbd9ea4599ab3fe78bc49d4d3829c3c09578c7e319e82cff4724e540a8a07459a3b16d4fb185564001ba8eeca4723fbfb097229f863adbded8348a1a9d21c5b480da473a04fcd2477f67f7b811a44a67475b1b85f721c9639421c1ef6d86376a8cd62b5d967af354159262a336663600a0"}]}, 0x7, [{0x4, &(0x7f0000001080)=@lang_id={0x4, 0x3, 0x1c01}}, {0xd3, &(0x7f00000010c0)=@string={0xd3, 0x3, "99babd8ecf6e643468d550723185b80111899b4180e29942f69d9d54a9ab3f8b63b9fef0a8cf9019826c43909bd2e4dcd8894870b0a7765d218b4fd341e0e1734e8eecc96d9523e5fd9a1021dd85c91affb71b63b42188590f2ab435d26cfb99c0606f126d79879b647f54018bba7e24c7f9dd0142debd02987ba96cb6cdd78c0181e21b66fc26c763db3cb4aebce7b0376a4981499ffe08f84ccee7100023b9a0c2710fcf31c3b70bdac0e2164f2ed461622f78fe9b6cd597e646e5d3231727ba5d5202b1a90768c829958a4d4eecda57"}}, {0x4, &(0x7f00000011c0)=@lang_id={0x4, 0x3, 0x455}}, {0xa, &(0x7f0000001200)=@string={0xa, 0x3, "44dcfaeb877d2026"}}, {0x4, &(0x7f0000001240)=@lang_id={0x4, 0x3, 0x423}}, {0x4, &(0x7f0000001280)=@lang_id={0x4, 0x3, 0x403}}, {0x4, &(0x7f00000012c0)=@lang_id={0x4, 0x3, 0x804}}]}) syz_open_dev$evdev(&(0x7f0000001380), 0x5, 0x0) 23:09:18 executing program 5: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) ioctl$PTP_PIN_SETFUNC(0xffffffffffffffff, 0x40603d07, &(0x7f0000000040)={'\x00', 0x7, 0x0, 0xfffffffb}) ioctl$MON_IOCH_MFLUSH(0xffffffffffffffff, 0x9208, 0xff) 23:09:18 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x22840, 0x0) ioctl$MON_IOCH_MFLUSH(0xffffffffffffffff, 0x9208, 0x0) 23:09:18 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) [ 2141.386778] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2141.388718] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2141.397011] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2141.399150] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2141.409289] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2141.410444] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2141.416833] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2141.418702] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2141.421978] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2141.428534] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2141.430561] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2141.433730] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2141.438699] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2141.440989] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2141.456526] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2141.461434] misc raw-gadget: fail, usb_gadget_register_driver returned -16 23:09:18 executing program 5: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6, 0x1f}}, './file0\x00'}) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x110, r0, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000040)=""/151) 23:09:18 executing program 6: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x180481, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000140), 0x5, 0x4180) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f0000000040)=""/243) 23:09:18 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x22840, 0x0) ioctl$MON_IOCH_MFLUSH(0xffffffffffffffff, 0x9208, 0x0) 23:09:18 executing program 5: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$usbmon(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000000, 0x50, 0xffffffffffffffff, 0x6) 23:09:18 executing program 5: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = memfd_secret(0x80000) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000040)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x7}) ioctl$MON_IOCQ_RING_SIZE(0xffffffffffffffff, 0x9205) 23:09:18 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x22840, 0x0) ioctl$MON_IOCH_MFLUSH(0xffffffffffffffff, 0x9208, 0x0) 23:09:18 executing program 6: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) r0 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), r1) getgroups(0x4, &(0x7f00000001c0)=[0xffffffffffffffff, 0xee01, 0x0, 0xee00]) setresgid(0xee00, 0xee01, r3) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="ac000000", @ANYRES16=r2, @ANYBLOB="00042dbd7000ffdbdf250c0000000800050007000000080006000200000030000380060004003f00020005000800080000000500080009000000140002006970766c616e300000000000000000000c00028006000e004e20000044000180080009003600000008000b0073697000060004004e230000080009001600000008000b007369700008000b0073697000070006006e710000070006006e71000008000600ffff0000"], 0xac}, 0x1, 0x0, 0x0, 0x4000}, 0x40) 23:09:18 executing program 5: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000480), 0x10001, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x200, 0x70bd2d, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4000845}, 0x40041) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000440)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4, 0x200}}, './file0\x00'}) ioctl$MON_IOCQ_RING_SIZE(r1, 0x9205) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f00000005c0)={&(0x7f00000004c0), &(0x7f0000000500)=""/171, 0xab}) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'wpan1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000200)={0x1a8, r2, 0x4, 0x70bd29, 0x25dfdbfb, {}, [@NL802154_ATTR_SEC_DEVKEY={0x184, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_ID={0xf0, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_IMPLICIT={0x50, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0xffff}, @NL802154_DEV_ADDR_ATTR_MODE={0x8}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa3}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x1}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xfffe}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0302}}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x3}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x1}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa2}]}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x6}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x4}, @NL802154_KEY_ID_ATTR_MODE={0x8}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x54, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0202}}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x1}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6}, @NL802154_DEV_ADDR_ATTR_MODE={0x8}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x1}, @NL802154_DEV_ADDR_ATTR_MODE={0x8}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x1}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0002}}]}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x3}, @NL802154_KEY_ID_ATTR_MODE={0x8}, @NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x3}]}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc, 0x2, {0xaaaaaaaaaaaa0302}}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc}, @NL802154_DEVKEY_ATTR_ID={0x70, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_IMPLICIT={0x44, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_MODE={0x8}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0302}}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x1}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x1}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x3}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc}]}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x14, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x3}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa0}]}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x6322}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x105}]}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0xb9b5}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}]}, 0x1a8}, 0x1, 0x0, 0x0, 0x20004094}, 0x40000) r5 = memfd_secret(0x80000) ioctl$MON_IOCT_RING_SIZE(r5, 0x9204, 0x828de) 23:09:28 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_WOWLAN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, 0x0, 0x2, 0x70bd2b, 0x25dfdbff, {{}, {@val={0x8, 0x1, 0x56}, @val={0x8}, @void}}, [@NL80211_ATTR_WOWLAN_TRIGGERS={0x18, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_RFKILL_RELEASE={0x4}, @NL80211_WOWLAN_TRIG_ANY={0x4}, @NL80211_WOWLAN_TRIG_EAP_IDENT_REQUEST={0x4}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_RFKILL_RELEASE={0x4}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x41}, 0x1747d1f32b25822b) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x3c, 0x0, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x20}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x7f, 0x9, 0x8e, 0x4d64, 0x6]}, @SEG6_ATTR_HMACKEYID={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x21) r1 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, 0x0, 0x100, 0x70bd29, 0x25dfdbfc, {}, [@ETHTOOL_A_PAUSE_RX={0x5}, @ETHTOOL_A_PAUSE_RX={0x5}, @ETHTOOL_A_PAUSE_TX={0x5}, @ETHTOOL_A_PAUSE_TX={0x5}, @ETHTOOL_A_PAUSE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) 23:09:28 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x47, {0x47, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf04"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:09:28 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, 0x0, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:09:28 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x22840, 0x0) ioctl$MON_IOCH_MFLUSH(0xffffffffffffffff, 0x9208, 0x0) 23:09:28 executing program 5: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) memfd_secret(0x80000) 23:09:28 executing program 0: syz_usb_connect$hid(0x3, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x8, 0x28bd, 0x74, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x51, 0x40, 0x7, [{{0x9, 0x4, 0x0, 0x40, 0x1, 0x3, 0x1, 0x3, 0x2, {0x9, 0x21, 0xaa6b, 0xc6, 0x1, {0x22, 0x3aa}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x1, 0x1, 0x20}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0x0, 0x5, 0x20}}]}}}]}}]}}, &(0x7f0000000300)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x2, 0x4, 0x9, 0x20, 0x1f}, 0x2e, &(0x7f0000000080)={0x5, 0xf, 0x2e, 0x4, [@ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x5, 0xf, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "f3467c0fdd67206c155df2f59eeba69c"}, @wireless={0xb, 0x10, 0x1, 0x8, 0x2c, 0x80, 0x3, 0x4, 0x9}]}, 0x6, [{0x4, &(0x7f00000000c0)=@lang_id={0x4, 0x3, 0x425}}, {0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x860}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x424}}, {0xc1, &(0x7f0000000180)=@string={0xc1, 0x3, "32895dce90d627157085c353d7f94cd861200256946f1e7b957200ebcb7088ebb826877a0b86b0f934dc71ba39550de0d221e0952964ee86319a4fc65c41ea14733f81707695bb54d66124588b78f9d5ef53c1103908a97f54387f55b74b4f4bdd47e9580ca75c0a7f3e13b3af501985fb8394a5736005e605475e5b1f7e0534db2efda6ab352db55fbf8c178bc4440e0f4d799a88ae835e7454d7a0c36dd2ad100d7a4087c45832b2a0afc03e974fbae484ade32af76f8a5990c75d6e589e"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x413}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0xf8ff}}]}) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000380)={{0x12, 0x1, 0x250, 0x0, 0x0, 0x0, 0x40, 0x6cb, 0x73f4, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xff, 0x10, 0x1f, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x2, 0x20, {0x9, 0x21, 0x3, 0x1, 0x1, {0x22, 0x923}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0xe2, 0x7f, 0x8}}}}}]}}]}}, &(0x7f0000000500)={0xa, &(0x7f00000003c0)={0xa, 0x6, 0x250, 0x6, 0x1, 0xff, 0xff, 0x8}, 0x49, &(0x7f0000000400)={0x5, 0xf, 0x49, 0x4, [@ss_container_id={0x14, 0x10, 0x4, 0x6, "9f23610ae8a732975fd3df64dab98795"}, @ssp_cap={0x1c, 0x10, 0xa, 0x4, 0x4, 0x3, 0xf, 0x2, [0xc000, 0xc000, 0x3f30, 0x3f0f]}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x0, 0x4, 0x2, 0x1000}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0xd5, 0xfd, 0x5}]}, 0x2, [{0x26, &(0x7f0000000480)=@string={0x26, 0x3, "cd191471cdbf34933d7231450ccd1f5765f9cfcdbcabc024ad292afcc747ec7e4f04c644"}}, {0x4, &(0x7f00000004c0)=@lang_id={0x4, 0x3, 0x40f}}]}) syz_usb_connect$hid(0x6, 0x36, &(0x7f0000000540)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x8, 0x46d, 0xc52b, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x2, 0xc0, 0xe7, [{{0x9, 0x4, 0x0, 0x8, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x6, 0x7f, 0x1, {0x22, 0xa8f}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0xfa, 0x8f, 0x2}}}}}]}}]}}, &(0x7f0000000880)={0xa, &(0x7f0000000580)={0xa, 0x6, 0x200, 0x80, 0x1f, 0x3, 0x20, 0x3}, 0x7e, &(0x7f00000005c0)={0x5, 0xf, 0x7e, 0x6, [@ptm_cap={0x3}, @ssp_cap={0x10, 0x10, 0xa, 0x1, 0x1, 0x7, 0xf00, 0xa3a, [0xff000f]}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0x9, 0x9, 0xfffe}, @generic={0x42, 0x10, 0x4, "dfa909963b4c4a0a5f93e6fff45ee072e0265d99f99a5467b700c649cb42a77c7eb06c0d601324a9e383b942ef51bc888a1cd17688864ab47fb29ca13dbc07"}, @generic={0x13, 0x10, 0x1, "bfa6bacd313037a66f522459a4efdabd"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0xa3, 0x9, 0x8}]}, 0x4, [{0x4, &(0x7f0000000640)=@lang_id={0x4, 0x3, 0x429}}, {0xb8, &(0x7f0000000680)=@string={0xb8, 0x3, "42705c0d85706ddea3591c3d464f897257f530fb7f333ad5db89ff34e160bd630ad32754ae8d302b4040b733ddd3021c9e0041b51501dc58577d710d7d330a461033ed02f78659b9e6a6d07f525160284581bf9f7b6d74858c3d8fb0294c6d7dac1a859101803450377a0ef39210fb6700f771d15e7b42a9b032f28923b0bc8f38f5c962ae8881b006453fa75001382e5fdd3fa8ebca0c343cf8262a0d4d3bbb66f5724cb55b722d30598bf8562c1ad838f1c92fce2e"}}, {0xee, &(0x7f0000000740)=@string={0xee, 0x3, "fa6e8b74837c661128332dc7a26e58cfb24b28ada9d05c1973d222ba1ff66b18361b559b4b45a9742e86b79717211fc974cb38701973690bea498bba170459c3d0c000c8405f47e5ac1f3975fd438ab062808c46b45c7cd4ee6c6431aff885e241e12f0db4ddccfcedf2320f68bf467ac4c8cc8c42ec72012cb318a13c536c7d7ef62404b87e163944ea949594ba81f14406b251116ecc13257c3ec853daa401e5715097bec00e1d8f60fbd59b5a931d50a9ba8e50b560f531406263c917ce2722c50f8b9b9ece653f1757ffe0b7e4f69dff41f0dcb44992c5e8cf2bd7f343927e85513857734bb918177ce6"}}, {0x4, &(0x7f0000000840)=@lang_id={0x4, 0x3, 0x44e}}]}) sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000c80)={&(0x7f0000000940)={0x318, 0x0, 0x300, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x5c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}]}, @TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'netpci0\x00'}}]}, @TIPC_NLA_SOCK={0x28, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x92a}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}]}]}, @TIPC_NLA_SOCK={0x60, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4a6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7f}, @TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x9}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x10d}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7fff}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_LINK={0x90, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}]}, @TIPC_NLA_LINK={0x70, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc00000}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_SOCK={0x10, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8}]}]}, @TIPC_NLA_SOCK={0x6c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xffff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_CON={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x690}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x20}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xffffffff}]}]}, @TIPC_NLA_BEARER={0x3c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0xee, @private0, 0x7fffffff}}}}]}, @TIPC_NLA_SOCK={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x400}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x6f2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8001}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x400}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7f}]}]}, 0x318}, 0x1, 0x0, 0x0, 0x40}, 0x4010) syz_usb_connect$hid(0x4, 0x36, &(0x7f0000000d00)={{0x12, 0x1, 0x310, 0x0, 0x0, 0x0, 0x10, 0xb05, 0x1854, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x29, 0xa8, 0x1f, [{{0x9, 0x4, 0x0, 0x3, 0x2, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x47, 0xd5, 0x1, {0x22, 0x923}}, {{{0x9, 0x5, 0x81, 0x3, 0x400, 0xa8, 0x4, 0x3}}}}}]}}]}}, &(0x7f0000000ec0)={0xa, &(0x7f0000000d40)={0xa, 0x6, 0x300, 0x5, 0xff, 0x1, 0x8, 0xfd}, 0x4a, &(0x7f0000000d80)={0x5, 0xf, 0x4a, 0x2, [@wireless={0xb, 0x10, 0x1, 0x4, 0x0, 0x7, 0x0, 0x0, 0xee}, @generic={0x3a, 0x10, 0x3, "f7d74a4c8036c1a8b4e26c5188039d025143c138b31e07b7f34097c90a14f7e6c6f47cecb8264afb72d3925a3e22de9a12080b946456e9"}]}, 0x1, [{0xbf, &(0x7f0000000e00)=@string={0xbf, 0x3, "344f23e358bd3547aa247d1bba456d86df0c3afdbeb57a15bc22fb5af6233b32b5f1796f9d049e608cccac50f09b8fbf3f4a085f6ade2f5b9a9503ecdd3f4f53e04773d90693ad568bb9387a3ec6b60987389bee34eb303c91f84966bf524825cc6e86a507b3186ec9bffa6dc614c25ea18fff853b866b6799ad4e3ab9fcd4f2f293e3ce2a4993b8c1ba1e5beaff85e561f0a4d269893b16ea12430112e5c841efb9ab751961c0ba07b6dd448e5e4ad1ff7ed0c575033375d9d6be8aa2"}}]}) syz_open_dev$evdev(&(0x7f0000000f00), 0x6, 0x80000) syz_usb_connect$hid(0x1, 0x36, &(0x7f0000000f40)={{0x12, 0x1, 0x310, 0x0, 0x0, 0x0, 0xff, 0x4b4, 0xde61, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x3, 0x10, 0xec, [{{0x9, 0x4, 0x0, 0x5, 0x1, 0x3, 0x1, 0x1, 0xeb, {0x9, 0x21, 0x1000, 0x4, 0x1, {0x22, 0xe2}}, {{{0x9, 0x5, 0x81, 0x3, 0x1a7, 0x0, 0x9, 0x8}}}}}]}}]}}, &(0x7f0000001300)={0xa, &(0x7f0000000f80)={0xa, 0x6, 0x310, 0x1, 0x3f, 0x9, 0x10, 0x19}, 0xa8, &(0x7f0000000fc0)={0x5, 0xf, 0xa8, 0x1, [@generic={0xa3, 0x10, 0xb, "9c484c119e0d8eb1b4ea76716d24c9c8a0f64c8ff470d0c899eb5cc4efead1ff3cd37e3d0fce2d09b43498c8a18a86dbd9ea4599ab3fe78bc49d4d3829c3c09578c7e319e82cff4724e540a8a07459a3b16d4fb185564001ba8eeca4723fbfb097229f863adbded8348a1a9d21c5b480da473a04fcd2477f67f7b811a44a67475b1b85f721c9639421c1ef6d86376a8cd62b5d967af354159262a336663600a0"}]}, 0x7, [{0x4, &(0x7f0000001080)=@lang_id={0x4, 0x3, 0x1c01}}, {0xd3, &(0x7f00000010c0)=@string={0xd3, 0x3, "99babd8ecf6e643468d550723185b80111899b4180e29942f69d9d54a9ab3f8b63b9fef0a8cf9019826c43909bd2e4dcd8894870b0a7765d218b4fd341e0e1734e8eecc96d9523e5fd9a1021dd85c91affb71b63b42188590f2ab435d26cfb99c0606f126d79879b647f54018bba7e24c7f9dd0142debd02987ba96cb6cdd78c0181e21b66fc26c763db3cb4aebce7b0376a4981499ffe08f84ccee7100023b9a0c2710fcf31c3b70bdac0e2164f2ed461622f78fe9b6cd597e646e5d3231727ba5d5202b1a90768c829958a4d4eecda57"}}, {0x4, &(0x7f00000011c0)=@lang_id={0x4, 0x3, 0x455}}, {0xa, &(0x7f0000001200)=@string={0xa, 0x3, "44dcfaeb877d2026"}}, {0x4, &(0x7f0000001240)=@lang_id={0x4, 0x3, 0x423}}, {0x4, &(0x7f0000001280)=@lang_id={0x4, 0x3, 0x403}}, {0x4, &(0x7f00000012c0)=@lang_id={0x4, 0x3, 0x804}}]}) 23:09:28 executing program 1: syz_usb_connect$hid(0x3, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x8, 0x28bd, 0x74, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x51, 0x40, 0x7, [{{0x9, 0x4, 0x0, 0x40, 0x1, 0x3, 0x1, 0x3, 0x2, {0x9, 0x21, 0xaa6b, 0xc6, 0x1, {0x22, 0x3aa}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x1, 0x1, 0x20}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0x0, 0x5, 0x20}}]}}}]}}]}}, &(0x7f0000000300)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x2, 0x4, 0x9, 0x20, 0x1f}, 0x2e, &(0x7f0000000080)={0x5, 0xf, 0x2e, 0x4, [@ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x5, 0xf, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "f3467c0fdd67206c155df2f59eeba69c"}, @wireless={0xb, 0x10, 0x1, 0x8, 0x2c, 0x80, 0x3, 0x4, 0x9}]}, 0x6, [{0x4, &(0x7f00000000c0)=@lang_id={0x4, 0x3, 0x425}}, {0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x860}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x424}}, {0xc1, &(0x7f0000000180)=@string={0xc1, 0x3, "32895dce90d627157085c353d7f94cd861200256946f1e7b957200ebcb7088ebb826877a0b86b0f934dc71ba39550de0d221e0952964ee86319a4fc65c41ea14733f81707695bb54d66124588b78f9d5ef53c1103908a97f54387f55b74b4f4bdd47e9580ca75c0a7f3e13b3af501985fb8394a5736005e605475e5b1f7e0534db2efda6ab352db55fbf8c178bc4440e0f4d799a88ae835e7454d7a0c36dd2ad100d7a4087c45832b2a0afc03e974fbae484ade32af76f8a5990c75d6e589e"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x413}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0xf8ff}}]}) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000380)={{0x12, 0x1, 0x250, 0x0, 0x0, 0x0, 0x40, 0x6cb, 0x73f4, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xff, 0x10, 0x1f, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x2, 0x20, {0x9, 0x21, 0x3, 0x1, 0x1, {0x22, 0x923}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0xe2, 0x7f, 0x8}}}}}]}}]}}, &(0x7f0000000500)={0xa, &(0x7f00000003c0)={0xa, 0x6, 0x250, 0x6, 0x1, 0xff, 0xff, 0x8}, 0x49, &(0x7f0000000400)={0x5, 0xf, 0x49, 0x4, [@ss_container_id={0x14, 0x10, 0x4, 0x6, "9f23610ae8a732975fd3df64dab98795"}, @ssp_cap={0x1c, 0x10, 0xa, 0x4, 0x4, 0x3, 0xf, 0x2, [0xc000, 0xc000, 0x3f30, 0x3f0f]}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x0, 0x4, 0x2, 0x1000}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0xd5, 0xfd, 0x5}]}, 0x2, [{0x26, &(0x7f0000000480)=@string={0x26, 0x3, "cd191471cdbf34933d7231450ccd1f5765f9cfcdbcabc024ad292afcc747ec7e4f04c644"}}, {0x4, &(0x7f00000004c0)=@lang_id={0x4, 0x3, 0x40f}}]}) syz_usb_connect$hid(0x6, 0x36, &(0x7f0000000540)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x8, 0x46d, 0xc52b, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x2, 0xc0, 0xe7, [{{0x9, 0x4, 0x0, 0x8, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x6, 0x7f, 0x1, {0x22, 0xa8f}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0xfa, 0x8f, 0x2}}}}}]}}]}}, &(0x7f0000000880)={0xa, &(0x7f0000000580)={0xa, 0x6, 0x200, 0x80, 0x1f, 0x3, 0x20, 0x3}, 0x7e, &(0x7f00000005c0)={0x5, 0xf, 0x7e, 0x6, [@ptm_cap={0x3}, @ssp_cap={0x10, 0x10, 0xa, 0x1, 0x1, 0x7, 0xf00, 0xa3a, [0xff000f]}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0x9, 0x9, 0xfffe}, @generic={0x42, 0x10, 0x4, "dfa909963b4c4a0a5f93e6fff45ee072e0265d99f99a5467b700c649cb42a77c7eb06c0d601324a9e383b942ef51bc888a1cd17688864ab47fb29ca13dbc07"}, @generic={0x13, 0x10, 0x1, "bfa6bacd313037a66f522459a4efdabd"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0xa3, 0x9, 0x8}]}, 0x4, [{0x4, &(0x7f0000000640)=@lang_id={0x4, 0x3, 0x429}}, {0xb8, &(0x7f0000000680)=@string={0xb8, 0x3, "42705c0d85706ddea3591c3d464f897257f530fb7f333ad5db89ff34e160bd630ad32754ae8d302b4040b733ddd3021c9e0041b51501dc58577d710d7d330a461033ed02f78659b9e6a6d07f525160284581bf9f7b6d74858c3d8fb0294c6d7dac1a859101803450377a0ef39210fb6700f771d15e7b42a9b032f28923b0bc8f38f5c962ae8881b006453fa75001382e5fdd3fa8ebca0c343cf8262a0d4d3bbb66f5724cb55b722d30598bf8562c1ad838f1c92fce2e"}}, {0xee, &(0x7f0000000740)=@string={0xee, 0x3, "fa6e8b74837c661128332dc7a26e58cfb24b28ada9d05c1973d222ba1ff66b18361b559b4b45a9742e86b79717211fc974cb38701973690bea498bba170459c3d0c000c8405f47e5ac1f3975fd438ab062808c46b45c7cd4ee6c6431aff885e241e12f0db4ddccfcedf2320f68bf467ac4c8cc8c42ec72012cb318a13c536c7d7ef62404b87e163944ea949594ba81f14406b251116ecc13257c3ec853daa401e5715097bec00e1d8f60fbd59b5a931d50a9ba8e50b560f531406263c917ce2722c50f8b9b9ece653f1757ffe0b7e4f69dff41f0dcb44992c5e8cf2bd7f343927e85513857734bb918177ce6"}}, {0x4, &(0x7f0000000840)=@lang_id={0x4, 0x3, 0x44e}}]}) sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000c80)={&(0x7f0000000940)={0x318, 0x0, 0x300, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x5c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}]}, @TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'netpci0\x00'}}]}, @TIPC_NLA_SOCK={0x28, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x92a}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}]}]}, @TIPC_NLA_SOCK={0x60, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4a6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7f}, @TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x9}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x10d}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7fff}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_LINK={0x90, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}]}, @TIPC_NLA_LINK={0x70, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc00000}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_SOCK={0x10, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8}]}]}, @TIPC_NLA_SOCK={0x6c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xffff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_CON={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x690}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x20}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xffffffff}]}]}, @TIPC_NLA_BEARER={0x3c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0xee, @private0, 0x7fffffff}}}}]}, @TIPC_NLA_SOCK={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x400}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x6f2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8001}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x400}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7f}]}]}, 0x318}, 0x1, 0x0, 0x0, 0x40}, 0x4010) syz_usb_connect$hid(0x4, 0x36, &(0x7f0000000d00)={{0x12, 0x1, 0x310, 0x0, 0x0, 0x0, 0x10, 0xb05, 0x1854, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x29, 0xa8, 0x1f, [{{0x9, 0x4, 0x0, 0x3, 0x2, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x47, 0xd5, 0x1, {0x22, 0x923}}, {{{0x9, 0x5, 0x81, 0x3, 0x400, 0xa8, 0x4, 0x3}}}}}]}}]}}, &(0x7f0000000ec0)={0xa, &(0x7f0000000d40)={0xa, 0x6, 0x300, 0x5, 0xff, 0x1, 0x8, 0xfd}, 0x4a, &(0x7f0000000d80)={0x5, 0xf, 0x4a, 0x2, [@wireless={0xb, 0x10, 0x1, 0x4, 0x0, 0x7, 0x0, 0x0, 0xee}, @generic={0x3a, 0x10, 0x3, "f7d74a4c8036c1a8b4e26c5188039d025143c138b31e07b7f34097c90a14f7e6c6f47cecb8264afb72d3925a3e22de9a12080b946456e9"}]}, 0x1, [{0xbf, &(0x7f0000000e00)=@string={0xbf, 0x3, "344f23e358bd3547aa247d1bba456d86df0c3afdbeb57a15bc22fb5af6233b32b5f1796f9d049e608cccac50f09b8fbf3f4a085f6ade2f5b9a9503ecdd3f4f53e04773d90693ad568bb9387a3ec6b60987389bee34eb303c91f84966bf524825cc6e86a507b3186ec9bffa6dc614c25ea18fff853b866b6799ad4e3ab9fcd4f2f293e3ce2a4993b8c1ba1e5beaff85e561f0a4d269893b16ea12430112e5c841efb9ab751961c0ba07b6dd448e5e4ad1ff7ed0c575033375d9d6be8aa2"}}]}) syz_open_dev$evdev(&(0x7f0000000f00), 0x6, 0x80000) syz_usb_connect$hid(0x1, 0x36, &(0x7f0000000f40)={{0x12, 0x1, 0x310, 0x0, 0x0, 0x0, 0xff, 0x4b4, 0xde61, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x3, 0x10, 0xec, [{{0x9, 0x4, 0x0, 0x5, 0x1, 0x3, 0x1, 0x1, 0xeb, {0x9, 0x21, 0x1000, 0x4, 0x1, {0x22, 0xe2}}, {{{0x9, 0x5, 0x81, 0x3, 0x1a7, 0x0, 0x9, 0x8}}}}}]}}]}}, &(0x7f0000001300)={0xa, &(0x7f0000000f80)={0xa, 0x6, 0x310, 0x1, 0x3f, 0x9, 0x10, 0x19}, 0xa8, &(0x7f0000000fc0)={0x5, 0xf, 0xa8, 0x1, [@generic={0xa3, 0x10, 0xb, "9c484c119e0d8eb1b4ea76716d24c9c8a0f64c8ff470d0c899eb5cc4efead1ff3cd37e3d0fce2d09b43498c8a18a86dbd9ea4599ab3fe78bc49d4d3829c3c09578c7e319e82cff4724e540a8a07459a3b16d4fb185564001ba8eeca4723fbfb097229f863adbded8348a1a9d21c5b480da473a04fcd2477f67f7b811a44a67475b1b85f721c9639421c1ef6d86376a8cd62b5d967af354159262a336663600a0"}]}, 0x7, [{0x4, &(0x7f0000001080)=@lang_id={0x4, 0x3, 0x1c01}}, {0xd3, &(0x7f00000010c0)=@string={0xd3, 0x3, "99babd8ecf6e643468d550723185b80111899b4180e29942f69d9d54a9ab3f8b63b9fef0a8cf9019826c43909bd2e4dcd8894870b0a7765d218b4fd341e0e1734e8eecc96d9523e5fd9a1021dd85c91affb71b63b42188590f2ab435d26cfb99c0606f126d79879b647f54018bba7e24c7f9dd0142debd02987ba96cb6cdd78c0181e21b66fc26c763db3cb4aebce7b0376a4981499ffe08f84ccee7100023b9a0c2710fcf31c3b70bdac0e2164f2ed461622f78fe9b6cd597e646e5d3231727ba5d5202b1a90768c829958a4d4eecda57"}}, {0x4, &(0x7f00000011c0)=@lang_id={0x4, 0x3, 0x455}}, {0xa, &(0x7f0000001200)=@string={0xa, 0x3, "44dcfaeb877d2026"}}, {0x4, &(0x7f0000001240)=@lang_id={0x4, 0x3, 0x423}}, {0x4, &(0x7f0000001280)=@lang_id={0x4, 0x3, 0x403}}, {0x4, &(0x7f00000012c0)=@lang_id={0x4, 0x3, 0x804}}]}) 23:09:28 executing program 3: syz_usb_connect$hid(0x3, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x8, 0x28bd, 0x74, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x51, 0x40, 0x7, [{{0x9, 0x4, 0x0, 0x40, 0x1, 0x3, 0x1, 0x3, 0x2, {0x9, 0x21, 0xaa6b, 0xc6, 0x1, {0x22, 0x3aa}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x1, 0x1, 0x20}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0x0, 0x5, 0x20}}]}}}]}}]}}, &(0x7f0000000300)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x2, 0x4, 0x9, 0x20, 0x1f}, 0x2e, &(0x7f0000000080)={0x5, 0xf, 0x2e, 0x4, [@ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x5, 0xf, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "f3467c0fdd67206c155df2f59eeba69c"}, @wireless={0xb, 0x10, 0x1, 0x8, 0x2c, 0x80, 0x3, 0x4, 0x9}]}, 0x6, [{0x4, &(0x7f00000000c0)=@lang_id={0x4, 0x3, 0x425}}, {0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x860}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x424}}, {0xc1, &(0x7f0000000180)=@string={0xc1, 0x3, "32895dce90d627157085c353d7f94cd861200256946f1e7b957200ebcb7088ebb826877a0b86b0f934dc71ba39550de0d221e0952964ee86319a4fc65c41ea14733f81707695bb54d66124588b78f9d5ef53c1103908a97f54387f55b74b4f4bdd47e9580ca75c0a7f3e13b3af501985fb8394a5736005e605475e5b1f7e0534db2efda6ab352db55fbf8c178bc4440e0f4d799a88ae835e7454d7a0c36dd2ad100d7a4087c45832b2a0afc03e974fbae484ade32af76f8a5990c75d6e589e"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x413}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0xf8ff}}]}) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000380)={{0x12, 0x1, 0x250, 0x0, 0x0, 0x0, 0x40, 0x6cb, 0x73f4, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xff, 0x10, 0x1f, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x2, 0x20, {0x9, 0x21, 0x3, 0x1, 0x1, {0x22, 0x923}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0xe2, 0x7f, 0x8}}}}}]}}]}}, &(0x7f0000000500)={0xa, &(0x7f00000003c0)={0xa, 0x6, 0x250, 0x6, 0x1, 0xff, 0xff, 0x8}, 0x49, &(0x7f0000000400)={0x5, 0xf, 0x49, 0x4, [@ss_container_id={0x14, 0x10, 0x4, 0x6, "9f23610ae8a732975fd3df64dab98795"}, @ssp_cap={0x1c, 0x10, 0xa, 0x4, 0x4, 0x3, 0xf, 0x2, [0xc000, 0xc000, 0x3f30, 0x3f0f]}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x0, 0x4, 0x2, 0x1000}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0xd5, 0xfd, 0x5}]}, 0x2, [{0x26, &(0x7f0000000480)=@string={0x26, 0x3, "cd191471cdbf34933d7231450ccd1f5765f9cfcdbcabc024ad292afcc747ec7e4f04c644"}}, {0x4, &(0x7f00000004c0)=@lang_id={0x4, 0x3, 0x40f}}]}) syz_open_dev$evdev(&(0x7f0000001380), 0x5, 0x0) [ 2151.360845] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2151.366269] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2151.370954] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2151.373673] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2151.380354] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2151.382666] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2151.386452] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2151.387279] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2151.387877] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2151.389856] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2151.400923] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2151.402827] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2151.405903] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2151.420762] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2151.430350] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2151.432304] misc raw-gadget: fail, usb_gadget_register_driver returned -16 23:09:37 executing program 5: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$MON_IOCQ_RING_SIZE(0xffffffffffffffff, 0x9205) 23:09:37 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x47, {0x47, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf04"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:09:37 executing program 0: syz_usb_connect$hid(0x3, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x8, 0x28bd, 0x74, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x51, 0x40, 0x7, [{{0x9, 0x4, 0x0, 0x40, 0x1, 0x3, 0x1, 0x3, 0x2, {0x9, 0x21, 0xaa6b, 0xc6, 0x1, {0x22, 0x3aa}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x1, 0x1, 0x20}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0x0, 0x5, 0x20}}]}}}]}}]}}, &(0x7f0000000300)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x2, 0x4, 0x9, 0x20, 0x1f}, 0x2e, &(0x7f0000000080)={0x5, 0xf, 0x2e, 0x4, [@ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x5, 0xf, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "f3467c0fdd67206c155df2f59eeba69c"}, @wireless={0xb, 0x10, 0x1, 0x8, 0x2c, 0x80, 0x3, 0x4, 0x9}]}, 0x6, [{0x4, &(0x7f00000000c0)=@lang_id={0x4, 0x3, 0x425}}, {0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x860}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x424}}, {0xc1, &(0x7f0000000180)=@string={0xc1, 0x3, "32895dce90d627157085c353d7f94cd861200256946f1e7b957200ebcb7088ebb826877a0b86b0f934dc71ba39550de0d221e0952964ee86319a4fc65c41ea14733f81707695bb54d66124588b78f9d5ef53c1103908a97f54387f55b74b4f4bdd47e9580ca75c0a7f3e13b3af501985fb8394a5736005e605475e5b1f7e0534db2efda6ab352db55fbf8c178bc4440e0f4d799a88ae835e7454d7a0c36dd2ad100d7a4087c45832b2a0afc03e974fbae484ade32af76f8a5990c75d6e589e"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x413}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0xf8ff}}]}) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000380)={{0x12, 0x1, 0x250, 0x0, 0x0, 0x0, 0x40, 0x6cb, 0x73f4, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xff, 0x10, 0x1f, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x2, 0x20, {0x9, 0x21, 0x3, 0x1, 0x1, {0x22, 0x923}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0xe2, 0x7f, 0x8}}}}}]}}]}}, &(0x7f0000000500)={0xa, &(0x7f00000003c0)={0xa, 0x6, 0x250, 0x6, 0x1, 0xff, 0xff, 0x8}, 0x49, &(0x7f0000000400)={0x5, 0xf, 0x49, 0x4, [@ss_container_id={0x14, 0x10, 0x4, 0x6, "9f23610ae8a732975fd3df64dab98795"}, @ssp_cap={0x1c, 0x10, 0xa, 0x4, 0x4, 0x3, 0xf, 0x2, [0xc000, 0xc000, 0x3f30, 0x3f0f]}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x0, 0x4, 0x2, 0x1000}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0xd5, 0xfd, 0x5}]}, 0x2, [{0x26, &(0x7f0000000480)=@string={0x26, 0x3, "cd191471cdbf34933d7231450ccd1f5765f9cfcdbcabc024ad292afcc747ec7e4f04c644"}}, {0x4, &(0x7f00000004c0)=@lang_id={0x4, 0x3, 0x40f}}]}) syz_usb_connect$hid(0x6, 0x36, &(0x7f0000000540)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x8, 0x46d, 0xc52b, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x2, 0xc0, 0xe7, [{{0x9, 0x4, 0x0, 0x8, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x6, 0x7f, 0x1, {0x22, 0xa8f}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0xfa, 0x8f, 0x2}}}}}]}}]}}, &(0x7f0000000880)={0xa, &(0x7f0000000580)={0xa, 0x6, 0x200, 0x80, 0x1f, 0x3, 0x20, 0x3}, 0x7e, &(0x7f00000005c0)={0x5, 0xf, 0x7e, 0x6, [@ptm_cap={0x3}, @ssp_cap={0x10, 0x10, 0xa, 0x1, 0x1, 0x7, 0xf00, 0xa3a, [0xff000f]}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0x9, 0x9, 0xfffe}, @generic={0x42, 0x10, 0x4, "dfa909963b4c4a0a5f93e6fff45ee072e0265d99f99a5467b700c649cb42a77c7eb06c0d601324a9e383b942ef51bc888a1cd17688864ab47fb29ca13dbc07"}, @generic={0x13, 0x10, 0x1, "bfa6bacd313037a66f522459a4efdabd"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0xa3, 0x9, 0x8}]}, 0x4, [{0x4, &(0x7f0000000640)=@lang_id={0x4, 0x3, 0x429}}, {0xb8, &(0x7f0000000680)=@string={0xb8, 0x3, "42705c0d85706ddea3591c3d464f897257f530fb7f333ad5db89ff34e160bd630ad32754ae8d302b4040b733ddd3021c9e0041b51501dc58577d710d7d330a461033ed02f78659b9e6a6d07f525160284581bf9f7b6d74858c3d8fb0294c6d7dac1a859101803450377a0ef39210fb6700f771d15e7b42a9b032f28923b0bc8f38f5c962ae8881b006453fa75001382e5fdd3fa8ebca0c343cf8262a0d4d3bbb66f5724cb55b722d30598bf8562c1ad838f1c92fce2e"}}, {0xee, &(0x7f0000000740)=@string={0xee, 0x3, "fa6e8b74837c661128332dc7a26e58cfb24b28ada9d05c1973d222ba1ff66b18361b559b4b45a9742e86b79717211fc974cb38701973690bea498bba170459c3d0c000c8405f47e5ac1f3975fd438ab062808c46b45c7cd4ee6c6431aff885e241e12f0db4ddccfcedf2320f68bf467ac4c8cc8c42ec72012cb318a13c536c7d7ef62404b87e163944ea949594ba81f14406b251116ecc13257c3ec853daa401e5715097bec00e1d8f60fbd59b5a931d50a9ba8e50b560f531406263c917ce2722c50f8b9b9ece653f1757ffe0b7e4f69dff41f0dcb44992c5e8cf2bd7f343927e85513857734bb918177ce6"}}, {0x4, &(0x7f0000000840)=@lang_id={0x4, 0x3, 0x44e}}]}) sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000c80)={&(0x7f0000000940)={0x318, 0x0, 0x300, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x5c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}]}, @TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'netpci0\x00'}}]}, @TIPC_NLA_SOCK={0x28, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x92a}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}]}]}, @TIPC_NLA_SOCK={0x60, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4a6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7f}, @TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x9}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x10d}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7fff}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_LINK={0x90, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}]}, @TIPC_NLA_LINK={0x70, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc00000}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_SOCK={0x10, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8}]}]}, @TIPC_NLA_SOCK={0x6c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xffff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_CON={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x690}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x20}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xffffffff}]}]}, @TIPC_NLA_BEARER={0x3c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0xee, @private0, 0x7fffffff}}}}]}, @TIPC_NLA_SOCK={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x400}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x6f2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8001}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x400}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7f}]}]}, 0x318}, 0x1, 0x0, 0x0, 0x40}, 0x4010) syz_usb_connect$hid(0x4, 0x36, &(0x7f0000000d00)={{0x12, 0x1, 0x310, 0x0, 0x0, 0x0, 0x10, 0xb05, 0x1854, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x29, 0xa8, 0x1f, [{{0x9, 0x4, 0x0, 0x3, 0x2, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x47, 0xd5, 0x1, {0x22, 0x923}}, {{{0x9, 0x5, 0x81, 0x3, 0x400, 0xa8, 0x4, 0x3}}}}}]}}]}}, &(0x7f0000000ec0)={0xa, &(0x7f0000000d40)={0xa, 0x6, 0x300, 0x5, 0xff, 0x1, 0x8, 0xfd}, 0x4a, &(0x7f0000000d80)={0x5, 0xf, 0x4a, 0x2, [@wireless={0xb, 0x10, 0x1, 0x4, 0x0, 0x7, 0x0, 0x0, 0xee}, @generic={0x3a, 0x10, 0x3, "f7d74a4c8036c1a8b4e26c5188039d025143c138b31e07b7f34097c90a14f7e6c6f47cecb8264afb72d3925a3e22de9a12080b946456e9"}]}, 0x1, [{0xbf, &(0x7f0000000e00)=@string={0xbf, 0x3, "344f23e358bd3547aa247d1bba456d86df0c3afdbeb57a15bc22fb5af6233b32b5f1796f9d049e608cccac50f09b8fbf3f4a085f6ade2f5b9a9503ecdd3f4f53e04773d90693ad568bb9387a3ec6b60987389bee34eb303c91f84966bf524825cc6e86a507b3186ec9bffa6dc614c25ea18fff853b866b6799ad4e3ab9fcd4f2f293e3ce2a4993b8c1ba1e5beaff85e561f0a4d269893b16ea12430112e5c841efb9ab751961c0ba07b6dd448e5e4ad1ff7ed0c575033375d9d6be8aa2"}}]}) syz_open_dev$evdev(&(0x7f0000000f00), 0x6, 0x80000) 23:09:37 executing program 6: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) r0 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f00000000c0)={&(0x7f0000000000), &(0x7f0000000040)=""/76, 0x4c}) 23:09:37 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, 0x0, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:09:37 executing program 1: syz_usb_connect$hid(0x3, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x8, 0x28bd, 0x74, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x51, 0x40, 0x7, [{{0x9, 0x4, 0x0, 0x40, 0x1, 0x3, 0x1, 0x3, 0x2, {0x9, 0x21, 0xaa6b, 0xc6, 0x1, {0x22, 0x3aa}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x1, 0x1, 0x20}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0x0, 0x5, 0x20}}]}}}]}}]}}, &(0x7f0000000300)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x2, 0x4, 0x9, 0x20, 0x1f}, 0x2e, &(0x7f0000000080)={0x5, 0xf, 0x2e, 0x4, [@ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x5, 0xf, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "f3467c0fdd67206c155df2f59eeba69c"}, @wireless={0xb, 0x10, 0x1, 0x8, 0x2c, 0x80, 0x3, 0x4, 0x9}]}, 0x6, [{0x4, &(0x7f00000000c0)=@lang_id={0x4, 0x3, 0x425}}, {0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x860}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x424}}, {0xc1, &(0x7f0000000180)=@string={0xc1, 0x3, "32895dce90d627157085c353d7f94cd861200256946f1e7b957200ebcb7088ebb826877a0b86b0f934dc71ba39550de0d221e0952964ee86319a4fc65c41ea14733f81707695bb54d66124588b78f9d5ef53c1103908a97f54387f55b74b4f4bdd47e9580ca75c0a7f3e13b3af501985fb8394a5736005e605475e5b1f7e0534db2efda6ab352db55fbf8c178bc4440e0f4d799a88ae835e7454d7a0c36dd2ad100d7a4087c45832b2a0afc03e974fbae484ade32af76f8a5990c75d6e589e"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x413}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0xf8ff}}]}) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000380)={{0x12, 0x1, 0x250, 0x0, 0x0, 0x0, 0x40, 0x6cb, 0x73f4, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xff, 0x10, 0x1f, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x2, 0x20, {0x9, 0x21, 0x3, 0x1, 0x1, {0x22, 0x923}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0xe2, 0x7f, 0x8}}}}}]}}]}}, &(0x7f0000000500)={0xa, &(0x7f00000003c0)={0xa, 0x6, 0x250, 0x6, 0x1, 0xff, 0xff, 0x8}, 0x49, &(0x7f0000000400)={0x5, 0xf, 0x49, 0x4, [@ss_container_id={0x14, 0x10, 0x4, 0x6, "9f23610ae8a732975fd3df64dab98795"}, @ssp_cap={0x1c, 0x10, 0xa, 0x4, 0x4, 0x3, 0xf, 0x2, [0xc000, 0xc000, 0x3f30, 0x3f0f]}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x0, 0x4, 0x2, 0x1000}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0xd5, 0xfd, 0x5}]}, 0x2, [{0x26, &(0x7f0000000480)=@string={0x26, 0x3, "cd191471cdbf34933d7231450ccd1f5765f9cfcdbcabc024ad292afcc747ec7e4f04c644"}}, {0x4, &(0x7f00000004c0)=@lang_id={0x4, 0x3, 0x40f}}]}) syz_usb_connect$hid(0x6, 0x36, &(0x7f0000000540)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x8, 0x46d, 0xc52b, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x2, 0xc0, 0xe7, [{{0x9, 0x4, 0x0, 0x8, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x6, 0x7f, 0x1, {0x22, 0xa8f}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0xfa, 0x8f, 0x2}}}}}]}}]}}, &(0x7f0000000880)={0xa, &(0x7f0000000580)={0xa, 0x6, 0x200, 0x80, 0x1f, 0x3, 0x20, 0x3}, 0x7e, &(0x7f00000005c0)={0x5, 0xf, 0x7e, 0x6, [@ptm_cap={0x3}, @ssp_cap={0x10, 0x10, 0xa, 0x1, 0x1, 0x7, 0xf00, 0xa3a, [0xff000f]}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0x9, 0x9, 0xfffe}, @generic={0x42, 0x10, 0x4, "dfa909963b4c4a0a5f93e6fff45ee072e0265d99f99a5467b700c649cb42a77c7eb06c0d601324a9e383b942ef51bc888a1cd17688864ab47fb29ca13dbc07"}, @generic={0x13, 0x10, 0x1, "bfa6bacd313037a66f522459a4efdabd"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0xa3, 0x9, 0x8}]}, 0x4, [{0x4, &(0x7f0000000640)=@lang_id={0x4, 0x3, 0x429}}, {0xb8, &(0x7f0000000680)=@string={0xb8, 0x3, "42705c0d85706ddea3591c3d464f897257f530fb7f333ad5db89ff34e160bd630ad32754ae8d302b4040b733ddd3021c9e0041b51501dc58577d710d7d330a461033ed02f78659b9e6a6d07f525160284581bf9f7b6d74858c3d8fb0294c6d7dac1a859101803450377a0ef39210fb6700f771d15e7b42a9b032f28923b0bc8f38f5c962ae8881b006453fa75001382e5fdd3fa8ebca0c343cf8262a0d4d3bbb66f5724cb55b722d30598bf8562c1ad838f1c92fce2e"}}, {0xee, &(0x7f0000000740)=@string={0xee, 0x3, "fa6e8b74837c661128332dc7a26e58cfb24b28ada9d05c1973d222ba1ff66b18361b559b4b45a9742e86b79717211fc974cb38701973690bea498bba170459c3d0c000c8405f47e5ac1f3975fd438ab062808c46b45c7cd4ee6c6431aff885e241e12f0db4ddccfcedf2320f68bf467ac4c8cc8c42ec72012cb318a13c536c7d7ef62404b87e163944ea949594ba81f14406b251116ecc13257c3ec853daa401e5715097bec00e1d8f60fbd59b5a931d50a9ba8e50b560f531406263c917ce2722c50f8b9b9ece653f1757ffe0b7e4f69dff41f0dcb44992c5e8cf2bd7f343927e85513857734bb918177ce6"}}, {0x4, &(0x7f0000000840)=@lang_id={0x4, 0x3, 0x44e}}]}) sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000c80)={&(0x7f0000000940)={0x318, 0x0, 0x300, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x5c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}]}, @TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'netpci0\x00'}}]}, @TIPC_NLA_SOCK={0x28, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x92a}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}]}]}, @TIPC_NLA_SOCK={0x60, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4a6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7f}, @TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x9}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x10d}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7fff}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_LINK={0x90, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}]}, @TIPC_NLA_LINK={0x70, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc00000}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_SOCK={0x10, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8}]}]}, @TIPC_NLA_SOCK={0x6c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xffff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_CON={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x690}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x20}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xffffffff}]}]}, @TIPC_NLA_BEARER={0x3c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0xee, @private0, 0x7fffffff}}}}]}, @TIPC_NLA_SOCK={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x400}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x6f2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8001}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x400}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7f}]}]}, 0x318}, 0x1, 0x0, 0x0, 0x40}, 0x4010) syz_usb_connect$hid(0x4, 0x36, &(0x7f0000000d00)={{0x12, 0x1, 0x310, 0x0, 0x0, 0x0, 0x10, 0xb05, 0x1854, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x29, 0xa8, 0x1f, [{{0x9, 0x4, 0x0, 0x3, 0x2, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x47, 0xd5, 0x1, {0x22, 0x923}}, {{{0x9, 0x5, 0x81, 0x3, 0x400, 0xa8, 0x4, 0x3}}}}}]}}]}}, &(0x7f0000000ec0)={0xa, &(0x7f0000000d40)={0xa, 0x6, 0x300, 0x5, 0xff, 0x1, 0x8, 0xfd}, 0x4a, &(0x7f0000000d80)={0x5, 0xf, 0x4a, 0x2, [@wireless={0xb, 0x10, 0x1, 0x4, 0x0, 0x7, 0x0, 0x0, 0xee}, @generic={0x3a, 0x10, 0x3, "f7d74a4c8036c1a8b4e26c5188039d025143c138b31e07b7f34097c90a14f7e6c6f47cecb8264afb72d3925a3e22de9a12080b946456e9"}]}, 0x1, [{0xbf, &(0x7f0000000e00)=@string={0xbf, 0x3, "344f23e358bd3547aa247d1bba456d86df0c3afdbeb57a15bc22fb5af6233b32b5f1796f9d049e608cccac50f09b8fbf3f4a085f6ade2f5b9a9503ecdd3f4f53e04773d90693ad568bb9387a3ec6b60987389bee34eb303c91f84966bf524825cc6e86a507b3186ec9bffa6dc614c25ea18fff853b866b6799ad4e3ab9fcd4f2f293e3ce2a4993b8c1ba1e5beaff85e561f0a4d269893b16ea12430112e5c841efb9ab751961c0ba07b6dd448e5e4ad1ff7ed0c575033375d9d6be8aa2"}}]}) syz_open_dev$evdev(&(0x7f0000000f00), 0x6, 0x80000) 23:09:37 executing program 3: syz_usb_connect$hid(0x3, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x8, 0x28bd, 0x74, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x51, 0x40, 0x7, [{{0x9, 0x4, 0x0, 0x40, 0x1, 0x3, 0x1, 0x3, 0x2, {0x9, 0x21, 0xaa6b, 0xc6, 0x1, {0x22, 0x3aa}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x1, 0x1, 0x20}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0x0, 0x5, 0x20}}]}}}]}}]}}, &(0x7f0000000300)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x2, 0x4, 0x9, 0x20, 0x1f}, 0x2e, &(0x7f0000000080)={0x5, 0xf, 0x2e, 0x4, [@ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x5, 0xf, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "f3467c0fdd67206c155df2f59eeba69c"}, @wireless={0xb, 0x10, 0x1, 0x8, 0x2c, 0x80, 0x3, 0x4, 0x9}]}, 0x6, [{0x4, &(0x7f00000000c0)=@lang_id={0x4, 0x3, 0x425}}, {0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x860}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x424}}, {0xc1, &(0x7f0000000180)=@string={0xc1, 0x3, "32895dce90d627157085c353d7f94cd861200256946f1e7b957200ebcb7088ebb826877a0b86b0f934dc71ba39550de0d221e0952964ee86319a4fc65c41ea14733f81707695bb54d66124588b78f9d5ef53c1103908a97f54387f55b74b4f4bdd47e9580ca75c0a7f3e13b3af501985fb8394a5736005e605475e5b1f7e0534db2efda6ab352db55fbf8c178bc4440e0f4d799a88ae835e7454d7a0c36dd2ad100d7a4087c45832b2a0afc03e974fbae484ade32af76f8a5990c75d6e589e"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x413}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0xf8ff}}]}) syz_open_dev$evdev(&(0x7f0000001380), 0x5, 0x0) 23:09:37 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x22840, 0x0) [ 2160.456369] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2160.457311] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2160.461961] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2160.464329] misc raw-gadget: fail, usb_gadget_register_driver returned -16 23:09:37 executing program 6: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x80010, 0xffffffffffffffff, 0x1) [ 2160.515868] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2160.517609] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2160.533274] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2160.534544] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2160.543384] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2160.549701] misc raw-gadget: fail, usb_gadget_register_driver returned -16 23:09:37 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x14b001) r1 = memfd_secret(0x80000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080), r1) sendmsg$TIPC_NL_KEY_SET(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x114, r2, 0x20, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x100, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ID={0xaf, 0x3, "50825105473684290881845d832a9f82cd026ba5befcd20763f9103b99e35c44d9cfe4d914b2bacd919da760c3143cb9be1551fae8b70ecaff8dc10f048ee937a2f39def9a615c75863f1b488bafb56d2d7d64d6510d14a719ca4548ba20305ddfbcc3576a64d301a7c698e2a61e45634732aa8de43b65b947e34479c526bfcb7e35a40a5f0749ab16e501ca9452b8053b4928186abcab5a9c9cf4398a8805bf17d88e7fa83b4434cac7f1"}, @TIPC_NLA_NODE_KEY={0x48, 0x4, {'gcm(aes)\x00', 0x20, "e71484d5420801612f2731821d42e3c366f376de538bced7d8b6ae5817327fe5"}}]}]}, 0x114}, 0x1, 0x0, 0x0, 0xc801}, 0x4040000) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x28, 0x0, 0x10, 0x70bd2c, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @loopback}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x24804) mmap$usbmon(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000002, 0x4000010, r0, 0x100) 23:09:37 executing program 7: openat$sr(0xffffffffffffff9c, 0x0, 0x22840, 0x0) 23:09:47 executing program 6: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x200000c, 0x10, 0xffffffffffffffff, 0x1) 23:09:47 executing program 7: openat$sr(0xffffffffffffff9c, 0x0, 0x22840, 0x0) 23:09:47 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, 0x0, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:09:47 executing program 1: syz_usb_connect$hid(0x3, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x8, 0x28bd, 0x74, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x51, 0x40, 0x7, [{{0x9, 0x4, 0x0, 0x40, 0x1, 0x3, 0x1, 0x3, 0x2, {0x9, 0x21, 0xaa6b, 0xc6, 0x1, {0x22, 0x3aa}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x1, 0x1, 0x20}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0x0, 0x5, 0x20}}]}}}]}}]}}, &(0x7f0000000300)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x2, 0x4, 0x9, 0x20, 0x1f}, 0x2e, &(0x7f0000000080)={0x5, 0xf, 0x2e, 0x4, [@ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x5, 0xf, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "f3467c0fdd67206c155df2f59eeba69c"}, @wireless={0xb, 0x10, 0x1, 0x8, 0x2c, 0x80, 0x3, 0x4, 0x9}]}, 0x6, [{0x4, &(0x7f00000000c0)=@lang_id={0x4, 0x3, 0x425}}, {0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x860}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x424}}, {0xc1, &(0x7f0000000180)=@string={0xc1, 0x3, "32895dce90d627157085c353d7f94cd861200256946f1e7b957200ebcb7088ebb826877a0b86b0f934dc71ba39550de0d221e0952964ee86319a4fc65c41ea14733f81707695bb54d66124588b78f9d5ef53c1103908a97f54387f55b74b4f4bdd47e9580ca75c0a7f3e13b3af501985fb8394a5736005e605475e5b1f7e0534db2efda6ab352db55fbf8c178bc4440e0f4d799a88ae835e7454d7a0c36dd2ad100d7a4087c45832b2a0afc03e974fbae484ade32af76f8a5990c75d6e589e"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x413}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0xf8ff}}]}) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000380)={{0x12, 0x1, 0x250, 0x0, 0x0, 0x0, 0x40, 0x6cb, 0x73f4, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xff, 0x10, 0x1f, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x2, 0x20, {0x9, 0x21, 0x3, 0x1, 0x1, {0x22, 0x923}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0xe2, 0x7f, 0x8}}}}}]}}]}}, &(0x7f0000000500)={0xa, &(0x7f00000003c0)={0xa, 0x6, 0x250, 0x6, 0x1, 0xff, 0xff, 0x8}, 0x49, &(0x7f0000000400)={0x5, 0xf, 0x49, 0x4, [@ss_container_id={0x14, 0x10, 0x4, 0x6, "9f23610ae8a732975fd3df64dab98795"}, @ssp_cap={0x1c, 0x10, 0xa, 0x4, 0x4, 0x3, 0xf, 0x2, [0xc000, 0xc000, 0x3f30, 0x3f0f]}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x0, 0x4, 0x2, 0x1000}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0xd5, 0xfd, 0x5}]}, 0x2, [{0x26, &(0x7f0000000480)=@string={0x26, 0x3, "cd191471cdbf34933d7231450ccd1f5765f9cfcdbcabc024ad292afcc747ec7e4f04c644"}}, {0x4, &(0x7f00000004c0)=@lang_id={0x4, 0x3, 0x40f}}]}) syz_usb_connect$hid(0x6, 0x36, &(0x7f0000000540)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x8, 0x46d, 0xc52b, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x2, 0xc0, 0xe7, [{{0x9, 0x4, 0x0, 0x8, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x6, 0x7f, 0x1, {0x22, 0xa8f}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0xfa, 0x8f, 0x2}}}}}]}}]}}, &(0x7f0000000880)={0xa, &(0x7f0000000580)={0xa, 0x6, 0x200, 0x80, 0x1f, 0x3, 0x20, 0x3}, 0x7e, &(0x7f00000005c0)={0x5, 0xf, 0x7e, 0x6, [@ptm_cap={0x3}, @ssp_cap={0x10, 0x10, 0xa, 0x1, 0x1, 0x7, 0xf00, 0xa3a, [0xff000f]}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0x9, 0x9, 0xfffe}, @generic={0x42, 0x10, 0x4, "dfa909963b4c4a0a5f93e6fff45ee072e0265d99f99a5467b700c649cb42a77c7eb06c0d601324a9e383b942ef51bc888a1cd17688864ab47fb29ca13dbc07"}, @generic={0x13, 0x10, 0x1, "bfa6bacd313037a66f522459a4efdabd"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0xa3, 0x9, 0x8}]}, 0x4, [{0x4, &(0x7f0000000640)=@lang_id={0x4, 0x3, 0x429}}, {0xb8, &(0x7f0000000680)=@string={0xb8, 0x3, "42705c0d85706ddea3591c3d464f897257f530fb7f333ad5db89ff34e160bd630ad32754ae8d302b4040b733ddd3021c9e0041b51501dc58577d710d7d330a461033ed02f78659b9e6a6d07f525160284581bf9f7b6d74858c3d8fb0294c6d7dac1a859101803450377a0ef39210fb6700f771d15e7b42a9b032f28923b0bc8f38f5c962ae8881b006453fa75001382e5fdd3fa8ebca0c343cf8262a0d4d3bbb66f5724cb55b722d30598bf8562c1ad838f1c92fce2e"}}, {0xee, &(0x7f0000000740)=@string={0xee, 0x3, "fa6e8b74837c661128332dc7a26e58cfb24b28ada9d05c1973d222ba1ff66b18361b559b4b45a9742e86b79717211fc974cb38701973690bea498bba170459c3d0c000c8405f47e5ac1f3975fd438ab062808c46b45c7cd4ee6c6431aff885e241e12f0db4ddccfcedf2320f68bf467ac4c8cc8c42ec72012cb318a13c536c7d7ef62404b87e163944ea949594ba81f14406b251116ecc13257c3ec853daa401e5715097bec00e1d8f60fbd59b5a931d50a9ba8e50b560f531406263c917ce2722c50f8b9b9ece653f1757ffe0b7e4f69dff41f0dcb44992c5e8cf2bd7f343927e85513857734bb918177ce6"}}, {0x4, &(0x7f0000000840)=@lang_id={0x4, 0x3, 0x44e}}]}) sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000c80)={&(0x7f0000000940)={0x318, 0x0, 0x300, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x5c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}]}, @TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'netpci0\x00'}}]}, @TIPC_NLA_SOCK={0x28, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x92a}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}]}]}, @TIPC_NLA_SOCK={0x60, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4a6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7f}, @TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x9}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x10d}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7fff}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_LINK={0x90, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}]}, @TIPC_NLA_LINK={0x70, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc00000}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_SOCK={0x10, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8}]}]}, @TIPC_NLA_SOCK={0x6c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xffff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_CON={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x690}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x20}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xffffffff}]}]}, @TIPC_NLA_BEARER={0x3c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0xee, @private0, 0x7fffffff}}}}]}, @TIPC_NLA_SOCK={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x400}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x6f2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8001}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x400}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7f}]}]}, 0x318}, 0x1, 0x0, 0x0, 0x40}, 0x4010) syz_usb_connect$hid(0x4, 0x36, &(0x7f0000000d00)={{0x12, 0x1, 0x310, 0x0, 0x0, 0x0, 0x10, 0xb05, 0x1854, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x29, 0xa8, 0x1f, [{{0x9, 0x4, 0x0, 0x3, 0x2, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x47, 0xd5, 0x1, {0x22, 0x923}}, {{{0x9, 0x5, 0x81, 0x3, 0x400, 0xa8, 0x4, 0x3}}}}}]}}]}}, &(0x7f0000000ec0)={0xa, &(0x7f0000000d40)={0xa, 0x6, 0x300, 0x5, 0xff, 0x1, 0x8, 0xfd}, 0x4a, &(0x7f0000000d80)={0x5, 0xf, 0x4a, 0x2, [@wireless={0xb, 0x10, 0x1, 0x4, 0x0, 0x7, 0x0, 0x0, 0xee}, @generic={0x3a, 0x10, 0x3, "f7d74a4c8036c1a8b4e26c5188039d025143c138b31e07b7f34097c90a14f7e6c6f47cecb8264afb72d3925a3e22de9a12080b946456e9"}]}, 0x1, [{0xbf, &(0x7f0000000e00)=@string={0xbf, 0x3, "344f23e358bd3547aa247d1bba456d86df0c3afdbeb57a15bc22fb5af6233b32b5f1796f9d049e608cccac50f09b8fbf3f4a085f6ade2f5b9a9503ecdd3f4f53e04773d90693ad568bb9387a3ec6b60987389bee34eb303c91f84966bf524825cc6e86a507b3186ec9bffa6dc614c25ea18fff853b866b6799ad4e3ab9fcd4f2f293e3ce2a4993b8c1ba1e5beaff85e561f0a4d269893b16ea12430112e5c841efb9ab751961c0ba07b6dd448e5e4ad1ff7ed0c575033375d9d6be8aa2"}}]}) 23:09:47 executing program 0: syz_usb_connect$hid(0x3, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x8, 0x28bd, 0x74, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x51, 0x40, 0x7, [{{0x9, 0x4, 0x0, 0x40, 0x1, 0x3, 0x1, 0x3, 0x2, {0x9, 0x21, 0xaa6b, 0xc6, 0x1, {0x22, 0x3aa}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x1, 0x1, 0x20}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0x0, 0x5, 0x20}}]}}}]}}]}}, &(0x7f0000000300)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x2, 0x4, 0x9, 0x20, 0x1f}, 0x2e, &(0x7f0000000080)={0x5, 0xf, 0x2e, 0x4, [@ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x5, 0xf, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "f3467c0fdd67206c155df2f59eeba69c"}, @wireless={0xb, 0x10, 0x1, 0x8, 0x2c, 0x80, 0x3, 0x4, 0x9}]}, 0x6, [{0x4, &(0x7f00000000c0)=@lang_id={0x4, 0x3, 0x425}}, {0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x860}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x424}}, {0xc1, &(0x7f0000000180)=@string={0xc1, 0x3, "32895dce90d627157085c353d7f94cd861200256946f1e7b957200ebcb7088ebb826877a0b86b0f934dc71ba39550de0d221e0952964ee86319a4fc65c41ea14733f81707695bb54d66124588b78f9d5ef53c1103908a97f54387f55b74b4f4bdd47e9580ca75c0a7f3e13b3af501985fb8394a5736005e605475e5b1f7e0534db2efda6ab352db55fbf8c178bc4440e0f4d799a88ae835e7454d7a0c36dd2ad100d7a4087c45832b2a0afc03e974fbae484ade32af76f8a5990c75d6e589e"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x413}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0xf8ff}}]}) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000380)={{0x12, 0x1, 0x250, 0x0, 0x0, 0x0, 0x40, 0x6cb, 0x73f4, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xff, 0x10, 0x1f, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x2, 0x20, {0x9, 0x21, 0x3, 0x1, 0x1, {0x22, 0x923}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0xe2, 0x7f, 0x8}}}}}]}}]}}, &(0x7f0000000500)={0xa, &(0x7f00000003c0)={0xa, 0x6, 0x250, 0x6, 0x1, 0xff, 0xff, 0x8}, 0x49, &(0x7f0000000400)={0x5, 0xf, 0x49, 0x4, [@ss_container_id={0x14, 0x10, 0x4, 0x6, "9f23610ae8a732975fd3df64dab98795"}, @ssp_cap={0x1c, 0x10, 0xa, 0x4, 0x4, 0x3, 0xf, 0x2, [0xc000, 0xc000, 0x3f30, 0x3f0f]}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x0, 0x4, 0x2, 0x1000}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0xd5, 0xfd, 0x5}]}, 0x2, [{0x26, &(0x7f0000000480)=@string={0x26, 0x3, "cd191471cdbf34933d7231450ccd1f5765f9cfcdbcabc024ad292afcc747ec7e4f04c644"}}, {0x4, &(0x7f00000004c0)=@lang_id={0x4, 0x3, 0x40f}}]}) syz_usb_connect$hid(0x6, 0x36, &(0x7f0000000540)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x8, 0x46d, 0xc52b, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x2, 0xc0, 0xe7, [{{0x9, 0x4, 0x0, 0x8, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x6, 0x7f, 0x1, {0x22, 0xa8f}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0xfa, 0x8f, 0x2}}}}}]}}]}}, &(0x7f0000000880)={0xa, &(0x7f0000000580)={0xa, 0x6, 0x200, 0x80, 0x1f, 0x3, 0x20, 0x3}, 0x7e, &(0x7f00000005c0)={0x5, 0xf, 0x7e, 0x6, [@ptm_cap={0x3}, @ssp_cap={0x10, 0x10, 0xa, 0x1, 0x1, 0x7, 0xf00, 0xa3a, [0xff000f]}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0x9, 0x9, 0xfffe}, @generic={0x42, 0x10, 0x4, "dfa909963b4c4a0a5f93e6fff45ee072e0265d99f99a5467b700c649cb42a77c7eb06c0d601324a9e383b942ef51bc888a1cd17688864ab47fb29ca13dbc07"}, @generic={0x13, 0x10, 0x1, "bfa6bacd313037a66f522459a4efdabd"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0xa3, 0x9, 0x8}]}, 0x4, [{0x4, &(0x7f0000000640)=@lang_id={0x4, 0x3, 0x429}}, {0xb8, &(0x7f0000000680)=@string={0xb8, 0x3, "42705c0d85706ddea3591c3d464f897257f530fb7f333ad5db89ff34e160bd630ad32754ae8d302b4040b733ddd3021c9e0041b51501dc58577d710d7d330a461033ed02f78659b9e6a6d07f525160284581bf9f7b6d74858c3d8fb0294c6d7dac1a859101803450377a0ef39210fb6700f771d15e7b42a9b032f28923b0bc8f38f5c962ae8881b006453fa75001382e5fdd3fa8ebca0c343cf8262a0d4d3bbb66f5724cb55b722d30598bf8562c1ad838f1c92fce2e"}}, {0xee, &(0x7f0000000740)=@string={0xee, 0x3, "fa6e8b74837c661128332dc7a26e58cfb24b28ada9d05c1973d222ba1ff66b18361b559b4b45a9742e86b79717211fc974cb38701973690bea498bba170459c3d0c000c8405f47e5ac1f3975fd438ab062808c46b45c7cd4ee6c6431aff885e241e12f0db4ddccfcedf2320f68bf467ac4c8cc8c42ec72012cb318a13c536c7d7ef62404b87e163944ea949594ba81f14406b251116ecc13257c3ec853daa401e5715097bec00e1d8f60fbd59b5a931d50a9ba8e50b560f531406263c917ce2722c50f8b9b9ece653f1757ffe0b7e4f69dff41f0dcb44992c5e8cf2bd7f343927e85513857734bb918177ce6"}}, {0x4, &(0x7f0000000840)=@lang_id={0x4, 0x3, 0x44e}}]}) sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000c80)={&(0x7f0000000940)={0x318, 0x0, 0x300, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x5c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}]}, @TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'netpci0\x00'}}]}, @TIPC_NLA_SOCK={0x28, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x92a}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}]}]}, @TIPC_NLA_SOCK={0x60, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4a6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7f}, @TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x9}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x10d}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7fff}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_LINK={0x90, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}]}, @TIPC_NLA_LINK={0x70, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc00000}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_SOCK={0x10, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8}]}]}, @TIPC_NLA_SOCK={0x6c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xffff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_CON={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x690}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x20}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xffffffff}]}]}, @TIPC_NLA_BEARER={0x3c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0xee, @private0, 0x7fffffff}}}}]}, @TIPC_NLA_SOCK={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x400}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x6f2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8001}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x400}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7f}]}]}, 0x318}, 0x1, 0x0, 0x0, 0x40}, 0x4010) syz_usb_connect$hid(0x4, 0x36, &(0x7f0000000d00)={{0x12, 0x1, 0x310, 0x0, 0x0, 0x0, 0x10, 0xb05, 0x1854, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x29, 0xa8, 0x1f, [{{0x9, 0x4, 0x0, 0x3, 0x2, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x47, 0xd5, 0x1, {0x22, 0x923}}, {{{0x9, 0x5, 0x81, 0x3, 0x400, 0xa8, 0x4, 0x3}}}}}]}}]}}, &(0x7f0000000ec0)={0xa, &(0x7f0000000d40)={0xa, 0x6, 0x300, 0x5, 0xff, 0x1, 0x8, 0xfd}, 0x4a, &(0x7f0000000d80)={0x5, 0xf, 0x4a, 0x2, [@wireless={0xb, 0x10, 0x1, 0x4, 0x0, 0x7, 0x0, 0x0, 0xee}, @generic={0x3a, 0x10, 0x3, "f7d74a4c8036c1a8b4e26c5188039d025143c138b31e07b7f34097c90a14f7e6c6f47cecb8264afb72d3925a3e22de9a12080b946456e9"}]}, 0x1, [{0xbf, &(0x7f0000000e00)=@string={0xbf, 0x3, "344f23e358bd3547aa247d1bba456d86df0c3afdbeb57a15bc22fb5af6233b32b5f1796f9d049e608cccac50f09b8fbf3f4a085f6ade2f5b9a9503ecdd3f4f53e04773d90693ad568bb9387a3ec6b60987389bee34eb303c91f84966bf524825cc6e86a507b3186ec9bffa6dc614c25ea18fff853b866b6799ad4e3ab9fcd4f2f293e3ce2a4993b8c1ba1e5beaff85e561f0a4d269893b16ea12430112e5c841efb9ab751961c0ba07b6dd448e5e4ad1ff7ed0c575033375d9d6be8aa2"}}]}) 23:09:47 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x47, {0x47, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf04"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:09:47 executing program 3: syz_open_dev$evdev(&(0x7f0000001380), 0x5, 0x0) 23:09:47 executing program 5: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) ioctl$CDROMREADTOCENTRY(r0, 0x5306, &(0x7f0000000000)={0xbc, 0xb, 0xf, 0x3, @lba=0xfa7}) [ 2170.242842] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2170.247466] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2170.260474] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2170.267575] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2170.271124] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2170.272933] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2170.278133] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2170.282011] misc raw-gadget: fail, usb_gadget_register_driver returned -16 23:09:47 executing program 5: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x1010, 0xffffffffffffffff, 0x0) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) 23:09:47 executing program 6: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x202, 0x0) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x94, 0x0, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x62}, @IPVS_SVC_ATTR_PE_NAME={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff61}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x3ff}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e21}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e21}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x878}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x46}]}, 0x94}, 0x1, 0x0, 0x0, 0x8080}, 0x810) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x1, 0x70bd29, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7fffffff}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xb6}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 23:09:47 executing program 3: syz_open_dev$evdev(0x0, 0x5, 0x0) 23:09:47 executing program 7: openat$sr(0xffffffffffffff9c, 0x0, 0x22840, 0x0) 23:09:47 executing program 5: mmap$usbmon(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x300000a, 0x100010, 0xffffffffffffffff, 0x0) ioctl$MON_IOCX_GET(0xffffffffffffffff, 0x40189206, &(0x7f00000000c0)={&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000040)=""/111, 0x6f}) ioctl$MON_IOCG_STATS(0xffffffffffffffff, 0x80089203, &(0x7f0000000100)) 23:09:47 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00'}) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) sendmsg$NL80211_CMD_SET_REG(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, 0x0, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [@NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1f}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'aa\x00'}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x9}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x9}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}, @NL80211_ATTR_SOCKET_OWNER={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000000}, 0x400c0) 23:09:47 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 23:09:47 executing program 3: syz_open_dev$evdev(0x0, 0x5, 0x0) 23:09:47 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x511440, 0x0) sendmsg$NL80211_CMD_GET_MPATH(r0, &(0x7f0000000140)={&(0x7f0000000080), 0xfffffffffffffe99, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r0, @ANYRESDEC], 0x5c}, 0x1, 0x0, 0x0, 0x24004080}, 0x20005880) 23:09:47 executing program 5: r0 = memfd_secret(0x80000) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000000)={0x81, 0x5, 0x401, 0x1, 0x0, 0x7}) 23:09:57 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x0, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:09:57 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x49, {0x49, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:09:57 executing program 3: syz_open_dev$evdev(0x0, 0x5, 0x0) 23:09:57 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 23:09:57 executing program 6: mmap$usbmon(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3000004, 0x10, 0xffffffffffffffff, 0x4) r0 = accept(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)=0x80) sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x88, 0x0, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffff800}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xea}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x3}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x90}, 0x4000) r1 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r1) syz_genetlink_get_family_id$devlink(&(0x7f00000003c0), r1) sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x68, 0x0, 0x10, 0x70bd28, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x8035, @link='broadcast-link\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x1}, 0x40800) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x760, 0x101000) ioctl$MON_IOCH_MFLUSH(r2, 0x9208, 0x18) 23:09:57 executing program 5: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x5) prctl$PR_SET_PDEATHSIG(0x1, 0x37) 23:09:57 executing program 0: syz_usb_connect$hid(0x3, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x8, 0x28bd, 0x74, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x51, 0x40, 0x7, [{{0x9, 0x4, 0x0, 0x40, 0x1, 0x3, 0x1, 0x3, 0x2, {0x9, 0x21, 0xaa6b, 0xc6, 0x1, {0x22, 0x3aa}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x1, 0x1, 0x20}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0x0, 0x5, 0x20}}]}}}]}}]}}, &(0x7f0000000300)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x2, 0x4, 0x9, 0x20, 0x1f}, 0x2e, &(0x7f0000000080)={0x5, 0xf, 0x2e, 0x4, [@ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x5, 0xf, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "f3467c0fdd67206c155df2f59eeba69c"}, @wireless={0xb, 0x10, 0x1, 0x8, 0x2c, 0x80, 0x3, 0x4, 0x9}]}, 0x6, [{0x4, &(0x7f00000000c0)=@lang_id={0x4, 0x3, 0x425}}, {0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x860}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x424}}, {0xc1, &(0x7f0000000180)=@string={0xc1, 0x3, "32895dce90d627157085c353d7f94cd861200256946f1e7b957200ebcb7088ebb826877a0b86b0f934dc71ba39550de0d221e0952964ee86319a4fc65c41ea14733f81707695bb54d66124588b78f9d5ef53c1103908a97f54387f55b74b4f4bdd47e9580ca75c0a7f3e13b3af501985fb8394a5736005e605475e5b1f7e0534db2efda6ab352db55fbf8c178bc4440e0f4d799a88ae835e7454d7a0c36dd2ad100d7a4087c45832b2a0afc03e974fbae484ade32af76f8a5990c75d6e589e"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x413}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0xf8ff}}]}) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000380)={{0x12, 0x1, 0x250, 0x0, 0x0, 0x0, 0x40, 0x6cb, 0x73f4, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xff, 0x10, 0x1f, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x2, 0x20, {0x9, 0x21, 0x3, 0x1, 0x1, {0x22, 0x923}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0xe2, 0x7f, 0x8}}}}}]}}]}}, &(0x7f0000000500)={0xa, &(0x7f00000003c0)={0xa, 0x6, 0x250, 0x6, 0x1, 0xff, 0xff, 0x8}, 0x49, &(0x7f0000000400)={0x5, 0xf, 0x49, 0x4, [@ss_container_id={0x14, 0x10, 0x4, 0x6, "9f23610ae8a732975fd3df64dab98795"}, @ssp_cap={0x1c, 0x10, 0xa, 0x4, 0x4, 0x3, 0xf, 0x2, [0xc000, 0xc000, 0x3f30, 0x3f0f]}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x0, 0x4, 0x2, 0x1000}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0xd5, 0xfd, 0x5}]}, 0x2, [{0x26, &(0x7f0000000480)=@string={0x26, 0x3, "cd191471cdbf34933d7231450ccd1f5765f9cfcdbcabc024ad292afcc747ec7e4f04c644"}}, {0x4, &(0x7f00000004c0)=@lang_id={0x4, 0x3, 0x40f}}]}) syz_usb_connect$hid(0x6, 0x36, &(0x7f0000000540)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x8, 0x46d, 0xc52b, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x2, 0xc0, 0xe7, [{{0x9, 0x4, 0x0, 0x8, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x6, 0x7f, 0x1, {0x22, 0xa8f}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0xfa, 0x8f, 0x2}}}}}]}}]}}, &(0x7f0000000880)={0xa, &(0x7f0000000580)={0xa, 0x6, 0x200, 0x80, 0x1f, 0x3, 0x20, 0x3}, 0x7e, &(0x7f00000005c0)={0x5, 0xf, 0x7e, 0x6, [@ptm_cap={0x3}, @ssp_cap={0x10, 0x10, 0xa, 0x1, 0x1, 0x7, 0xf00, 0xa3a, [0xff000f]}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0x9, 0x9, 0xfffe}, @generic={0x42, 0x10, 0x4, "dfa909963b4c4a0a5f93e6fff45ee072e0265d99f99a5467b700c649cb42a77c7eb06c0d601324a9e383b942ef51bc888a1cd17688864ab47fb29ca13dbc07"}, @generic={0x13, 0x10, 0x1, "bfa6bacd313037a66f522459a4efdabd"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0xa3, 0x9, 0x8}]}, 0x4, [{0x4, &(0x7f0000000640)=@lang_id={0x4, 0x3, 0x429}}, {0xb8, &(0x7f0000000680)=@string={0xb8, 0x3, "42705c0d85706ddea3591c3d464f897257f530fb7f333ad5db89ff34e160bd630ad32754ae8d302b4040b733ddd3021c9e0041b51501dc58577d710d7d330a461033ed02f78659b9e6a6d07f525160284581bf9f7b6d74858c3d8fb0294c6d7dac1a859101803450377a0ef39210fb6700f771d15e7b42a9b032f28923b0bc8f38f5c962ae8881b006453fa75001382e5fdd3fa8ebca0c343cf8262a0d4d3bbb66f5724cb55b722d30598bf8562c1ad838f1c92fce2e"}}, {0xee, &(0x7f0000000740)=@string={0xee, 0x3, "fa6e8b74837c661128332dc7a26e58cfb24b28ada9d05c1973d222ba1ff66b18361b559b4b45a9742e86b79717211fc974cb38701973690bea498bba170459c3d0c000c8405f47e5ac1f3975fd438ab062808c46b45c7cd4ee6c6431aff885e241e12f0db4ddccfcedf2320f68bf467ac4c8cc8c42ec72012cb318a13c536c7d7ef62404b87e163944ea949594ba81f14406b251116ecc13257c3ec853daa401e5715097bec00e1d8f60fbd59b5a931d50a9ba8e50b560f531406263c917ce2722c50f8b9b9ece653f1757ffe0b7e4f69dff41f0dcb44992c5e8cf2bd7f343927e85513857734bb918177ce6"}}, {0x4, &(0x7f0000000840)=@lang_id={0x4, 0x3, 0x44e}}]}) sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000c80)={&(0x7f0000000940)={0x318, 0x0, 0x300, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x5c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}]}, @TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'netpci0\x00'}}]}, @TIPC_NLA_SOCK={0x28, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x92a}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}]}]}, @TIPC_NLA_SOCK={0x60, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4a6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7f}, @TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x9}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x10d}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7fff}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_LINK={0x90, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}]}, @TIPC_NLA_LINK={0x70, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc00000}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_SOCK={0x10, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8}]}]}, @TIPC_NLA_SOCK={0x6c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xffff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_CON={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x690}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x20}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xffffffff}]}]}, @TIPC_NLA_BEARER={0x3c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0xee, @private0, 0x7fffffff}}}}]}, @TIPC_NLA_SOCK={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x400}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x6f2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8001}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x400}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7f}]}]}, 0x318}, 0x1, 0x0, 0x0, 0x40}, 0x4010) 23:09:57 executing program 1: syz_usb_connect$hid(0x3, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x8, 0x28bd, 0x74, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x51, 0x40, 0x7, [{{0x9, 0x4, 0x0, 0x40, 0x1, 0x3, 0x1, 0x3, 0x2, {0x9, 0x21, 0xaa6b, 0xc6, 0x1, {0x22, 0x3aa}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x1, 0x1, 0x20}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0x0, 0x5, 0x20}}]}}}]}}]}}, &(0x7f0000000300)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x2, 0x4, 0x9, 0x20, 0x1f}, 0x2e, &(0x7f0000000080)={0x5, 0xf, 0x2e, 0x4, [@ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x5, 0xf, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "f3467c0fdd67206c155df2f59eeba69c"}, @wireless={0xb, 0x10, 0x1, 0x8, 0x2c, 0x80, 0x3, 0x4, 0x9}]}, 0x6, [{0x4, &(0x7f00000000c0)=@lang_id={0x4, 0x3, 0x425}}, {0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x860}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x424}}, {0xc1, &(0x7f0000000180)=@string={0xc1, 0x3, "32895dce90d627157085c353d7f94cd861200256946f1e7b957200ebcb7088ebb826877a0b86b0f934dc71ba39550de0d221e0952964ee86319a4fc65c41ea14733f81707695bb54d66124588b78f9d5ef53c1103908a97f54387f55b74b4f4bdd47e9580ca75c0a7f3e13b3af501985fb8394a5736005e605475e5b1f7e0534db2efda6ab352db55fbf8c178bc4440e0f4d799a88ae835e7454d7a0c36dd2ad100d7a4087c45832b2a0afc03e974fbae484ade32af76f8a5990c75d6e589e"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x413}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0xf8ff}}]}) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000380)={{0x12, 0x1, 0x250, 0x0, 0x0, 0x0, 0x40, 0x6cb, 0x73f4, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xff, 0x10, 0x1f, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x2, 0x20, {0x9, 0x21, 0x3, 0x1, 0x1, {0x22, 0x923}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0xe2, 0x7f, 0x8}}}}}]}}]}}, &(0x7f0000000500)={0xa, &(0x7f00000003c0)={0xa, 0x6, 0x250, 0x6, 0x1, 0xff, 0xff, 0x8}, 0x49, &(0x7f0000000400)={0x5, 0xf, 0x49, 0x4, [@ss_container_id={0x14, 0x10, 0x4, 0x6, "9f23610ae8a732975fd3df64dab98795"}, @ssp_cap={0x1c, 0x10, 0xa, 0x4, 0x4, 0x3, 0xf, 0x2, [0xc000, 0xc000, 0x3f30, 0x3f0f]}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x0, 0x4, 0x2, 0x1000}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0xd5, 0xfd, 0x5}]}, 0x2, [{0x26, &(0x7f0000000480)=@string={0x26, 0x3, "cd191471cdbf34933d7231450ccd1f5765f9cfcdbcabc024ad292afcc747ec7e4f04c644"}}, {0x4, &(0x7f00000004c0)=@lang_id={0x4, 0x3, 0x40f}}]}) syz_usb_connect$hid(0x6, 0x36, &(0x7f0000000540)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x8, 0x46d, 0xc52b, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x2, 0xc0, 0xe7, [{{0x9, 0x4, 0x0, 0x8, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x6, 0x7f, 0x1, {0x22, 0xa8f}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0xfa, 0x8f, 0x2}}}}}]}}]}}, &(0x7f0000000880)={0xa, &(0x7f0000000580)={0xa, 0x6, 0x200, 0x80, 0x1f, 0x3, 0x20, 0x3}, 0x7e, &(0x7f00000005c0)={0x5, 0xf, 0x7e, 0x6, [@ptm_cap={0x3}, @ssp_cap={0x10, 0x10, 0xa, 0x1, 0x1, 0x7, 0xf00, 0xa3a, [0xff000f]}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0x9, 0x9, 0xfffe}, @generic={0x42, 0x10, 0x4, "dfa909963b4c4a0a5f93e6fff45ee072e0265d99f99a5467b700c649cb42a77c7eb06c0d601324a9e383b942ef51bc888a1cd17688864ab47fb29ca13dbc07"}, @generic={0x13, 0x10, 0x1, "bfa6bacd313037a66f522459a4efdabd"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0xa3, 0x9, 0x8}]}, 0x4, [{0x4, &(0x7f0000000640)=@lang_id={0x4, 0x3, 0x429}}, {0xb8, &(0x7f0000000680)=@string={0xb8, 0x3, "42705c0d85706ddea3591c3d464f897257f530fb7f333ad5db89ff34e160bd630ad32754ae8d302b4040b733ddd3021c9e0041b51501dc58577d710d7d330a461033ed02f78659b9e6a6d07f525160284581bf9f7b6d74858c3d8fb0294c6d7dac1a859101803450377a0ef39210fb6700f771d15e7b42a9b032f28923b0bc8f38f5c962ae8881b006453fa75001382e5fdd3fa8ebca0c343cf8262a0d4d3bbb66f5724cb55b722d30598bf8562c1ad838f1c92fce2e"}}, {0xee, &(0x7f0000000740)=@string={0xee, 0x3, "fa6e8b74837c661128332dc7a26e58cfb24b28ada9d05c1973d222ba1ff66b18361b559b4b45a9742e86b79717211fc974cb38701973690bea498bba170459c3d0c000c8405f47e5ac1f3975fd438ab062808c46b45c7cd4ee6c6431aff885e241e12f0db4ddccfcedf2320f68bf467ac4c8cc8c42ec72012cb318a13c536c7d7ef62404b87e163944ea949594ba81f14406b251116ecc13257c3ec853daa401e5715097bec00e1d8f60fbd59b5a931d50a9ba8e50b560f531406263c917ce2722c50f8b9b9ece653f1757ffe0b7e4f69dff41f0dcb44992c5e8cf2bd7f343927e85513857734bb918177ce6"}}, {0x4, &(0x7f0000000840)=@lang_id={0x4, 0x3, 0x44e}}]}) sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000c80)={&(0x7f0000000940)={0x318, 0x0, 0x300, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x5c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}]}, @TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'netpci0\x00'}}]}, @TIPC_NLA_SOCK={0x28, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x92a}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}]}]}, @TIPC_NLA_SOCK={0x60, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4a6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7f}, @TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x9}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x10d}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7fff}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_LINK={0x90, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}]}, @TIPC_NLA_LINK={0x70, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc00000}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_SOCK={0x10, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8}]}]}, @TIPC_NLA_SOCK={0x6c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xffff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_CON={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x690}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x20}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xffffffff}]}]}, @TIPC_NLA_BEARER={0x3c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0xee, @private0, 0x7fffffff}}}}]}, @TIPC_NLA_SOCK={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x400}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x6f2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8001}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x400}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7f}]}]}, 0x318}, 0x1, 0x0, 0x0, 0x40}, 0x4010) [ 2179.916111] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2179.922442] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2179.936187] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2179.939276] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2179.940769] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2179.946979] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2179.948334] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2179.951872] misc raw-gadget: fail, usb_gadget_register_driver returned -16 23:09:57 executing program 5: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$MON_IOCT_RING_SIZE(0xffffffffffffffff, 0x9204, 0x5b83e) 23:09:57 executing program 3: syz_open_dev$evdev(&(0x7f0000001380), 0x0, 0x0) 23:09:57 executing program 6: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) mmap$usbmon(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000002, 0x12, 0xffffffffffffffff, 0x7) 23:09:57 executing program 6: r0 = memfd_secret(0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x9, 0x2}}, './file0\x00'}) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f00000000c0)={0x9df, 0x8, 0x79, 0x9, 0x1, 0x1f}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) ioctl$CDROM_MEDIA_CHANGED(r0, 0x5325, 0x1f) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000100)=0x4a) r2 = syz_open_dev$usbmon(&(0x7f0000000000), 0x6, 0x40) ioctl$CDROMREADTOCENTRY(r0, 0x5306, &(0x7f0000000040)={0x7e, 0x1, 0x9, 0x2, @lba=0x353, 0x9}) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x2010, r2, 0x1) 23:09:57 executing program 7: openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 23:09:57 executing program 5: mmap$usbmon(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2, 0x80010, 0xffffffffffffffff, 0x5) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000000)={0xfffffeff, 0x1000, 0xa000, 0x0, 0x1, 0x8}) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, 0x0, 0x20, 0x70bd2c, 0x25dfdbfb, {}, [@FOU_ATTR_LOCAL_V6={0x14, 0x7, @mcast2}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast2}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x20004095) 23:09:57 executing program 3: syz_open_dev$evdev(&(0x7f0000001380), 0x0, 0x0) 23:10:06 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x0, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:10:06 executing program 6: r0 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f00000000c0)=""/126) r1 = socket(0x2a, 0x5, 0x6) accept4(r1, 0x0, &(0x7f0000000000), 0x80800) 23:10:06 executing program 3: syz_open_dev$evdev(&(0x7f0000001380), 0x0, 0x0) 23:10:06 executing program 7: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x5) prctl$PR_SET_PDEATHSIG(0x1, 0x37) 23:10:06 executing program 5: mmap$usbmon(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x100010, 0xffffffffffffffff, 0x0) 23:10:06 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x49, {0x49, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:10:06 executing program 0: syz_usb_connect$hid(0x3, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x8, 0x28bd, 0x74, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x51, 0x40, 0x7, [{{0x9, 0x4, 0x0, 0x40, 0x1, 0x3, 0x1, 0x3, 0x2, {0x9, 0x21, 0xaa6b, 0xc6, 0x1, {0x22, 0x3aa}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x1, 0x1, 0x20}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0x0, 0x5, 0x20}}]}}}]}}]}}, &(0x7f0000000300)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x2, 0x4, 0x9, 0x20, 0x1f}, 0x2e, &(0x7f0000000080)={0x5, 0xf, 0x2e, 0x4, [@ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x5, 0xf, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "f3467c0fdd67206c155df2f59eeba69c"}, @wireless={0xb, 0x10, 0x1, 0x8, 0x2c, 0x80, 0x3, 0x4, 0x9}]}, 0x6, [{0x4, &(0x7f00000000c0)=@lang_id={0x4, 0x3, 0x425}}, {0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x860}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x424}}, {0xc1, &(0x7f0000000180)=@string={0xc1, 0x3, "32895dce90d627157085c353d7f94cd861200256946f1e7b957200ebcb7088ebb826877a0b86b0f934dc71ba39550de0d221e0952964ee86319a4fc65c41ea14733f81707695bb54d66124588b78f9d5ef53c1103908a97f54387f55b74b4f4bdd47e9580ca75c0a7f3e13b3af501985fb8394a5736005e605475e5b1f7e0534db2efda6ab352db55fbf8c178bc4440e0f4d799a88ae835e7454d7a0c36dd2ad100d7a4087c45832b2a0afc03e974fbae484ade32af76f8a5990c75d6e589e"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x413}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0xf8ff}}]}) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000380)={{0x12, 0x1, 0x250, 0x0, 0x0, 0x0, 0x40, 0x6cb, 0x73f4, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xff, 0x10, 0x1f, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x2, 0x20, {0x9, 0x21, 0x3, 0x1, 0x1, {0x22, 0x923}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0xe2, 0x7f, 0x8}}}}}]}}]}}, &(0x7f0000000500)={0xa, &(0x7f00000003c0)={0xa, 0x6, 0x250, 0x6, 0x1, 0xff, 0xff, 0x8}, 0x49, &(0x7f0000000400)={0x5, 0xf, 0x49, 0x4, [@ss_container_id={0x14, 0x10, 0x4, 0x6, "9f23610ae8a732975fd3df64dab98795"}, @ssp_cap={0x1c, 0x10, 0xa, 0x4, 0x4, 0x3, 0xf, 0x2, [0xc000, 0xc000, 0x3f30, 0x3f0f]}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x0, 0x4, 0x2, 0x1000}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0xd5, 0xfd, 0x5}]}, 0x2, [{0x26, &(0x7f0000000480)=@string={0x26, 0x3, "cd191471cdbf34933d7231450ccd1f5765f9cfcdbcabc024ad292afcc747ec7e4f04c644"}}, {0x4, &(0x7f00000004c0)=@lang_id={0x4, 0x3, 0x40f}}]}) syz_usb_connect$hid(0x6, 0x36, &(0x7f0000000540)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x8, 0x46d, 0xc52b, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x2, 0xc0, 0xe7, [{{0x9, 0x4, 0x0, 0x8, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x6, 0x7f, 0x1, {0x22, 0xa8f}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0xfa, 0x8f, 0x2}}}}}]}}]}}, &(0x7f0000000880)={0xa, &(0x7f0000000580)={0xa, 0x6, 0x200, 0x80, 0x1f, 0x3, 0x20, 0x3}, 0x7e, &(0x7f00000005c0)={0x5, 0xf, 0x7e, 0x6, [@ptm_cap={0x3}, @ssp_cap={0x10, 0x10, 0xa, 0x1, 0x1, 0x7, 0xf00, 0xa3a, [0xff000f]}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0x9, 0x9, 0xfffe}, @generic={0x42, 0x10, 0x4, "dfa909963b4c4a0a5f93e6fff45ee072e0265d99f99a5467b700c649cb42a77c7eb06c0d601324a9e383b942ef51bc888a1cd17688864ab47fb29ca13dbc07"}, @generic={0x13, 0x10, 0x1, "bfa6bacd313037a66f522459a4efdabd"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0xa3, 0x9, 0x8}]}, 0x4, [{0x4, &(0x7f0000000640)=@lang_id={0x4, 0x3, 0x429}}, {0xb8, &(0x7f0000000680)=@string={0xb8, 0x3, "42705c0d85706ddea3591c3d464f897257f530fb7f333ad5db89ff34e160bd630ad32754ae8d302b4040b733ddd3021c9e0041b51501dc58577d710d7d330a461033ed02f78659b9e6a6d07f525160284581bf9f7b6d74858c3d8fb0294c6d7dac1a859101803450377a0ef39210fb6700f771d15e7b42a9b032f28923b0bc8f38f5c962ae8881b006453fa75001382e5fdd3fa8ebca0c343cf8262a0d4d3bbb66f5724cb55b722d30598bf8562c1ad838f1c92fce2e"}}, {0xee, &(0x7f0000000740)=@string={0xee, 0x3, "fa6e8b74837c661128332dc7a26e58cfb24b28ada9d05c1973d222ba1ff66b18361b559b4b45a9742e86b79717211fc974cb38701973690bea498bba170459c3d0c000c8405f47e5ac1f3975fd438ab062808c46b45c7cd4ee6c6431aff885e241e12f0db4ddccfcedf2320f68bf467ac4c8cc8c42ec72012cb318a13c536c7d7ef62404b87e163944ea949594ba81f14406b251116ecc13257c3ec853daa401e5715097bec00e1d8f60fbd59b5a931d50a9ba8e50b560f531406263c917ce2722c50f8b9b9ece653f1757ffe0b7e4f69dff41f0dcb44992c5e8cf2bd7f343927e85513857734bb918177ce6"}}, {0x4, &(0x7f0000000840)=@lang_id={0x4, 0x3, 0x44e}}]}) 23:10:06 executing program 5: r0 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) read$usbmon(r0, &(0x7f0000000000)=""/252, 0xfc) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:10:06 executing program 1: syz_usb_connect$hid(0x3, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x8, 0x28bd, 0x74, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x51, 0x40, 0x7, [{{0x9, 0x4, 0x0, 0x40, 0x1, 0x3, 0x1, 0x3, 0x2, {0x9, 0x21, 0xaa6b, 0xc6, 0x1, {0x22, 0x3aa}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x1, 0x1, 0x20}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0x0, 0x5, 0x20}}]}}}]}}]}}, &(0x7f0000000300)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x2, 0x4, 0x9, 0x20, 0x1f}, 0x2e, &(0x7f0000000080)={0x5, 0xf, 0x2e, 0x4, [@ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x5, 0xf, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "f3467c0fdd67206c155df2f59eeba69c"}, @wireless={0xb, 0x10, 0x1, 0x8, 0x2c, 0x80, 0x3, 0x4, 0x9}]}, 0x6, [{0x4, &(0x7f00000000c0)=@lang_id={0x4, 0x3, 0x425}}, {0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x860}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x424}}, {0xc1, &(0x7f0000000180)=@string={0xc1, 0x3, "32895dce90d627157085c353d7f94cd861200256946f1e7b957200ebcb7088ebb826877a0b86b0f934dc71ba39550de0d221e0952964ee86319a4fc65c41ea14733f81707695bb54d66124588b78f9d5ef53c1103908a97f54387f55b74b4f4bdd47e9580ca75c0a7f3e13b3af501985fb8394a5736005e605475e5b1f7e0534db2efda6ab352db55fbf8c178bc4440e0f4d799a88ae835e7454d7a0c36dd2ad100d7a4087c45832b2a0afc03e974fbae484ade32af76f8a5990c75d6e589e"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x413}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0xf8ff}}]}) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000380)={{0x12, 0x1, 0x250, 0x0, 0x0, 0x0, 0x40, 0x6cb, 0x73f4, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xff, 0x10, 0x1f, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x2, 0x20, {0x9, 0x21, 0x3, 0x1, 0x1, {0x22, 0x923}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0xe2, 0x7f, 0x8}}}}}]}}]}}, &(0x7f0000000500)={0xa, &(0x7f00000003c0)={0xa, 0x6, 0x250, 0x6, 0x1, 0xff, 0xff, 0x8}, 0x49, &(0x7f0000000400)={0x5, 0xf, 0x49, 0x4, [@ss_container_id={0x14, 0x10, 0x4, 0x6, "9f23610ae8a732975fd3df64dab98795"}, @ssp_cap={0x1c, 0x10, 0xa, 0x4, 0x4, 0x3, 0xf, 0x2, [0xc000, 0xc000, 0x3f30, 0x3f0f]}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x0, 0x4, 0x2, 0x1000}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0xd5, 0xfd, 0x5}]}, 0x2, [{0x26, &(0x7f0000000480)=@string={0x26, 0x3, "cd191471cdbf34933d7231450ccd1f5765f9cfcdbcabc024ad292afcc747ec7e4f04c644"}}, {0x4, &(0x7f00000004c0)=@lang_id={0x4, 0x3, 0x40f}}]}) sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000c80)={&(0x7f0000000940)={0x318, 0x0, 0x300, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x5c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}]}, @TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'netpci0\x00'}}]}, @TIPC_NLA_SOCK={0x28, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x92a}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}]}]}, @TIPC_NLA_SOCK={0x60, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4a6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7f}, @TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x9}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x10d}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7fff}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_LINK={0x90, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}]}, @TIPC_NLA_LINK={0x70, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc00000}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_SOCK={0x10, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8}]}]}, @TIPC_NLA_SOCK={0x6c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xffff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_CON={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x690}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x20}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xffffffff}]}]}, @TIPC_NLA_BEARER={0x3c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0xee, @private0, 0x7fffffff}}}}]}, @TIPC_NLA_SOCK={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x400}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x6f2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8001}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x400}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7f}]}]}, 0x318}, 0x1, 0x0, 0x0, 0x40}, 0x4010) [ 2188.941001] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2188.943494] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2188.947524] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2188.948847] misc raw-gadget: fail, usb_gadget_register_driver returned -16 23:10:06 executing program 3: r0 = memfd_secret(0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x9, 0x2}}, './file0\x00'}) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f00000000c0)={0x9df, 0x8, 0x79, 0x9, 0x1, 0x1f}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) ioctl$CDROM_MEDIA_CHANGED(r0, 0x5325, 0x1f) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000100)=0x4a) r2 = syz_open_dev$usbmon(&(0x7f0000000000), 0x6, 0x40) ioctl$CDROMREADTOCENTRY(r0, 0x5306, &(0x7f0000000040)={0x7e, 0x1, 0x9, 0x2, @lba=0x353, 0x9}) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x2010, r2, 0x1) [ 2189.017490] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy 23:10:06 executing program 5: mmap$usbmon(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x30, 0xffffffffffffffff, 0x0) ioctl$MON_IOCX_MFETCH(0xffffffffffffffff, 0xc0109207, &(0x7f0000000040)={&(0x7f0000000000)=[0x0, 0x0], 0x2, 0x8}) [ 2189.040651] misc raw-gadget: fail, usb_gadget_register_driver returned -16 23:10:06 executing program 7: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x5) prctl$PR_SET_PDEATHSIG(0x1, 0x37) [ 2189.057296] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2189.070670] misc raw-gadget: fail, usb_gadget_register_driver returned -16 23:10:06 executing program 5: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x629e}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x1}, @BATADV_ATTR_GW_MODE={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x80}, 0x44800) 23:10:06 executing program 6: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) r0 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) read$usbmon(r0, &(0x7f0000000180)=""/1, 0x1) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x88, 0x0, 0x300, 0x70bd29, 0x25dfdbff, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x200}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x7]}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x9, 0xffffffc0, 0x3, 0x0, 0x3]}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x9}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x4, 0xd0a9]}, @SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}]}, 0x88}, 0x1, 0x0, 0x0, 0x20000000}, 0x4051) 23:10:06 executing program 7: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x5) prctl$PR_SET_PDEATHSIG(0x1, 0x37) 23:10:06 executing program 3: r0 = memfd_secret(0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x9, 0x2}}, './file0\x00'}) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f00000000c0)={0x9df, 0x8, 0x79, 0x9, 0x1, 0x1f}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) ioctl$CDROM_MEDIA_CHANGED(r0, 0x5325, 0x1f) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000100)=0x4a) r2 = syz_open_dev$usbmon(&(0x7f0000000000), 0x6, 0x40) ioctl$CDROMREADTOCENTRY(r0, 0x5306, &(0x7f0000000040)={0x7e, 0x1, 0x9, 0x2, @lba=0x353, 0x9}) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x2010, r2, 0x1) 23:10:15 executing program 1: syz_usb_connect$hid(0x3, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x8, 0x28bd, 0x74, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x51, 0x40, 0x7, [{{0x9, 0x4, 0x0, 0x40, 0x1, 0x3, 0x1, 0x3, 0x2, {0x9, 0x21, 0xaa6b, 0xc6, 0x1, {0x22, 0x3aa}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x1, 0x1, 0x20}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0x0, 0x5, 0x20}}]}}}]}}]}}, &(0x7f0000000300)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x2, 0x4, 0x9, 0x20, 0x1f}, 0x2e, &(0x7f0000000080)={0x5, 0xf, 0x2e, 0x4, [@ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x5, 0xf, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "f3467c0fdd67206c155df2f59eeba69c"}, @wireless={0xb, 0x10, 0x1, 0x8, 0x2c, 0x80, 0x3, 0x4, 0x9}]}, 0x6, [{0x4, &(0x7f00000000c0)=@lang_id={0x4, 0x3, 0x425}}, {0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x860}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x424}}, {0xc1, &(0x7f0000000180)=@string={0xc1, 0x3, "32895dce90d627157085c353d7f94cd861200256946f1e7b957200ebcb7088ebb826877a0b86b0f934dc71ba39550de0d221e0952964ee86319a4fc65c41ea14733f81707695bb54d66124588b78f9d5ef53c1103908a97f54387f55b74b4f4bdd47e9580ca75c0a7f3e13b3af501985fb8394a5736005e605475e5b1f7e0534db2efda6ab352db55fbf8c178bc4440e0f4d799a88ae835e7454d7a0c36dd2ad100d7a4087c45832b2a0afc03e974fbae484ade32af76f8a5990c75d6e589e"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x413}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0xf8ff}}]}) sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000c80)={&(0x7f0000000940)={0x318, 0x0, 0x300, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x5c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}]}, @TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'netpci0\x00'}}]}, @TIPC_NLA_SOCK={0x28, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x92a}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}]}]}, @TIPC_NLA_SOCK={0x60, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4a6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7f}, @TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x9}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x10d}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7fff}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_LINK={0x90, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}]}, @TIPC_NLA_LINK={0x70, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc00000}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_SOCK={0x10, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8}]}]}, @TIPC_NLA_SOCK={0x6c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xffff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_CON={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x690}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x20}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xffffffff}]}]}, @TIPC_NLA_BEARER={0x3c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0xee, @private0, 0x7fffffff}}}}]}, @TIPC_NLA_SOCK={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x400}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x6f2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8001}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x400}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7f}]}]}, 0x318}, 0x1, 0x0, 0x0, 0x40}, 0x4010) 23:10:15 executing program 5: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) ioctl$MON_IOCQ_URB_LEN(r0, 0x9201) 23:10:15 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x0, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:10:15 executing program 3: r0 = memfd_secret(0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x9, 0x2}}, './file0\x00'}) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f00000000c0)={0x9df, 0x8, 0x79, 0x9, 0x1, 0x1f}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) ioctl$CDROM_MEDIA_CHANGED(r0, 0x5325, 0x1f) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000100)=0x4a) r2 = syz_open_dev$usbmon(&(0x7f0000000000), 0x6, 0x40) ioctl$CDROMREADTOCENTRY(r0, 0x5306, &(0x7f0000000040)={0x7e, 0x1, 0x9, 0x2, @lba=0x353, 0x9}) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x2010, r2, 0x1) 23:10:15 executing program 0: syz_usb_connect$hid(0x3, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x8, 0x28bd, 0x74, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x51, 0x40, 0x7, [{{0x9, 0x4, 0x0, 0x40, 0x1, 0x3, 0x1, 0x3, 0x2, {0x9, 0x21, 0xaa6b, 0xc6, 0x1, {0x22, 0x3aa}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x1, 0x1, 0x20}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0x0, 0x5, 0x20}}]}}}]}}]}}, &(0x7f0000000300)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x2, 0x4, 0x9, 0x20, 0x1f}, 0x2e, &(0x7f0000000080)={0x5, 0xf, 0x2e, 0x4, [@ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x5, 0xf, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "f3467c0fdd67206c155df2f59eeba69c"}, @wireless={0xb, 0x10, 0x1, 0x8, 0x2c, 0x80, 0x3, 0x4, 0x9}]}, 0x6, [{0x4, &(0x7f00000000c0)=@lang_id={0x4, 0x3, 0x425}}, {0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x860}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x424}}, {0xc1, &(0x7f0000000180)=@string={0xc1, 0x3, "32895dce90d627157085c353d7f94cd861200256946f1e7b957200ebcb7088ebb826877a0b86b0f934dc71ba39550de0d221e0952964ee86319a4fc65c41ea14733f81707695bb54d66124588b78f9d5ef53c1103908a97f54387f55b74b4f4bdd47e9580ca75c0a7f3e13b3af501985fb8394a5736005e605475e5b1f7e0534db2efda6ab352db55fbf8c178bc4440e0f4d799a88ae835e7454d7a0c36dd2ad100d7a4087c45832b2a0afc03e974fbae484ade32af76f8a5990c75d6e589e"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x413}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0xf8ff}}]}) syz_usb_connect$hid(0x6, 0x36, &(0x7f0000000540)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x8, 0x46d, 0xc52b, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x2, 0xc0, 0xe7, [{{0x9, 0x4, 0x0, 0x8, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x6, 0x7f, 0x1, {0x22, 0xa8f}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0xfa, 0x8f, 0x2}}}}}]}}]}}, &(0x7f0000000880)={0xa, &(0x7f0000000580)={0xa, 0x6, 0x200, 0x80, 0x1f, 0x3, 0x20, 0x3}, 0x7e, &(0x7f00000005c0)={0x5, 0xf, 0x7e, 0x6, [@ptm_cap={0x3}, @ssp_cap={0x10, 0x10, 0xa, 0x1, 0x1, 0x7, 0xf00, 0xa3a, [0xff000f]}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0x9, 0x9, 0xfffe}, @generic={0x42, 0x10, 0x4, "dfa909963b4c4a0a5f93e6fff45ee072e0265d99f99a5467b700c649cb42a77c7eb06c0d601324a9e383b942ef51bc888a1cd17688864ab47fb29ca13dbc07"}, @generic={0x13, 0x10, 0x1, "bfa6bacd313037a66f522459a4efdabd"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0xa3, 0x9, 0x8}]}, 0x4, [{0x4, &(0x7f0000000640)=@lang_id={0x4, 0x3, 0x429}}, {0xb8, &(0x7f0000000680)=@string={0xb8, 0x3, "42705c0d85706ddea3591c3d464f897257f530fb7f333ad5db89ff34e160bd630ad32754ae8d302b4040b733ddd3021c9e0041b51501dc58577d710d7d330a461033ed02f78659b9e6a6d07f525160284581bf9f7b6d74858c3d8fb0294c6d7dac1a859101803450377a0ef39210fb6700f771d15e7b42a9b032f28923b0bc8f38f5c962ae8881b006453fa75001382e5fdd3fa8ebca0c343cf8262a0d4d3bbb66f5724cb55b722d30598bf8562c1ad838f1c92fce2e"}}, {0xee, &(0x7f0000000740)=@string={0xee, 0x3, "fa6e8b74837c661128332dc7a26e58cfb24b28ada9d05c1973d222ba1ff66b18361b559b4b45a9742e86b79717211fc974cb38701973690bea498bba170459c3d0c000c8405f47e5ac1f3975fd438ab062808c46b45c7cd4ee6c6431aff885e241e12f0db4ddccfcedf2320f68bf467ac4c8cc8c42ec72012cb318a13c536c7d7ef62404b87e163944ea949594ba81f14406b251116ecc13257c3ec853daa401e5715097bec00e1d8f60fbd59b5a931d50a9ba8e50b560f531406263c917ce2722c50f8b9b9ece653f1757ffe0b7e4f69dff41f0dcb44992c5e8cf2bd7f343927e85513857734bb918177ce6"}}, {0x4, &(0x7f0000000840)=@lang_id={0x4, 0x3, 0x44e}}]}) 23:10:15 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x49, {0x49, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:10:15 executing program 7: prctl$PR_SET_PDEATHSIG(0x1, 0x37) 23:10:15 executing program 6: syz_open_dev$usbmon(&(0x7f0000000040), 0x7, 0x101101) r0 = memfd_secret(0x0) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000100)) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) mmap$usbmon(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x200000a, 0x810, r0, 0x6) ioctl$MON_IOCX_GET(0xffffffffffffffff, 0x40189206, &(0x7f0000000000)={&(0x7f00000000c0), &(0x7f0000000200)=""/87, 0x57}) r1 = syz_open_dev$usbmon(&(0x7f0000000080), 0x4, 0x10000) ioctl$MON_IOCQ_RING_SIZE(r1, 0x9205) r2 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), r2) 23:10:15 executing program 7: prctl$PR_SET_PDEATHSIG(0x1, 0x0) [ 2197.860719] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy 23:10:15 executing program 5: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) read$usbmon(0xffffffffffffffff, &(0x7f0000000000)=""/114, 0x72) [ 2197.870959] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2197.881679] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2197.883781] misc raw-gadget: fail, usb_gadget_register_driver returned -16 23:10:15 executing program 3: r0 = memfd_secret(0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x9, 0x2}}, './file0\x00'}) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f00000000c0)={0x9df, 0x8, 0x79, 0x9, 0x1, 0x1f}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) ioctl$CDROM_MEDIA_CHANGED(r0, 0x5325, 0x1f) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000100)=0x4a) syz_open_dev$usbmon(&(0x7f0000000000), 0x6, 0x40) ioctl$CDROMREADTOCENTRY(r0, 0x5306, &(0x7f0000000040)={0x7e, 0x1, 0x9, 0x2, @lba=0x353, 0x9}) 23:10:15 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x3599, 0x63, 0x9, 0xffff}, {0x0, 0x20, 0x6}]}) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:10:15 executing program 7: mmap$usbmon(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x30, 0xffffffffffffffff, 0x0) ioctl$MON_IOCX_MFETCH(0xffffffffffffffff, 0xc0109207, &(0x7f0000000040)={&(0x7f0000000000)=[0x0, 0x0], 0x2, 0x8}) 23:10:15 executing program 6: ioctl$PTP_SYS_OFFSET_EXTENDED(0xffffffffffffffff, 0xc4c03d09, &(0x7f0000000000)={0xf}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000004c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1, 0x8001}}, './file0\x00'}) ioctl$PTP_PEROUT_REQUEST(r0, 0x40383d03, &(0x7f0000000500)={{0x9, 0x4}, {0x8, 0x8}}) ioctl$CDROMEJECT(r0, 0x5309) 23:10:25 executing program 7: mmap$usbmon(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x30, 0xffffffffffffffff, 0x0) ioctl$MON_IOCX_MFETCH(0xffffffffffffffff, 0xc0109207, &(0x7f0000000040)={&(0x7f0000000000)=[0x0, 0x0], 0x2, 0x8}) 23:10:25 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:10:25 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4a, {0x4a, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:10:25 executing program 5: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000004c0)={&(0x7f0000000540)={0x380, r0, 0x1, 0x70bd28, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_DEVKEY={0x120, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_ID={0x8c, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_IMPLICIT={0x18, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa3}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0x100}}]}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0xff}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x40, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa0}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x1}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x2}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0102}}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa1}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6}]}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x2}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x9}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x8}]}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0x1}, @NL802154_DEVKEY_ATTR_ID={0x20, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0xfffffffd}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc}]}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc, 0x2, {0xaaaaaaaaaaaa0002}}, @NL802154_DEVKEY_ATTR_ID={0x3c, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_IMPLICIT={0x1c, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x1}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa3}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x1}]}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x40}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x2}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x3}]}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc, 0x2, {0x200}}, @NL802154_DEVKEY_ATTR_ID={0xc, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x1}]}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0x7}]}, @NL802154_ATTR_SEC_DEVKEY={0x208, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_ID={0x90, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x124b0880}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0xffff}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x24, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x2}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0xffff}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa3}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x1}]}, @NL802154_KEY_ID_ATTR_MODE={0x8}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x2c, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x2}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0x2cd87f6777557fd4}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x2}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6}]}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x5}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x7fffffff}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x2}]}, @NL802154_DEVKEY_ATTR_ID={0x74, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x7}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x2}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x9}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0xffff}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x40, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa2}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x2}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa0}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0302}}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0xffff}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x3}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x1}]}]}, @NL802154_DEVKEY_ATTR_ID={0x70, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x7}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x7}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x38, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0002}}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x3}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa1}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0xffff}]}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x4}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x2}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x1}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x4}]}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0x800}, @NL802154_DEVKEY_ATTR_ID={0x18, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x9}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x8001}]}, @NL802154_DEVKEY_ATTR_ID={0x18, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_IMPLICIT={0xc, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa1}]}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x3}]}, @NL802154_DEVKEY_ATTR_ID={0x34, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x3}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x2}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x18, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0102}}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x2}]}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x4}]}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0x1}, @NL802154_DEVKEY_ATTR_ID={0x14, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0x3ff}]}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r2}]}, 0x380}, 0x1, 0x0, 0x0, 0x40004}, 0x84) syz_genetlink_get_family_id$tipc(&(0x7f0000000000), 0xffffffffffffffff) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:10:25 executing program 3: r0 = memfd_secret(0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x9, 0x2}}, './file0\x00'}) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f00000000c0)={0x9df, 0x8, 0x79, 0x9, 0x1, 0x1f}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) ioctl$CDROM_MEDIA_CHANGED(r0, 0x5325, 0x1f) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000100)=0x4a) syz_open_dev$usbmon(&(0x7f0000000000), 0x6, 0x40) 23:10:25 executing program 6: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) ioctl$MON_IOCT_RING_SIZE(0xffffffffffffffff, 0x9204, 0xeb61b) 23:10:25 executing program 1: sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000c80)={&(0x7f0000000940)={0x318, 0x0, 0x300, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x5c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}]}, @TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'netpci0\x00'}}]}, @TIPC_NLA_SOCK={0x28, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x92a}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}]}]}, @TIPC_NLA_SOCK={0x60, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4a6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7f}, @TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x9}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x10d}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7fff}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_LINK={0x90, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}]}, @TIPC_NLA_LINK={0x70, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc00000}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_SOCK={0x10, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8}]}]}, @TIPC_NLA_SOCK={0x6c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xffff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_CON={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x690}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x20}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xffffffff}]}]}, @TIPC_NLA_BEARER={0x3c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0xee, @private0, 0x7fffffff}}}}]}, @TIPC_NLA_SOCK={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x400}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x6f2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8001}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x400}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7f}]}]}, 0x318}, 0x1, 0x0, 0x0, 0x40}, 0x4010) 23:10:25 executing program 0: syz_usb_connect$hid(0x6, 0x36, &(0x7f0000000540)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x8, 0x46d, 0xc52b, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x2, 0xc0, 0xe7, [{{0x9, 0x4, 0x0, 0x8, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x6, 0x7f, 0x1, {0x22, 0xa8f}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0xfa, 0x8f, 0x2}}}}}]}}]}}, &(0x7f0000000880)={0xa, &(0x7f0000000580)={0xa, 0x6, 0x200, 0x80, 0x1f, 0x3, 0x20, 0x3}, 0x7e, &(0x7f00000005c0)={0x5, 0xf, 0x7e, 0x6, [@ptm_cap={0x3}, @ssp_cap={0x10, 0x10, 0xa, 0x1, 0x1, 0x7, 0xf00, 0xa3a, [0xff000f]}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0x9, 0x9, 0xfffe}, @generic={0x42, 0x10, 0x4, "dfa909963b4c4a0a5f93e6fff45ee072e0265d99f99a5467b700c649cb42a77c7eb06c0d601324a9e383b942ef51bc888a1cd17688864ab47fb29ca13dbc07"}, @generic={0x13, 0x10, 0x1, "bfa6bacd313037a66f522459a4efdabd"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0xa3, 0x9, 0x8}]}, 0x4, [{0x4, &(0x7f0000000640)=@lang_id={0x4, 0x3, 0x429}}, {0xb8, &(0x7f0000000680)=@string={0xb8, 0x3, "42705c0d85706ddea3591c3d464f897257f530fb7f333ad5db89ff34e160bd630ad32754ae8d302b4040b733ddd3021c9e0041b51501dc58577d710d7d330a461033ed02f78659b9e6a6d07f525160284581bf9f7b6d74858c3d8fb0294c6d7dac1a859101803450377a0ef39210fb6700f771d15e7b42a9b032f28923b0bc8f38f5c962ae8881b006453fa75001382e5fdd3fa8ebca0c343cf8262a0d4d3bbb66f5724cb55b722d30598bf8562c1ad838f1c92fce2e"}}, {0xee, &(0x7f0000000740)=@string={0xee, 0x3, "fa6e8b74837c661128332dc7a26e58cfb24b28ada9d05c1973d222ba1ff66b18361b559b4b45a9742e86b79717211fc974cb38701973690bea498bba170459c3d0c000c8405f47e5ac1f3975fd438ab062808c46b45c7cd4ee6c6431aff885e241e12f0db4ddccfcedf2320f68bf467ac4c8cc8c42ec72012cb318a13c536c7d7ef62404b87e163944ea949594ba81f14406b251116ecc13257c3ec853daa401e5715097bec00e1d8f60fbd59b5a931d50a9ba8e50b560f531406263c917ce2722c50f8b9b9ece653f1757ffe0b7e4f69dff41f0dcb44992c5e8cf2bd7f343927e85513857734bb918177ce6"}}, {0x4, &(0x7f0000000840)=@lang_id={0x4, 0x3, 0x44e}}]}) 23:10:25 executing program 6: syz_genetlink_get_family_id$tipc(&(0x7f0000000000), 0xffffffffffffffff) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) 23:10:25 executing program 1: sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, 0x0, 0x4010) 23:10:25 executing program 7: mmap$usbmon(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x30, 0xffffffffffffffff, 0x0) ioctl$MON_IOCX_MFETCH(0xffffffffffffffff, 0xc0109207, &(0x7f0000000040)={&(0x7f0000000000)=[0x0, 0x0], 0x2, 0x8}) 23:10:25 executing program 3: r0 = memfd_secret(0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x9, 0x2}}, './file0\x00'}) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f00000000c0)={0x9df, 0x8, 0x79, 0x9, 0x1, 0x1f}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) ioctl$CDROM_MEDIA_CHANGED(r0, 0x5325, 0x1f) syz_open_dev$usbmon(&(0x7f0000000000), 0x6, 0x40) 23:10:25 executing program 1: sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, 0x0, 0x0) 23:10:25 executing program 7: mmap$usbmon(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x30, 0xffffffffffffffff, 0x0) 23:10:25 executing program 5: syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) r0 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x1ff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) sendmsg$ETHTOOL_MSG_FEATURES_SET(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000940)={0x1078, r2, 0x20, 0x70bd2b, 0x25dfdbff, {}, [@ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}, @ETHTOOL_A_FEATURES_WANTED={0x1058, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x5, 0x5, "9f"}, @ETHTOOL_A_BITSET_VALUE={0x32, 0x4, "dec2a458f5e9dd9dfc31367810e4edc182da8b1e2563661c1c4ed7a99a31ad1bd077b2b083174785afad5be6e691"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x7f}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x9}, @ETHTOOL_A_BITSET_VALUE={0x1004, 0x4, "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"}]}]}, 0x1078}, 0x1, 0x0, 0x0, 0x4000}, 0x1) 23:10:25 executing program 3: r0 = memfd_secret(0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x9, 0x2}}, './file0\x00'}) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f00000000c0)={0x9df, 0x8, 0x79, 0x9, 0x1, 0x1f}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) syz_open_dev$usbmon(&(0x7f0000000000), 0x6, 0x40) 23:10:25 executing program 1: syz_usb_connect$hid(0x3, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x8, 0x28bd, 0x74, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x51, 0x40, 0x7, [{{0x9, 0x4, 0x0, 0x40, 0x1, 0x3, 0x1, 0x3, 0x2, {0x9, 0x21, 0xaa6b, 0xc6, 0x1, {0x22, 0x3aa}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x1, 0x1, 0x20}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0x0, 0x5, 0x20}}]}}}]}}]}}, &(0x7f0000000300)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x2, 0x4, 0x9, 0x20, 0x1f}, 0x2e, &(0x7f0000000080)={0x5, 0xf, 0x2e, 0x4, [@ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x5, 0xf, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "f3467c0fdd67206c155df2f59eeba69c"}, @wireless={0xb, 0x10, 0x1, 0x8, 0x2c, 0x80, 0x3, 0x4, 0x9}]}, 0x6, [{0x4, &(0x7f00000000c0)=@lang_id={0x4, 0x3, 0x425}}, {0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x860}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x424}}, {0xc1, &(0x7f0000000180)=@string={0xc1, 0x3, "32895dce90d627157085c353d7f94cd861200256946f1e7b957200ebcb7088ebb826877a0b86b0f934dc71ba39550de0d221e0952964ee86319a4fc65c41ea14733f81707695bb54d66124588b78f9d5ef53c1103908a97f54387f55b74b4f4bdd47e9580ca75c0a7f3e13b3af501985fb8394a5736005e605475e5b1f7e0534db2efda6ab352db55fbf8c178bc4440e0f4d799a88ae835e7454d7a0c36dd2ad100d7a4087c45832b2a0afc03e974fbae484ade32af76f8a5990c75d6e589e"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x413}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0xf8ff}}]}) syz_usb_connect$hid(0x6, 0x36, &(0x7f0000000540)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x8, 0x46d, 0xc52b, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x2, 0xc0, 0xe7, [{{0x9, 0x4, 0x0, 0x8, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x6, 0x7f, 0x1, {0x22, 0xa8f}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0xfa, 0x8f, 0x2}}}}}]}}]}}, &(0x7f0000000880)={0xa, &(0x7f0000000580)={0xa, 0x6, 0x200, 0x80, 0x1f, 0x3, 0x20, 0x3}, 0x7e, &(0x7f00000005c0)={0x5, 0xf, 0x7e, 0x6, [@ptm_cap={0x3}, @ssp_cap={0x10, 0x10, 0xa, 0x1, 0x1, 0x7, 0xf00, 0xa3a, [0xff000f]}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0x9, 0x9, 0xfffe}, @generic={0x42, 0x10, 0x4, "dfa909963b4c4a0a5f93e6fff45ee072e0265d99f99a5467b700c649cb42a77c7eb06c0d601324a9e383b942ef51bc888a1cd17688864ab47fb29ca13dbc07"}, @generic={0x13, 0x10, 0x1, "bfa6bacd313037a66f522459a4efdabd"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0xa3, 0x9, 0x8}]}, 0x4, [{0x4, &(0x7f0000000640)=@lang_id={0x4, 0x3, 0x429}}, {0xb8, &(0x7f0000000680)=@string={0xb8, 0x3, "42705c0d85706ddea3591c3d464f897257f530fb7f333ad5db89ff34e160bd630ad32754ae8d302b4040b733ddd3021c9e0041b51501dc58577d710d7d330a461033ed02f78659b9e6a6d07f525160284581bf9f7b6d74858c3d8fb0294c6d7dac1a859101803450377a0ef39210fb6700f771d15e7b42a9b032f28923b0bc8f38f5c962ae8881b006453fa75001382e5fdd3fa8ebca0c343cf8262a0d4d3bbb66f5724cb55b722d30598bf8562c1ad838f1c92fce2e"}}, {0xee, &(0x7f0000000740)=@string={0xee, 0x3, "fa6e8b74837c661128332dc7a26e58cfb24b28ada9d05c1973d222ba1ff66b18361b559b4b45a9742e86b79717211fc974cb38701973690bea498bba170459c3d0c000c8405f47e5ac1f3975fd438ab062808c46b45c7cd4ee6c6431aff885e241e12f0db4ddccfcedf2320f68bf467ac4c8cc8c42ec72012cb318a13c536c7d7ef62404b87e163944ea949594ba81f14406b251116ecc13257c3ec853daa401e5715097bec00e1d8f60fbd59b5a931d50a9ba8e50b560f531406263c917ce2722c50f8b9b9ece653f1757ffe0b7e4f69dff41f0dcb44992c5e8cf2bd7f343927e85513857734bb918177ce6"}}, {0x4, &(0x7f0000000840)=@lang_id={0x4, 0x3, 0x44e}}]}) [ 2208.618374] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2208.623646] misc raw-gadget: fail, usb_gadget_register_driver returned -16 23:10:34 executing program 5: ioctl$PTP_ENABLE_PPS(0xffffffffffffffff, 0x40043d04, 0x0) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:10:34 executing program 3: r0 = memfd_secret(0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x9, 0x2}}, './file0\x00'}) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f00000000c0)={0x9df, 0x8, 0x79, 0x9, 0x1, 0x1f}) syz_open_dev$usbmon(&(0x7f0000000000), 0x6, 0x40) 23:10:34 executing program 6: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000000, 0x10, 0xffffffffffffffff, 0x1) 23:10:34 executing program 0: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000540)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x8, 0x46d, 0xc52b, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x2, 0xc0, 0xe7, [{{0x9, 0x4, 0x0, 0x8, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x6, 0x7f, 0x1, {0x22, 0xa8f}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0xfa, 0x8f, 0x2}}}}}]}}]}}, &(0x7f0000000880)={0xa, &(0x7f0000000580)={0xa, 0x6, 0x200, 0x80, 0x1f, 0x3, 0x20, 0x3}, 0x7e, &(0x7f00000005c0)={0x5, 0xf, 0x7e, 0x6, [@ptm_cap={0x3}, @ssp_cap={0x10, 0x10, 0xa, 0x1, 0x1, 0x7, 0xf00, 0xa3a, [0xff000f]}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0x9, 0x9, 0xfffe}, @generic={0x42, 0x10, 0x4, "dfa909963b4c4a0a5f93e6fff45ee072e0265d99f99a5467b700c649cb42a77c7eb06c0d601324a9e383b942ef51bc888a1cd17688864ab47fb29ca13dbc07"}, @generic={0x13, 0x10, 0x1, "bfa6bacd313037a66f522459a4efdabd"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0xa3, 0x9, 0x8}]}, 0x4, [{0x4, &(0x7f0000000640)=@lang_id={0x4, 0x3, 0x429}}, {0xb8, &(0x7f0000000680)=@string={0xb8, 0x3, "42705c0d85706ddea3591c3d464f897257f530fb7f333ad5db89ff34e160bd630ad32754ae8d302b4040b733ddd3021c9e0041b51501dc58577d710d7d330a461033ed02f78659b9e6a6d07f525160284581bf9f7b6d74858c3d8fb0294c6d7dac1a859101803450377a0ef39210fb6700f771d15e7b42a9b032f28923b0bc8f38f5c962ae8881b006453fa75001382e5fdd3fa8ebca0c343cf8262a0d4d3bbb66f5724cb55b722d30598bf8562c1ad838f1c92fce2e"}}, {0xee, &(0x7f0000000740)=@string={0xee, 0x3, "fa6e8b74837c661128332dc7a26e58cfb24b28ada9d05c1973d222ba1ff66b18361b559b4b45a9742e86b79717211fc974cb38701973690bea498bba170459c3d0c000c8405f47e5ac1f3975fd438ab062808c46b45c7cd4ee6c6431aff885e241e12f0db4ddccfcedf2320f68bf467ac4c8cc8c42ec72012cb318a13c536c7d7ef62404b87e163944ea949594ba81f14406b251116ecc13257c3ec853daa401e5715097bec00e1d8f60fbd59b5a931d50a9ba8e50b560f531406263c917ce2722c50f8b9b9ece653f1757ffe0b7e4f69dff41f0dcb44992c5e8cf2bd7f343927e85513857734bb918177ce6"}}, {0x4, &(0x7f0000000840)=@lang_id={0x4, 0x3, 0x44e}}]}) 23:10:34 executing program 7: mmap$usbmon(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:10:34 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:10:34 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4a, {0x4a, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:10:34 executing program 1: syz_usb_connect$hid(0x3, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x8, 0x28bd, 0x74, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x51, 0x40, 0x7, [{{0x9, 0x4, 0x0, 0x40, 0x1, 0x3, 0x1, 0x3, 0x2, {0x9, 0x21, 0xaa6b, 0xc6, 0x1, {0x22, 0x3aa}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x1, 0x1, 0x20}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0x0, 0x5, 0x20}}]}}}]}}]}}, &(0x7f0000000300)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x2, 0x4, 0x9, 0x20, 0x1f}, 0x2e, &(0x7f0000000080)={0x5, 0xf, 0x2e, 0x4, [@ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x5, 0xf, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "f3467c0fdd67206c155df2f59eeba69c"}, @wireless={0xb, 0x10, 0x1, 0x8, 0x2c, 0x80, 0x3, 0x4, 0x9}]}, 0x6, [{0x4, &(0x7f00000000c0)=@lang_id={0x4, 0x3, 0x425}}, {0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x860}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x424}}, {0xc1, &(0x7f0000000180)=@string={0xc1, 0x3, "32895dce90d627157085c353d7f94cd861200256946f1e7b957200ebcb7088ebb826877a0b86b0f934dc71ba39550de0d221e0952964ee86319a4fc65c41ea14733f81707695bb54d66124588b78f9d5ef53c1103908a97f54387f55b74b4f4bdd47e9580ca75c0a7f3e13b3af501985fb8394a5736005e605475e5b1f7e0534db2efda6ab352db55fbf8c178bc4440e0f4d799a88ae835e7454d7a0c36dd2ad100d7a4087c45832b2a0afc03e974fbae484ade32af76f8a5990c75d6e589e"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x413}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0xf8ff}}]}) syz_usb_connect$hid(0x6, 0x36, &(0x7f0000000540)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x8, 0x46d, 0xc52b, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x2, 0xc0, 0xe7, [{{0x9, 0x4, 0x0, 0x8, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x6, 0x7f, 0x1, {0x22, 0xa8f}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0xfa, 0x8f, 0x2}}}}}]}}]}}, &(0x7f0000000880)={0xa, &(0x7f0000000580)={0xa, 0x6, 0x200, 0x80, 0x1f, 0x3, 0x20, 0x3}, 0x7e, &(0x7f00000005c0)={0x5, 0xf, 0x7e, 0x6, [@ptm_cap={0x3}, @ssp_cap={0x10, 0x10, 0xa, 0x1, 0x1, 0x7, 0xf00, 0xa3a, [0xff000f]}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0x9, 0x9, 0xfffe}, @generic={0x42, 0x10, 0x4, "dfa909963b4c4a0a5f93e6fff45ee072e0265d99f99a5467b700c649cb42a77c7eb06c0d601324a9e383b942ef51bc888a1cd17688864ab47fb29ca13dbc07"}, @generic={0x13, 0x10, 0x1, "bfa6bacd313037a66f522459a4efdabd"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0xa3, 0x9, 0x8}]}, 0x4, [{0x4, &(0x7f0000000640)=@lang_id={0x4, 0x3, 0x429}}, {0xb8, &(0x7f0000000680)=@string={0xb8, 0x3, "42705c0d85706ddea3591c3d464f897257f530fb7f333ad5db89ff34e160bd630ad32754ae8d302b4040b733ddd3021c9e0041b51501dc58577d710d7d330a461033ed02f78659b9e6a6d07f525160284581bf9f7b6d74858c3d8fb0294c6d7dac1a859101803450377a0ef39210fb6700f771d15e7b42a9b032f28923b0bc8f38f5c962ae8881b006453fa75001382e5fdd3fa8ebca0c343cf8262a0d4d3bbb66f5724cb55b722d30598bf8562c1ad838f1c92fce2e"}}, {0xee, &(0x7f0000000740)=@string={0xee, 0x3, "fa6e8b74837c661128332dc7a26e58cfb24b28ada9d05c1973d222ba1ff66b18361b559b4b45a9742e86b79717211fc974cb38701973690bea498bba170459c3d0c000c8405f47e5ac1f3975fd438ab062808c46b45c7cd4ee6c6431aff885e241e12f0db4ddccfcedf2320f68bf467ac4c8cc8c42ec72012cb318a13c536c7d7ef62404b87e163944ea949594ba81f14406b251116ecc13257c3ec853daa401e5715097bec00e1d8f60fbd59b5a931d50a9ba8e50b560f531406263c917ce2722c50f8b9b9ece653f1757ffe0b7e4f69dff41f0dcb44992c5e8cf2bd7f343927e85513857734bb918177ce6"}}, {0x4, &(0x7f0000000840)=@lang_id={0x4, 0x3, 0x44e}}]}) 23:10:34 executing program 6: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x103, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, 0x0, 0x609, 0x70bd2b, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0xffffffff, 0x75}}}}, [@NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x3}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x108a}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x131c}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) socket$nl_generic(0x10, 0x3, 0x10) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f00000000c0)={&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000080)=""/15, 0xf}) [ 2217.114968] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2217.119638] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2217.124550] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2217.131870] misc raw-gadget: fail, usb_gadget_register_driver returned -16 23:10:34 executing program 6: r0 = memfd_secret(0x0) sendmsg$NL80211_CMD_SET_REG(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="ec010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x1ec}, 0x1, 0x0, 0x0, 0x40088c1}, 0x4000041) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0xffffffffffff67e3) 23:10:34 executing program 3: r0 = memfd_secret(0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x9, 0x2}}, './file0\x00'}) syz_open_dev$usbmon(&(0x7f0000000000), 0x6, 0x40) 23:10:34 executing program 5: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f0000000080)={&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000040)=""/23, 0x17}) 23:10:34 executing program 7: mmap$usbmon(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:10:34 executing program 3: memfd_secret(0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x6, 0x40) 23:10:34 executing program 6: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) r0 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) ioctl$PTP_EXTTS_REQUEST(r0, 0x40103d02, &(0x7f0000000080)={0xfff, 0x2}) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000040)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x2}) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) ioctl$MON_IOCQ_RING_SIZE(0xffffffffffffffff, 0x9205) 23:10:34 executing program 7: mmap$usbmon(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:10:43 executing program 3: syz_open_dev$usbmon(&(0x7f0000000000), 0x6, 0x40) 23:10:43 executing program 5: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x204000, 0x0) r1 = memfd_secret(0x80000) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0x9, 0x800}}, './file0\x00'}) 23:10:43 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4a, {0x4a, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:10:43 executing program 1: syz_usb_connect$hid(0x3, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x8, 0x28bd, 0x74, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x51, 0x40, 0x7, [{{0x9, 0x4, 0x0, 0x40, 0x1, 0x3, 0x1, 0x3, 0x2, {0x9, 0x21, 0xaa6b, 0xc6, 0x1, {0x22, 0x3aa}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x1, 0x1, 0x20}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0x0, 0x5, 0x20}}]}}}]}}]}}, &(0x7f0000000300)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x2, 0x4, 0x9, 0x20, 0x1f}, 0x2e, &(0x7f0000000080)={0x5, 0xf, 0x2e, 0x4, [@ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x5, 0xf, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "f3467c0fdd67206c155df2f59eeba69c"}, @wireless={0xb, 0x10, 0x1, 0x8, 0x2c, 0x80, 0x3, 0x4, 0x9}]}, 0x6, [{0x4, &(0x7f00000000c0)=@lang_id={0x4, 0x3, 0x425}}, {0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x860}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x424}}, {0xc1, &(0x7f0000000180)=@string={0xc1, 0x3, "32895dce90d627157085c353d7f94cd861200256946f1e7b957200ebcb7088ebb826877a0b86b0f934dc71ba39550de0d221e0952964ee86319a4fc65c41ea14733f81707695bb54d66124588b78f9d5ef53c1103908a97f54387f55b74b4f4bdd47e9580ca75c0a7f3e13b3af501985fb8394a5736005e605475e5b1f7e0534db2efda6ab352db55fbf8c178bc4440e0f4d799a88ae835e7454d7a0c36dd2ad100d7a4087c45832b2a0afc03e974fbae484ade32af76f8a5990c75d6e589e"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x413}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0xf8ff}}]}) syz_usb_connect$hid(0x6, 0x36, &(0x7f0000000540)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x8, 0x46d, 0xc52b, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x2, 0xc0, 0xe7, [{{0x9, 0x4, 0x0, 0x8, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x6, 0x7f, 0x1, {0x22, 0xa8f}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0xfa, 0x8f, 0x2}}}}}]}}]}}, &(0x7f0000000880)={0xa, &(0x7f0000000580)={0xa, 0x6, 0x200, 0x80, 0x1f, 0x3, 0x20, 0x3}, 0x7e, &(0x7f00000005c0)={0x5, 0xf, 0x7e, 0x6, [@ptm_cap={0x3}, @ssp_cap={0x10, 0x10, 0xa, 0x1, 0x1, 0x7, 0xf00, 0xa3a, [0xff000f]}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0x9, 0x9, 0xfffe}, @generic={0x42, 0x10, 0x4, "dfa909963b4c4a0a5f93e6fff45ee072e0265d99f99a5467b700c649cb42a77c7eb06c0d601324a9e383b942ef51bc888a1cd17688864ab47fb29ca13dbc07"}, @generic={0x13, 0x10, 0x1, "bfa6bacd313037a66f522459a4efdabd"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0xa3, 0x9, 0x8}]}, 0x4, [{0x4, &(0x7f0000000640)=@lang_id={0x4, 0x3, 0x429}}, {0xb8, &(0x7f0000000680)=@string={0xb8, 0x3, "42705c0d85706ddea3591c3d464f897257f530fb7f333ad5db89ff34e160bd630ad32754ae8d302b4040b733ddd3021c9e0041b51501dc58577d710d7d330a461033ed02f78659b9e6a6d07f525160284581bf9f7b6d74858c3d8fb0294c6d7dac1a859101803450377a0ef39210fb6700f771d15e7b42a9b032f28923b0bc8f38f5c962ae8881b006453fa75001382e5fdd3fa8ebca0c343cf8262a0d4d3bbb66f5724cb55b722d30598bf8562c1ad838f1c92fce2e"}}, {0xee, &(0x7f0000000740)=@string={0xee, 0x3, "fa6e8b74837c661128332dc7a26e58cfb24b28ada9d05c1973d222ba1ff66b18361b559b4b45a9742e86b79717211fc974cb38701973690bea498bba170459c3d0c000c8405f47e5ac1f3975fd438ab062808c46b45c7cd4ee6c6431aff885e241e12f0db4ddccfcedf2320f68bf467ac4c8cc8c42ec72012cb318a13c536c7d7ef62404b87e163944ea949594ba81f14406b251116ecc13257c3ec853daa401e5715097bec00e1d8f60fbd59b5a931d50a9ba8e50b560f531406263c917ce2722c50f8b9b9ece653f1757ffe0b7e4f69dff41f0dcb44992c5e8cf2bd7f343927e85513857734bb918177ce6"}}, {0x4, &(0x7f0000000840)=@lang_id={0x4, 0x3, 0x44e}}]}) 23:10:43 executing program 6: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x444940, 0x0) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000040)={'\x00', 0x725817d4, 0x2, 0x4}) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000100)={0x0, @phonet={0x23, 0x81, 0xff, 0x6}, @isdn={0x22, 0x4, 0x40, 0x0, 0x7}, @isdn={0x22, 0x2c, 0x5e, 0x20, 0x6a}, 0x8, 0x0, 0x0, 0x0, 0x6, &(0x7f00000000c0)='macvtap0\x00', 0x7ff, 0x5, 0x4}) 23:10:43 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:10:43 executing program 0: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000540)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x8, 0x46d, 0xc52b, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x2, 0xc0, 0xe7, [{{0x9, 0x4, 0x0, 0x8, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x6, 0x7f, 0x1, {0x22, 0xa8f}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0xfa, 0x8f, 0x2}}}}}]}}]}}, &(0x7f0000000880)={0xa, &(0x7f0000000580)={0xa, 0x6, 0x200, 0x80, 0x1f, 0x3, 0x20, 0x3}, 0x7e, &(0x7f00000005c0)={0x5, 0xf, 0x7e, 0x6, [@ptm_cap={0x3}, @ssp_cap={0x10, 0x10, 0xa, 0x1, 0x1, 0x7, 0xf00, 0xa3a, [0xff000f]}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0x9, 0x9, 0xfffe}, @generic={0x42, 0x10, 0x4, "dfa909963b4c4a0a5f93e6fff45ee072e0265d99f99a5467b700c649cb42a77c7eb06c0d601324a9e383b942ef51bc888a1cd17688864ab47fb29ca13dbc07"}, @generic={0x13, 0x10, 0x1, "bfa6bacd313037a66f522459a4efdabd"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0xa3, 0x9, 0x8}]}, 0x4, [{0x4, &(0x7f0000000640)=@lang_id={0x4, 0x3, 0x429}}, {0xb8, &(0x7f0000000680)=@string={0xb8, 0x3, "42705c0d85706ddea3591c3d464f897257f530fb7f333ad5db89ff34e160bd630ad32754ae8d302b4040b733ddd3021c9e0041b51501dc58577d710d7d330a461033ed02f78659b9e6a6d07f525160284581bf9f7b6d74858c3d8fb0294c6d7dac1a859101803450377a0ef39210fb6700f771d15e7b42a9b032f28923b0bc8f38f5c962ae8881b006453fa75001382e5fdd3fa8ebca0c343cf8262a0d4d3bbb66f5724cb55b722d30598bf8562c1ad838f1c92fce2e"}}, {0xee, &(0x7f0000000740)=@string={0xee, 0x3, "fa6e8b74837c661128332dc7a26e58cfb24b28ada9d05c1973d222ba1ff66b18361b559b4b45a9742e86b79717211fc974cb38701973690bea498bba170459c3d0c000c8405f47e5ac1f3975fd438ab062808c46b45c7cd4ee6c6431aff885e241e12f0db4ddccfcedf2320f68bf467ac4c8cc8c42ec72012cb318a13c536c7d7ef62404b87e163944ea949594ba81f14406b251116ecc13257c3ec853daa401e5715097bec00e1d8f60fbd59b5a931d50a9ba8e50b560f531406263c917ce2722c50f8b9b9ece653f1757ffe0b7e4f69dff41f0dcb44992c5e8cf2bd7f343927e85513857734bb918177ce6"}}, {0x4, &(0x7f0000000840)=@lang_id={0x4, 0x3, 0x44e}}]}) 23:10:43 executing program 7: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x103, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, 0x0, 0x609, 0x70bd2b, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0xffffffff, 0x75}}}}, [@NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x3}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x108a}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x131c}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) socket$nl_generic(0x10, 0x3, 0x10) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f00000000c0)={&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000080)=""/15, 0xf}) [ 2226.184176] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2226.187355] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2226.210874] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2226.212342] misc raw-gadget: fail, usb_gadget_register_driver returned -16 23:10:43 executing program 7: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x103, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, 0x0, 0x609, 0x70bd2b, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0xffffffff, 0x75}}}}, [@NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x3}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x108a}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x131c}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) socket$nl_generic(0x10, 0x3, 0x10) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f00000000c0)={&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000080)=""/15, 0xf}) 23:10:43 executing program 6: mmap$usbmon(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x4) 23:10:43 executing program 7: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x103, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, 0x0, 0x609, 0x70bd2b, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0xffffffff, 0x75}}}}, [@NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x3}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x108a}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x131c}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) socket$nl_generic(0x10, 0x3, 0x10) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f00000000c0)={&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000080)=""/15, 0xf}) 23:10:43 executing program 3: syz_open_dev$usbmon(0x0, 0x6, 0x40) 23:10:43 executing program 5: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000000)) 23:10:43 executing program 7: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x103, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, 0x0, 0x609, 0x70bd2b, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0xffffffff, 0x75}}}}, [@NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x3}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x108a}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x131c}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) socket$nl_generic(0x10, 0x3, 0x10) 23:10:52 executing program 7: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x103, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, 0x0, 0x609, 0x70bd2b, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0xffffffff, 0x75}}}}, [@NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x3}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x108a}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x131c}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) 23:10:52 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, 0x0, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:10:52 executing program 0: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000540)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x8, 0x46d, 0xc52b, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x2, 0xc0, 0xe7, [{{0x9, 0x4, 0x0, 0x8, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x6, 0x7f, 0x1, {0x22, 0xa8f}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0xfa, 0x8f, 0x2}}}}}]}}]}}, &(0x7f0000000880)={0xa, &(0x7f0000000580)={0xa, 0x6, 0x200, 0x80, 0x1f, 0x3, 0x20, 0x3}, 0x7e, &(0x7f00000005c0)={0x5, 0xf, 0x7e, 0x6, [@ptm_cap={0x3}, @ssp_cap={0x10, 0x10, 0xa, 0x1, 0x1, 0x7, 0xf00, 0xa3a, [0xff000f]}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0x9, 0x9, 0xfffe}, @generic={0x42, 0x10, 0x4, "dfa909963b4c4a0a5f93e6fff45ee072e0265d99f99a5467b700c649cb42a77c7eb06c0d601324a9e383b942ef51bc888a1cd17688864ab47fb29ca13dbc07"}, @generic={0x13, 0x10, 0x1, "bfa6bacd313037a66f522459a4efdabd"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0xa3, 0x9, 0x8}]}, 0x4, [{0x4, &(0x7f0000000640)=@lang_id={0x4, 0x3, 0x429}}, {0xb8, &(0x7f0000000680)=@string={0xb8, 0x3, "42705c0d85706ddea3591c3d464f897257f530fb7f333ad5db89ff34e160bd630ad32754ae8d302b4040b733ddd3021c9e0041b51501dc58577d710d7d330a461033ed02f78659b9e6a6d07f525160284581bf9f7b6d74858c3d8fb0294c6d7dac1a859101803450377a0ef39210fb6700f771d15e7b42a9b032f28923b0bc8f38f5c962ae8881b006453fa75001382e5fdd3fa8ebca0c343cf8262a0d4d3bbb66f5724cb55b722d30598bf8562c1ad838f1c92fce2e"}}, {0xee, &(0x7f0000000740)=@string={0xee, 0x3, "fa6e8b74837c661128332dc7a26e58cfb24b28ada9d05c1973d222ba1ff66b18361b559b4b45a9742e86b79717211fc974cb38701973690bea498bba170459c3d0c000c8405f47e5ac1f3975fd438ab062808c46b45c7cd4ee6c6431aff885e241e12f0db4ddccfcedf2320f68bf467ac4c8cc8c42ec72012cb318a13c536c7d7ef62404b87e163944ea949594ba81f14406b251116ecc13257c3ec853daa401e5715097bec00e1d8f60fbd59b5a931d50a9ba8e50b560f531406263c917ce2722c50f8b9b9ece653f1757ffe0b7e4f69dff41f0dcb44992c5e8cf2bd7f343927e85513857734bb918177ce6"}}, {0x4, &(0x7f0000000840)=@lang_id={0x4, 0x3, 0x44e}}]}) 23:10:52 executing program 5: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$MON_IOCX_GET(0xffffffffffffffff, 0x40189206, &(0x7f0000000100)={&(0x7f0000000000), &(0x7f0000000040)=""/129, 0x81}) 23:10:52 executing program 1: syz_usb_connect$hid(0x3, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x8, 0x28bd, 0x74, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x51, 0x40, 0x7, [{{0x9, 0x4, 0x0, 0x40, 0x1, 0x3, 0x1, 0x3, 0x2, {0x9, 0x21, 0xaa6b, 0xc6, 0x1, {0x22, 0x3aa}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x1, 0x1, 0x20}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0x0, 0x5, 0x20}}]}}}]}}]}}, &(0x7f0000000300)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x2, 0x4, 0x9, 0x20, 0x1f}, 0x2e, &(0x7f0000000080)={0x5, 0xf, 0x2e, 0x4, [@ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x5, 0xf, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "f3467c0fdd67206c155df2f59eeba69c"}, @wireless={0xb, 0x10, 0x1, 0x8, 0x2c, 0x80, 0x3, 0x4, 0x9}]}, 0x6, [{0x4, &(0x7f00000000c0)=@lang_id={0x4, 0x3, 0x425}}, {0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x860}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x424}}, {0xc1, &(0x7f0000000180)=@string={0xc1, 0x3, "32895dce90d627157085c353d7f94cd861200256946f1e7b957200ebcb7088ebb826877a0b86b0f934dc71ba39550de0d221e0952964ee86319a4fc65c41ea14733f81707695bb54d66124588b78f9d5ef53c1103908a97f54387f55b74b4f4bdd47e9580ca75c0a7f3e13b3af501985fb8394a5736005e605475e5b1f7e0534db2efda6ab352db55fbf8c178bc4440e0f4d799a88ae835e7454d7a0c36dd2ad100d7a4087c45832b2a0afc03e974fbae484ade32af76f8a5990c75d6e589e"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x413}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0xf8ff}}]}) 23:10:52 executing program 6: syz_open_dev$usbmon(&(0x7f0000000000), 0x8, 0x400800) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x4c, r0, 0x300, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x3}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0xfd2}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0xc1d}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x473}, @NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x1}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x8c8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0xc0) r1 = syz_open_dev$vcsn(&(0x7f0000000040), 0x7fff, 0x400) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r1, 0x1) r2 = memfd_secret(0x0) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) ioctl$CDROMREADALL(r3, 0x5318, &(0x7f0000000940)) r4 = memfd_secret(0x0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x34000, 0x0) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r5, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x88, 0x0, 0x100, 0x70bd29, 0x25dfdbff, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}]}, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) ioctl$MON_IOCX_MFETCH(r4, 0xc0109207, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x4}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x3d46d) 23:10:52 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x14, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:10:52 executing program 3: syz_open_dev$usbmon(0x0, 0x6, 0x40) [ 2234.840355] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2234.843416] misc raw-gadget: fail, usb_gadget_register_driver returned -16 23:10:52 executing program 3: syz_open_dev$usbmon(0x0, 0x6, 0x40) [ 2234.873810] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2234.883351] misc raw-gadget: fail, usb_gadget_register_driver returned -16 23:10:52 executing program 3: syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x40) 23:10:52 executing program 5: sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000001080)={&(0x7f0000001040)={0x1c, 0x0, 0x101, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x91}, 0x4000000) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, &(0x7f0000001100)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000000)=""/4096) 23:10:52 executing program 7: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x103, 0x0) 23:10:52 executing program 3: syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x40) 23:10:52 executing program 6: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x40, 0x400) read$usbmon(r0, &(0x7f0000000040)=""/100, 0x64) 23:10:52 executing program 3: syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x40) 23:10:52 executing program 7: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x103, 0x0) 23:10:52 executing program 5: ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000000)=""/128) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:10:52 executing program 6: r0 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f00000000c0)={&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000040)=""/89, 0x59}) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) r1 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r1) mmap$usbmon(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000012, 0x50, r1, 0x6) 23:11:01 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x14, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:11:01 executing program 7: openat$vcsa(0xffffffffffffff9c, 0x0, 0x103, 0x0) 23:11:01 executing program 6: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) io_uring_setup(0x3041, &(0x7f0000000000)={0x0, 0xfd28, 0x10, 0x1, 0x39d}) 23:11:01 executing program 3: syz_open_dev$usbmon(&(0x7f0000000000), 0x6, 0x0) 23:11:01 executing program 5: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$CDROM_DISC_STATUS(0xffffffffffffffff, 0x5327) r0 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) ioctl$MON_IOCH_MFLUSH(r0, 0x9208, 0x5) mmap$usbmon(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000004, 0x20010, 0xffffffffffffffff, 0xd0e8) 23:11:01 executing program 0: syz_usb_connect$hid(0x6, 0x0, 0x0, &(0x7f0000000880)={0xa, &(0x7f0000000580)={0xa, 0x6, 0x200, 0x80, 0x1f, 0x3, 0x20, 0x3}, 0x7e, &(0x7f00000005c0)={0x5, 0xf, 0x7e, 0x6, [@ptm_cap={0x3}, @ssp_cap={0x10, 0x10, 0xa, 0x1, 0x1, 0x7, 0xf00, 0xa3a, [0xff000f]}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0x9, 0x9, 0xfffe}, @generic={0x42, 0x10, 0x4, "dfa909963b4c4a0a5f93e6fff45ee072e0265d99f99a5467b700c649cb42a77c7eb06c0d601324a9e383b942ef51bc888a1cd17688864ab47fb29ca13dbc07"}, @generic={0x13, 0x10, 0x1, "bfa6bacd313037a66f522459a4efdabd"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0xa3, 0x9, 0x8}]}, 0x4, [{0x4, &(0x7f0000000640)=@lang_id={0x4, 0x3, 0x429}}, {0xb8, &(0x7f0000000680)=@string={0xb8, 0x3, "42705c0d85706ddea3591c3d464f897257f530fb7f333ad5db89ff34e160bd630ad32754ae8d302b4040b733ddd3021c9e0041b51501dc58577d710d7d330a461033ed02f78659b9e6a6d07f525160284581bf9f7b6d74858c3d8fb0294c6d7dac1a859101803450377a0ef39210fb6700f771d15e7b42a9b032f28923b0bc8f38f5c962ae8881b006453fa75001382e5fdd3fa8ebca0c343cf8262a0d4d3bbb66f5724cb55b722d30598bf8562c1ad838f1c92fce2e"}}, {0xee, &(0x7f0000000740)=@string={0xee, 0x3, "fa6e8b74837c661128332dc7a26e58cfb24b28ada9d05c1973d222ba1ff66b18361b559b4b45a9742e86b79717211fc974cb38701973690bea498bba170459c3d0c000c8405f47e5ac1f3975fd438ab062808c46b45c7cd4ee6c6431aff885e241e12f0db4ddccfcedf2320f68bf467ac4c8cc8c42ec72012cb318a13c536c7d7ef62404b87e163944ea949594ba81f14406b251116ecc13257c3ec853daa401e5715097bec00e1d8f60fbd59b5a931d50a9ba8e50b560f531406263c917ce2722c50f8b9b9ece653f1757ffe0b7e4f69dff41f0dcb44992c5e8cf2bd7f343927e85513857734bb918177ce6"}}, {0x4, &(0x7f0000000840)=@lang_id={0x4, 0x3, 0x44e}}]}) 23:11:01 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, 0x0, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:11:01 executing program 1: syz_usb_connect$hid(0x3, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x8, 0x28bd, 0x74, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x51, 0x40, 0x7, [{{0x9, 0x4, 0x0, 0x40, 0x1, 0x3, 0x1, 0x3, 0x2, {0x9, 0x21, 0xaa6b, 0xc6, 0x1, {0x22, 0x3aa}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x1, 0x1, 0x20}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0x0, 0x5, 0x20}}]}}}]}}]}}, &(0x7f0000000300)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x2, 0x4, 0x9, 0x20, 0x1f}, 0x2e, &(0x7f0000000080)={0x5, 0xf, 0x2e, 0x4, [@ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x5, 0xf, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "f3467c0fdd67206c155df2f59eeba69c"}, @wireless={0xb, 0x10, 0x1, 0x8, 0x2c, 0x80, 0x3, 0x4, 0x9}]}, 0x6, [{0x4, &(0x7f00000000c0)=@lang_id={0x4, 0x3, 0x425}}, {0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x860}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x424}}, {0xc1, &(0x7f0000000180)=@string={0xc1, 0x3, "32895dce90d627157085c353d7f94cd861200256946f1e7b957200ebcb7088ebb826877a0b86b0f934dc71ba39550de0d221e0952964ee86319a4fc65c41ea14733f81707695bb54d66124588b78f9d5ef53c1103908a97f54387f55b74b4f4bdd47e9580ca75c0a7f3e13b3af501985fb8394a5736005e605475e5b1f7e0534db2efda6ab352db55fbf8c178bc4440e0f4d799a88ae835e7454d7a0c36dd2ad100d7a4087c45832b2a0afc03e974fbae484ade32af76f8a5990c75d6e589e"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x413}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0xf8ff}}]}) 23:11:01 executing program 7: openat$vcsa(0xffffffffffffff9c, 0x0, 0x103, 0x0) [ 2243.857040] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2243.857981] misc raw-gadget: fail, usb_gadget_register_driver returned -16 23:11:01 executing program 7: openat$vcsa(0xffffffffffffff9c, 0x0, 0x103, 0x0) 23:11:01 executing program 5: mmap$usbmon(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x810, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x8, 0x10000) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x800}) 23:11:01 executing program 6: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x5, 0x10180) ioctl$MON_IOCQ_RING_SIZE(r0, 0x9205) 23:11:01 executing program 7: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 23:11:01 executing program 3: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) io_uring_setup(0x3041, &(0x7f0000000000)={0x0, 0xfd28, 0x10, 0x1, 0x39d}) 23:11:01 executing program 7: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 23:11:01 executing program 5: r0 = socket(0x16, 0x1, 0xfffffffc) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x5c, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x100000}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}]}, 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:11:09 executing program 7: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 23:11:09 executing program 6: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) read$usbmon(0xffffffffffffffff, &(0x7f0000000000)=""/233, 0xe9) 23:11:09 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x14, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:11:09 executing program 1: syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x8, 0x28bd, 0x74, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x51, 0x40, 0x7, [{{0x9, 0x4, 0x0, 0x40, 0x1, 0x3, 0x1, 0x3, 0x2, {0x9, 0x21, 0xaa6b, 0xc6, 0x1, {0x22, 0x3aa}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x1, 0x1, 0x20}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0x0, 0x5, 0x20}}]}}}]}}]}}, &(0x7f0000000300)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x2, 0x4, 0x9, 0x20, 0x1f}, 0x2e, &(0x7f0000000080)={0x5, 0xf, 0x2e, 0x4, [@ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x5, 0xf, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "f3467c0fdd67206c155df2f59eeba69c"}, @wireless={0xb, 0x10, 0x1, 0x8, 0x2c, 0x80, 0x3, 0x4, 0x9}]}, 0x6, [{0x4, &(0x7f00000000c0)=@lang_id={0x4, 0x3, 0x425}}, {0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x860}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x424}}, {0xc1, &(0x7f0000000180)=@string={0xc1, 0x3, "32895dce90d627157085c353d7f94cd861200256946f1e7b957200ebcb7088ebb826877a0b86b0f934dc71ba39550de0d221e0952964ee86319a4fc65c41ea14733f81707695bb54d66124588b78f9d5ef53c1103908a97f54387f55b74b4f4bdd47e9580ca75c0a7f3e13b3af501985fb8394a5736005e605475e5b1f7e0534db2efda6ab352db55fbf8c178bc4440e0f4d799a88ae835e7454d7a0c36dd2ad100d7a4087c45832b2a0afc03e974fbae484ade32af76f8a5990c75d6e589e"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x413}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0xf8ff}}]}) 23:11:09 executing program 3: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) io_uring_setup(0x3041, &(0x7f0000000000)={0x0, 0xfd28, 0x10, 0x1, 0x39d}) 23:11:09 executing program 5: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xc00, 0x0) mmap$usbmon(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 23:11:09 executing program 0: syz_usb_connect$hid(0x6, 0x0, 0x0, &(0x7f0000000880)={0xa, &(0x7f0000000580)={0xa, 0x6, 0x200, 0x80, 0x1f, 0x3, 0x20, 0x3}, 0x7e, &(0x7f00000005c0)={0x5, 0xf, 0x7e, 0x6, [@ptm_cap={0x3}, @ssp_cap={0x10, 0x10, 0xa, 0x1, 0x1, 0x7, 0xf00, 0xa3a, [0xff000f]}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0x9, 0x9, 0xfffe}, @generic={0x42, 0x10, 0x4, "dfa909963b4c4a0a5f93e6fff45ee072e0265d99f99a5467b700c649cb42a77c7eb06c0d601324a9e383b942ef51bc888a1cd17688864ab47fb29ca13dbc07"}, @generic={0x13, 0x10, 0x1, "bfa6bacd313037a66f522459a4efdabd"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0xa3, 0x9, 0x8}]}, 0x4, [{0x4, &(0x7f0000000640)=@lang_id={0x4, 0x3, 0x429}}, {0xb8, &(0x7f0000000680)=@string={0xb8, 0x3, "42705c0d85706ddea3591c3d464f897257f530fb7f333ad5db89ff34e160bd630ad32754ae8d302b4040b733ddd3021c9e0041b51501dc58577d710d7d330a461033ed02f78659b9e6a6d07f525160284581bf9f7b6d74858c3d8fb0294c6d7dac1a859101803450377a0ef39210fb6700f771d15e7b42a9b032f28923b0bc8f38f5c962ae8881b006453fa75001382e5fdd3fa8ebca0c343cf8262a0d4d3bbb66f5724cb55b722d30598bf8562c1ad838f1c92fce2e"}}, {0xee, &(0x7f0000000740)=@string={0xee, 0x3, "fa6e8b74837c661128332dc7a26e58cfb24b28ada9d05c1973d222ba1ff66b18361b559b4b45a9742e86b79717211fc974cb38701973690bea498bba170459c3d0c000c8405f47e5ac1f3975fd438ab062808c46b45c7cd4ee6c6431aff885e241e12f0db4ddccfcedf2320f68bf467ac4c8cc8c42ec72012cb318a13c536c7d7ef62404b87e163944ea949594ba81f14406b251116ecc13257c3ec853daa401e5715097bec00e1d8f60fbd59b5a931d50a9ba8e50b560f531406263c917ce2722c50f8b9b9ece653f1757ffe0b7e4f69dff41f0dcb44992c5e8cf2bd7f343927e85513857734bb918177ce6"}}, {0x4, &(0x7f0000000840)=@lang_id={0x4, 0x3, 0x44e}}]}) 23:11:09 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, 0x0, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:11:09 executing program 6: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x220340, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2, 0x1f}}, './file0\x00'}) [ 2252.735497] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2252.745477] misc raw-gadget: fail, usb_gadget_register_driver returned -16 23:11:09 executing program 3: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) io_uring_setup(0x3041, &(0x7f0000000000)={0x0, 0xfd28, 0x10, 0x1, 0x39d}) 23:11:10 executing program 6: sched_setattr(0xffffffffffffffff, &(0x7f0000000000)={0x38, 0x0, 0x4, 0x4, 0x7, 0x4, 0x8000, 0x623, 0x71, 0x6}, 0x0) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) 23:11:10 executing program 7: syz_open_dev$usbmon(&(0x7f0000000000), 0x8, 0x400800) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x4c, r0, 0x300, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x3}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0xfd2}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0xc1d}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x473}, @NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x1}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x8c8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0xc0) r1 = syz_open_dev$vcsn(&(0x7f0000000040), 0x7fff, 0x400) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r1, 0x1) r2 = memfd_secret(0x0) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) ioctl$CDROMREADALL(r3, 0x5318, &(0x7f0000000940)) r4 = memfd_secret(0x0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x34000, 0x0) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r5, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x88, 0x0, 0x100, 0x70bd29, 0x25dfdbff, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}]}, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) ioctl$MON_IOCX_MFETCH(r4, 0xc0109207, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x4}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x3d46d) 23:11:10 executing program 3: io_uring_setup(0x3041, &(0x7f0000000000)={0x0, 0xfd28, 0x10, 0x1, 0x39d}) 23:11:10 executing program 7: syz_open_dev$usbmon(&(0x7f0000000000), 0x8, 0x400800) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x4c, r0, 0x300, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x3}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0xfd2}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0xc1d}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x473}, @NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x1}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x8c8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0xc0) r1 = syz_open_dev$vcsn(&(0x7f0000000040), 0x7fff, 0x400) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r1, 0x1) r2 = memfd_secret(0x0) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) ioctl$CDROMREADALL(r3, 0x5318, &(0x7f0000000940)) r4 = memfd_secret(0x0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x34000, 0x0) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r5, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x88, 0x0, 0x100, 0x70bd29, 0x25dfdbff, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}]}, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) ioctl$MON_IOCX_MFETCH(r4, 0xc0109207, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x4}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x3d46d) 23:11:10 executing program 5: r0 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_open_dev$evdev(&(0x7f0000000140), 0xf5a, 0x50001) ioctl$EVIOCSABS3F(r2, 0x401845ff, &(0x7f0000000180)={0xef11, 0x5, 0x20000000, 0x1, 0x3f, 0x92}) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="34000013", @ANYRES16=r1, @ANYBLOB="000425bd7000fedbdf2510000000080039000000000008003c000100000005002d00000000000500330002000000"], 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x94) mmap$usbmon(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000002, 0x10, r0, 0x0) 23:11:10 executing program 3: io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0xfd28, 0x10, 0x1, 0x39d}) 23:11:10 executing program 6: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x1010, 0xffffffffffffffff, 0x1) 23:11:10 executing program 3: io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0xfd28, 0x10, 0x1, 0x39d}) 23:11:18 executing program 7: syz_open_dev$usbmon(&(0x7f0000000000), 0x8, 0x400800) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x4c, r0, 0x300, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x3}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0xfd2}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0xc1d}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x473}, @NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x1}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x8c8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0xc0) r1 = syz_open_dev$vcsn(&(0x7f0000000040), 0x7fff, 0x400) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r1, 0x1) r2 = memfd_secret(0x0) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) ioctl$CDROMREADALL(r3, 0x5318, &(0x7f0000000940)) r4 = memfd_secret(0x0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x34000, 0x0) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r5, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x88, 0x0, 0x100, 0x70bd29, 0x25dfdbff, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}]}, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) ioctl$MON_IOCX_MFETCH(r4, 0xc0109207, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x4}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x3d46d) 23:11:18 executing program 3: io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0xfd28, 0x10, 0x1, 0x39d}) 23:11:18 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x1e, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:11:18 executing program 1: syz_usb_connect$hid(0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x2, 0x4, 0x9, 0x20, 0x1f}, 0x2e, &(0x7f0000000080)={0x5, 0xf, 0x2e, 0x4, [@ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x5, 0xf, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "f3467c0fdd67206c155df2f59eeba69c"}, @wireless={0xb, 0x10, 0x1, 0x8, 0x2c, 0x80, 0x3, 0x4, 0x9}]}, 0x6, [{0x4, &(0x7f00000000c0)=@lang_id={0x4, 0x3, 0x425}}, {0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x860}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x424}}, {0xc1, &(0x7f0000000180)=@string={0xc1, 0x3, "32895dce90d627157085c353d7f94cd861200256946f1e7b957200ebcb7088ebb826877a0b86b0f934dc71ba39550de0d221e0952964ee86319a4fc65c41ea14733f81707695bb54d66124588b78f9d5ef53c1103908a97f54387f55b74b4f4bdd47e9580ca75c0a7f3e13b3af501985fb8394a5736005e605475e5b1f7e0534db2efda6ab352db55fbf8c178bc4440e0f4d799a88ae835e7454d7a0c36dd2ad100d7a4087c45832b2a0afc03e974fbae484ade32af76f8a5990c75d6e589e"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x413}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0xf8ff}}]}) 23:11:18 executing program 5: ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r0 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) read$usbmon(r0, &(0x7f0000000000)=""/226, 0xe2) 23:11:18 executing program 0: syz_usb_connect$hid(0x6, 0x0, 0x0, &(0x7f0000000880)={0xa, &(0x7f0000000580)={0xa, 0x6, 0x200, 0x80, 0x1f, 0x3, 0x20, 0x3}, 0x7e, &(0x7f00000005c0)={0x5, 0xf, 0x7e, 0x6, [@ptm_cap={0x3}, @ssp_cap={0x10, 0x10, 0xa, 0x1, 0x1, 0x7, 0xf00, 0xa3a, [0xff000f]}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0x9, 0x9, 0xfffe}, @generic={0x42, 0x10, 0x4, "dfa909963b4c4a0a5f93e6fff45ee072e0265d99f99a5467b700c649cb42a77c7eb06c0d601324a9e383b942ef51bc888a1cd17688864ab47fb29ca13dbc07"}, @generic={0x13, 0x10, 0x1, "bfa6bacd313037a66f522459a4efdabd"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0xa3, 0x9, 0x8}]}, 0x4, [{0x4, &(0x7f0000000640)=@lang_id={0x4, 0x3, 0x429}}, {0xb8, &(0x7f0000000680)=@string={0xb8, 0x3, "42705c0d85706ddea3591c3d464f897257f530fb7f333ad5db89ff34e160bd630ad32754ae8d302b4040b733ddd3021c9e0041b51501dc58577d710d7d330a461033ed02f78659b9e6a6d07f525160284581bf9f7b6d74858c3d8fb0294c6d7dac1a859101803450377a0ef39210fb6700f771d15e7b42a9b032f28923b0bc8f38f5c962ae8881b006453fa75001382e5fdd3fa8ebca0c343cf8262a0d4d3bbb66f5724cb55b722d30598bf8562c1ad838f1c92fce2e"}}, {0xee, &(0x7f0000000740)=@string={0xee, 0x3, "fa6e8b74837c661128332dc7a26e58cfb24b28ada9d05c1973d222ba1ff66b18361b559b4b45a9742e86b79717211fc974cb38701973690bea498bba170459c3d0c000c8405f47e5ac1f3975fd438ab062808c46b45c7cd4ee6c6431aff885e241e12f0db4ddccfcedf2320f68bf467ac4c8cc8c42ec72012cb318a13c536c7d7ef62404b87e163944ea949594ba81f14406b251116ecc13257c3ec853daa401e5715097bec00e1d8f60fbd59b5a931d50a9ba8e50b560f531406263c917ce2722c50f8b9b9ece653f1757ffe0b7e4f69dff41f0dcb44992c5e8cf2bd7f343927e85513857734bb918177ce6"}}, {0x4, &(0x7f0000000840)=@lang_id={0x4, 0x3, 0x44e}}]}) 23:11:18 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:11:18 executing program 6: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000001, 0x8010, 0xffffffffffffffff, 0x1) 23:11:18 executing program 6: r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x7, 0x400800) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xc4, 0x0, 0x2, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x4}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x5}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e21}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xddcf}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80000000}, @IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x81}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0xd6e}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x2e}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev={0xac, 0x14, 0x14, 0x20}}, @IPVS_SVC_ATTR_PE_NAME={0x8}]}]}, 0xc4}}, 0x20000080) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) 23:11:18 executing program 3: io_uring_setup(0x3041, 0x0) 23:11:18 executing program 5: syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x801) mmap$usbmon(&(0x7f0000eca000/0x2000)=nil, 0x2000, 0x200000c, 0x11, r0, 0x3fffffffffffffff) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wpan3\x00'}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wpan1\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000700)={'wpan4\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000000700)={'wpan4\x00'}) sendmsg$NL802154_CMD_GET_SEC_DEVKEY(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x20, r1, 0x800, 0x70bd26, 0x25dfdbfd, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4008081) 23:11:18 executing program 3: io_uring_setup(0x3041, 0x0) 23:11:27 executing program 3: io_uring_setup(0x3041, 0x0) 23:11:27 executing program 6: clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000000)={[0xfffffffffffffff9]}, 0x0, &(0x7f0000000080)={r0, r1+10000000}, 0x8) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) 23:11:27 executing program 7: syz_open_dev$usbmon(&(0x7f0000000000), 0x8, 0x400800) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x4c, r0, 0x300, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x3}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0xfd2}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0xc1d}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x473}, @NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x1}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x8c8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0xc0) r1 = syz_open_dev$vcsn(&(0x7f0000000040), 0x7fff, 0x400) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r1, 0x1) r2 = memfd_secret(0x0) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) ioctl$CDROMREADALL(r3, 0x5318, &(0x7f0000000940)) r4 = memfd_secret(0x0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x34000, 0x0) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r5, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x88, 0x0, 0x100, 0x70bd29, 0x25dfdbff, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}]}, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) ioctl$MON_IOCX_MFETCH(r4, 0xc0109207, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x4}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) 23:11:28 executing program 1: syz_usb_connect$hid(0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x2, 0x4, 0x9, 0x20, 0x1f}, 0x2e, &(0x7f0000000080)={0x5, 0xf, 0x2e, 0x4, [@ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x5, 0xf, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "f3467c0fdd67206c155df2f59eeba69c"}, @wireless={0xb, 0x10, 0x1, 0x8, 0x2c, 0x80, 0x3, 0x4, 0x9}]}, 0x6, [{0x4, &(0x7f00000000c0)=@lang_id={0x4, 0x3, 0x425}}, {0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x860}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x424}}, {0xc1, &(0x7f0000000180)=@string={0xc1, 0x3, "32895dce90d627157085c353d7f94cd861200256946f1e7b957200ebcb7088ebb826877a0b86b0f934dc71ba39550de0d221e0952964ee86319a4fc65c41ea14733f81707695bb54d66124588b78f9d5ef53c1103908a97f54387f55b74b4f4bdd47e9580ca75c0a7f3e13b3af501985fb8394a5736005e605475e5b1f7e0534db2efda6ab352db55fbf8c178bc4440e0f4d799a88ae835e7454d7a0c36dd2ad100d7a4087c45832b2a0afc03e974fbae484ade32af76f8a5990c75d6e589e"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x413}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0xf8ff}}]}) 23:11:28 executing program 5: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) ioctl$MON_IOCQ_RING_SIZE(r0, 0x9205) 23:11:28 executing program 0: syz_usb_connect$hid(0x6, 0x36, &(0x7f0000000540)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x46d, 0xc52b, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x2, 0xc0, 0xe7, [{{0x9, 0x4, 0x0, 0x8, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x6, 0x7f, 0x1, {0x22, 0xa8f}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0xfa, 0x8f, 0x2}}}}}]}}]}}, &(0x7f0000000880)={0xa, &(0x7f0000000580)={0xa, 0x6, 0x200, 0x80, 0x1f, 0x3, 0x20, 0x3}, 0x7e, &(0x7f00000005c0)={0x5, 0xf, 0x7e, 0x6, [@ptm_cap={0x3}, @ssp_cap={0x10, 0x10, 0xa, 0x1, 0x1, 0x7, 0xf00, 0xa3a, [0xff000f]}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0x9, 0x9, 0xfffe}, @generic={0x42, 0x10, 0x4, "dfa909963b4c4a0a5f93e6fff45ee072e0265d99f99a5467b700c649cb42a77c7eb06c0d601324a9e383b942ef51bc888a1cd17688864ab47fb29ca13dbc07"}, @generic={0x13, 0x10, 0x1, "bfa6bacd313037a66f522459a4efdabd"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0xa3, 0x9, 0x8}]}, 0x4, [{0x4, &(0x7f0000000640)=@lang_id={0x4, 0x3, 0x429}}, {0xb8, &(0x7f0000000680)=@string={0xb8, 0x3, "42705c0d85706ddea3591c3d464f897257f530fb7f333ad5db89ff34e160bd630ad32754ae8d302b4040b733ddd3021c9e0041b51501dc58577d710d7d330a461033ed02f78659b9e6a6d07f525160284581bf9f7b6d74858c3d8fb0294c6d7dac1a859101803450377a0ef39210fb6700f771d15e7b42a9b032f28923b0bc8f38f5c962ae8881b006453fa75001382e5fdd3fa8ebca0c343cf8262a0d4d3bbb66f5724cb55b722d30598bf8562c1ad838f1c92fce2e"}}, {0xee, &(0x7f0000000740)=@string={0xee, 0x3, "fa6e8b74837c661128332dc7a26e58cfb24b28ada9d05c1973d222ba1ff66b18361b559b4b45a9742e86b79717211fc974cb38701973690bea498bba170459c3d0c000c8405f47e5ac1f3975fd438ab062808c46b45c7cd4ee6c6431aff885e241e12f0db4ddccfcedf2320f68bf467ac4c8cc8c42ec72012cb318a13c536c7d7ef62404b87e163944ea949594ba81f14406b251116ecc13257c3ec853daa401e5715097bec00e1d8f60fbd59b5a931d50a9ba8e50b560f531406263c917ce2722c50f8b9b9ece653f1757ffe0b7e4f69dff41f0dcb44992c5e8cf2bd7f343927e85513857734bb918177ce6"}}, {0x4, &(0x7f0000000840)=@lang_id={0x4, 0x3, 0x44e}}]}) 23:11:28 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x1e, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:11:28 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:11:28 executing program 3: io_uring_setup(0x3041, &(0x7f0000000000)={0x0, 0x0, 0x10, 0x1, 0x39d}) 23:11:28 executing program 5: r0 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x2d03f) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) mmap$usbmon(&(0x7f0000ff2000/0xe000)=nil, 0xe000, 0x200000d, 0x2010, 0xffffffffffffffff, 0x6d840bfa) 23:11:28 executing program 7: syz_open_dev$usbmon(&(0x7f0000000000), 0x8, 0x400800) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x4c, r0, 0x300, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x3}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0xfd2}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0xc1d}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x473}, @NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x1}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x8c8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0xc0) r1 = syz_open_dev$vcsn(&(0x7f0000000040), 0x7fff, 0x400) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r1, 0x1) memfd_secret(0x0) r2 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) ioctl$CDROMREADALL(r2, 0x5318, &(0x7f0000000940)) r3 = memfd_secret(0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x34000, 0x0) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r4, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x88, 0x0, 0x100, 0x70bd29, 0x25dfdbff, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}]}, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) ioctl$MON_IOCX_MFETCH(r3, 0xc0109207, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x4}) 23:11:28 executing program 3: io_uring_setup(0x3041, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x39d}) 23:11:28 executing program 7: syz_open_dev$usbmon(&(0x7f0000000000), 0x8, 0x400800) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x4c, r0, 0x300, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x3}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0xfd2}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0xc1d}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x473}, @NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x1}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x8c8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0xc0) r1 = syz_open_dev$vcsn(&(0x7f0000000040), 0x7fff, 0x400) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r1, 0x1) memfd_secret(0x0) r2 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) ioctl$CDROMREADALL(r2, 0x5318, &(0x7f0000000940)) memfd_secret(0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x34000, 0x0) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r3, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x88, 0x0, 0x100, 0x70bd29, 0x25dfdbff, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}]}, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) 23:11:28 executing program 5: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$usbmon(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3000009, 0x4010, 0xffffffffffffffff, 0x6) r0 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) sendmsg$NL80211_CMD_GET_WOWLAN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x70bd2d, 0x25dfdbff, {{}, {@void, @val={0x8}, @val={0xc, 0x99, {0x80, 0x7a}}}}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x24040800) 23:11:28 executing program 3: io_uring_setup(0x3041, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x39d}) 23:11:28 executing program 7: syz_open_dev$usbmon(&(0x7f0000000000), 0x8, 0x400800) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x4c, r0, 0x300, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x3}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0xfd2}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0xc1d}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x473}, @NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x1}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x8c8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0xc0) r1 = syz_open_dev$vcsn(&(0x7f0000000040), 0x7fff, 0x400) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r1, 0x1) memfd_secret(0x0) r2 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) ioctl$CDROMREADALL(r2, 0x5318, &(0x7f0000000940)) memfd_secret(0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x34000, 0x0) 23:11:28 executing program 3: io_uring_setup(0x3041, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x39d}) 23:11:38 executing program 6: r0 = memfd_secret(0x80000) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x7fffffff}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44}, 0x404c011) r1 = socket(0x23, 0xa, 0x8) r2 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000240), r2) sendmsg$BATADV_CMD_TP_METER_CANCEL(r3, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r4, 0x400, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x7}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40004}, 0x20000094) accept4(r2, &(0x7f0000000100)=@ethernet, &(0x7f0000000180)=0x80, 0x80000) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x50, 0xffffffffffffffff, 0x1) syz_genetlink_get_family_id$tipc(&(0x7f00000001c0), r1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000580), r5) sendmsg$NL802154_CMD_SET_BACKOFF_EXPONENT(r5, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x44, r6, 0x10, 0x70bd26, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x600000006}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_MAX_BE={0x5, 0x10, 0x5}]}, 0x44}}, 0x4000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000580)={&(0x7f00000003c0)={0x18c, r6, 0x300, 0x70bd27, 0x25dfdbfd, {}, [@NL802154_ATTR_SEC_KEY={0xec, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x3}]}, @NL802154_KEY_ATTR_ID={0x4c, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x3}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x1}, @NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x28, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_PAN_ID={0x6}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x2}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa0}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0202}}]}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x3}]}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "4c9ba40107db8142157ac6eaa21cda9d"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x3a}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "e6df587c697c77314009d50e2f334161"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x3f}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "e3545f0b77ae6d06583da8ea818f0456"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "a5efc7681aec34b77be9c8b449316db9"}, @NL802154_KEY_ATTR_ID={0x30, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x3}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x24, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xffff}, @NL802154_DEV_ADDR_ATTR_MODE={0x8}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x1}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x2}]}]}]}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r7}, @NL802154_ATTR_SEC_KEY={0x28, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "4bb8b10f99c03a1ee2261211f842c9216b28bbfc0202ab77564ecb57bb3b555a"}]}, @NL802154_ATTR_SEC_KEY={0x4c, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "bfd3f79a28c3d768845dc99ce6b44e417b3f09d29c77247a8fa248964b315c92"}, @NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "f7b12f4d10746ec2c52dc0bd58ee11e5d567f4baadfc3ceba81b3e878bc5ebe4"}]}]}, 0x18c}, 0x1, 0x0, 0x0, 0x4881}, 0x20000800) 23:11:38 executing program 7: syz_open_dev$usbmon(&(0x7f0000000000), 0x8, 0x400800) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x4c, r0, 0x300, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x3}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0xfd2}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0xc1d}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x473}, @NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x1}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x8c8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0xc0) r1 = syz_open_dev$vcsn(&(0x7f0000000040), 0x7fff, 0x400) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r1, 0x1) memfd_secret(0x0) r2 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) ioctl$CDROMREADALL(r2, 0x5318, &(0x7f0000000940)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x34000, 0x0) 23:11:38 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x1e, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:11:38 executing program 1: syz_usb_connect$hid(0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x2, 0x4, 0x9, 0x20, 0x1f}, 0x2e, &(0x7f0000000080)={0x5, 0xf, 0x2e, 0x4, [@ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x5, 0xf, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "f3467c0fdd67206c155df2f59eeba69c"}, @wireless={0xb, 0x10, 0x1, 0x8, 0x2c, 0x80, 0x3, 0x4, 0x9}]}, 0x6, [{0x4, &(0x7f00000000c0)=@lang_id={0x4, 0x3, 0x425}}, {0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x860}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x424}}, {0xc1, &(0x7f0000000180)=@string={0xc1, 0x3, "32895dce90d627157085c353d7f94cd861200256946f1e7b957200ebcb7088ebb826877a0b86b0f934dc71ba39550de0d221e0952964ee86319a4fc65c41ea14733f81707695bb54d66124588b78f9d5ef53c1103908a97f54387f55b74b4f4bdd47e9580ca75c0a7f3e13b3af501985fb8394a5736005e605475e5b1f7e0534db2efda6ab352db55fbf8c178bc4440e0f4d799a88ae835e7454d7a0c36dd2ad100d7a4087c45832b2a0afc03e974fbae484ade32af76f8a5990c75d6e589e"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x413}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0xf8ff}}]}) 23:11:38 executing program 0: syz_usb_connect$hid(0x6, 0x36, &(0x7f0000000540)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46d, 0xc52b, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x2, 0xc0, 0xe7, [{{0x9, 0x4, 0x0, 0x8, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x6, 0x7f, 0x1, {0x22, 0xa8f}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0xfa, 0x8f, 0x2}}}}}]}}]}}, &(0x7f0000000880)={0xa, &(0x7f0000000580)={0xa, 0x6, 0x200, 0x80, 0x1f, 0x3, 0x20, 0x3}, 0x7e, &(0x7f00000005c0)={0x5, 0xf, 0x7e, 0x6, [@ptm_cap={0x3}, @ssp_cap={0x10, 0x10, 0xa, 0x1, 0x1, 0x7, 0xf00, 0xa3a, [0xff000f]}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0x9, 0x9, 0xfffe}, @generic={0x42, 0x10, 0x4, "dfa909963b4c4a0a5f93e6fff45ee072e0265d99f99a5467b700c649cb42a77c7eb06c0d601324a9e383b942ef51bc888a1cd17688864ab47fb29ca13dbc07"}, @generic={0x13, 0x10, 0x1, "bfa6bacd313037a66f522459a4efdabd"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0xa3, 0x9, 0x8}]}, 0x4, [{0x4, &(0x7f0000000640)=@lang_id={0x4, 0x3, 0x429}}, {0xb8, &(0x7f0000000680)=@string={0xb8, 0x3, "42705c0d85706ddea3591c3d464f897257f530fb7f333ad5db89ff34e160bd630ad32754ae8d302b4040b733ddd3021c9e0041b51501dc58577d710d7d330a461033ed02f78659b9e6a6d07f525160284581bf9f7b6d74858c3d8fb0294c6d7dac1a859101803450377a0ef39210fb6700f771d15e7b42a9b032f28923b0bc8f38f5c962ae8881b006453fa75001382e5fdd3fa8ebca0c343cf8262a0d4d3bbb66f5724cb55b722d30598bf8562c1ad838f1c92fce2e"}}, {0xee, &(0x7f0000000740)=@string={0xee, 0x3, "fa6e8b74837c661128332dc7a26e58cfb24b28ada9d05c1973d222ba1ff66b18361b559b4b45a9742e86b79717211fc974cb38701973690bea498bba170459c3d0c000c8405f47e5ac1f3975fd438ab062808c46b45c7cd4ee6c6431aff885e241e12f0db4ddccfcedf2320f68bf467ac4c8cc8c42ec72012cb318a13c536c7d7ef62404b87e163944ea949594ba81f14406b251116ecc13257c3ec853daa401e5715097bec00e1d8f60fbd59b5a931d50a9ba8e50b560f531406263c917ce2722c50f8b9b9ece653f1757ffe0b7e4f69dff41f0dcb44992c5e8cf2bd7f343927e85513857734bb918177ce6"}}, {0x4, &(0x7f0000000840)=@lang_id={0x4, 0x3, 0x44e}}]}) 23:11:38 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:11:38 executing program 5: ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000940)={0x4c, 0x4, 0x7, 0x1, "f6b33ce0248fc22aecf7693d91f6e689adb4fffe1fb41a2c8f68ae4986e9ca8f"}) r0 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000980)=ANY=[@ANYBLOB="01009d000194000002020000", @ANYRES32=r0, @ANYBLOB="01000100000000002e2f66696c653000"]) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000009c0)=""/47) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) ioctl$CDROM_GET_MCN(r0, 0x5311, &(0x7f0000000a00)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000a40), r0) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000900)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000100)={0x788, r2, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_FEATURES_WANTED={0xcc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x7c, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfff}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ',\x00'}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, ',$&[^)%@+-^\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '.$\xf5\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_BITS={0x40, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10000}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '[\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '&,S\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '+-'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_FEATURES_WANTED={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x9}]}, @ETHTOOL_A_FEATURES_WANTED={0x36c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xc, 0x5, "0821592aa2dfa66b"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x138, 0x3, 0x0, 0x1, [{0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, ']--.,\\/\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '{\'\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '^\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '+\\\xc7\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '\'*\x00'}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, '$\xf4.-:2s$>^(*\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '%)\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '^).[\\}\'\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xc9\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}]}]}, @ETHTOOL_A_BITSET_VALUE={0x5f, 0x4, "7ef522ae82b70d0b1f14ccf1b5e880241a8bd6c435783feab535116f676df77344c6ff2742a45d1eb0f26ec1377a9e213122bcde3f29d26e47ac6a1754012507921872af2fea331bcbe9c712fa605a74ae58bfc03b9cdaf40d0734"}, @ETHTOOL_A_BITSET_MASK={0x4b, 0x5, "f0847d4715396449fd26fa3e7320cda5c8becb7f67699740594156316130a6044f21fb945494209b52d072ffd05f844a9adf40a90e4580e326516182d43c7fef44ef7db9887ea9"}, @ETHTOOL_A_BITSET_MASK={0x6c, 0x5, "6ce44a93bc75e7ce7df6b6fa7b0d4cd0978c9325cf348debb659980d1fdad549591cc9910120e0123fb58fd47613308aa9394a0adf7abd64a6a90cde85c14950238b93babef7e934ee8882e97b7a27cc16342de195eeec89edbd505b43ba1a7eeba91208eb548277"}, @ETHTOOL_A_BITSET_VALUE={0xee, 0x4, "e59a2376842d5094d90d067e787bb2e4266cbd117b2a5949681e5ef999fa6f8183016c80c58e13094b06d508950e216105d52c12e652edbeff53f50670f89ca958e65cf172f15b4743d979950bef7105022ae25d440f5cb632faaf66f4ee241615060e4884c6eecc4a7adb0aae9e6de697588b57eadaaacdf0397033b0aa151d507ac7d172740ac5620dacd2cf0b084f83091788b0b1d7c3118c47222197397bc9f7dd56e0ec33ae2237846be7f85b80bbcff28cdabf9350320f006abda3f05277cebcf296837b9b5efc6842d216498e108bd6580f60bc5fd70d68d7a91823e79ee5cfc99f9852af7993"}, @ETHTOOL_A_BITSET_VALUE={0x15, 0x4, "a935c282b3f63e884b43af149925b2e18b"}]}, @ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @ETHTOOL_A_FEATURES_WANTED={0x1bc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x60, 0x3, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xe13}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, ':/([&.($.(:^\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}]}, {0x4}, {0x4}]}, @ETHTOOL_A_BITSET_MASK={0xdc, 0x5, "4af1901f479178efeac5831f9eb7b2158ccec4c5294f8de1eb75f6dbfbbb28a5c72f9bbd8e15ef22d752078d76c325a9a47d4c692477cc634d0ac59cffdd76e755b796aa88cad3500ac9195d5b0e3a7ef6892e0f572bb3e241c255a7822bcb74029c4821b900872be4a96b0c619332fdb94ed691ac42677a122b9a20cdb1c858db8802c538ba4c84a7abdaeacddfddb5cad446198687c06eac6b7124ec9cf49672adef9557259724170343b3f35e84e7aa4997cd7c27ceecb54e8fa4cddd8f9ec6023caa7d018545300b19517e8d9fbdb989b25ac8e5325d"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x74, 0x5, "5c1c892dad2ac634b92115f6da9c61678579781fdad20eaa4b0943cf7127bd6fd6ea601988b1e57e445ea67efe32494a0d6b012cf0977c63330fe6e56d4260d186c9ab6115fadf45d2ac666aeaa8c57b983b263356764d577173fad67ad6bb7774c2ef032e77d92de40493ca2e61aa05"}]}, @ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x130, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x100, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0x29, 0x5, "0a102ae801012e4ea9ef65b5b2ada595acb2654564a69ea0fe16083ad85213df8e575dbbe5"}]}, @ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x788}, 0x1, 0x0, 0x0, 0x80c0}, 0x1000) r4 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r4) ioctl$EVIOCSKEYCODE_V2(r4, 0x40284504, &(0x7f0000000a80)={0xfc, 0x1c, 0x0, 0xb9, "5feb932ebaac34337958a6a79b1c49acb35460cbb234f40f63872ec9f831b2e8"}) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:11:38 executing program 3: io_uring_setup(0x3041, &(0x7f0000000000)) 23:11:38 executing program 7: syz_open_dev$usbmon(&(0x7f0000000000), 0x8, 0x400800) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x4c, r0, 0x300, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x3}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0xfd2}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0xc1d}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x473}, @NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x1}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x8c8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0xc0) r1 = syz_open_dev$vcsn(&(0x7f0000000040), 0x7fff, 0x400) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r1, 0x1) memfd_secret(0x0) r2 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x34000, 0x0) 23:11:38 executing program 7: syz_open_dev$usbmon(&(0x7f0000000000), 0x8, 0x400800) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x4c, r0, 0x300, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x3}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0xfd2}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0xc1d}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x473}, @NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x1}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x8c8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0xc0) r1 = syz_open_dev$vcsn(&(0x7f0000000040), 0x7fff, 0x400) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r1, 0x1) memfd_secret(0x0) memfd_secret(0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x34000, 0x0) 23:11:38 executing program 5: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x40010, 0xffffffffffffffff, 0x8000) read$usbmon(0xffffffffffffffff, &(0x7f0000000000)=""/128, 0x80) 23:11:38 executing program 5: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x7) 23:11:38 executing program 3: clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000000)={[0xfffffffffffffff9]}, 0x0, &(0x7f0000000080)={r0, r1+10000000}, 0x8) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) 23:11:38 executing program 7: syz_open_dev$usbmon(&(0x7f0000000000), 0x8, 0x400800) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x4c, r0, 0x300, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x3}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0xfd2}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0xc1d}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x473}, @NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x1}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x8c8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0xc0) r1 = syz_open_dev$vcsn(&(0x7f0000000040), 0x7fff, 0x400) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r1, 0x1) memfd_secret(0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x34000, 0x0) 23:11:38 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_OFF(0x3b, 0x0) r0 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x10, r0, 0x0) 23:11:38 executing program 7: syz_open_dev$usbmon(&(0x7f0000000000), 0x8, 0x400800) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x4c, r0, 0x300, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x3}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0xfd2}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0xc1d}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x473}, @NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x1}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x8c8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0xc0) r1 = syz_open_dev$vcsn(&(0x7f0000000040), 0x7fff, 0x400) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r1, 0x1) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x34000, 0x0) 23:11:38 executing program 6: r0 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x82000088}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x6c, r0, 0x300, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xe0}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x6}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DST={0x14, 0x1, @remote}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1f}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x791}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x1, 0x3ff]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000040}, 0xc0) 23:11:47 executing program 3: clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000000)={[0xfffffffffffffff9]}, 0x0, &(0x7f0000000080)={r0, r1+10000000}, 0x8) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) 23:11:47 executing program 5: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x810, 0xffffffffffffffff, 0x20) 23:11:47 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, 0x0, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:11:47 executing program 0: syz_usb_connect$hid(0x6, 0x36, &(0x7f0000000540)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46d, 0xc52b, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0xc0, 0xe7, [{{0x9, 0x4, 0x0, 0x8, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x6, 0x7f, 0x1, {0x22, 0xa8f}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0xfa, 0x8f, 0x2}}}}}]}}]}}, &(0x7f0000000880)={0xa, &(0x7f0000000580)={0xa, 0x6, 0x200, 0x80, 0x1f, 0x3, 0x20, 0x3}, 0x7e, &(0x7f00000005c0)={0x5, 0xf, 0x7e, 0x6, [@ptm_cap={0x3}, @ssp_cap={0x10, 0x10, 0xa, 0x1, 0x1, 0x7, 0xf00, 0xa3a, [0xff000f]}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0x9, 0x9, 0xfffe}, @generic={0x42, 0x10, 0x4, "dfa909963b4c4a0a5f93e6fff45ee072e0265d99f99a5467b700c649cb42a77c7eb06c0d601324a9e383b942ef51bc888a1cd17688864ab47fb29ca13dbc07"}, @generic={0x13, 0x10, 0x1, "bfa6bacd313037a66f522459a4efdabd"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0xa3, 0x9, 0x8}]}, 0x4, [{0x4, &(0x7f0000000640)=@lang_id={0x4, 0x3, 0x429}}, {0xb8, &(0x7f0000000680)=@string={0xb8, 0x3, "42705c0d85706ddea3591c3d464f897257f530fb7f333ad5db89ff34e160bd630ad32754ae8d302b4040b733ddd3021c9e0041b51501dc58577d710d7d330a461033ed02f78659b9e6a6d07f525160284581bf9f7b6d74858c3d8fb0294c6d7dac1a859101803450377a0ef39210fb6700f771d15e7b42a9b032f28923b0bc8f38f5c962ae8881b006453fa75001382e5fdd3fa8ebca0c343cf8262a0d4d3bbb66f5724cb55b722d30598bf8562c1ad838f1c92fce2e"}}, {0xee, &(0x7f0000000740)=@string={0xee, 0x3, "fa6e8b74837c661128332dc7a26e58cfb24b28ada9d05c1973d222ba1ff66b18361b559b4b45a9742e86b79717211fc974cb38701973690bea498bba170459c3d0c000c8405f47e5ac1f3975fd438ab062808c46b45c7cd4ee6c6431aff885e241e12f0db4ddccfcedf2320f68bf467ac4c8cc8c42ec72012cb318a13c536c7d7ef62404b87e163944ea949594ba81f14406b251116ecc13257c3ec853daa401e5715097bec00e1d8f60fbd59b5a931d50a9ba8e50b560f531406263c917ce2722c50f8b9b9ece653f1757ffe0b7e4f69dff41f0dcb44992c5e8cf2bd7f343927e85513857734bb918177ce6"}}, {0x4, &(0x7f0000000840)=@lang_id={0x4, 0x3, 0x44e}}]}) 23:11:47 executing program 6: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x2400, 0x0) syz_open_dev$vcsn(&(0x7f0000000540), 0x80, 0x102) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(r0, &(0x7f0000000500)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={&(0x7f00000000c0)={0x3e4, r1, 0x300, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_TX_RATES={0x3c, 0x5a, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x38, 0x2, 0x0, 0x1, [@NL80211_TXRATE_HT={0x8, 0x2, [{0x7, 0x1}, {0x6, 0xa}, {0x0, 0x5}, {0x7}]}, @NL80211_TXRATE_LEGACY={0x22, 0x1, [0x60, 0x16, 0xc, 0xc, 0x48, 0x5, 0x1, 0x6c, 0x60, 0x6, 0x2, 0x16, 0x18, 0x30, 0x30, 0x12, 0x16, 0x60, 0x65, 0x2, 0x1, 0xc, 0x0, 0x1, 0x4, 0x0, 0x5, 0x30, 0x24, 0x9]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}]}, @NL80211_ATTR_TX_RATES={0x38c, 0x5a, 0x0, 0x1, [@NL80211_BAND_5GHZ={0xc, 0x1, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}, @NL80211_BAND_6GHZ={0xf0, 0x3, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x24, 0x0, 0x7, 0x1, 0x5, 0x200, 0x0, 0x100]}}, @NL80211_TXRATE_HT={0x1b, 0x2, [{0x3, 0x5}, {0x1}, {0x1, 0x7}, {0x0, 0x5}, {0x5, 0x1}, {0x0, 0x8}, {0x4, 0x6}, {0x4, 0x5}, {0x0, 0x4}, {0x3, 0x3}, {0x1, 0x9}, {0x7, 0x4}, {0x3, 0x5}, {0x0, 0x4}, {0x1, 0x7}, {0x7, 0x2}, {0x5, 0x2}, {0x5}, {0x1, 0x2}, {0x1}, {0x4, 0x1}, {0x4, 0x6}, {0x1, 0x8}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x5, 0xcc6, 0x4, 0x3, 0x1fc, 0x4b, 0x800, 0x3ff]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x7, 0x8001, 0x1, 0x2, 0x0, 0x2, 0xfff8, 0x6]}}, @NL80211_TXRATE_LEGACY={0xc, 0x1, [0x1b, 0x18, 0x0, 0x5, 0x1b, 0x12, 0x30, 0x36]}, @NL80211_TXRATE_HT={0x4b, 0x2, [{}, {0x7, 0x8}, {0x1, 0x5}, {0x6, 0x7}, {0x7, 0x4}, {0x5, 0xa}, {0x7, 0x5}, {0x4, 0x1}, {0x6, 0x1}, {0x1}, {0x0, 0x8}, {0x2}, {0x3, 0x3}, {0x5, 0x6}, {0x5, 0x7}, {0x2, 0x2}, {0x7, 0x8}, {0x0, 0x9}, {0x4, 0x5}, {0x1, 0x5}, {0x0, 0x3}, {0x2, 0x6}, {0x2, 0x1}, {0x5, 0x6}, {0x7}, {0x1, 0x8}, {0x3, 0x5}, {0x3, 0x3}, {0x2, 0xa}, {0x6, 0x1}, {0x3, 0x7}, {0x5, 0x3}, {0x4}, {0x6, 0x4}, {0x3, 0x7}, {0x3, 0x6}, {0x0, 0x7}, {0x3, 0x8}, {0x6, 0x7}, {0x6, 0xa}, {0x3, 0x7}, {0x6, 0x3}, {0x6, 0x3}, {0x0, 0x1}, {0x7, 0x3}, {0x2, 0x9}, {0x7, 0x6}, {0x2, 0x4}, {0x3}, {0x6, 0x8}, {0x4, 0x5}, {0x3, 0x5}, {0x1}, {0x7, 0x5}, {0x7, 0x7}, {0x7, 0x9}, {0x7, 0xa}, {0x0, 0x1}, {0x4, 0x8}, {0x6, 0x1}, {0x3, 0x3}, {0x0, 0x5}, {0x4, 0x9}, {0x1, 0x3}, {0x2, 0x8}, {0x7, 0x2}, {0x3, 0x6}, {0x5, 0x3}, {0x6, 0x7}, {0x2}, {0x1, 0x1}]}, @NL80211_TXRATE_HT={0x25, 0x2, [{0x5, 0x6}, {0x2}, {0x0, 0x3}, {0x5}, {0x1, 0x3}, {0x1, 0x5}, {0x1}, {0x4, 0x4}, {0x0, 0x4}, {0x3, 0x9}, {0x2, 0x6}, {0x6, 0x5}, {0x5, 0x6}, {0x0, 0xa}, {0x0, 0x9}, {0x3, 0x3}, {0x0, 0x5}, {0x3, 0x3}, {0x1, 0x3}, {0x5}, {0x4, 0x9}, {0x7, 0x2}, {0x0, 0x4}, {0x2, 0x8}, {0x1, 0x3}, {0x4}, {0x1, 0xa}, {0x1, 0x1}, {0x5, 0xa}, {0x6, 0x5}, {0x5, 0x5}, {0x6, 0x7}, {0x7}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x2, 0x3f, 0xb2, 0x93b, 0x100, 0x8818]}}]}, @NL80211_BAND_6GHZ={0xe4, 0x3, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x1, 0x2, 0xe66, 0x4, 0x0, 0x1, 0x86, 0x800]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x7f, 0xb5c, 0x6, 0x800, 0xfff, 0x800, 0x2, 0x2]}}, @NL80211_TXRATE_LEGACY={0x19, 0x1, [0x30, 0x1, 0xc, 0x48, 0x1, 0x18, 0x18, 0x36, 0x60, 0x1b, 0x1, 0x30, 0x16, 0x6c, 0x6c, 0x48, 0xc, 0x5, 0x1, 0x6, 0x9]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x400, 0x0, 0xffff, 0xfffe, 0x8, 0x2, 0x1, 0x1]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x6, 0x1, 0x2, 0x2, 0x9, 0x1000, 0x5, 0x9]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x3, 0x4, 0x579, 0x9, 0xfff, 0xff, 0x0, 0xfff7]}}, @NL80211_TXRATE_LEGACY={0x7, 0x1, [0x1b, 0x36, 0x2]}, @NL80211_TXRATE_LEGACY={0x1e, 0x1, [0xb, 0x48, 0x6c, 0x60, 0x18, 0x6, 0x5, 0x48, 0x5, 0x16, 0x30, 0x3380a85b9e87d379, 0x60, 0x36, 0x6c, 0x2, 0x2, 0x1b, 0x2, 0x5, 0x48, 0xb, 0x3, 0x1b, 0x48, 0x3]}, @NL80211_TXRATE_LEGACY={0x21, 0x1, [0x24, 0xb, 0x9, 0x18, 0x16, 0x9, 0x6, 0x24, 0xc, 0x16, 0x30, 0x4, 0x4, 0x30, 0x3, 0x6, 0x18, 0x6c, 0x60, 0x1b, 0x1, 0x16, 0x60, 0x24, 0x6, 0x3, 0x3, 0x4, 0x36]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xac7, 0x8, 0x1, 0x797, 0xff, 0x3, 0x1f, 0x2]}}]}, @NL80211_BAND_60GHZ={0x30, 0x2, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x4}, @NL80211_TXRATE_LEGACY={0x11, 0x1, [0x12, 0x5, 0x48, 0x1b, 0x3d, 0x60, 0xc, 0x12, 0x16, 0x1, 0xc, 0x18, 0x48]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xff, 0x200, 0x7, 0x401, 0x5, 0x7a, 0x7, 0x9]}}]}, @NL80211_BAND_5GHZ={0x54, 0x1, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_LEGACY={0xb, 0x1, [0x6c, 0x30, 0x4, 0x12, 0x9, 0x6c, 0x36]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_HT={0x33, 0x2, [{0x1, 0xb}, {0x1, 0x6}, {0x3, 0x5}, {0x2, 0x4}, {0x1, 0x7}, {0x2, 0x2}, {0x7, 0x2}, {0x1, 0x5}, {0x3, 0xa}, {0x3, 0x7}, {0x1, 0xa}, {0x0, 0x3}, {0x4, 0x1}, {0x3, 0x3}, {0x2, 0xa}, {0x0, 0x2}, {0x5, 0x1}, {0x6, 0x3}, {0x7}, {0x6, 0xa}, {0x6, 0x1}, {0x3, 0x3}, {0x0, 0x3}, {0x5, 0x6}, {0x2, 0x9}, {0x7, 0xa}, {0x1, 0x3}, {0x6, 0x9}, {0x7, 0x8}, {0x3, 0x7}, {0x7, 0x7}, {0x0, 0x1}, {0x6, 0x6}, {0x3, 0xa}, {0x6, 0x5}, {0x1, 0x4}, {0x0, 0x5}, {0x5, 0xa}, {0x3, 0x6}, {0x0, 0x7}, {0x7, 0x6}, {0x0, 0xa}, {0x2, 0xa}, {0x5, 0xa}, {0x2, 0x4}, {0x4, 0x4}, {0x5}]}]}, @NL80211_BAND_60GHZ={0xa8, 0x2, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x8, 0x0, 0x6, 0x4b89, 0x96c, 0x0, 0x959, 0x100]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x8, 0x800, 0x2a, 0x4, 0x7ff, 0xffe1, 0x3ff, 0x3f]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_LEGACY={0x21, 0x1, [0x1b, 0x60, 0x36, 0x24, 0x48, 0x12, 0x6a, 0x60, 0x1, 0x9, 0x6c, 0x6, 0x5, 0x3, 0x33, 0x30, 0x2, 0x12, 0x4, 0x30, 0x16, 0x3, 0x5d468d876b5e2465, 0x12, 0x9, 0x6c, 0x65, 0x36, 0x1]}, @NL80211_TXRATE_HT={0x47, 0x2, [{0x2}, {0x4, 0x8}, {0x6, 0x6}, {0x1, 0x8}, {0x3, 0x4}, {0x2, 0xa}, {0x6, 0x4}, {0x6, 0x1}, {0x4}, {0x1, 0x3}, {0x1, 0x9}, {0x6, 0x8}, {0x2, 0x6}, {0x6, 0x3}, {0x0, 0xa}, {0x6, 0x7}, {0x4, 0x3}, {0x1, 0x5}, {0x1, 0x9}, {0x0, 0x6}, {0x6, 0x1}, {0x0, 0x9}, {0x7, 0x6}, {0x3, 0xa}, {0x1, 0x9}, {0x4, 0xa}, {0x1, 0x3}, {0x5, 0x4}, {0x0, 0x9}, {0x1, 0xa}, {0x1, 0x2}, {0x6, 0x9}, {0x2, 0x6}, {0x1, 0xa}, {0x7, 0x3}, {0x1, 0x6}, {0x5}, {0x7, 0x6}, {0x3, 0x2}, {0x6, 0x3}, {0x0, 0xa}, {0x0, 0x9}, {0x4, 0x9}, {0x5, 0x9}, {0x6, 0x3}, {0x2}, {0x5, 0x1}, {0x3}, {0x4, 0x5}, {0x0, 0x7}, {0x1, 0x8}, {0x4, 0x4}, {0x6, 0x4}, {0x2, 0x7}, {0x1, 0x2}, {0x6, 0x9}, {0x2, 0x2}, {0x0, 0x9}, {0x3, 0x3}, {0x2, 0x4}, {0x4, 0x5}, {0x3, 0xa}, {0x0, 0x7}, {0x6, 0x9}, {0x0, 0x9}, {0x2, 0xa}, {0x5, 0x4}]}]}, @NL80211_BAND_60GHZ={0x5c, 0x2, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x21, 0x1, [0x6c, 0x60, 0x3, 0x60, 0x48, 0xc121f3ba0fee91fc, 0x3, 0x30, 0x5, 0x6, 0x18, 0x1b, 0x9, 0x6, 0x24, 0x9, 0x16, 0xc, 0x3, 0x60, 0xc, 0x5, 0x18, 0x1, 0x48, 0x21, 0x36, 0xb, 0x60]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xce, 0x231, 0x80e, 0x656e, 0x0, 0x0, 0xff25, 0x6]}}, @NL80211_TXRATE_HT={0xf, 0x2, [{0x5, 0x2}, {0x1, 0xa}, {0x0, 0x8}, {0x6, 0x7}, {0x4, 0x7}, {0x7, 0x2}, {0x1, 0x8}, {0x0, 0x2}, {0x7, 0x4}, {0x1, 0x9}, {0x1, 0x4}]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x3}]}, @NL80211_BAND_6GHZ={0x20, 0x3, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x5, 0x7, 0xb4, 0x8, 0x8, 0x2, 0x200]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}]}]}]}, 0x3e4}, 0x1, 0x0, 0x0, 0x4000}, 0x20000800) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) 23:11:47 executing program 7: syz_open_dev$usbmon(&(0x7f0000000000), 0x8, 0x400800) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x4c, r0, 0x300, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x3}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0xfd2}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0xc1d}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x473}, @NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x1}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x8c8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0xc0) syz_open_dev$vcsn(&(0x7f0000000040), 0x7fff, 0x400) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x34000, 0x0) 23:11:47 executing program 1: syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28bd, 0x74, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x51, 0x40, 0x7, [{{0x9, 0x4, 0x0, 0x40, 0x1, 0x3, 0x1, 0x3, 0x2, {0x9, 0x21, 0xaa6b, 0xc6, 0x1, {0x22, 0x3aa}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x1, 0x1, 0x20}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0x0, 0x5, 0x20}}]}}}]}}]}}, &(0x7f0000000300)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x2, 0x4, 0x9, 0x20, 0x1f}, 0x2e, &(0x7f0000000080)={0x5, 0xf, 0x2e, 0x4, [@ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x5, 0xf, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "f3467c0fdd67206c155df2f59eeba69c"}, @wireless={0xb, 0x10, 0x1, 0x8, 0x2c, 0x80, 0x3, 0x4, 0x9}]}, 0x6, [{0x4, &(0x7f00000000c0)=@lang_id={0x4, 0x3, 0x425}}, {0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x860}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x424}}, {0xc1, &(0x7f0000000180)=@string={0xc1, 0x3, "32895dce90d627157085c353d7f94cd861200256946f1e7b957200ebcb7088ebb826877a0b86b0f934dc71ba39550de0d221e0952964ee86319a4fc65c41ea14733f81707695bb54d66124588b78f9d5ef53c1103908a97f54387f55b74b4f4bdd47e9580ca75c0a7f3e13b3af501985fb8394a5736005e605475e5b1f7e0534db2efda6ab352db55fbf8c178bc4440e0f4d799a88ae835e7454d7a0c36dd2ad100d7a4087c45832b2a0afc03e974fbae484ade32af76f8a5990c75d6e589e"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x413}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0xf8ff}}]}) 23:11:47 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x23, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:11:47 executing program 6: mmap$usbmon(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x1) read$usbmon(0xffffffffffffffff, &(0x7f0000000000)=""/200, 0xc8) [ 2290.440328] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2290.444450] misc raw-gadget: fail, usb_gadget_register_driver returned -16 23:11:47 executing program 5: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x8, 0x22000) ioctl$MON_IOCQ_RING_SIZE(r0, 0x9205) 23:11:47 executing program 7: syz_open_dev$usbmon(&(0x7f0000000000), 0x8, 0x400800) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x4c, r0, 0x300, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x3}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0xfd2}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0xc1d}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x473}, @NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x1}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x8c8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0xc0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x34000, 0x0) 23:11:47 executing program 6: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x8, 0x260980) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000181000000000000", @ANYRES32=r0, @ANYBLOB="07000000060000000038b4da89907e99e6f519473ba225718cbf196852b99bbfd8648a3eaac6d33a6c3b854c922c17040b31c942c4ffeb02d174648c8fffe6e90b2f4f07eb24482635ab2d245c9dda765eb43a"]) ioctl$CDROM_SELECT_DISK(r1, 0x5322, 0x2) r2 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) mmap$usbmon(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x4000010, r2, 0x401) gettid() 23:11:47 executing program 5: mmap$usbmon(&(0x7f0000ff2000/0xe000)=nil, 0xe000, 0x8, 0x10, 0xffffffffffffffff, 0x2) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x208000, 0x0) 23:11:47 executing program 7: syz_open_dev$usbmon(&(0x7f0000000000), 0x8, 0x400800) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x34000, 0x0) 23:11:47 executing program 5: r0 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) ioctl$CDROMSTOP(r0, 0x5307) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:11:47 executing program 6: r0 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000008, 0x10, r0, 0x1) 23:11:57 executing program 3: clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000000)={[0xfffffffffffffff9]}, 0x0, &(0x7f0000000080)={r0, r1+10000000}, 0x8) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) 23:11:57 executing program 7: syz_open_dev$usbmon(&(0x7f0000000000), 0x8, 0x400800) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x34000, 0x0) 23:11:57 executing program 0: syz_usb_connect$hid(0x6, 0x36, &(0x7f0000000540)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46d, 0xc52b, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0xe7, [{{0x9, 0x4, 0x0, 0x8, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x6, 0x7f, 0x1, {0x22, 0xa8f}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0xfa, 0x8f, 0x2}}}}}]}}]}}, &(0x7f0000000880)={0xa, &(0x7f0000000580)={0xa, 0x6, 0x200, 0x80, 0x1f, 0x3, 0x20, 0x3}, 0x7e, &(0x7f00000005c0)={0x5, 0xf, 0x7e, 0x6, [@ptm_cap={0x3}, @ssp_cap={0x10, 0x10, 0xa, 0x1, 0x1, 0x7, 0xf00, 0xa3a, [0xff000f]}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0x9, 0x9, 0xfffe}, @generic={0x42, 0x10, 0x4, "dfa909963b4c4a0a5f93e6fff45ee072e0265d99f99a5467b700c649cb42a77c7eb06c0d601324a9e383b942ef51bc888a1cd17688864ab47fb29ca13dbc07"}, @generic={0x13, 0x10, 0x1, "bfa6bacd313037a66f522459a4efdabd"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0xa3, 0x9, 0x8}]}, 0x4, [{0x4, &(0x7f0000000640)=@lang_id={0x4, 0x3, 0x429}}, {0xb8, &(0x7f0000000680)=@string={0xb8, 0x3, "42705c0d85706ddea3591c3d464f897257f530fb7f333ad5db89ff34e160bd630ad32754ae8d302b4040b733ddd3021c9e0041b51501dc58577d710d7d330a461033ed02f78659b9e6a6d07f525160284581bf9f7b6d74858c3d8fb0294c6d7dac1a859101803450377a0ef39210fb6700f771d15e7b42a9b032f28923b0bc8f38f5c962ae8881b006453fa75001382e5fdd3fa8ebca0c343cf8262a0d4d3bbb66f5724cb55b722d30598bf8562c1ad838f1c92fce2e"}}, {0xee, &(0x7f0000000740)=@string={0xee, 0x3, "fa6e8b74837c661128332dc7a26e58cfb24b28ada9d05c1973d222ba1ff66b18361b559b4b45a9742e86b79717211fc974cb38701973690bea498bba170459c3d0c000c8405f47e5ac1f3975fd438ab062808c46b45c7cd4ee6c6431aff885e241e12f0db4ddccfcedf2320f68bf467ac4c8cc8c42ec72012cb318a13c536c7d7ef62404b87e163944ea949594ba81f14406b251116ecc13257c3ec853daa401e5715097bec00e1d8f60fbd59b5a931d50a9ba8e50b560f531406263c917ce2722c50f8b9b9ece653f1757ffe0b7e4f69dff41f0dcb44992c5e8cf2bd7f343927e85513857734bb918177ce6"}}, {0x4, &(0x7f0000000840)=@lang_id={0x4, 0x3, 0x44e}}]}) 23:11:57 executing program 5: mmap$usbmon(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000009, 0x50, 0xffffffffffffffff, 0x3ff) r0 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r1 = accept4(r0, 0x0, &(0x7f0000000040), 0x0) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, 0x0, 0x4, 0x70bd27, 0x25dfdbff, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e22}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @empty}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private0}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000000)={0x8af, 0x0, 0x4, 0x9, 0x6ca, 0x4f}) 23:11:57 executing program 6: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x50, 0xffffffffffffffff, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) 23:11:57 executing program 1: syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28bd, 0x74, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x51, 0x40, 0x7, [{{0x9, 0x4, 0x0, 0x40, 0x1, 0x3, 0x1, 0x3, 0x2, {0x9, 0x21, 0xaa6b, 0xc6, 0x1, {0x22, 0x3aa}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x1, 0x1, 0x20}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0x0, 0x5, 0x20}}]}}}]}}]}}, &(0x7f0000000300)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x2, 0x4, 0x9, 0x20, 0x1f}, 0x2e, &(0x7f0000000080)={0x5, 0xf, 0x2e, 0x4, [@ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x5, 0xf, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "f3467c0fdd67206c155df2f59eeba69c"}, @wireless={0xb, 0x10, 0x1, 0x8, 0x2c, 0x80, 0x3, 0x4, 0x9}]}, 0x6, [{0x4, &(0x7f00000000c0)=@lang_id={0x4, 0x3, 0x425}}, {0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x860}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x424}}, {0xc1, &(0x7f0000000180)=@string={0xc1, 0x3, "32895dce90d627157085c353d7f94cd861200256946f1e7b957200ebcb7088ebb826877a0b86b0f934dc71ba39550de0d221e0952964ee86319a4fc65c41ea14733f81707695bb54d66124588b78f9d5ef53c1103908a97f54387f55b74b4f4bdd47e9580ca75c0a7f3e13b3af501985fb8394a5736005e605475e5b1f7e0534db2efda6ab352db55fbf8c178bc4440e0f4d799a88ae835e7454d7a0c36dd2ad100d7a4087c45832b2a0afc03e974fbae484ade32af76f8a5990c75d6e589e"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x413}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0xf8ff}}]}) 23:11:57 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, 0x0, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:11:57 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x23, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:11:58 executing program 7: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x34000, 0x0) 23:11:58 executing program 6: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) ioctl$MON_IOCX_GET(0xffffffffffffffff, 0x40189206, &(0x7f0000000100)={&(0x7f0000000000), &(0x7f0000000140)=""/133, 0x85}) [ 2300.806910] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2300.819552] misc raw-gadget: fail, usb_gadget_register_driver returned -16 23:11:58 executing program 5: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x10000, 0xb9e9}}, './file0\x00'}) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f0000000100)={&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000080)=""/84, 0x54}) 23:11:58 executing program 7: openat$vcsa(0xffffffffffffff9c, 0x0, 0x34000, 0x0) 23:11:58 executing program 6: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x2) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000080)={0xfffffffc, 0xffffffff, 0x42, 0x0, 0x5, 0x8000}) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) mmap$usbmon(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000008, 0x10, 0xffffffffffffffff, 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0xd5, 0x161200) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4400004}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x4c, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x1}, @NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x1}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x529}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x633}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x62c}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x9d6}]}, 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x4) accept(r0, &(0x7f0000000140)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f00000002c0)=0x80) 23:11:58 executing program 5: r0 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) sendmsg$TIPC_NL_KEY_FLUSH(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="b0000000", @ANYRES16=0x0, @ANYBLOB="080008000000fedbdf2518000000240007800c000400aa000000000000000c000400ff070000000000000800020003000000780006806e00030080b04003dfec24277347ac2ea8d3c4695aaefebc9f6085b5053df3d1f97c7626890d73f05ff5817533664286be6c9019feaf5571a897b989d6ba4576c459f065651b7f691151eab267f99bc25e591918cad7cc22c59cb9930eda60204b3b6f688552728548c6a1a64b98000004000200"], 0xb0}, 0x1, 0x0, 0x0, 0x4050}, 0x4004080) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000700)={'wpan4\x00'}) r2 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), r0) sendmsg$NL80211_CMD_DEL_INTERFACE(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r3, 0x300, 0x70bd29, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}}, 0x30004010) sendmsg$NL802154_CMD_SET_MAX_CSMA_BACKOFFS(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x1) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:11:58 executing program 7: openat$vcsa(0xffffffffffffff9c, 0x0, 0x34000, 0x0) 23:11:58 executing program 7: openat$vcsa(0xffffffffffffff9c, 0x0, 0x34000, 0x0) 23:12:08 executing program 3: clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000000)={[0xfffffffffffffff9]}, 0x0, &(0x7f0000000080)={r0, r1+10000000}, 0x8) 23:12:08 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x23, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:12:08 executing program 6: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x80010, 0xffffffffffffffff, 0x1) 23:12:08 executing program 0: syz_usb_connect$hid(0x6, 0x36, &(0x7f0000000540)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46d, 0xc52b, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x8, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x6, 0x7f, 0x1, {0x22, 0xa8f}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0xfa, 0x8f, 0x2}}}}}]}}]}}, &(0x7f0000000880)={0xa, &(0x7f0000000580)={0xa, 0x6, 0x200, 0x80, 0x1f, 0x3, 0x20, 0x3}, 0x7e, &(0x7f00000005c0)={0x5, 0xf, 0x7e, 0x6, [@ptm_cap={0x3}, @ssp_cap={0x10, 0x10, 0xa, 0x1, 0x1, 0x7, 0xf00, 0xa3a, [0xff000f]}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0x9, 0x9, 0xfffe}, @generic={0x42, 0x10, 0x4, "dfa909963b4c4a0a5f93e6fff45ee072e0265d99f99a5467b700c649cb42a77c7eb06c0d601324a9e383b942ef51bc888a1cd17688864ab47fb29ca13dbc07"}, @generic={0x13, 0x10, 0x1, "bfa6bacd313037a66f522459a4efdabd"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0xa3, 0x9, 0x8}]}, 0x4, [{0x4, &(0x7f0000000640)=@lang_id={0x4, 0x3, 0x429}}, {0xb8, &(0x7f0000000680)=@string={0xb8, 0x3, "42705c0d85706ddea3591c3d464f897257f530fb7f333ad5db89ff34e160bd630ad32754ae8d302b4040b733ddd3021c9e0041b51501dc58577d710d7d330a461033ed02f78659b9e6a6d07f525160284581bf9f7b6d74858c3d8fb0294c6d7dac1a859101803450377a0ef39210fb6700f771d15e7b42a9b032f28923b0bc8f38f5c962ae8881b006453fa75001382e5fdd3fa8ebca0c343cf8262a0d4d3bbb66f5724cb55b722d30598bf8562c1ad838f1c92fce2e"}}, {0xee, &(0x7f0000000740)=@string={0xee, 0x3, "fa6e8b74837c661128332dc7a26e58cfb24b28ada9d05c1973d222ba1ff66b18361b559b4b45a9742e86b79717211fc974cb38701973690bea498bba170459c3d0c000c8405f47e5ac1f3975fd438ab062808c46b45c7cd4ee6c6431aff885e241e12f0db4ddccfcedf2320f68bf467ac4c8cc8c42ec72012cb318a13c536c7d7ef62404b87e163944ea949594ba81f14406b251116ecc13257c3ec853daa401e5715097bec00e1d8f60fbd59b5a931d50a9ba8e50b560f531406263c917ce2722c50f8b9b9ece653f1757ffe0b7e4f69dff41f0dcb44992c5e8cf2bd7f343927e85513857734bb918177ce6"}}, {0x4, &(0x7f0000000840)=@lang_id={0x4, 0x3, 0x44e}}]}) 23:12:08 executing program 7: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) 23:12:08 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, 0x0, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:12:08 executing program 1: syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28bd, 0x74, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x0, 0x40, 0x7, [{{0x9, 0x4, 0x0, 0x40, 0x1, 0x3, 0x1, 0x3, 0x2, {0x9, 0x21, 0xaa6b, 0xc6, 0x1, {0x22, 0x3aa}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x1, 0x1, 0x20}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0x0, 0x5, 0x20}}]}}}]}}]}}, &(0x7f0000000300)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x2, 0x4, 0x9, 0x20, 0x1f}, 0x2e, &(0x7f0000000080)={0x5, 0xf, 0x2e, 0x4, [@ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x5, 0xf, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "f3467c0fdd67206c155df2f59eeba69c"}, @wireless={0xb, 0x10, 0x1, 0x8, 0x2c, 0x80, 0x3, 0x4, 0x9}]}, 0x6, [{0x4, &(0x7f00000000c0)=@lang_id={0x4, 0x3, 0x425}}, {0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x860}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x424}}, {0xc1, &(0x7f0000000180)=@string={0xc1, 0x3, "32895dce90d627157085c353d7f94cd861200256946f1e7b957200ebcb7088ebb826877a0b86b0f934dc71ba39550de0d221e0952964ee86319a4fc65c41ea14733f81707695bb54d66124588b78f9d5ef53c1103908a97f54387f55b74b4f4bdd47e9580ca75c0a7f3e13b3af501985fb8394a5736005e605475e5b1f7e0534db2efda6ab352db55fbf8c178bc4440e0f4d799a88ae835e7454d7a0c36dd2ad100d7a4087c45832b2a0afc03e974fbae484ade32af76f8a5990c75d6e589e"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x413}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0xf8ff}}]}) 23:12:08 executing program 5: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x4010, 0xffffffffffffffff, 0x5) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x40000000) 23:12:08 executing program 5: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000000, 0x13, 0xffffffffffffffff, 0x80) [ 2311.711155] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2311.718710] misc raw-gadget: fail, usb_gadget_register_driver returned -16 23:12:08 executing program 6: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x1) 23:12:09 executing program 7: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) 23:12:09 executing program 6: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x10, 0xffffffffffffffff, 0x3) read$ptp(0xffffffffffffffff, &(0x7f0000000080)=""/48, 0x30) r0 = memfd_secret(0x0) r1 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r1) mmap$usbmon(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000002, 0x4000010, r0, 0x3) mmap$usbmon(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000005, 0x40010, r1, 0x8) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x4c, 0x0, 0x200, 0x70bd2c, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x3}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x235}, @NL80211_ATTR_CRIT_PROT_ID={0x6}, @NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x98238787c01a203f}, @NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x2}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0xaba}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0xd8) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x3c, r2, 0x0, 0x70bd2a, 0x25dfdbff, {}, [@ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_AUTONEG={0x5, 0x2, 0x1}, @ETHTOOL_A_PAUSE_TX={0x5}, @ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x44}, 0x4000000) read$usbmon(r0, &(0x7f0000000000)=""/99, 0x63) 23:12:09 executing program 5: r0 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) ioctl$CDROM_SELECT_DISK(r0, 0x5322, 0x111) r1 = socket$nl_generic(0x10, 0x3, 0x10) accept(0xffffffffffffffff, &(0x7f0000000380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000400)=0x80) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'batadv_slave_0\x00', 0x0}) sendmsg$ETHTOOL_MSG_WOL_SET(r1, &(0x7f00000006c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000680)={&(0x7f0000000940)={0x119c, 0x0, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7dbdb1ba25a43c82}]}, @ETHTOOL_A_WOL_HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_WOL_MODES={0x1008, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x1004, 0x4, "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"}]}, @ETHTOOL_A_WOL_SOPASS={0xe5, 0x3, "8fb43daae2b2161f4ccc21e3d257bf06998e3aa135a7517d1571626a7b618c6b62cfb02c95d71763d15d464bdc7d23a5c918f6ac12704757834c2658cb552629c3ca59964c7d1f9ef57fed0f12142f8cc9aa6b80fb428ccdcb0581db8ccdc17b7a169ecc6f74729c39ba19919ac4072118c998aec857f022bc21cf44a7690f416d6c3232b4f65cfe8b0951e6f7ba862f5dbc5247d0164fbf1db2eca4d3052b7a0b7930bafc42e308bb4306d58105a8d7eb1c1537d363f11164c2582b22f67a1790d43f7401ba0e81d2e467dee72ec3f2cd548c49d0962a4835d31548fb0faa47ff"}]}, 0x119c}, 0x1, 0x0, 0x0, 0x8000}, 0x2004004d) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = memfd_secret(0x80000) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r4, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)={0xd0, 0x0, 0x8, 0x70bd2d, 0x25dfdc02, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}}]}, 0xd0}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) 23:12:09 executing program 6: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) ioctl$MON_IOCX_GET(0xffffffffffffffff, 0x40189206, &(0x7f00000000c0)={&(0x7f0000000000), &(0x7f0000000040)=""/70, 0x46}) 23:12:09 executing program 7: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) 23:12:18 executing program 3: rt_sigtimedwait(&(0x7f0000000000)={[0xfffffffffffffff9]}, 0x0, &(0x7f0000000080), 0x8) 23:12:18 executing program 6: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0xa6) ioctl$MON_IOCQ_RING_SIZE(0xffffffffffffffff, 0x9205) ioctl$MON_IOCT_RING_SIZE(0xffffffffffffffff, 0x9204, 0x115888) 23:12:18 executing program 0: syz_usb_connect$hid(0x6, 0x36, &(0x7f0000000540)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46d, 0xc52b, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x6, 0x7f, 0x1, {0x22, 0xa8f}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0xfa, 0x8f, 0x2}}}}}]}}]}}, &(0x7f0000000880)={0xa, &(0x7f0000000580)={0xa, 0x6, 0x200, 0x80, 0x1f, 0x3, 0x20, 0x3}, 0x7e, &(0x7f00000005c0)={0x5, 0xf, 0x7e, 0x6, [@ptm_cap={0x3}, @ssp_cap={0x10, 0x10, 0xa, 0x1, 0x1, 0x7, 0xf00, 0xa3a, [0xff000f]}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0x9, 0x9, 0xfffe}, @generic={0x42, 0x10, 0x4, "dfa909963b4c4a0a5f93e6fff45ee072e0265d99f99a5467b700c649cb42a77c7eb06c0d601324a9e383b942ef51bc888a1cd17688864ab47fb29ca13dbc07"}, @generic={0x13, 0x10, 0x1, "bfa6bacd313037a66f522459a4efdabd"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0xa3, 0x9, 0x8}]}, 0x4, [{0x4, &(0x7f0000000640)=@lang_id={0x4, 0x3, 0x429}}, {0xb8, &(0x7f0000000680)=@string={0xb8, 0x3, "42705c0d85706ddea3591c3d464f897257f530fb7f333ad5db89ff34e160bd630ad32754ae8d302b4040b733ddd3021c9e0041b51501dc58577d710d7d330a461033ed02f78659b9e6a6d07f525160284581bf9f7b6d74858c3d8fb0294c6d7dac1a859101803450377a0ef39210fb6700f771d15e7b42a9b032f28923b0bc8f38f5c962ae8881b006453fa75001382e5fdd3fa8ebca0c343cf8262a0d4d3bbb66f5724cb55b722d30598bf8562c1ad838f1c92fce2e"}}, {0xee, &(0x7f0000000740)=@string={0xee, 0x3, "fa6e8b74837c661128332dc7a26e58cfb24b28ada9d05c1973d222ba1ff66b18361b559b4b45a9742e86b79717211fc974cb38701973690bea498bba170459c3d0c000c8405f47e5ac1f3975fd438ab062808c46b45c7cd4ee6c6431aff885e241e12f0db4ddccfcedf2320f68bf467ac4c8cc8c42ec72012cb318a13c536c7d7ef62404b87e163944ea949594ba81f14406b251116ecc13257c3ec853daa401e5715097bec00e1d8f60fbd59b5a931d50a9ba8e50b560f531406263c917ce2722c50f8b9b9ece653f1757ffe0b7e4f69dff41f0dcb44992c5e8cf2bd7f343927e85513857734bb918177ce6"}}, {0x4, &(0x7f0000000840)=@lang_id={0x4, 0x3, 0x44e}}]}) 23:12:18 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x27, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:12:18 executing program 7: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x2) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000080)={0xfffffffc, 0xffffffff, 0x42, 0x0, 0x5, 0x8000}) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) mmap$usbmon(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000008, 0x10, 0xffffffffffffffff, 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0xd5, 0x161200) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4400004}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x4c, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x1}, @NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x1}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x529}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x633}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x62c}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x9d6}]}, 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x4) accept(r0, &(0x7f0000000140)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f00000002c0)=0x80) 23:12:18 executing program 5: clock_getres(0x0, &(0x7f0000000000)) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:12:18 executing program 1: syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28bd, 0x74, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x0, 0x0, 0x7, [{{0x9, 0x4, 0x0, 0x40, 0x1, 0x3, 0x1, 0x3, 0x2, {0x9, 0x21, 0xaa6b, 0xc6, 0x1, {0x22, 0x3aa}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x1, 0x1, 0x20}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0x0, 0x5, 0x20}}]}}}]}}]}}, &(0x7f0000000300)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x2, 0x4, 0x9, 0x20, 0x1f}, 0x2e, &(0x7f0000000080)={0x5, 0xf, 0x2e, 0x4, [@ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x5, 0xf, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "f3467c0fdd67206c155df2f59eeba69c"}, @wireless={0xb, 0x10, 0x1, 0x8, 0x2c, 0x80, 0x3, 0x4, 0x9}]}, 0x6, [{0x4, &(0x7f00000000c0)=@lang_id={0x4, 0x3, 0x425}}, {0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x860}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x424}}, {0xc1, &(0x7f0000000180)=@string={0xc1, 0x3, "32895dce90d627157085c353d7f94cd861200256946f1e7b957200ebcb7088ebb826877a0b86b0f934dc71ba39550de0d221e0952964ee86319a4fc65c41ea14733f81707695bb54d66124588b78f9d5ef53c1103908a97f54387f55b74b4f4bdd47e9580ca75c0a7f3e13b3af501985fb8394a5736005e605475e5b1f7e0534db2efda6ab352db55fbf8c178bc4440e0f4d799a88ae835e7454d7a0c36dd2ad100d7a4087c45832b2a0afc03e974fbae484ade32af76f8a5990c75d6e589e"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x413}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0xf8ff}}]}) 23:12:18 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x25, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:12:18 executing program 6: mmap$usbmon(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xf, 0x10, 0xffffffffffffffff, 0x5) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r0 = memfd_secret(0x80000) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f0000000040)={&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f00000000c0)=""/102393, 0xf97f}) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(r0, &(0x7f0000019540)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000019500)={&(0x7f00000190c0)={0x428, 0x0, 0x400, 0x70bd29, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x2, 0x13}}}}, [@NL80211_ATTR_TX_RATES={0x50, 0x5a, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x14, 0x0, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0xd, 0x1, [0x18, 0x9, 0x2, 0x6, 0x48, 0x1b, 0x30, 0x1b, 0x24]}]}, @NL80211_BAND_5GHZ={0x18, 0x1, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0xac1, 0xfffc, 0x8, 0xfffe, 0x7, 0x4, 0x1, 0x7]}}]}, @NL80211_BAND_60GHZ={0x20, 0x2, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_LEGACY={0x14, 0x1, [0x9, 0x2, 0x3, 0x60, 0x9, 0x2, 0x0, 0x2, 0x60, 0x4, 0x16, 0xc, 0x60, 0x16, 0x2, 0x9]}]}]}, @NL80211_ATTR_TX_RATES={0x1d0, 0x5a, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x98, 0x2, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_LEGACY={0x18, 0x1, [0x16, 0x33, 0x36, 0x24, 0x1, 0x3, 0x12, 0x4, 0x3a, 0x9, 0x9, 0x36, 0x48, 0x6c, 0x30, 0xc, 0x30, 0xc, 0x30, 0x4]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x800, 0x4, 0x1, 0x6, 0x7, 0x81, 0x3, 0x7fff]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_HT={0x41, 0x2, [{0x1, 0x2}, {0x3}, {0x1, 0x3}, {0x1, 0x8}, {0x1, 0x5}, {0x4, 0x1}, {0x6, 0x8}, {0x1}, {0x6, 0x6}, {0x2, 0x3}, {0x6, 0xa}, {0x1, 0x7}, {0x4, 0x3}, {0x0, 0x9}, {0x3, 0x6}, {0x3, 0x8}, {0x1, 0x4}, {0x6, 0x4}, {0x2, 0x3}, {0x3}, {0x7, 0xa}, {0x5, 0x8}, {0x5, 0x3}, {0x4, 0x9}, {0x5}, {0x3, 0x2}, {0x0, 0xa}, {0x1, 0x4}, {0x0, 0x8}, {0x2, 0xa}, {0x0, 0x4}, {0x3, 0x5}, {0x0, 0x5}, {0x4}, {0x6, 0xa}, {0x7, 0x4}, {0x0, 0x7}, {0x1, 0x7}, {0x4, 0x9}, {0x1}, {0x4, 0x7}, {}, {0x6, 0x2}, {0x6, 0x1}, {0x6, 0x6}, {0x7, 0x3}, {0x7, 0x6}, {0x1, 0x1}, {0x7, 0x4}, {0x1, 0x9}, {0x1, 0x7}, {0x6, 0x4}, {0x4, 0x2}, {0x0, 0x9}, {0x0, 0x8}, {0x1, 0x6}, {0x5, 0x1}, {0x1, 0x8}, {0x1, 0x4}, {0x6, 0x5}, {0x5, 0x1}]}, @NL80211_TXRATE_LEGACY={0xa, 0x1, [0x24, 0x24, 0x24, 0x2, 0x18, 0x60]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x3}]}, @NL80211_BAND_5GHZ={0x2c, 0x1, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x6, 0x2, 0x0, 0x1f, 0x7ff, 0x4, 0x1000, 0xf000]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x0, 0x2, 0x5, 0x4, 0xbc, 0x6, 0x100, 0x7]}}]}, @NL80211_BAND_6GHZ={0xc0, 0x3, 0x0, 0x1, [@NL80211_TXRATE_HT={0x46, 0x2, [{0x6, 0x6}, {0x3, 0x6}, {0x3}, {0x4, 0x2}, {0x1, 0x1}, {0x4, 0x6}, {0x6, 0x8}, {0x1, 0x1}, {0x2, 0x2}, {0x1, 0x3}, {0x6, 0x8}, {0x6, 0xa}, {0x3, 0x7}, {0x6, 0x8}, {0x6, 0x6}, {0x6, 0x2}, {0x2, 0x8}, {0x7, 0x6}, {0x0, 0x8}, {0x6, 0x5}, {0x1, 0x1}, {0x3, 0x2}, {0x7, 0x7}, {0x0, 0xa}, {0x7, 0x6}, {0x5, 0x3}, {0x3, 0x8}, {0x6, 0xa}, {0x1, 0x3}, {0x5, 0x2}, {0x1, 0xa}, {0x4, 0x6}, {0x1}, {0x5, 0x7}, {0x1, 0x4}, {0x2, 0x9}, {0x7}, {0x1, 0x1}, {0x4, 0x5}, {0x7, 0x2}, {0x5, 0x1}, {0x3}, {0x2, 0x6}, {0x7, 0xa}, {0x2, 0x3}, {0x5, 0x3}, {0x0, 0x1}, {0x4, 0x8}, {0x7, 0x6}, {0x1, 0x4}, {0x2, 0x7}, {0x4, 0x7}, {0x4, 0x6}, {0x3, 0x9}, {0x3, 0x1f}, {0x3, 0x3}, {0x1, 0x5}, {0x2, 0x4}, {0x4, 0x1}, {0x1, 0x4}, {0x6, 0x4}, {0x0, 0xa}, {0x3, 0x6}, {0x1, 0x7}, {0x2, 0x7}, {0x5, 0xa}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x4, 0x6, 0x9, 0x101, 0x7fff, 0xffff, 0x1fe, 0x200]}}, @NL80211_TXRATE_HT={0x20, 0x2, [{0x5, 0x1}, {0x6, 0x4}, {0x7, 0x2}, {0x6, 0x2}, {0x1, 0x8}, {0x2, 0x2}, {0x5}, {0x2, 0x4}, {0x7, 0x5}, {0x4, 0x8}, {0x4, 0x3}, {0x1, 0x5}, {0x4, 0x3}, {0x7, 0x6}, {0x2, 0x5}, {0x1, 0x5}, {0x6, 0x2}, {0x5}, {0x1, 0x7}, {0x2, 0xa}, {0x2, 0xa}, {0x1, 0x1}, {0x2, 0xa}, {0x2, 0x3}, {0x4, 0x2}, {0x5, 0x7}, {0x6, 0xa}, {0x4, 0x2}]}, @NL80211_TXRATE_LEGACY={0xb, 0x1, [0x12, 0x18, 0x48, 0x49, 0x18, 0x9, 0x3]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_HT={0xf, 0x2, [{0x6, 0x3}, {}, {0x4, 0x1}, {0x6, 0x2}, {0x3, 0x1}, {0x0, 0x9}, {0x2, 0x1}, {0x2, 0xa}, {0x4}, {0x5, 0x3}, {0x6, 0x1}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x7fff, 0x5, 0x3, 0xaab, 0xf6, 0x5b8, 0xf0, 0x100]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}, @NL80211_BAND_60GHZ={0x40, 0x2, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0xc, 0x1, [0x60, 0x12, 0x5, 0x16, 0x48, 0x9, 0x6c, 0x60]}, @NL80211_TXRATE_LEGACY={0x21, 0x1, [0x0, 0x18, 0x5c, 0x60, 0x24, 0x16, 0x1, 0x60, 0x36, 0x4, 0x6c, 0x1, 0x1, 0x1b, 0x5, 0x1b, 0x3, 0xb, 0x18, 0x61, 0x24, 0x5, 0x6c, 0x1, 0x1b, 0xb, 0x0, 0x1b, 0x48]}, @NL80211_TXRATE_HT={0xb, 0x2, [{0x3, 0xa}, {0x3}, {0x3, 0x9}, {0x0, 0x9}, {0x7, 0x6}, {0x0, 0x9}, {0x1, 0x7}]}]}, @NL80211_BAND_60GHZ={0x4}, @NL80211_BAND_5GHZ={0x4}]}, @NL80211_ATTR_TX_RATES={0x1e8, 0x5a, 0x0, 0x1, [@NL80211_BAND_6GHZ={0x8c, 0x3, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x0, 0x1, 0x4, 0x8, 0x7, 0x4, 0x3, 0x4]}}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x2, 0xfffe, 0xff, 0x7, 0x7af, 0x4, 0xff, 0xd46c]}}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0xb, 0x1, [0x1b, 0x6, 0xc, 0x9, 0x4, 0xc, 0x4]}, @NL80211_TXRATE_HT={0x44, 0x2, [{0x6, 0x5}, {0x3, 0x2}, {0x7, 0x4}, {0x5, 0x9}, {0x2, 0x1}, {0x7, 0xa}, {0x0, 0x3}, {0x2}, {0x7, 0xa}, {0x7, 0x2}, {0x6}, {0x1, 0x8}, {0x0, 0xa}, {0x5, 0x5}, {0x4, 0x6}, {0x0, 0x2}, {0x0, 0x4}, {0x0, 0x6}, {0x5, 0x2}, {0x0, 0x5}, {0x6, 0x1}, {0x7, 0x8}, {0x1, 0x9}, {0x2, 0x2}, {0x5}, {}, {0x6, 0x7}, {0x5, 0x2}, {0x0, 0x5}, {0x1, 0x4}, {0x7, 0x2}, {0x1, 0x8}, {0x6}, {0x4, 0x4}, {0x7, 0xa}, {0x2, 0x1}, {0x7, 0x3}, {0x2, 0x9}, {0x4, 0x8}, {0x7, 0x4}, {0x7, 0x4}, {0x1, 0x4}, {0x5, 0x9}, {0x5, 0x3}, {0x5, 0xa}, {0x3, 0x9}, {0x6, 0x1}, {0x6, 0x9}, {0x7, 0x4}, {0x3}, {0x2, 0x3}, {0x5, 0x8}, {0x0, 0x5}, {0x5}, {0x0, 0x8}, {0x1, 0x7}, {0x1, 0x4}, {0x2, 0x4}, {0x1, 0x7}, {0x0, 0x3}, {0x1, 0x5}, {0x0, 0x8}, {0x2, 0x8}, {0x7, 0x7}]}]}, @NL80211_BAND_2GHZ={0x24, 0x0, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x800, 0x4, 0x6, 0x4, 0x81, 0xffe8, 0x8000, 0x3]}}, @NL80211_TXRATE_HT={0x9, 0x2, [{0x7, 0x8}, {0x6, 0x5}, {0x1, 0x8}, {0x6, 0x1}, {0x7, 0x3}]}]}, @NL80211_BAND_60GHZ={0x94, 0x2, 0x0, 0x1, [@NL80211_TXRATE_HT={0x3a, 0x2, [{0x3, 0x4}, {0x6, 0x1}, {0x2, 0x3}, {0x5, 0x1}, {0x3, 0x2}, {0x6, 0x7}, {0x7, 0x6}, {0x0, 0x8}, {0x5, 0x8}, {0x4}, {0x2, 0xa}, {0x1, 0x9}, {0x6, 0x4}, {0x0, 0xa}, {0x5, 0x3}, {0x0, 0x7}, {0x2, 0x7}, {0x5}, {0x6, 0x5}, {0x5, 0xa}, {0x0, 0x1}, {0x2, 0x8}, {0x0, 0x9}, {0x5, 0x4}, {0x2, 0x6}, {0x1, 0x3}, {0x3, 0x5}, {0x7, 0x5}, {0x4}, {0x7, 0x2}, {0x3, 0xa}, {0x4, 0x8}, {0x6, 0x8}, {0x6, 0x2}, {0x0, 0x1b}, {0x2, 0x5}, {0x1, 0x3}, {0x1, 0x5}, {0x7, 0x3}, {0x3, 0x3}, {0x6, 0x2}, {0x7, 0x5}, {0x2, 0x7}, {0x0, 0xa}, {0x1, 0x2}, {0x3, 0x4}, {0x5, 0x5}, {0x6, 0xa}, {0x4, 0x2}, {0x4, 0x8}, {0x5, 0x2}, {0x5, 0x4}, {0x5, 0x8}, {0x4, 0x5}]}, @NL80211_TXRATE_HT={0x42, 0x2, [{0x0, 0x9}, {0x6, 0x8}, {0x6, 0x4}, {0x4}, {0x6, 0x2}, {0x7, 0x7}, {0x3, 0x1}, {0x7, 0x5}, {0x1, 0x7}, {0x5, 0x8}, {0x3, 0x2}, {0x7, 0x4}, {0x6, 0x9}, {0x0, 0x6}, {0x6, 0x5}, {0x0, 0xa}, {0x5, 0x9}, {0x6, 0x3}, {}, {0x3, 0x9}, {0x4, 0x9}, {0x2, 0x8}, {0x4, 0x1}, {0x7, 0x1}, {0x6, 0x1}, {0x4, 0x7}, {0x7, 0x9}, {0x2, 0x1}, {0x2, 0x4}, {0x7, 0x7}, {0x6, 0x4}, {0x2, 0x4}, {0x6, 0x1}, {0x2}, {0x4, 0x1}, {0x1, 0x2}, {0x7, 0x6}, {0x1, 0x9}, {0x5, 0x8}, {0x7, 0xa}, {0x3, 0x9}, {0x5, 0x1}, {0x1, 0x8}, {0x0, 0x2}, {0x1, 0x8}, {0x4}, {0x3, 0x2}, {0x2, 0x2}, {0x0, 0x9}, {0x6, 0x6}, {0x3, 0x9}, {0x1, 0x3}, {0x1, 0x8}, {0x0, 0x5}, {0x0, 0x7}, {0x2}, {0x4, 0x5}, {0x6, 0x8}, {0x5, 0x6}, {0x0, 0x4}, {0x7, 0x6}, {0x6, 0x9}]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}, @NL80211_BAND_60GHZ={0x94, 0x2, 0x0, 0x1, [@NL80211_TXRATE_HT={0x47, 0x2, [{0x6, 0x4}, {0x1, 0xe}, {0x2, 0x4}, {0x1, 0x7}, {0x4, 0x2}, {0x1, 0xa}, {0x2, 0x5}, {0x0, 0x4}, {0x0, 0x9}, {0x0, 0x9}, {0x2, 0x2}, {0x4, 0x5}, {0x7, 0x9}, {0x1, 0x6}, {0x7, 0x3}, {0x2}, {0x3, 0x3}, {0x0, 0x4}, {0x2, 0x3}, {0x7, 0x3}, {0x4, 0x1}, {0x3, 0xa}, {0x2, 0x5}, {0x0, 0x7}, {0x1}, {0x4, 0x6}, {0x0, 0x6}, {0x1, 0x6}, {0x7, 0x9}, {0x0, 0x5}, {0x5, 0xa}, {0x0, 0x6}, {0x0, 0x8}, {0x6, 0x1}, {0x2, 0x4}, {0x3, 0x7}, {0x1, 0x6}, {0x2, 0x1}, {0x1, 0x7}, {0x3, 0x2}, {0x5, 0x3}, {0x4, 0x2}, {0x7, 0x4}, {0x5, 0x8}, {0x6, 0x3}, {0x4, 0x7}, {0x0, 0x2}, {0x2, 0x2}, {0x1}, {0x1, 0xa}, {0x0, 0x6}, {0x0, 0x5}, {0x3, 0x4}, {0x0, 0x6}, {0x6, 0x8}, {0x6, 0x8}, {0x4, 0x2}, {0x5, 0x7}, {0x3, 0x4}, {0x4, 0x4}, {0x7, 0x1}, {0x5}, {0x4, 0x3}, {0x4, 0x9}, {0x1, 0x8}, {0x2, 0x8}, {0x1}]}, @NL80211_TXRATE_LEGACY={0x22, 0x1, [0x0, 0x18, 0x12, 0x60, 0x60, 0x16, 0x6, 0x9, 0x12, 0x21, 0x6c, 0x6, 0x1, 0x1d, 0x6, 0xc, 0x1, 0x36, 0x9, 0x60, 0x6, 0x18, 0x3, 0x9, 0x1b, 0x60, 0x48, 0xc, 0x4, 0x1b]}, @NL80211_TXRATE_LEGACY={0xf, 0x1, [0x1b, 0x18, 0xc, 0xc, 0x4, 0xb, 0x6, 0xb, 0x30, 0x48, 0x6]}, @NL80211_TXRATE_LEGACY={0xc, 0x1, [0x2, 0x2, 0x24, 0x2, 0x1b, 0x1, 0x1, 0x1b]}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_60GHZ={0xc, 0x2, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}]}]}]}, 0x428}, 0x1, 0x0, 0x0, 0x800}, 0xdb10dc9f6d76e0ec) r1 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r1) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000019580)=""/48) 23:12:18 executing program 3: rt_sigtimedwait(&(0x7f0000000000)={[0xfffffffffffffff9]}, 0x0, &(0x7f0000000080), 0x8) [ 2321.105000] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2321.109576] misc raw-gadget: fail, usb_gadget_register_driver returned -16 23:12:18 executing program 5: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000816bd7051dbe9cad969cf12961dcd91589c792536e0ffff0b009900ff07000002000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="200028a6bba3bd7000fcdbdf080034000600000005002e000100000005003500740600000a000900aaaaaaaaaabb0000080032000000000008003400000124728697db0a15fc13c10870f1b1000005003500b300000008003b00feffffff6633f2c59b8d7be91170d367ea4458972c5817eacf0a1a97f6a5c2c9acfd4243d3329b9c011bf3d9877f82400c99918cc45ebf8d46c7fc8640f1ba0a755897073b0993e5e1f3cb63da4a5416f6a7cadc40ef0741268090a3cb2f236d2e89d6653e40cc551d7161efc90c8699e09c40a67bdcdd1e6e497fe3a678b4227b68103978edf8764b8500fc4af6deb56b4d5700451e561f6d665fc25e179e934ea30abe446b3c1e09ae4240271b50763dae3a8f3e"], 0x60}, 0x1, 0x0, 0x0, 0x81}, 0x40001) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="00000000ef9b6a2bb56403445b7289824586f4ad3f9a93c9607322b1f5c76e4c0e8d90030f5c65f4d414bc424726c2b037d27250d613b59f722935d13fe8511bd20d9274f1f5db6c", @ANYRES16=r2, @ANYBLOB="080029bd7000fcdbdf252c0000000c0099000000000006000000"], 0x20}, 0x1, 0x0, 0x0, 0x8040}, 0x4004084) mmap$usbmon(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_INTERFACE(r4, &(0x7f00000006c0)={&(0x7f0000000300), 0xc, &(0x7f0000000540)={&(0x7f0000000380)={0x20, r2, 0x600, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x0, 0x31}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x24000800}, 0x10) 23:12:18 executing program 6: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x1010, 0xffffffffffffffff, 0x1) 23:12:18 executing program 3: rt_sigtimedwait(&(0x7f0000000000)={[0xfffffffffffffff9]}, 0x0, &(0x7f0000000080), 0x8) 23:12:18 executing program 6: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) r0 = memfd_secret(0x0) r1 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r1) ioctl$sock_SIOCDELRT(r1, 0x890c, &(0x7f0000000100)={0x0, @l2={0x1f, 0x4, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x12}, 0x8}, @qipcrtr={0x2a, 0xffffffffffffffff, 0x4000}, @vsock={0x28, 0x0, 0x0, @local}, 0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='veth0_to_bond\x00', 0x2, 0x81a, 0x8}) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), r0) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c0000004c0600871c919a317ca0f61ac88a30888288c84ff31bbf734b2eca11254988de934ec9d7c5938d7a28959ce24568221932b1df542a95dc92f9274cad866026de8cdcde8e235b15e208de5dc455dc5f62292bac865a91e6055ae9ec436269ef1d030c1303f269543d0ac8e837a676d30bd17120530b", @ANYRES16=r2, @ANYBLOB="350d0c3b3e20f8118465eb294fd1fecc7a357fc7dbc5a85ab81c4802fce505dc5c3d3196fec354930eed21bd98dd51"], 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x10) 23:12:18 executing program 7: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x2) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000080)={0xfffffffc, 0xffffffff, 0x42, 0x0, 0x5, 0x8000}) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) mmap$usbmon(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000008, 0x10, 0xffffffffffffffff, 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0xd5, 0x161200) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4400004}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x4c, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x1}, @NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x1}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x529}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x633}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x62c}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x9d6}]}, 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x4) accept(r0, &(0x7f0000000140)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f00000002c0)=0x80) 23:12:18 executing program 3: clock_gettime(0x0, 0x0) rt_sigtimedwait(&(0x7f0000000000)={[0xfffffffffffffff9]}, 0x0, &(0x7f0000000080), 0x8) 23:12:18 executing program 5: ioctl$PTP_PIN_SETFUNC(0xffffffffffffffff, 0x40603d07, &(0x7f00000001c0)={'\x00', 0x80, 0x3, 0x4000000}) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0x193001, 0x0) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000180)) r1 = syz_open_dev$evdev(&(0x7f0000000000), 0x9, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/198) 23:12:18 executing program 6: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) r0 = memfd_secret(0x0) r1 = accept(r0, &(0x7f00000000c0)=@in={0x2, 0x0, @dev}, &(0x7f0000000140)=0x80) syz_genetlink_get_family_id$tipc(&(0x7f0000000080), r1) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/62) r2 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x1c, 0x0, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000010}, 0x41) ioctl$EVIOCGSND(r2, 0x8040451a, &(0x7f0000000180)=""/195) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r0) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000280)={0x13}) 23:12:28 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x25, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:12:28 executing program 1: syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28bd, 0x74, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x40, 0x1, 0x3, 0x1, 0x3, 0x2, {0x9, 0x21, 0xaa6b, 0xc6, 0x1, {0x22, 0x3aa}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x1, 0x1, 0x20}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0x0, 0x5, 0x20}}]}}}]}}]}}, &(0x7f0000000300)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x2, 0x4, 0x9, 0x20, 0x1f}, 0x2e, &(0x7f0000000080)={0x5, 0xf, 0x2e, 0x4, [@ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x5, 0xf, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "f3467c0fdd67206c155df2f59eeba69c"}, @wireless={0xb, 0x10, 0x1, 0x8, 0x2c, 0x80, 0x3, 0x4, 0x9}]}, 0x6, [{0x4, &(0x7f00000000c0)=@lang_id={0x4, 0x3, 0x425}}, {0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x860}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x424}}, {0xc1, &(0x7f0000000180)=@string={0xc1, 0x3, "32895dce90d627157085c353d7f94cd861200256946f1e7b957200ebcb7088ebb826877a0b86b0f934dc71ba39550de0d221e0952964ee86319a4fc65c41ea14733f81707695bb54d66124588b78f9d5ef53c1103908a97f54387f55b74b4f4bdd47e9580ca75c0a7f3e13b3af501985fb8394a5736005e605475e5b1f7e0534db2efda6ab352db55fbf8c178bc4440e0f4d799a88ae835e7454d7a0c36dd2ad100d7a4087c45832b2a0afc03e974fbae484ade32af76f8a5990c75d6e589e"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x413}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0xf8ff}}]}) 23:12:28 executing program 7: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x2) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000080)={0xfffffffc, 0xffffffff, 0x42, 0x0, 0x5, 0x8000}) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) mmap$usbmon(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000008, 0x10, 0xffffffffffffffff, 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0xd5, 0x161200) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4400004}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x4c, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x1}, @NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x1}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x529}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x633}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x62c}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x9d6}]}, 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x4) accept(r0, &(0x7f0000000140)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f00000002c0)=0x80) 23:12:28 executing program 6: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x1, 0x0) mmap$usbmon(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x20010, r0, 0x7da99c5f) 23:12:28 executing program 0: syz_usb_connect$hid(0x6, 0x36, &(0x7f0000000540)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46d, 0xc52b, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x6, 0x7f, 0x1, {0x22, 0xa8f}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0xfa, 0x8f, 0x2}}}}}]}}]}}, &(0x7f0000000880)={0xa, &(0x7f0000000580)={0xa, 0x6, 0x200, 0x80, 0x1f, 0x3, 0x20, 0x3}, 0x7e, &(0x7f00000005c0)={0x5, 0xf, 0x7e, 0x6, [@ptm_cap={0x3}, @ssp_cap={0x10, 0x10, 0xa, 0x1, 0x1, 0x7, 0xf00, 0xa3a, [0xff000f]}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0x9, 0x9, 0xfffe}, @generic={0x42, 0x10, 0x4, "dfa909963b4c4a0a5f93e6fff45ee072e0265d99f99a5467b700c649cb42a77c7eb06c0d601324a9e383b942ef51bc888a1cd17688864ab47fb29ca13dbc07"}, @generic={0x13, 0x10, 0x1, "bfa6bacd313037a66f522459a4efdabd"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0xa3, 0x9, 0x8}]}, 0x4, [{0x4, &(0x7f0000000640)=@lang_id={0x4, 0x3, 0x429}}, {0xb8, &(0x7f0000000680)=@string={0xb8, 0x3, "42705c0d85706ddea3591c3d464f897257f530fb7f333ad5db89ff34e160bd630ad32754ae8d302b4040b733ddd3021c9e0041b51501dc58577d710d7d330a461033ed02f78659b9e6a6d07f525160284581bf9f7b6d74858c3d8fb0294c6d7dac1a859101803450377a0ef39210fb6700f771d15e7b42a9b032f28923b0bc8f38f5c962ae8881b006453fa75001382e5fdd3fa8ebca0c343cf8262a0d4d3bbb66f5724cb55b722d30598bf8562c1ad838f1c92fce2e"}}, {0xee, &(0x7f0000000740)=@string={0xee, 0x3, "fa6e8b74837c661128332dc7a26e58cfb24b28ada9d05c1973d222ba1ff66b18361b559b4b45a9742e86b79717211fc974cb38701973690bea498bba170459c3d0c000c8405f47e5ac1f3975fd438ab062808c46b45c7cd4ee6c6431aff885e241e12f0db4ddccfcedf2320f68bf467ac4c8cc8c42ec72012cb318a13c536c7d7ef62404b87e163944ea949594ba81f14406b251116ecc13257c3ec853daa401e5715097bec00e1d8f60fbd59b5a931d50a9ba8e50b560f531406263c917ce2722c50f8b9b9ece653f1757ffe0b7e4f69dff41f0dcb44992c5e8cf2bd7f343927e85513857734bb918177ce6"}}, {0x4, &(0x7f0000000840)=@lang_id={0x4, 0x3, 0x44e}}]}) 23:12:28 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x27, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:12:28 executing program 5: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$MON_IOCH_MFLUSH(0xffffffffffffffff, 0x9208, 0x3) ioctl$MON_IOCT_RING_SIZE(0xffffffffffffffff, 0x9204, 0x97909) r0 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) read$usbmon(r0, &(0x7f0000000040)=""/161, 0xa1) r1 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r1) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x5586, 0x8}}, './file0\x00'}) 23:12:28 executing program 3: clock_gettime(0x0, 0x0) rt_sigtimedwait(&(0x7f0000000000)={[0xfffffffffffffff9]}, 0x0, &(0x7f0000000080), 0x8) 23:12:28 executing program 3: clock_gettime(0x0, 0x0) rt_sigtimedwait(&(0x7f0000000000)={[0xfffffffffffffff9]}, 0x0, &(0x7f0000000080), 0x8) [ 2330.903728] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2330.920307] misc raw-gadget: fail, usb_gadget_register_driver returned -16 23:12:28 executing program 5: r0 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r1 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r1) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000080)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x1}) 23:12:28 executing program 3: clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) rt_sigtimedwait(0x0, 0x0, &(0x7f0000000080)={r0, r1+10000000}, 0x0) 23:12:28 executing program 6: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000000, 0x10, r0, 0x1) 23:12:28 executing program 3: clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) rt_sigtimedwait(0x0, 0x0, &(0x7f0000000080)={r0, r1+10000000}, 0x0) 23:12:28 executing program 5: mmap$usbmon(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x8010, 0xffffffffffffffff, 0x5) 23:12:28 executing program 7: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x2) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000080)={0xfffffffc, 0xffffffff, 0x42, 0x0, 0x5, 0x8000}) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) mmap$usbmon(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000008, 0x10, 0xffffffffffffffff, 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0xd5, 0x161200) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4400004}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x4c, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x1}, @NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x1}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x529}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x633}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x62c}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x9d6}]}, 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x4) 23:12:36 executing program 3: clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) rt_sigtimedwait(0x0, 0x0, &(0x7f0000000080)={r0, r1+10000000}, 0x0) 23:12:36 executing program 5: sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x58, 0x0, 0x300, 0x70bd2d, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_EXTENDED_ADDR={0xc, 0x17, {0xaaaaaaaaaaaa0002}}, @NL802154_ATTR_EXTENDED_ADDR={0xc, 0x17, {0xaaaaaaaaaaaa0302}}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x2}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x346556abc02663a9}, @NL802154_ATTR_EXTENDED_ADDR={0xc, 0x17, {0xaaaaaaaaaaaa0102}}]}, 0x58}, 0x1, 0x0, 0x0, 0x4880}, 0x48044) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000580), r0) sendmsg$NL802154_CMD_SET_BACKOFF_EXPONENT(r0, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x44, r1, 0x10, 0x70bd26, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x600000006}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_MAX_BE={0x5, 0x10, 0x5}]}, 0x44}}, 0x4000) sendmsg$NL802154_CMD_SET_LBT_MODE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x48, r1, 0x100, 0x70bd26, 0x25dfdbff, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_LBT_MODE={0x5, 0x13, 0x1}, @NL802154_ATTR_LBT_MODE={0x5}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x48}, 0x1, 0x0, 0x0, 0x20048040}, 0x90) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:12:36 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x25, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:12:36 executing program 1: syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28bd, 0x74, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x3, 0x2, {0x9, 0x21, 0xaa6b, 0xc6, 0x1, {0x22, 0x3aa}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x1, 0x1, 0x20}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0x0, 0x5, 0x20}}]}}}]}}]}}, &(0x7f0000000300)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x2, 0x4, 0x9, 0x20, 0x1f}, 0x2e, &(0x7f0000000080)={0x5, 0xf, 0x2e, 0x4, [@ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x5, 0xf, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "f3467c0fdd67206c155df2f59eeba69c"}, @wireless={0xb, 0x10, 0x1, 0x8, 0x2c, 0x80, 0x3, 0x4, 0x9}]}, 0x6, [{0x4, &(0x7f00000000c0)=@lang_id={0x4, 0x3, 0x425}}, {0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x860}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x424}}, {0xc1, &(0x7f0000000180)=@string={0xc1, 0x3, "32895dce90d627157085c353d7f94cd861200256946f1e7b957200ebcb7088ebb826877a0b86b0f934dc71ba39550de0d221e0952964ee86319a4fc65c41ea14733f81707695bb54d66124588b78f9d5ef53c1103908a97f54387f55b74b4f4bdd47e9580ca75c0a7f3e13b3af501985fb8394a5736005e605475e5b1f7e0534db2efda6ab352db55fbf8c178bc4440e0f4d799a88ae835e7454d7a0c36dd2ad100d7a4087c45832b2a0afc03e974fbae484ade32af76f8a5990c75d6e589e"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x413}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0xf8ff}}]}) 23:12:36 executing program 7: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x2) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000080)={0xfffffffc, 0xffffffff, 0x42, 0x0, 0x5, 0x8000}) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) mmap$usbmon(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000008, 0x10, 0xffffffffffffffff, 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0xd5, 0x161200) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4400004}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x4c, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x1}, @NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x1}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x529}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x633}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x62c}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x9d6}]}, 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) 23:12:36 executing program 0: syz_usb_connect$hid(0x6, 0x36, &(0x7f0000000540)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46d, 0xc52b, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x7f, 0x1, {0x22, 0xa8f}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0xfa, 0x8f, 0x2}}}}}]}}]}}, &(0x7f0000000880)={0xa, &(0x7f0000000580)={0xa, 0x6, 0x200, 0x80, 0x1f, 0x3, 0x20, 0x3}, 0x7e, &(0x7f00000005c0)={0x5, 0xf, 0x7e, 0x6, [@ptm_cap={0x3}, @ssp_cap={0x10, 0x10, 0xa, 0x1, 0x1, 0x7, 0xf00, 0xa3a, [0xff000f]}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0x9, 0x9, 0xfffe}, @generic={0x42, 0x10, 0x4, "dfa909963b4c4a0a5f93e6fff45ee072e0265d99f99a5467b700c649cb42a77c7eb06c0d601324a9e383b942ef51bc888a1cd17688864ab47fb29ca13dbc07"}, @generic={0x13, 0x10, 0x1, "bfa6bacd313037a66f522459a4efdabd"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0xa3, 0x9, 0x8}]}, 0x4, [{0x4, &(0x7f0000000640)=@lang_id={0x4, 0x3, 0x429}}, {0xb8, &(0x7f0000000680)=@string={0xb8, 0x3, "42705c0d85706ddea3591c3d464f897257f530fb7f333ad5db89ff34e160bd630ad32754ae8d302b4040b733ddd3021c9e0041b51501dc58577d710d7d330a461033ed02f78659b9e6a6d07f525160284581bf9f7b6d74858c3d8fb0294c6d7dac1a859101803450377a0ef39210fb6700f771d15e7b42a9b032f28923b0bc8f38f5c962ae8881b006453fa75001382e5fdd3fa8ebca0c343cf8262a0d4d3bbb66f5724cb55b722d30598bf8562c1ad838f1c92fce2e"}}, {0xee, &(0x7f0000000740)=@string={0xee, 0x3, "fa6e8b74837c661128332dc7a26e58cfb24b28ada9d05c1973d222ba1ff66b18361b559b4b45a9742e86b79717211fc974cb38701973690bea498bba170459c3d0c000c8405f47e5ac1f3975fd438ab062808c46b45c7cd4ee6c6431aff885e241e12f0db4ddccfcedf2320f68bf467ac4c8cc8c42ec72012cb318a13c536c7d7ef62404b87e163944ea949594ba81f14406b251116ecc13257c3ec853daa401e5715097bec00e1d8f60fbd59b5a931d50a9ba8e50b560f531406263c917ce2722c50f8b9b9ece653f1757ffe0b7e4f69dff41f0dcb44992c5e8cf2bd7f343927e85513857734bb918177ce6"}}, {0x4, &(0x7f0000000840)=@lang_id={0x4, 0x3, 0x44e}}]}) 23:12:36 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x27, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:12:36 executing program 6: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'batadv_slave_1\x00', 0x0}) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x5c, 0x0, 0x1, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x80000000}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r0}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x6}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xc7}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}]}, 0x5c}, 0x1, 0x0, 0x0, 0x24000000}, 0x44) 23:12:36 executing program 3: clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000080)={r0, r1+10000000}, 0x8) [ 2339.735950] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2339.738713] misc raw-gadget: fail, usb_gadget_register_driver returned -16 23:12:37 executing program 5: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x12, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(0xffffffffffffffff, 0x80089203, &(0x7f0000000080)) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000000)=""/77) 23:12:37 executing program 7: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x2) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000080)={0xfffffffc, 0xffffffff, 0x42, 0x0, 0x5, 0x8000}) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) mmap$usbmon(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000008, 0x10, 0xffffffffffffffff, 0x1) syz_open_dev$vcsn(&(0x7f0000000000), 0xd5, 0x161200) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan1\x00'}) 23:12:37 executing program 6: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x0, 0x70bd29, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4000890}, 0x40b1) r2 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0), r0) sendmsg$TIPC_NL_LINK_RESET_STATS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="080029bd7000fedbdf250a0000000c0003800800020013cf82650c00098008000100000000006d8338fc18676128773c2122b71cef002c90d9d9ba061e8c2c7f04d66971c27351cfd3f301958358d70146e150d3f0c13a0fb52b705a"], 0x2c}, 0x1, 0x0, 0x0, 0x20048001}, 0x20000000) sendmsg$FOU_CMD_ADD(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x5c, 0x0, 0x300, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}, @FOU_ATTR_PEER_V6={0x14, 0x9, @loopback}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e20}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @private1}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e23}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e24}]}, 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x44894) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r1, 0x200, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4000015) 23:12:37 executing program 7: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x2) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000080)={0xfffffffc, 0xffffffff, 0x42, 0x0, 0x5, 0x8000}) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) mmap$usbmon(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000008, 0x10, 0xffffffffffffffff, 0x1) syz_open_dev$vcsn(&(0x7f0000000000), 0xd5, 0x161200) 23:12:37 executing program 5: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000480)={0x70, 0x0, 0x100, 0x70bd29, 0x25dfdbff, {}, [@ETHTOOL_A_WOL_SOPASS={0x36, 0x3, "6c6fc22f74e69ab9b48d6ccd2c234c219f4fa1f2ca574bd88d49901683167a581bc48afaedfa2dfe7db26fc101c07daf4324"}, @ETHTOOL_A_WOL_SOPASS={0x21, 0x3, "89faae320248016ff846f620ba6bde32954066d7213f71dc68bff31cb3"}]}, 0x70}, 0x1, 0x0, 0x0, 0x80}, 0x40) sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="6800000098f46e59b3dfebd96d9063495823a8f88e39294f742db60229bd3a5c2dd7f1f2ed05133ff227990ca6f983770db6499617d31cbb7f1be18784621dc80fd0da2f7f5413f7b4aa5248719abe3d8cf76aca12259fbb3e28b7f1d65ec31db61b497742481ccffc66032799d1a81b5d76e9dd497fa2ed9f134e4d636f7459ce105b2eb317a3ec2e46499149baf6fbf80dc0347adaeac4c4c5216e2238b69016997f8597c489afa71b8c4ae9704d6e057b53d7dfaf", @ANYRES16=r0, @ANYBLOB="020029bd7000ffdbdf251700000014000980080001000900000008000200ffffff7f400001800d00010069623a7663616e30000000000d0001007564703a73797a31000000001400010069623a7465616d5f736c6176655f30000800030000000000"], 0x68}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000700)={'wpan4\x00'}) sendmsg$NL802154_CMD_GET_SEC_LEVEL(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1341020}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000003}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4004080}, 0x2) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) read$usbmon(0xffffffffffffffff, &(0x7f0000000000)=""/141, 0x8d) 23:12:37 executing program 7: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x2) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000080)={0xfffffffc, 0xffffffff, 0x42, 0x0, 0x5, 0x8000}) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) mmap$usbmon(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000008, 0x10, 0xffffffffffffffff, 0x1) 23:12:37 executing program 7: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x2) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000080)={0xfffffffc, 0xffffffff, 0x42, 0x0, 0x5, 0x8000}) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) 23:12:37 executing program 7: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x2) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000080)={0xfffffffc, 0xffffffff, 0x42, 0x0, 0x5, 0x8000}) 23:12:37 executing program 7: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x2) 23:12:47 executing program 3: clock_gettime(0x0, &(0x7f0000000040)) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) 23:12:47 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x26, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d228"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:12:47 executing program 5: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PTP_EXTTS_REQUEST2(0xffffffffffffffff, 0x40103d0b, &(0x7f0000000000)={0x81, 0x3}) r0 = memfd_secret(0x0) r1 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r1) ioctl$MON_IOCH_MFLUSH(r1, 0x9208, 0x2e63) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) ioctl$MON_IOCQ_URB_LEN(r0, 0x9201) 23:12:47 executing program 7: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) 23:12:47 executing program 0: syz_usb_connect$hid(0x6, 0x36, &(0x7f0000000540)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46d, 0xc52b, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0xa8f}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0xfa, 0x8f, 0x2}}}}}]}}]}}, &(0x7f0000000880)={0xa, &(0x7f0000000580)={0xa, 0x6, 0x200, 0x80, 0x1f, 0x3, 0x20, 0x3}, 0x7e, &(0x7f00000005c0)={0x5, 0xf, 0x7e, 0x6, [@ptm_cap={0x3}, @ssp_cap={0x10, 0x10, 0xa, 0x1, 0x1, 0x7, 0xf00, 0xa3a, [0xff000f]}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0x9, 0x9, 0xfffe}, @generic={0x42, 0x10, 0x4, "dfa909963b4c4a0a5f93e6fff45ee072e0265d99f99a5467b700c649cb42a77c7eb06c0d601324a9e383b942ef51bc888a1cd17688864ab47fb29ca13dbc07"}, @generic={0x13, 0x10, 0x1, "bfa6bacd313037a66f522459a4efdabd"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0xa3, 0x9, 0x8}]}, 0x4, [{0x4, &(0x7f0000000640)=@lang_id={0x4, 0x3, 0x429}}, {0xb8, &(0x7f0000000680)=@string={0xb8, 0x3, "42705c0d85706ddea3591c3d464f897257f530fb7f333ad5db89ff34e160bd630ad32754ae8d302b4040b733ddd3021c9e0041b51501dc58577d710d7d330a461033ed02f78659b9e6a6d07f525160284581bf9f7b6d74858c3d8fb0294c6d7dac1a859101803450377a0ef39210fb6700f771d15e7b42a9b032f28923b0bc8f38f5c962ae8881b006453fa75001382e5fdd3fa8ebca0c343cf8262a0d4d3bbb66f5724cb55b722d30598bf8562c1ad838f1c92fce2e"}}, {0xee, &(0x7f0000000740)=@string={0xee, 0x3, "fa6e8b74837c661128332dc7a26e58cfb24b28ada9d05c1973d222ba1ff66b18361b559b4b45a9742e86b79717211fc974cb38701973690bea498bba170459c3d0c000c8405f47e5ac1f3975fd438ab062808c46b45c7cd4ee6c6431aff885e241e12f0db4ddccfcedf2320f68bf467ac4c8cc8c42ec72012cb318a13c536c7d7ef62404b87e163944ea949594ba81f14406b251116ecc13257c3ec853daa401e5715097bec00e1d8f60fbd59b5a931d50a9ba8e50b560f531406263c917ce2722c50f8b9b9ece653f1757ffe0b7e4f69dff41f0dcb44992c5e8cf2bd7f343927e85513857734bb918177ce6"}}, {0x4, &(0x7f0000000840)=@lang_id={0x4, 0x3, 0x44e}}]}) 23:12:47 executing program 6: mmap$usbmon(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x110, 0xffffffffffffffff, 0x1) 23:12:47 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x0, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:12:47 executing program 1: syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28bd, 0x74, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x3, 0x2, {0x9, 0x21, 0xaa6b, 0xc6, 0x1, {0x22, 0x3aa}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x1, 0x1, 0x20}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0x0, 0x5, 0x20}}]}}}]}}]}}, &(0x7f0000000300)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x2, 0x4, 0x9, 0x20, 0x1f}, 0x2e, &(0x7f0000000080)={0x5, 0xf, 0x2e, 0x4, [@ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x5, 0xf, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "f3467c0fdd67206c155df2f59eeba69c"}, @wireless={0xb, 0x10, 0x1, 0x8, 0x2c, 0x80, 0x3, 0x4, 0x9}]}, 0x6, [{0x4, &(0x7f00000000c0)=@lang_id={0x4, 0x3, 0x425}}, {0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x860}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x424}}, {0xc1, &(0x7f0000000180)=@string={0xc1, 0x3, "32895dce90d627157085c353d7f94cd861200256946f1e7b957200ebcb7088ebb826877a0b86b0f934dc71ba39550de0d221e0952964ee86319a4fc65c41ea14733f81707695bb54d66124588b78f9d5ef53c1103908a97f54387f55b74b4f4bdd47e9580ca75c0a7f3e13b3af501985fb8394a5736005e605475e5b1f7e0534db2efda6ab352db55fbf8c178bc4440e0f4d799a88ae835e7454d7a0c36dd2ad100d7a4087c45832b2a0afc03e974fbae484ade32af76f8a5990c75d6e589e"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x413}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0xf8ff}}]}) [ 2349.918775] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2349.923409] misc raw-gadget: fail, usb_gadget_register_driver returned -16 23:12:47 executing program 6: r0 = memfd_secret(0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x80, 0x3, 0xffff8001}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) ioctl$CDROMVOLCTRL(r0, 0x530a, &(0x7f0000000000)={0x3, 0x3, 0x4, 0x3}) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x400) 23:12:47 executing program 7: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) 23:12:47 executing program 5: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$MON_IOCH_MFLUSH(0xffffffffffffffff, 0x9208, 0x200) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x301100, 0x0) r1 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x5, 0x480) ioctl$MON_IOCQ_URB_LEN(r1, 0x9201) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000080)={&(0x7f0000000040)=[0x0], 0x1, 0x3}) 23:12:47 executing program 5: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x80000000) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) ioctl$MON_IOCX_MFETCH(0xffffffffffffffff, 0xc0109207, &(0x7f0000000040)={&(0x7f0000000000)=[0x0, 0x0], 0x2, 0x81}) r0 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) ioctl$MON_IOCH_MFLUSH(r0, 0x9208, 0x10000) syz_open_dev$usbmon(&(0x7f0000000080), 0x27, 0x200001) 23:12:47 executing program 6: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) ioctl$CDROMCLOSETRAY(0xffffffffffffffff, 0x5319) 23:12:57 executing program 6: read$usbmon(0xffffffffffffffff, &(0x7f0000000000)=""/126, 0x7e) mmap$usbmon(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) 23:12:57 executing program 7: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) 23:12:57 executing program 3: clock_gettime(0x0, &(0x7f0000000040)) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) 23:12:57 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x26, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d228"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:12:57 executing program 0: syz_usb_connect$hid(0x6, 0x36, &(0x7f0000000540)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46d, 0xc52b, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0xfa, 0x8f, 0x2}}}}}]}}]}}, &(0x7f0000000880)={0xa, &(0x7f0000000580)={0xa, 0x6, 0x200, 0x80, 0x1f, 0x3, 0x20, 0x3}, 0x7e, &(0x7f00000005c0)={0x5, 0xf, 0x7e, 0x6, [@ptm_cap={0x3}, @ssp_cap={0x10, 0x10, 0xa, 0x1, 0x1, 0x7, 0xf00, 0xa3a, [0xff000f]}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0x9, 0x9, 0xfffe}, @generic={0x42, 0x10, 0x4, "dfa909963b4c4a0a5f93e6fff45ee072e0265d99f99a5467b700c649cb42a77c7eb06c0d601324a9e383b942ef51bc888a1cd17688864ab47fb29ca13dbc07"}, @generic={0x13, 0x10, 0x1, "bfa6bacd313037a66f522459a4efdabd"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0xa3, 0x9, 0x8}]}, 0x4, [{0x4, &(0x7f0000000640)=@lang_id={0x4, 0x3, 0x429}}, {0xb8, &(0x7f0000000680)=@string={0xb8, 0x3, "42705c0d85706ddea3591c3d464f897257f530fb7f333ad5db89ff34e160bd630ad32754ae8d302b4040b733ddd3021c9e0041b51501dc58577d710d7d330a461033ed02f78659b9e6a6d07f525160284581bf9f7b6d74858c3d8fb0294c6d7dac1a859101803450377a0ef39210fb6700f771d15e7b42a9b032f28923b0bc8f38f5c962ae8881b006453fa75001382e5fdd3fa8ebca0c343cf8262a0d4d3bbb66f5724cb55b722d30598bf8562c1ad838f1c92fce2e"}}, {0xee, &(0x7f0000000740)=@string={0xee, 0x3, "fa6e8b74837c661128332dc7a26e58cfb24b28ada9d05c1973d222ba1ff66b18361b559b4b45a9742e86b79717211fc974cb38701973690bea498bba170459c3d0c000c8405f47e5ac1f3975fd438ab062808c46b45c7cd4ee6c6431aff885e241e12f0db4ddccfcedf2320f68bf467ac4c8cc8c42ec72012cb318a13c536c7d7ef62404b87e163944ea949594ba81f14406b251116ecc13257c3ec853daa401e5715097bec00e1d8f60fbd59b5a931d50a9ba8e50b560f531406263c917ce2722c50f8b9b9ece653f1757ffe0b7e4f69dff41f0dcb44992c5e8cf2bd7f343927e85513857734bb918177ce6"}}, {0x4, &(0x7f0000000840)=@lang_id={0x4, 0x3, 0x44e}}]}) 23:12:57 executing program 5: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={0x0, @xdp={0x2c, 0x4, r0, 0x2f}, @l2tp={0x2, 0x0, @private=0xa010101, 0x3}, @l2={0x1f, 0x1, @any, 0x1}, 0x2, 0x0, 0x0, 0x0, 0xfff, &(0x7f0000000100)='wg0\x00', 0x5, 0x4, 0x6bb0}) r1 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r1) ioctl$MON_IOCQ_URB_LEN(r1, 0x9201) 23:12:57 executing program 1: syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28bd, 0x74, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x2, {0x9, 0x21, 0xaa6b, 0xc6, 0x1, {0x22, 0x3aa}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x1, 0x1, 0x20}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0x0, 0x5, 0x20}}]}}}]}}]}}, &(0x7f0000000300)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x2, 0x4, 0x9, 0x20, 0x1f}, 0x2e, &(0x7f0000000080)={0x5, 0xf, 0x2e, 0x4, [@ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x5, 0xf, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "f3467c0fdd67206c155df2f59eeba69c"}, @wireless={0xb, 0x10, 0x1, 0x8, 0x2c, 0x80, 0x3, 0x4, 0x9}]}, 0x6, [{0x4, &(0x7f00000000c0)=@lang_id={0x4, 0x3, 0x425}}, {0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x860}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x424}}, {0xc1, &(0x7f0000000180)=@string={0xc1, 0x3, "32895dce90d627157085c353d7f94cd861200256946f1e7b957200ebcb7088ebb826877a0b86b0f934dc71ba39550de0d221e0952964ee86319a4fc65c41ea14733f81707695bb54d66124588b78f9d5ef53c1103908a97f54387f55b74b4f4bdd47e9580ca75c0a7f3e13b3af501985fb8394a5736005e605475e5b1f7e0534db2efda6ab352db55fbf8c178bc4440e0f4d799a88ae835e7454d7a0c36dd2ad100d7a4087c45832b2a0afc03e974fbae484ade32af76f8a5990c75d6e589e"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x413}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0xf8ff}}]}) 23:12:57 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x0, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) [ 2360.223623] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2360.230686] misc raw-gadget: fail, usb_gadget_register_driver returned -16 23:12:57 executing program 7: clock_gettime(0x0, &(0x7f0000000040)) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) 23:12:57 executing program 6: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) syz_open_dev$usbmon(&(0x7f0000000000), 0x80, 0x80001) 23:12:57 executing program 6: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) read$usbmon(0xffffffffffffffff, &(0x7f0000000000)=""/197, 0xc5) 23:12:57 executing program 6: r0 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r1 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r1) ioctl$CDROMVOLCTRL(r1, 0x530a, &(0x7f0000001000)={0x40, 0x3, 0xcc, 0xfd}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) ioctl$EVIOCGSW(r2, 0x8040451b, &(0x7f0000001040)=""/4115) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) 23:12:57 executing program 6: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000700)={'wpan4\x00'}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_GET_SEC_LEVEL(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x0, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x40800) ioctl$CDROM_SELECT_DISK(0xffffffffffffffff, 0x5322, 0x0) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000700)={'wpan4\x00'}) syz_genetlink_get_family_id$nbd(&(0x7f0000000140), r2) 23:12:57 executing program 5: sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40894}, 0x40000) mmap$usbmon(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0xfffffffffffffffe) r0 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r1 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r1) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(r1, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000940)={0xe78, 0x0, 0x20, 0x70bd2c, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0x4, 0x47}}}}, [@NL80211_ATTR_TX_RATES={0x4c0, 0x5a, 0x0, 0x1, [@NL80211_BAND_2GHZ={0xa8, 0x0, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x0, 0x6, 0x2, 0x7, 0x1ff, 0x101, 0x9, 0x55da]}}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x13, 0x1, [0x3, 0x60, 0x3, 0x36, 0x5, 0x36, 0x60, 0x16, 0x2, 0x5, 0x22, 0x24, 0x3, 0x36, 0x5]}, @NL80211_TXRATE_LEGACY={0x1c, 0x1, [0x36, 0x60, 0x3, 0x1b, 0x24, 0x0, 0x12, 0x9, 0x1, 0x30, 0x36, 0x6c, 0x30, 0x2, 0x2, 0xc, 0x6, 0x1, 0xc, 0x36, 0x4, 0x5, 0x18, 0x24]}, @NL80211_TXRATE_LEGACY={0x22, 0x1, [0x6c, 0x36, 0x2, 0xb, 0x30, 0x16, 0x16, 0x60, 0x36, 0x16, 0x24, 0x5, 0xb, 0x48, 0x12, 0x36, 0xc, 0x4, 0x6, 0x1, 0x6e, 0xb, 0x48, 0x0, 0x30, 0x9, 0x36, 0x16, 0x2, 0x16]}, @NL80211_TXRATE_LEGACY={0x1b, 0x1, [0x6c, 0x16, 0x60, 0x35, 0xb, 0xb, 0x2, 0x3, 0x4c, 0x5, 0x6c, 0x36, 0x6c, 0x30, 0x9, 0x60, 0xcb84a18012ef4f7c, 0x1b, 0x0, 0x6c, 0x30, 0x12, 0x36]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}]}, @NL80211_BAND_60GHZ={0x134, 0x2, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x0, 0x8, 0x5, 0x57c, 0x0, 0x2b, 0x4917, 0x7]}}, @NL80211_TXRATE_LEGACY={0x5, 0x1, [0x6c]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x6, 0x0, 0xfffd, 0x6, 0x81, 0xe0, 0x5, 0x25a]}}, @NL80211_TXRATE_LEGACY={0xf, 0x1, [0x95a37a895747be16, 0x0, 0x4, 0x1c, 0xc, 0xb, 0x4, 0x9, 0x1e, 0xc, 0x30]}, @NL80211_TXRATE_HT={0x3c, 0x2, [{0x5, 0x1e}, {0x6, 0xa}, {0x1, 0xa}, {0x6, 0x3}, {0x4, 0xa}, {0x6, 0x9}, {0x2, 0x2}, {0x7, 0x1}, {0x0, 0x2}, {0x1, 0x2}, {0x3}, {0x0, 0x6}, {0x2}, {0x5, 0x9}, {0x4, 0x9}, {0x4, 0x8}, {0x7, 0x5}, {0x1}, {0x6, 0x6}, {0x3, 0x8}, {0x4, 0x3}, {}, {0x0, 0x8}, {0x0, 0x7}, {0x6, 0xa}, {0x0, 0x7}, {0x3, 0x1}, {0x3, 0x3}, {0x1, 0x7}, {0x5, 0x1}, {0x4, 0x5}, {0x1, 0x2}, {0x6, 0x9}, {0x2, 0x1}, {0x5, 0x9}, {0x0, 0x4}, {0x1, 0x9}, {0x3, 0x3}, {0x4, 0x3}, {0x0, 0x3}, {0x6, 0x7}, {0x0, 0x8}, {0x6, 0x6}, {0x0, 0x1}, {0x1, 0x3}, {0x0, 0x9}, {0x0, 0xa}, {0x2, 0x4}, {0x6, 0x6}, {0x5, 0x3}, {0x4, 0x7}, {0x0, 0x9}, {0x5, 0xa}, {0x1, 0x5}, {0x2, 0xa}, {0x0, 0x3}]}, @NL80211_TXRATE_HT={0x3f, 0x2, [{0x7, 0x6}, {0x0, 0x9}, {0x4, 0xa}, {0x2, 0x6}, {0x4, 0x3}, {0x5}, {0x7, 0x8}, {0x4}, {0x6, 0x1}, {0x7, 0x7}, {0x7, 0x1}, {0x1, 0x5}, {0x5, 0x1}, {0x1, 0x7}, {0x5}, {0x1, 0x2}, {0x1}, {0x1}, {0x6, 0x8}, {0x5, 0x2}, {0x4, 0x2}, {0x6, 0x9}, {0x2, 0x5}, {0x3, 0x2}, {0x0, 0x4}, {0x7, 0x4}, {0x4, 0x7}, {0x0, 0x6}, {0x1, 0x5}, {0x6, 0x5}, {0x1, 0x4}, {0x5, 0x7}, {0x6, 0x1}, {0x6, 0x7}, {0x1, 0xa}, {0x7, 0x7}, {0x6}, {}, {0x4, 0x1}, {0x3, 0x7}, {0x6, 0x4}, {0x5, 0x7}, {0x7, 0x4}, {0x1, 0x8}, {0x4, 0x8}, {0x2, 0xa}, {0x4}, {0x0, 0x4}, {0x5, 0x7}, {0x7, 0xa}, {0x0, 0x9}, {0x0, 0x3}, {0x4, 0x2}, {0x0, 0xa}, {0x0, 0x9}, {0x1, 0x9}, {0x7, 0x2}, {0x3, 0x4}, {0x0, 0x3}]}, @NL80211_TXRATE_HT={0x33, 0x2, [{0x3, 0x8}, {0x3, 0x7}, {0x1, 0x9}, {0x4, 0x4}, {0x2, 0x2}, {0x7, 0x2}, {0x7, 0x6}, {0x3, 0x4}, {0x0, 0x2}, {0x1, 0x7}, {0x3, 0x2}, {0x0, 0x2}, {0x1, 0xa}, {0x6, 0x8}, {0x6, 0x8}, {0x1, 0x6}, {0x3, 0x3}, {0x2, 0x9}, {0x6, 0x5}, {0x7, 0x5}, {0x5, 0x8}, {0x2, 0x2}, {0x0, 0x9}, {0x0, 0xa}, {0x3, 0x2}, {0x2, 0x7}, {0x1, 0x5}, {0x6, 0x5}, {0x1}, {0x5, 0x6}, {0x7}, {0x3, 0x2}, {0x6, 0x3}, {0x0, 0x5}, {0x4, 0x8}, {0x0, 0x4}, {0x5, 0x1}, {0x7, 0x7}, {0x7, 0x4}, {0x0, 0x5}, {0x6, 0x3}, {0x6, 0x7}, {0x7, 0x4}, {0x5, 0x8}, {0x6, 0x1}, {0x1, 0x2}, {0x3, 0x2}]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_LEGACY={0x22, 0x1, [0x34, 0xc, 0x5, 0x3, 0x18, 0x36, 0x60, 0x1, 0x3, 0x48, 0x18, 0x71, 0x4, 0x9, 0x1f, 0x24, 0x2, 0x16, 0xb, 0x1, 0x1, 0xc, 0x36, 0x1, 0x1b, 0x9, 0x1, 0x1, 0x3, 0xb]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x88, 0x40, 0x3, 0xffff, 0x1000, 0x7, 0x6, 0x1]}}]}, @NL80211_BAND_6GHZ={0xe8, 0x3, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x1f, 0x1, [0x2, 0x6c, 0x33, 0x0, 0x6, 0x30, 0x30, 0x3, 0x1b, 0x3, 0x18, 0x49, 0x24, 0xb, 0x18, 0x30, 0x3, 0xb, 0x6c, 0x9, 0xc, 0x18, 0x2f, 0x2, 0x32, 0xc, 0x30]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x1, 0x1ff, 0x4, 0x3f, 0x100, 0x9, 0xd58c, 0x9]}}, @NL80211_TXRATE_LEGACY={0x14, 0x1, [0x18, 0x3, 0x2, 0x30, 0x36, 0x5, 0xa, 0xb, 0x0, 0x18, 0x30, 0x24, 0x60, 0x18, 0x6c, 0x6]}, @NL80211_TXRATE_HT={0x17, 0x2, [{0x6, 0x1}, {0x5, 0x2}, {0x3, 0x5}, {0x6, 0x2}, {0x3, 0x2}, {0x5, 0x7}, {0x6}, {0x1, 0x2}, {0x4, 0x2}, {0x3, 0xa}, {0x3, 0x2}, {0x6, 0x1}, {0x0, 0x8}, {0x3, 0x3}, {0x7, 0x2}, {0x3, 0x3}, {0x0, 0x6}, {0x4, 0x6}, {0x0, 0x7}]}, @NL80211_TXRATE_HT={0x1d, 0x2, [{0x2, 0x1}, {0x4, 0x5}, {0x7}, {0x7, 0x6}, {0x3, 0x3}, {0x7, 0x5}, {0x4, 0xa}, {0x0, 0x8}, {0x2, 0x4}, {0x3}, {0x7}, {0x7, 0x5}, {0x5, 0x2}, {0x7, 0x1}, {0x7, 0x1}, {0x5, 0x1}, {0x5, 0x7}, {0x3, 0xa}, {0x2, 0x7}, {0x0, 0x4}, {0x7, 0xa}, {0x6, 0x7}, {0x3, 0x9}, {0x4, 0x6}, {0x5, 0x1}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x40, 0x7, 0x2, 0x4, 0x7, 0x8001, 0xac2, 0x3]}}, @NL80211_TXRATE_HT={0x39, 0x2, [{0x1, 0x7}, {0x1, 0x2}, {0x4, 0xa}, {0x4, 0x6}, {0x5, 0x9}, {0x0, 0x3}, {0x1, 0x2}, {0x1, 0x5}, {0x0, 0xa}, {0x2, 0x9}, {0x6, 0x1}, {0x5, 0x6}, {0x5, 0x3}, {0x1, 0x7}, {0x5, 0x2}, {0x7, 0x4}, {0x6}, {0x7, 0x7}, {0x6, 0x6}, {0x1, 0x3}, {0x1, 0x8}, {0x7, 0x8}, {0x0, 0x3}, {0x7, 0x9}, {0x1, 0xa}, {0x7, 0xa}, {0x4, 0x8}, {0x3, 0x4}, {0x2, 0xa}, {0x3, 0x1}, {0x0, 0xa}, {0x4}, {0x5, 0x9}, {0x5, 0x8}, {0x6}, {0x1, 0x1}, {0x5, 0x2}, {0x0, 0x9}, {0x5, 0x6}, {0x1, 0x6}, {0x6, 0x7}, {0x3}, {0x1, 0x6}, {0x0, 0x3}, {0x2, 0x3}, {0x3, 0x5}, {0x4, 0x8}, {0x2, 0x2}, {0x5, 0x1}, {0x1}, {0x5, 0x3}, {0x0, 0x4}, {0x2, 0x4}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x81, 0x0, 0x5, 0x95, 0x2, 0x8, 0x0, 0x3]}}]}, @NL80211_BAND_2GHZ={0x28, 0x0, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x24, 0x1, [0x3, 0x4, 0x3, 0x3, 0x4, 0x6c, 0x9, 0x16, 0x6, 0x60, 0x3, 0x9, 0x18, 0x4, 0x12, 0x1b, 0x4, 0x18, 0x30, 0x5, 0x12, 0x24, 0x48, 0x1, 0xb, 0x30, 0x60, 0xc, 0x6, 0x60, 0x36, 0x9]}]}, @NL80211_BAND_5GHZ={0x60, 0x1, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x6, 0x1, [0x5, 0x48]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x24, 0x1, [0x18, 0x4, 0x16, 0x1, 0xb, 0x1b, 0x4, 0x12, 0x1b, 0x18, 0x9, 0x60, 0x60, 0x24, 0x48, 0xc, 0x12, 0x2, 0x0, 0x36, 0x6c, 0x6c, 0xc, 0x5, 0x30, 0x6, 0x36, 0x3, 0x3, 0xc, 0x2, 0x6]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x4, 0x8, 0x7fff, 0x5, 0x541, 0x8, 0x3]}}, @NL80211_TXRATE_LEGACY={0x11, 0x1, [0x48, 0x18, 0x4, 0x6, 0x60, 0xc, 0x1, 0x12, 0x48, 0x18, 0x24, 0x36, 0x9]}]}, @NL80211_BAND_5GHZ={0x8c, 0x1, 0x0, 0x1, [@NL80211_TXRATE_HT={0x36, 0x2, [{0x5, 0x3}, {0x3, 0x5}, {0x0, 0x4}, {0x2, 0x5}, {0x0, 0xa}, {0x7, 0x8}, {0x7, 0x5}, {0x1, 0x6}, {0x2, 0x7}, {0x3, 0x4}, {0x4, 0x1}, {0x7}, {0x6, 0x8}, {0x7, 0x6}, {0x7, 0x6}, {0x6, 0x5}, {0x4, 0x6}, {0x5, 0x3}, {0x0, 0xa}, {0x2, 0x9}, {0x1, 0xa}, {0x2, 0x7}, {0x7, 0x4}, {0x5, 0x7}, {0x4, 0x4}, {0x3, 0x7}, {0x0, 0x7}, {0x6, 0x5}, {0x1, 0x2}, {0x2, 0x1}, {0x5, 0x4}, {0x1, 0x6}, {0x5, 0xa}, {0x0, 0x1}, {0x6}, {0x2, 0x9}, {0x0, 0x4}, {0x1, 0x7}, {0x2, 0x7}, {0x7, 0x4}, {0x4, 0x9}, {0x7, 0x1}, {0x0, 0x6}, {0x4, 0x8}, {0x5, 0x2}, {0x2, 0x9}, {0x3, 0x8}, {0x7, 0x3}, {0x6}, {0x3, 0x2}]}, @NL80211_TXRATE_HT={0x15, 0x2, [{0x4, 0x9}, {0x1}, {0x2, 0x7}, {0x2, 0x6}, {0x0, 0xa}, {0x6, 0x8}, {0x2, 0x2}, {0x5}, {0x6, 0xa}, {0x1, 0x8}, {0x0, 0x9}, {0x4, 0x8}, {0x2, 0x2}, {0x4, 0x2}, {0x1, 0x5}, {0x6}, {0x2, 0x6}]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x9, 0x3c, 0x6, 0xa519, 0x7, 0x8, 0x5d1, 0xbdf]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x85a8, 0x7, 0x2, 0x0, 0x7fff, 0x9, 0xff, 0xa5ca]}}, @NL80211_TXRATE_HT={0x8, 0x2, [{0x5}, {0x1, 0x1}, {0x4, 0x8}, {0x1, 0x7}]}]}, @NL80211_BAND_2GHZ={0x1c, 0x0, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}]}, @NL80211_BAND_60GHZ={0xc8, 0x2, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x6, 0x2, 0x8, 0x8, 0x2, 0x3f, 0x1, 0x6]}}, @NL80211_TXRATE_HT={0x3a, 0x2, [{0x1, 0x2}, {0x2, 0xa}, {0x7, 0x3}, {0x0, 0x6}, {0x5, 0x5}, {0x6, 0x3}, {0x3}, {0x1, 0x1}, {0x4, 0x6}, {0x4, 0x5}, {0x4, 0x4}, {0x1}, {0x4, 0x4}, {}, {}, {0x0, 0x1}, {0x0, 0x6}, {0x1, 0x8}, {0x0, 0x3}, {0x1, 0x8}, {0x6, 0x8}, {0x1, 0x6}, {0x4, 0x2}, {0x1, 0x5}, {0x7, 0x8}, {}, {0x1, 0xa}, {0x5, 0x5}, {0x3, 0x8}, {0x7, 0x7}, {0x0, 0x8}, {0x3, 0x9}, {0x2, 0x5}, {0x2, 0x4}, {0x6, 0x3}, {0x0, 0x7}, {0x3, 0x5}, {0x1, 0x4}, {0x5, 0x4}, {0x4, 0x6}, {0x7, 0x1}, {0x0, 0x3}, {0x6, 0x3}, {0x2, 0x7}, {0x1}, {0x0, 0xa}, {0x2, 0x3}, {0x0, 0x1}, {0x2, 0x7}, {0x6, 0x5}, {0x3, 0x4}, {0x0, 0x9}, {0x0, 0x1}, {0x4, 0x6}]}, @NL80211_TXRATE_LEGACY={0x6, 0x1, [0x2, 0x12]}, @NL80211_TXRATE_HT={0x4e, 0x2, [{0x1, 0x9}, {0x4, 0x5}, {0x1, 0xa}, {0x3}, {0x1, 0x8}, {0x1, 0x5}, {0x5}, {0x4, 0x9}, {0x0, 0x2}, {0x2, 0x4}, {0x1}, {0x5, 0x2}, {0x1, 0x5}, {0x4, 0x2}, {0x2, 0x8}, {0x5, 0x2}, {0x0, 0x7}, {0x7, 0x5}, {0x0, 0x3}, {0x3, 0x5}, {0x5, 0x9}, {0x0, 0x7}, {0x4, 0x2}, {0x4, 0x5}, {0x7, 0x3}, {0x6, 0x9}, {0x3, 0x7}, {0x5, 0x1}, {0x6, 0x7}, {0x0, 0x1}, {0x4, 0x1}, {0x1, 0x5}, {0x1, 0x5}, {0x5, 0x5}, {0x4, 0xa}, {0x2, 0x1}, {0x6, 0x3}, {0x4, 0x3}, {0x1, 0x5}, {0x6, 0x7}, {0x1, 0x1}, {0x7, 0x8}, {0x7, 0x3}, {0x5, 0x7}, {0x2, 0x8}, {0x7, 0x4}, {0x1, 0x5}, {0x6, 0x3}, {0x2, 0x7}, {0x1, 0x8}, {0x2, 0x5}, {0x1, 0x4}, {0x5, 0x4}, {0x0, 0xa}, {0x0, 0x2}, {0x7, 0x9}, {0x1, 0x7}, {0x6}, {0x5, 0x3}, {0x2, 0x1}, {0x1, 0x2}, {0x4, 0xa}, {0x0, 0x6}, {0x5, 0x1}, {0x5, 0x7}, {0x5, 0xa}, {0x3, 0x8}, {0x1, 0x4}, {0x1, 0x2}, {0x2, 0x5}, {0x7, 0xa}, {0x6, 0x9}, {0x0, 0x9}, {0x1, 0x8}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x80, 0x3, 0x5, 0x6, 0x7, 0x3, 0x7, 0x1b29]}}]}]}, @NL80211_ATTR_TX_RATES={0xa0, 0x5a, 0x0, 0x1, [@NL80211_BAND_5GHZ={0x9c, 0x1, 0x0, 0x1, [@NL80211_TXRATE_HT={0x1a, 0x2, [{0x5, 0xa}, {0x5, 0x4}, {0x7, 0x1}, {0x3}, {0x5, 0x7}, {0x6, 0x9}, {0x4}, {0x7}, {0x7, 0x8}, {0x1, 0x2}, {0x6, 0x1}, {0x1, 0x3}, {0x0, 0x7}, {0x1, 0x9}, {0x5, 0x2}, {0x1, 0x8}, {0x0, 0x5}, {0x1, 0x5}, {0x3, 0xa}, {0x2, 0x7}, {0x6}, {0x4, 0x4}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x3, 0x8000, 0x5, 0x1, 0x6, 0x3ff, 0x7, 0xf001]}}, @NL80211_TXRATE_LEGACY={0x1c, 0x1, [0x1b, 0x36, 0x6, 0x2c, 0xb, 0xb, 0x5d, 0x6c, 0x23, 0x18, 0xc, 0x16, 0x9, 0x2, 0x36, 0x60, 0x22, 0x1, 0x9, 0x5, 0x60, 0x24, 0x24, 0x2]}, @NL80211_TXRATE_LEGACY={0x14, 0x1, [0x3, 0x36, 0x18, 0xc, 0x36, 0x30, 0x48, 0x3, 0x70, 0xc, 0xc, 0x60, 0x5, 0x48, 0x1, 0x36]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_LEGACY={0x19, 0x1, [0xc, 0x4, 0x2, 0x24, 0x3, 0x6c, 0x2, 0x6, 0x24, 0x30, 0x30, 0x24, 0x9, 0x24, 0x1, 0x24, 0x6c, 0x4, 0x0, 0x36, 0x36]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x9679, 0x7, 0x1, 0x8000, 0xe73, 0x400, 0x5]}}]}]}, @NL80211_ATTR_TX_RATES={0x4}, @NL80211_ATTR_TX_RATES={0xf0, 0x5a, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x80, 0x0, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x2e9a, 0x5, 0x9, 0x148, 0x40, 0x8, 0x6, 0x5]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x3, 0x6, 0xbb9f, 0x6, 0x40, 0xb1, 0x81, 0x8001]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_HT={0x16, 0x2, [{0x1}, {0x7, 0x9}, {0x2, 0x5}, {0x7, 0x8}, {0x2, 0x7}, {0x0, 0x9}, {0x2, 0x9}, {0x3, 0x9}, {0x1, 0x1}, {0x1, 0xa}, {0x1, 0x1}, {0x4, 0x1}, {0x2, 0x6}, {0x1, 0x4}, {0x7, 0x9}, {0x6, 0x9}, {0x3, 0x9}, {0x5, 0x1}]}, @NL80211_TXRATE_LEGACY={0xd, 0x1, [0x30, 0x9, 0x24, 0xc, 0x4, 0x1b, 0x48, 0x9, 0x12]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x7, 0x1, [0x24, 0x48, 0x6]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x7fff, 0x8, 0x6, 0x9, 0x0, 0x7ff, 0xf1, 0x3]}}]}, @NL80211_BAND_6GHZ={0x6c, 0x3, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x21, 0x1, [0x6c, 0x60, 0x5, 0x24, 0xc, 0xc, 0x4, 0x19, 0x3, 0x12, 0x36, 0x16, 0x16, 0x36, 0x18, 0x12, 0xb, 0x60, 0x9, 0x6, 0x69, 0xb, 0x16, 0x24, 0x2, 0x60, 0x18, 0x5, 0x12]}, @NL80211_TXRATE_LEGACY={0xa, 0x1, [0x26, 0x24, 0x18, 0x65, 0x1b, 0x18]}, @NL80211_TXRATE_HT={0x1e, 0x2, [{0x3, 0x5}, {0x3, 0xa}, {0x6, 0x9}, {0x2, 0xa}, {0x0, 0x9}, {0x5, 0x7}, {0x7, 0x1}, {0x6, 0x2}, {0x1, 0x2}, {0x0, 0x5}, {0x5, 0x3}, {0x0, 0x4}, {0x6, 0x7}, {0x5, 0x4}, {0x5, 0x3}, {0x5, 0x4}, {0x1, 0x6}, {0x0, 0x1}, {0x4, 0x3}, {0x0, 0x5}, {0x4}, {0x3, 0x2}, {0x7, 0x4}, {0x3, 0x9}, {0x2, 0x3}, {0x6, 0x2}]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}]}]}, @NL80211_ATTR_TX_RATES={0x3e4, 0x5a, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x20, 0x0, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x2, 0x2, 0x6, 0xfff, 0x3, 0x9, 0x1, 0x5]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}, @NL80211_BAND_5GHZ={0x14, 0x1, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x5, 0x1, [0x1]}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_60GHZ={0x9c, 0x2, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x400, 0x3, 0x1, 0x4, 0x6, 0x865, 0x3, 0x454]}}, @NL80211_TXRATE_HT={0x32, 0x2, [{0x3, 0x3}, {0x1, 0x8}, {0x5, 0x1}, {0x0, 0x3}, {0x7, 0x4}, {0x2, 0xa}, {0x0, 0x2}, {0x4, 0xa}, {0x0, 0x7}, {0x2, 0x7}, {0x3, 0x4}, {0x6, 0x9}, {0x6, 0x9}, {0x2, 0x5}, {}, {0x1, 0x1}, {0x1, 0x6}, {0x6, 0xa}, {0x7, 0x8}, {0x5}, {0x4, 0x1}, {0x5, 0x3}, {0x0, 0x8}, {0x0, 0x1}, {0x1, 0x2}, {0x5, 0x1}, {0x3, 0xa}, {0x3, 0x2}, {0x4, 0x6}, {0x1, 0x1}, {0x6}, {0x5}, {0x7, 0x9}, {0x3, 0x2}, {0x7, 0x9}, {0x2}, {0x7, 0x2}, {0x5, 0x2}, {0x1, 0x5}, {0x3, 0x6}, {0x0, 0xa}, {0x3, 0x2}, {0x3, 0x6}, {0x0, 0x7}, {0x0, 0x2}, {0x1, 0x1}]}, @NL80211_TXRATE_LEGACY={0x11, 0x1, [0x4, 0x24, 0x48, 0x60, 0x18, 0xb, 0x30, 0x30, 0x6, 0x5, 0x12, 0x18, 0x24]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x4, 0x5, 0x8, 0x8, 0x0, 0x9, 0x5, 0x200]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x9, 0x0, 0xf001, 0x76fd, 0x4, 0x81, 0x7fff, 0x7]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_LEGACY={0x4}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}]}, @NL80211_BAND_6GHZ={0xc0, 0x3, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x5, 0x40, 0x7, 0x9, 0x2, 0x2807, 0x7, 0x1f]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xbeb5, 0x3ff, 0x2, 0x6, 0x36, 0x1, 0x3ff, 0x5]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x1, 0x2, 0x4, 0xff, 0x3f, 0x8, 0x0, 0x6]}}, @NL80211_TXRATE_HT={0x7, 0x2, [{0x0, 0xa}, {0x6}, {0x4, 0x2}]}, @NL80211_TXRATE_LEGACY={0x24, 0x1, [0x30, 0x12, 0x12, 0x16, 0x18, 0xb, 0x6, 0xc, 0x12, 0x60, 0x3, 0x5, 0x18, 0x48, 0x60, 0x1, 0x4, 0x3, 0x2b, 0x9, 0x30, 0x18, 0x4, 0x9, 0x1a, 0x73, 0x48, 0x30, 0x60, 0x0, 0x48, 0x2]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_HT={0x3a, 0x2, [{0x5, 0x3}, {0x7, 0x4}, {0x6, 0x1}, {0x3, 0x6}, {0x3, 0x4}, {0x1, 0x5}, {0x6, 0x8}, {0x2}, {0x4, 0xa}, {0x5, 0x4}, {0x2, 0x1}, {0x1, 0xa}, {0x5, 0x8}, {0x1, 0xa}, {0x1, 0x5}, {0x0, 0x7}, {0x2, 0x2}, {0x7, 0x2}, {0x0, 0xa}, {0x3, 0x8}, {0x3, 0x9}, {0x7, 0x4}, {0x4, 0x1}, {0x1, 0x9}, {0x0, 0x9}, {0x2, 0x9}, {0x2, 0x7}, {0x6, 0xa}, {0x3, 0x7}, {0x1, 0x9}, {0x1, 0x8}, {0x4, 0x5}, {0x2, 0x7}, {0x0, 0x7}, {0x5, 0xa}, {0x1, 0x1}, {0x1, 0x2}, {0x5, 0x9}, {0x2, 0x7}, {0x1, 0x7}, {0x3, 0x9}, {0x3, 0x8}, {0x6, 0x1}, {0x1, 0x7}, {0x0, 0x7}, {0x1, 0x4}, {0x3, 0x3}, {0x4, 0x3}, {0x1, 0x6}, {0x2}, {0x7, 0x9}, {0x0, 0x4}, {0x4, 0x2}, {0x1, 0xa}]}]}, @NL80211_BAND_5GHZ={0x100, 0x1, 0x0, 0x1, [@NL80211_TXRATE_HT={0x48, 0x2, [{0x1, 0x1}, {0x2, 0x4}, {0x1, 0x4}, {0x2, 0x1}, {0x2, 0x9}, {0x5, 0x9}, {0x3, 0x9}, {0x1, 0x4}, {0x0, 0x7}, {0x2, 0x3}, {0x1, 0x6}, {0x3, 0x6}, {0x7, 0x5}, {0x3}, {0x0, 0x3}, {0x1, 0x1}, {0x6, 0x6}, {0x7, 0x4}, {0x3, 0x9}, {0x1, 0x3}, {0x7, 0x1}, {0x6, 0x6}, {0x3}, {0x6}, {0x5, 0x6}, {0x1, 0x7}, {0x6, 0x8}, {0x4, 0x3}, {0x2, 0x2}, {0x2, 0x8}, {0x7, 0x9}, {0x3}, {0x0, 0x9}, {0x1, 0x6}, {0x6, 0x9}, {0x0, 0x3}, {0x2, 0x1}, {0x7, 0x8}, {0x1, 0xa}, {0x0, 0x5}, {0x3, 0x8}, {0x3}, {0x2, 0x6}, {0x2, 0x4}, {0x7, 0x1}, {0x2, 0xa}, {0x6, 0x9}, {0x3, 0x8}, {0x5, 0x7}, {0x6, 0xa}, {0x7, 0x5}, {0x5, 0x4}, {0x4, 0x4}, {0x1, 0x8}, {0x1, 0x9}, {0x2, 0x2}, {0x4, 0x8}, {0x1, 0x8}, {0x7, 0x1}, {0x2, 0x4}, {0x5}, {0x4, 0x5}, {0x6, 0x2}, {0x2, 0x7}, {0x1, 0x4}, {}, {0x0, 0x2}, {0x0, 0x2}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x8, 0x6, 0x9, 0xff77, 0xf72c, 0x3ff, 0x8455, 0xffff]}}, @NL80211_TXRATE_HT={0x4d, 0x2, [{0x1, 0x3}, {0x3, 0xa}, {0x2, 0x8}, {0x6, 0x2}, {0x0, 0x3}, {0x3}, {0x5, 0x7}, {0x0, 0x5}, {0x4, 0xa}, {0x5}, {0x1, 0x2}, {0x7, 0x4}, {0x7, 0x2}, {0x0, 0x9}, {0x0, 0x8}, {0x1, 0x2}, {0x7, 0x9}, {0x3, 0x1}, {0x1, 0x8}, {0x4, 0xa}, {0x1, 0x1}, {0x0, 0xa}, {0x2, 0xa}, {0x1, 0x9}, {0x3, 0x8}, {0x3, 0xa}, {0x0, 0x4}, {0x4, 0x6}, {0x5, 0xa}, {0x2, 0x1}, {0x5, 0x2}, {0x0, 0x8}, {0x2, 0x4}, {0x5}, {0x0, 0x1}, {0x7, 0x1}, {0x3, 0x6}, {0x4, 0x6}, {0x2, 0x4}, {0x5, 0x5}, {0x5, 0x2}, {0x5, 0x7}, {0x1, 0x9}, {0x2, 0x9}, {0x7, 0x1}, {0x4, 0x9}, {0x4, 0xa}, {0x7, 0x3}, {0x3, 0x5}, {0x0, 0x3}, {0x6, 0x6}, {0x0, 0x1}, {0x1, 0x8}, {0x6, 0x4}, {0x4, 0x7}, {0x5, 0x4}, {0x7, 0x7}, {0x4, 0xa}, {0x3, 0x4}, {0x6, 0x7}, {0x7, 0x8}, {0x5, 0x4}, {0x3, 0xa}, {0x4, 0x4}, {0x4, 0xa}, {0x7, 0x2}, {0x4, 0x8}, {0x1, 0x9}, {0x0, 0x2}, {0x6, 0x5}, {0x0, 0x3}, {0x1, 0x9}, {0x4, 0x7}]}, @NL80211_TXRATE_HT={0x45, 0x2, [{0x0, 0x2}, {0x0, 0x6}, {0x7, 0x3}, {0x0, 0x3}, {0x2, 0x5}, {0x0, 0x2}, {0x2, 0x5}, {0x5, 0x4}, {0x6, 0x4}, {0x4}, {0x4, 0x2}, {0x4, 0x2}, {0x1, 0x4}, {0x0, 0x5}, {0x4, 0x7}, {0x5, 0xa}, {0x6, 0x2}, {0x1, 0x9}, {0x4, 0x9}, {0x6}, {0x7, 0x7}, {0x7, 0x6}, {0x2, 0x5}, {0x6, 0x5}, {0x7, 0x7}, {0x0, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x6}, {0x7, 0x3}, {0x2, 0x2}, {0x0, 0xa}, {0x3, 0xa}, {0x3}, {0x6, 0x9}, {0x2, 0x1}, {0x6, 0x1}, {0x2}, {0x3, 0x5}, {0x2, 0x1}, {0x4, 0x1}, {0x0, 0x3}, {}, {0x2, 0x4}, {0x6, 0x2}, {0x2, 0x6}, {0x0, 0x7}, {0x2, 0x1}, {0x0, 0xa}, {0x3, 0x1}, {0x1, 0x2}, {0x4, 0x8}, {0x4, 0x7}, {0x5, 0xa}, {0x0, 0x5}, {0x0, 0x6}, {0x5, 0x1}, {0x4, 0xa}, {0x4, 0x6}, {0x1, 0x7}, {0x5, 0x9}, {0x3, 0x9}, {0x2, 0x8}, {0x1, 0x3}, {0x5, 0x7}]}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_6GHZ={0xb4, 0x3, 0x0, 0x1, [@NL80211_TXRATE_HT={0x36, 0x2, [{0x6, 0x3}, {0x5, 0xa}, {0x0, 0x8}, {0x1}, {0x3, 0x7}, {0x1, 0x8}, {0x3, 0x2}, {0x1, 0xa}, {0x6, 0x2}, {0x2}, {0x3}, {0x1, 0x7}, {0x1, 0x7}, {0x5, 0x1}, {0x7, 0x9}, {0x3, 0x7}, {0x6, 0x6}, {0x0, 0x2}, {0x7, 0x3}, {0x5, 0x6}, {0x7, 0x8}, {0x1, 0x3}, {0x3, 0xa}, {0x6}, {0x4, 0x9}, {0x7, 0x3}, {0x4, 0x9}, {0x2, 0xa}, {0x3, 0x8}, {0x0, 0x1}, {0x5, 0x5}, {0x4, 0x8}, {0x4, 0x1}, {0x1, 0x1}, {0x1, 0x9}, {0x2, 0x3}, {0x4, 0x7}, {0x0, 0xa}, {0x6, 0x5}, {0x3, 0x2}, {0x0, 0x3}, {0x2, 0x7}, {0x0, 0x3}, {0x4, 0xa}, {0x7, 0x8}, {0x5, 0x9}, {0x1, 0x3}, {0x3, 0x7}, {0x4, 0x8}, {0x5}]}, @NL80211_TXRATE_HT={0x2a, 0x2, [{0x1}, {0x3, 0x3}, {0x2, 0x7}, {0x6, 0x2}, {0x7, 0x3}, {0x5, 0x1}, {0x4, 0x9}, {0x6}, {0x2, 0x4}, {0x3, 0x2}, {0x7, 0x7}, {0x4, 0x9}, {0x1, 0x7}, {0x7, 0x6}, {0x5, 0x2}, {0x4, 0xa}, {0x7, 0x2}, {0x7, 0x4}, {0x5, 0x4}, {0x6, 0x7}, {0x4, 0x9}, {0x5, 0x6}, {0x7}, {0x5, 0x2}, {0x3, 0x6}, {0x7, 0x9}, {0x7, 0x8}, {0x5, 0x5}, {0x1, 0x9}, {0x0, 0x2}, {0x0, 0x6}, {0x1, 0x4}, {0x1, 0x6}, {0x1, 0x16}, {0x2, 0x7}, {0x0, 0x8}, {0x3, 0x7}, {0x7, 0x5}]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_HT={0xf, 0x2, [{0x4, 0xa}, {0x7, 0x7}, {0x1, 0x5}, {0x1, 0x2}, {0x6, 0x8}, {0x3, 0x1}, {0x1}, {0x5, 0x8}, {0x3, 0x7}, {0x1, 0xa}, {0x7}]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x4f2d, 0x101, 0x1, 0x6, 0x2, 0x5f7, 0x1, 0x800]}}, @NL80211_TXRATE_HT={0x17, 0x2, [{0x5, 0x2}, {0x5}, {0x4, 0x4}, {0x2, 0x7}, {0x5, 0x18}, {0x6, 0x6}, {0x2, 0x7}, {0x5, 0x3}, {0x3}, {0x2, 0x3}, {0x4, 0x2}, {0x0, 0x8}, {0x2, 0x8}, {0x0, 0x9}, {0x2, 0x1}, {0x2, 0x1}, {0x4, 0x3}, {0x0, 0x2}, {0x3, 0x3}]}]}, @NL80211_BAND_2GHZ={0x60, 0x0, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0xfffc, 0xfeff, 0x5, 0xc6, 0x3, 0xb04, 0x401, 0x1]}}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x17, 0x1, [0x16, 0x1d, 0x53, 0x4, 0x36, 0x1, 0x24, 0xb, 0x18, 0x28, 0x6c, 0x5, 0x16, 0x48, 0x60, 0x36, 0xb, 0xc, 0x9]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x2, 0x6, 0x419, 0x20, 0x4, 0x20, 0x0, 0x5e]}}, @NL80211_TXRATE_LEGACY={0xc, 0x1, [0x9, 0xb, 0x6, 0x6c, 0xb, 0x60, 0x12, 0x3]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}]}, @NL80211_BAND_6GHZ={0x3c, 0x3, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x5, 0x9, 0x6, 0x43, 0xee, 0x3ff, 0x3, 0x2]}}, @NL80211_TXRATE_LEGACY={0x19, 0x1, [0xc, 0x12, 0x9, 0x9, 0x18, 0x2, 0x6, 0x2, 0x9, 0x12, 0x1, 0x6, 0x42, 0x36, 0x1, 0x30, 0x30, 0xb, 0x6, 0xc, 0x1]}, @NL80211_TXRATE_GI={0x5}]}]}, @NL80211_ATTR_TX_RATES={0x2e4, 0x5a, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x9c, 0x0, 0x0, 0x1, [@NL80211_TXRATE_HT={0x39, 0x2, [{0x7, 0x2}, {0x4, 0x7}, {0x3, 0x8}, {0x0, 0xa}, {0x4, 0x3}, {0x4, 0x8}, {0x7, 0x9}, {0x3, 0x4}, {0x0, 0x1}, {0x6}, {0x5, 0x3}, {0x2, 0x4}, {0x2}, {0x1, 0x5}, {0x2, 0x1}, {0x2, 0x4}, {0x4, 0x3}, {0x7, 0x3}, {0x7, 0x5}, {0x5, 0x7}, {0x1, 0x7}, {0x1}, {0x6, 0x7}, {0x1, 0x7}, {0x4, 0x5}, {0x1, 0x8}, {0x2, 0x4}, {0x1, 0x5}, {0x4, 0x9}, {0x5, 0x2}, {0x6, 0x9}, {0x2, 0x6}, {0x4, 0x8}, {0x0, 0x9}, {0x7, 0x4}, {0x5, 0x7}, {0x5, 0x1}, {0x6, 0x3}, {0x2, 0xa}, {0x0, 0x7}, {0x6, 0x6}, {0x7, 0x9}, {0x0, 0x4}, {0x5, 0x2}, {0x6, 0x3}, {0x0, 0x9}, {0x1, 0x2}, {0x0, 0x1}, {0x2, 0x9}, {0x5, 0x8}, {0x4, 0x8}, {0x3, 0x8}, {0x2, 0xa}]}, @NL80211_TXRATE_HT={0x14, 0x2, [{0x1, 0x6}, {0x1, 0x4}, {0x3, 0x7}, {0x1, 0x5}, {0x1, 0x8}, {0x3, 0xa}, {0x1, 0x4}, {0x2, 0x5}, {0x0, 0x5}, {0x4, 0x2}, {0x1, 0x6}, {0x3, 0x2}, {0x0, 0x4}, {0x3, 0x9}, {0x2, 0x1}, {0x2, 0x7}]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_LEGACY={0x19, 0x1, [0x3e, 0x6, 0x6c, 0xc, 0x48, 0x1b, 0x9, 0x6c, 0x5, 0xc, 0x16, 0x16, 0x4, 0xb, 0x48, 0x3, 0x6c, 0x6, 0x60, 0x6c, 0xb]}, @NL80211_TXRATE_LEGACY={0x11, 0x1, [0x1, 0x12, 0x3, 0x16, 0x24, 0x5, 0x12, 0xb, 0x60, 0xc, 0x36, 0x6c, 0x1]}, @NL80211_TXRATE_LEGACY={0xe, 0x1, [0x0, 0x36, 0x18, 0x24, 0x1b, 0x1, 0x5, 0x48, 0x36, 0x6]}]}, @NL80211_BAND_5GHZ={0x24, 0x1, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x1e, 0x1, [0x60, 0x6c, 0x18, 0x3, 0x9, 0x5, 0x36, 0x2, 0x24, 0xb, 0x16, 0x4, 0x16, 0x7e, 0x12, 0x18, 0x1b, 0x12, 0x60, 0x30, 0x30, 0x12, 0x12, 0x36, 0x48, 0x4]}]}, @NL80211_BAND_6GHZ={0x108, 0x3, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x19, 0x1, [0xb, 0x1b, 0x18, 0x24, 0x6c, 0x2, 0x18, 0x12, 0x18, 0x60, 0xc, 0x36, 0xc, 0x60, 0x5, 0x5, 0x9, 0x12, 0x9, 0x6, 0x2]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x9, 0x5, 0x5, 0x3f, 0x5, 0x5, 0x0, 0x7931]}}, @NL80211_TXRATE_HT={0x2f, 0x2, [{0x7, 0xa}, {0x0, 0x7}, {0x0, 0x6}, {0x7, 0xa}, {0x5, 0x6}, {0x3, 0x7}, {0x3, 0x2}, {0x7, 0x6}, {0x1, 0x2}, {0x0, 0xa}, {}, {0x3, 0x3}, {0x3, 0x7}, {0x1, 0x8}, {0x6, 0x8}, {0x2, 0x6}, {0x0, 0x2}, {0x4, 0x7}, {0x5, 0x4}, {0x2, 0x5}, {0x3, 0x4}, {0x4, 0xa}, {0x5, 0xa}, {0x4, 0x1}, {0x1}, {0x4, 0x7}, {0x2, 0x1}, {0x2}, {0x7, 0x9}, {0x3, 0xa}, {0x6, 0x3}, {0x3, 0x2}, {0x0, 0x5}, {0x4, 0x7}, {0x4, 0xa}, {0x3, 0x2}, {0x0, 0x4}, {0x2, 0x5}, {0x1, 0x6}, {0x2, 0x3}, {0x5, 0x3}, {0x6}, {0x7, 0x4}]}, @NL80211_TXRATE_LEGACY={0x10, 0x1, [0x1b, 0x9, 0x10, 0x3, 0x24, 0x1b, 0x6c, 0x16, 0x24, 0x9, 0x36, 0x12]}, @NL80211_TXRATE_LEGACY={0xc, 0x1, [0x35, 0x2, 0x2, 0x24, 0x9, 0x1, 0x6c, 0x1]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x7, 0xd6f, 0x7, 0x101, 0x0, 0xf7a4, 0x0, 0xff]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x6, 0x0, 0x7, 0x8, 0x7fff, 0x1a48, 0x1]}}, @NL80211_TXRATE_HT={0x42, 0x2, [{0x3, 0x6}, {0x5, 0x3}, {0x5, 0x3}, {0x1, 0x5}, {0x0, 0x4}, {0x0, 0x2}, {0x1, 0x1}, {0x3, 0xa}, {0x7, 0x1}, {0x1, 0x9}, {0x7, 0x7}, {0x5, 0x6}, {0x4, 0x2}, {0x3, 0x6}, {0x1, 0x8}, {0x4, 0x5}, {0x7, 0x5}, {0x1, 0x9}, {0x0, 0x1}, {0x2, 0x7}, {0x0, 0x1}, {0x1, 0x7}, {0x6, 0x6}, {0x3, 0x1}, {0x5, 0x5}, {0x5, 0x8}, {0x4, 0x5}, {0x2, 0x5}, {0x4, 0x4}, {0x1, 0x2}, {0x6, 0xa}, {0x6, 0x2}, {0x3, 0x3}, {0x6, 0x9}, {0x1, 0x3}, {0x1, 0x8}, {0x7, 0x5}, {0x3, 0x4}, {0x1, 0x1}, {0x4, 0x9}, {0x1, 0x6}, {0x7, 0x2}, {0x7, 0x7}, {0x4, 0x7}, {0x1, 0x4}, {0x3, 0x4}, {0x3, 0x3}, {0x4, 0x1}, {0x2, 0x5}, {0x4, 0x6}, {0x1, 0x7}, {0x0, 0x8}, {0x0, 0x8}, {0x5, 0x1}, {0x7, 0xa}, {0x6, 0x5}, {0x6, 0x5}, {0x7}, {0x6, 0x6}, {0x5, 0xa}, {0x7, 0x8}, {0x6, 0x1}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x7, 0x4, 0x1, 0x100, 0x6, 0x9, 0x101, 0x20]}}]}, @NL80211_BAND_5GHZ={0x58, 0x1, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x23, 0x1, [0x41, 0x4, 0x9, 0x3, 0x2, 0x12, 0x60, 0x60, 0x30, 0x60, 0x9, 0xb, 0x18, 0xc, 0x73e288815a09cec4, 0x5, 0x30, 0x36, 0x9, 0x2, 0x24, 0x36, 0x12, 0x24, 0x30, 0x1, 0x1b, 0x9, 0x9, 0x36, 0x12]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x3000, 0x9799, 0x7fff, 0x1, 0x3, 0x8, 0x62f8, 0x400]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x40, 0x40, 0x401, 0x1f, 0x8f3, 0x2, 0x7, 0x40]}}]}, @NL80211_BAND_6GHZ={0x34, 0x3, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x5, 0x1, 0x80, 0x6, 0x3f, 0x3, 0x2, 0x2]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xa8a1, 0x1ff, 0x0, 0x1, 0xfffa, 0x3, 0x1, 0xca2b]}}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_6GHZ={0x68, 0x3, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x18, 0x1, [0x1b, 0x36, 0x1b, 0x16, 0x9, 0x36, 0x36, 0xb, 0x5, 0x18, 0x30, 0x0, 0x2, 0x4, 0x1, 0x4, 0x71, 0x16, 0x18, 0x6]}, @NL80211_TXRATE_LEGACY={0x24, 0x1, [0x24, 0x55, 0x5, 0x12, 0x16, 0x6, 0x6, 0x2, 0x1b, 0x16, 0x16, 0x2, 0x24, 0x4, 0x4, 0x4, 0x30, 0x24, 0x18, 0xc, 0xf, 0x16, 0x4a06e234aa1f2921, 0x1, 0x16, 0x6c, 0x1, 0x5, 0x1b, 0x6c, 0xb, 0xb]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x100, 0x1ff, 0xfff, 0x1f, 0x1, 0x9, 0xe5]}}, @NL80211_TXRATE_HT={0x13, 0x2, [{0x7, 0x3}, {0x0, 0x2}, {0x4, 0x7}, {0x6}, {0x7, 0x3}, {0x4, 0x7}, {0x3, 0x8}, {0x6, 0x2}, {0x4}, {0x7, 0x1}, {0x4, 0x2}, {0x6, 0x8}, {0x6, 0x4}, {0x1, 0x4}, {0x0, 0x9}]}]}, @NL80211_BAND_60GHZ={0x24, 0x2, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x10, 0x1, [0x24, 0x1, 0x36, 0x74, 0x2, 0x68, 0xc, 0x24, 0x9, 0x30, 0x18, 0x24]}]}]}, @NL80211_ATTR_TX_RATES={0x134, 0x5a, 0x0, 0x1, [@NL80211_BAND_5GHZ={0x28, 0x1, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x1b, 0x1, [0xb, 0x16, 0x28, 0x8, 0x3, 0x0, 0x1b, 0x0, 0x5f, 0x4, 0x36, 0x1b, 0x7b, 0x48, 0x30, 0x30, 0x4, 0x36, 0x31, 0x48, 0xf, 0x1, 0x0]}]}, @NL80211_BAND_60GHZ={0x50, 0x2, 0x0, 0x1, [@NL80211_TXRATE_HT={0x32, 0x2, [{0x1, 0x3}, {0x6, 0x2}, {}, {0x4, 0x3}, {0x6}, {0x1, 0x1}, {0x5, 0x9}, {0x6, 0x3}, {0x5, 0x4}, {0x0, 0x6}, {0x5, 0x3}, {0x5, 0x3}, {0x4, 0x2}, {0x1, 0x9}, {0x0, 0xa}, {0x1, 0x1}, {0x7, 0x1}, {0x5}, {0x7, 0x5}, {0x2, 0x2}, {0x3, 0x8}, {0x3, 0x4}, {0x6, 0x2}, {0x0, 0x4}, {0x4, 0x3}, {0x2, 0x6}, {0x3, 0x4}, {0x5, 0x9}, {0x3, 0xa}, {0x0, 0x5}, {0x1, 0x5}, {0x3, 0x1}, {0x0, 0x7}, {0x5, 0x3}, {0x3, 0x1}, {0x0, 0x5}, {0x1, 0x4}, {0x1, 0x4}, {0x4, 0xa}, {0x0, 0x6}, {0x6, 0x9}, {0x5}, {0x6, 0x6}, {0x3, 0xa}, {0x1, 0x6}, {0x1, 0x4}]}, @NL80211_TXRATE_LEGACY={0x17, 0x1, [0x16, 0x5, 0xc, 0x4, 0x48, 0x60, 0x60, 0x2, 0x60, 0x60, 0x7f, 0x3e, 0x48, 0x9, 0x48, 0x6, 0x30, 0x24, 0x3]}]}, @NL80211_BAND_6GHZ={0xb8, 0x3, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xc66d, 0x2, 0x1, 0xffff, 0x400, 0x200, 0x7ff, 0xd36]}}, @NL80211_TXRATE_HT={0x2e, 0x2, [{0x1, 0x9}, {0x7, 0x5}, {0x7, 0xa}, {0x5, 0xa}, {0x1}, {0x3, 0x7}, {0x4, 0x4}, {0x1, 0xa}, {0x6, 0x1}, {0x2}, {0x7, 0x6}, {0x1, 0x1}, {0x2, 0x2}, {0x4, 0x6}, {0x5, 0x9}, {0x4, 0x1}, {0x5, 0x1}, {0x5, 0x5}, {0x7, 0x2}, {0x6, 0x6}, {0x6, 0x2}, {0x6, 0x3}, {0x6, 0x5}, {0x3, 0x2}, {0x0, 0x9}, {0x0, 0x3}, {0x3, 0x2}, {0x0, 0x8}, {0x0, 0x5}, {0x1, 0xa}, {0x7, 0x2}, {0x2, 0x2}, {0x3, 0x6}, {0x4, 0x8}, {0x7, 0x1}, {0x7, 0x9}, {0x0, 0x3}, {0x5, 0x6}, {0x2, 0x8}, {0x4, 0x2}, {0x7, 0x9}, {0x0, 0x2}]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_HT={0x1f, 0x2, [{}, {0x6, 0x9}, {0x7, 0x1}, {0x0, 0xa}, {0x2, 0x1}, {0x0, 0xa}, {0x0, 0xa}, {0x1, 0x5}, {0x3, 0xa}, {0x4}, {0x2, 0x5}, {0x2, 0x3}, {0x5, 0x2}, {0x1, 0x6}, {0x4, 0x4}, {0x6}, {0x6, 0x1}, {0x2, 0xa}, {0x2}, {0x4, 0x3}, {0x1, 0xa}, {0x4, 0x9}, {0x1}, {0x2, 0x9}, {0x2, 0x4}, {0x3, 0x3}, {0x1, 0x7}]}, @NL80211_TXRATE_HT={0x17, 0x2, [{0x1, 0x6}, {0x4, 0x8}, {0x1, 0x3}, {0x3, 0x2}, {0x5, 0xa}, {0x7, 0x7}, {0x2, 0x1}, {0x2, 0xa}, {0x0, 0x7}, {0x2, 0x1}, {0x0, 0x4}, {0x4, 0xa}, {0x5, 0x9}, {0x3, 0x8}, {0x2, 0x6}, {0x6, 0x1}, {0x6, 0x2}, {0x1, 0xa}, {0x3, 0x8}]}, @NL80211_TXRATE_LEGACY={0x11, 0x1, [0x1, 0x24, 0x5, 0x17, 0x24, 0x3, 0x5, 0x1, 0x48, 0x48, 0x24, 0xc, 0x60]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x1000, 0x10, 0x2, 0x3, 0xd4df, 0x7fff, 0x6, 0xe9a7]}}]}]}]}, 0xe78}, 0x1, 0x0, 0x0, 0x8000}, 0x11) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r0, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x880200}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x114, r2, 0x8, 0x70bd29, 0x25dfdbfc, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8}, {0x11}}, {0x8}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}]}, 0x114}, 0x1, 0x0, 0x0, 0x40}, 0x0) 23:12:58 executing program 0: syz_usb_connect$hid(0x6, 0x36, &(0x7f0000000540)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46d, 0xc52b, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}, {{{0x9, 0x5, 0x81, 0x3, 0x0, 0xfa, 0x8f, 0x2}}}}}]}}]}}, &(0x7f0000000880)={0xa, &(0x7f0000000580)={0xa, 0x6, 0x200, 0x80, 0x1f, 0x3, 0x20, 0x3}, 0x7e, &(0x7f00000005c0)={0x5, 0xf, 0x7e, 0x6, [@ptm_cap={0x3}, @ssp_cap={0x10, 0x10, 0xa, 0x1, 0x1, 0x7, 0xf00, 0xa3a, [0xff000f]}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0x9, 0x9, 0xfffe}, @generic={0x42, 0x10, 0x4, "dfa909963b4c4a0a5f93e6fff45ee072e0265d99f99a5467b700c649cb42a77c7eb06c0d601324a9e383b942ef51bc888a1cd17688864ab47fb29ca13dbc07"}, @generic={0x13, 0x10, 0x1, "bfa6bacd313037a66f522459a4efdabd"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0xa3, 0x9, 0x8}]}, 0x4, [{0x4, &(0x7f0000000640)=@lang_id={0x4, 0x3, 0x429}}, {0xb8, &(0x7f0000000680)=@string={0xb8, 0x3, "42705c0d85706ddea3591c3d464f897257f530fb7f333ad5db89ff34e160bd630ad32754ae8d302b4040b733ddd3021c9e0041b51501dc58577d710d7d330a461033ed02f78659b9e6a6d07f525160284581bf9f7b6d74858c3d8fb0294c6d7dac1a859101803450377a0ef39210fb6700f771d15e7b42a9b032f28923b0bc8f38f5c962ae8881b006453fa75001382e5fdd3fa8ebca0c343cf8262a0d4d3bbb66f5724cb55b722d30598bf8562c1ad838f1c92fce2e"}}, {0xee, &(0x7f0000000740)=@string={0xee, 0x3, "fa6e8b74837c661128332dc7a26e58cfb24b28ada9d05c1973d222ba1ff66b18361b559b4b45a9742e86b79717211fc974cb38701973690bea498bba170459c3d0c000c8405f47e5ac1f3975fd438ab062808c46b45c7cd4ee6c6431aff885e241e12f0db4ddccfcedf2320f68bf467ac4c8cc8c42ec72012cb318a13c536c7d7ef62404b87e163944ea949594ba81f14406b251116ecc13257c3ec853daa401e5715097bec00e1d8f60fbd59b5a931d50a9ba8e50b560f531406263c917ce2722c50f8b9b9ece653f1757ffe0b7e4f69dff41f0dcb44992c5e8cf2bd7f343927e85513857734bb918177ce6"}}, {0x4, &(0x7f0000000840)=@lang_id={0x4, 0x3, 0x44e}}]}) 23:12:58 executing program 1: syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28bd, 0x74, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0xaa6b, 0xc6, 0x1, {0x22, 0x3aa}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x1, 0x1, 0x20}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0x0, 0x5, 0x20}}]}}}]}}]}}, &(0x7f0000000300)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x2, 0x4, 0x9, 0x20, 0x1f}, 0x2e, &(0x7f0000000080)={0x5, 0xf, 0x2e, 0x4, [@ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x5, 0xf, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "f3467c0fdd67206c155df2f59eeba69c"}, @wireless={0xb, 0x10, 0x1, 0x8, 0x2c, 0x80, 0x3, 0x4, 0x9}]}, 0x6, [{0x4, &(0x7f00000000c0)=@lang_id={0x4, 0x3, 0x425}}, {0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x860}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x424}}, {0xc1, &(0x7f0000000180)=@string={0xc1, 0x3, "32895dce90d627157085c353d7f94cd861200256946f1e7b957200ebcb7088ebb826877a0b86b0f934dc71ba39550de0d221e0952964ee86319a4fc65c41ea14733f81707695bb54d66124588b78f9d5ef53c1103908a97f54387f55b74b4f4bdd47e9580ca75c0a7f3e13b3af501985fb8394a5736005e605475e5b1f7e0534db2efda6ab352db55fbf8c178bc4440e0f4d799a88ae835e7454d7a0c36dd2ad100d7a4087c45832b2a0afc03e974fbae484ade32af76f8a5990c75d6e589e"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x413}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0xf8ff}}]}) 23:12:58 executing program 6: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="24ecd8aa91ed936dd1936b80ac0b1c2c61edd810200b8f7cde65a3f47f57f9e47021d47e36155f4ab8fd0521fc8ab1463e48e8989a8f9a2a25f0e5c666dc47ebcc803c20b96fc196a4b4bc1b36167fa10509c7cd1f85f05d2daba7fc8dd644ab46218800"/110, @ANYRES16=r1, @ANYBLOB="020828bd7000fcdbdf250b00000006000a000300000006000a00feff0000"], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) read$usbmon(0xffffffffffffffff, &(0x7f0000000200)=""/102, 0x66) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r0, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x692d1e5235b6c1fc}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x20, r1, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000040}, 0x4) 23:12:58 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x26, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d228"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) [ 2360.945650] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2360.950423] misc raw-gadget: fail, usb_gadget_register_driver returned -16 23:12:58 executing program 3: clock_gettime(0x0, &(0x7f0000000040)) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) 23:12:58 executing program 5: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) memfd_secret(0x80000) r0 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) ioctl$MON_IOCQ_RING_SIZE(r0, 0x9205) r1 = memfd_secret(0x0) r2 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x1ff, 0xa882) read$usbmon(r2, &(0x7f0000000100)=""/90, 0x5a) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r1) read$usbmon(r1, &(0x7f0000000000)=""/161, 0xa1) 23:12:58 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x0, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:12:58 executing program 6: mmap$usbmon(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4, 0x10, 0xffffffffffffffff, 0x1) 23:12:58 executing program 6: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x0, 0x20, 0x70bd2a, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_SOPASS={0x1a, 0x3, "56be7e2c5f7a2859d66bdaab9ad375cd28d09e731884"}]}, 0x30}, 0x1, 0x0, 0x0, 0x24000000}, 0x40000) 23:12:58 executing program 6: mmap$usbmon(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000005, 0x10, 0xffffffffffffffff, 0xfffffffffffffffd) 23:12:58 executing program 7: clock_gettime(0x0, &(0x7f0000000040)) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) 23:12:58 executing program 6: r0 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0xf4, 0x0, 0x10, 0x70bd2b, 0x25dfdbfb, {}, [@ETHTOOL_A_WOL_MODES={0xe0, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xcb, 0x4, "de88e27c0286763134a876b0dcf675d85cfd7b24a9f05ef699146a049f73e1adcb774be3eba9e6fcf5436cb32a3cf1010979f96907327cd0b7b1d2cd8bdb0015b97ed95ed902f3fd8fb3ceef4c62910d967a7cdfc6a747fb00038f0ef023a0762216611c561279441092be1509a7cb56567552ad3c51fc2cea13a149bec0e5800782ebd69af5d39311a31c6241f41b1b2f8ce313620113ff8da9ee0f7ce50c6b4df8ca6ca3144dfe5be73f34f034cfc3b9ab5ce3c3d4edf148ebd9bacbd1283daab056fa242ca1"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xffff}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4008000}, 0x1) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) 23:12:58 executing program 5: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000100), 0x101, 0x8000) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f0000000140)={&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000040)=""/77, 0x4d}) ioctl$CDROMRESUME(0xffffffffffffffff, 0x5302) 23:12:58 executing program 6: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) mmap$usbmon(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4, 0x4010, 0xffffffffffffffff, 0x6) 23:12:58 executing program 5: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000000, 0x10, 0xffffffffffffffff, 0x1ff) 23:12:58 executing program 5: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x40400, 0x0) 23:13:09 executing program 3: clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000080)={0x0, r0+10000000}, 0x8) 23:13:09 executing program 7: clock_gettime(0x0, &(0x7f0000000040)) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) 23:13:09 executing program 6: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {{}, {}, {0x14, 0x18, {0x6, @bearer=@udp='udp:syz1\x00'}}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x40040) 23:13:09 executing program 0: syz_usb_connect$hid(0x6, 0x36, &(0x7f0000000540)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46d, 0xc52b, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}, {{{0x9, 0x5, 0x81, 0x3, 0x0, 0x0, 0x8f, 0x2}}}}}]}}]}}, &(0x7f0000000880)={0xa, &(0x7f0000000580)={0xa, 0x6, 0x200, 0x80, 0x1f, 0x3, 0x20, 0x3}, 0x7e, &(0x7f00000005c0)={0x5, 0xf, 0x7e, 0x6, [@ptm_cap={0x3}, @ssp_cap={0x10, 0x10, 0xa, 0x1, 0x1, 0x7, 0xf00, 0xa3a, [0xff000f]}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0x9, 0x9, 0xfffe}, @generic={0x42, 0x10, 0x4, "dfa909963b4c4a0a5f93e6fff45ee072e0265d99f99a5467b700c649cb42a77c7eb06c0d601324a9e383b942ef51bc888a1cd17688864ab47fb29ca13dbc07"}, @generic={0x13, 0x10, 0x1, "bfa6bacd313037a66f522459a4efdabd"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0xa3, 0x9, 0x8}]}, 0x4, [{0x4, &(0x7f0000000640)=@lang_id={0x4, 0x3, 0x429}}, {0xb8, &(0x7f0000000680)=@string={0xb8, 0x3, "42705c0d85706ddea3591c3d464f897257f530fb7f333ad5db89ff34e160bd630ad32754ae8d302b4040b733ddd3021c9e0041b51501dc58577d710d7d330a461033ed02f78659b9e6a6d07f525160284581bf9f7b6d74858c3d8fb0294c6d7dac1a859101803450377a0ef39210fb6700f771d15e7b42a9b032f28923b0bc8f38f5c962ae8881b006453fa75001382e5fdd3fa8ebca0c343cf8262a0d4d3bbb66f5724cb55b722d30598bf8562c1ad838f1c92fce2e"}}, {0xee, &(0x7f0000000740)=@string={0xee, 0x3, "fa6e8b74837c661128332dc7a26e58cfb24b28ada9d05c1973d222ba1ff66b18361b559b4b45a9742e86b79717211fc974cb38701973690bea498bba170459c3d0c000c8405f47e5ac1f3975fd438ab062808c46b45c7cd4ee6c6431aff885e241e12f0db4ddccfcedf2320f68bf467ac4c8cc8c42ec72012cb318a13c536c7d7ef62404b87e163944ea949594ba81f14406b251116ecc13257c3ec853daa401e5715097bec00e1d8f60fbd59b5a931d50a9ba8e50b560f531406263c917ce2722c50f8b9b9ece653f1757ffe0b7e4f69dff41f0dcb44992c5e8cf2bd7f343927e85513857734bb918177ce6"}}, {0x4, &(0x7f0000000840)=@lang_id={0x4, 0x3, 0x44e}}]}) 23:13:09 executing program 5: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$MON_IOCH_MFLUSH(0xffffffffffffffff, 0x9208, 0x8) 23:13:09 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, 0x0, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:13:09 executing program 1: syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28bd, 0x74, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0xc6, 0x1, {0x22, 0x3aa}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x1, 0x1, 0x20}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0x0, 0x5, 0x20}}]}}}]}}]}}, &(0x7f0000000300)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x2, 0x4, 0x9, 0x20, 0x1f}, 0x2e, &(0x7f0000000080)={0x5, 0xf, 0x2e, 0x4, [@ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x5, 0xf, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "f3467c0fdd67206c155df2f59eeba69c"}, @wireless={0xb, 0x10, 0x1, 0x8, 0x2c, 0x80, 0x3, 0x4, 0x9}]}, 0x6, [{0x4, &(0x7f00000000c0)=@lang_id={0x4, 0x3, 0x425}}, {0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x860}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x424}}, {0xc1, &(0x7f0000000180)=@string={0xc1, 0x3, "32895dce90d627157085c353d7f94cd861200256946f1e7b957200ebcb7088ebb826877a0b86b0f934dc71ba39550de0d221e0952964ee86319a4fc65c41ea14733f81707695bb54d66124588b78f9d5ef53c1103908a97f54387f55b74b4f4bdd47e9580ca75c0a7f3e13b3af501985fb8394a5736005e605475e5b1f7e0534db2efda6ab352db55fbf8c178bc4440e0f4d799a88ae835e7454d7a0c36dd2ad100d7a4087c45832b2a0afc03e974fbae484ade32af76f8a5990c75d6e589e"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x413}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0xf8ff}}]}) 23:13:09 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2b, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) [ 2371.917551] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2371.920780] misc raw-gadget: fail, usb_gadget_register_driver returned -16 23:13:09 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) r0 = memfd_secret(0x0) r1 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r1) sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000001180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001140)={&(0x7f00000010c0)={0x68, 0x0, 0x20, 0x70bd2b, 0x25dfdbfe, {{}, {}, {0x4c, 0x18, {0x4, @link='syz1\x00'}}}, ["", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20000040}, 0x40000) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) read$ptp(r0, &(0x7f00000000c0)=""/4096, 0x1000) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:13:09 executing program 6: mmap$usbmon(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x1) 23:13:09 executing program 6: mmap$usbmon(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) ioctl$MON_IOCQ_RING_SIZE(0xffffffffffffffff, 0x9205) r0 = memfd_secret(0x0) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x9, 0x5}}, './file0\x00'}) sendmsg$NL80211_CMD_SET_WOWLAN(r1, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000940)={0x10d0, 0x0, 0x504, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void, @val={0xc, 0x99, {0x7, 0x7}}}}, [@NL80211_ATTR_WOWLAN_TRIGGERS={0xc, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE={0x4}, @NL80211_WOWLAN_TRIG_MAGIC_PKT={0x4}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0x1070, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_PKT_PATTERN={0x30, 0x4, 0x0, 0x1, [{0x2c, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0x4}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x7fff}, @NL80211_PKTPAT_MASK={0x14, 0x1, "93aeb13ed09ee16b3d4608bbfe81f71f"}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x1}]}]}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE={0x4}, @NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE={0x4}, @NL80211_WOWLAN_TRIG_TCP_CONNECTION={0x101c, 0xe, 0x0, 0x1, [@NL80211_WOWLAN_TCP_DATA_INTERVAL={0x8, 0x9, 0x8}, @NL80211_WOWLAN_TCP_WAKE_PAYLOAD={0x1004, 0xa, "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"}, @NL80211_WOWLAN_TCP_DST_MAC={0xa}]}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_RFKILL_RELEASE={0x4}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_DISCONNECT={0x4}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0x34, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_NET_DETECT={0x2c, 0x12, 0x0, 0x1, [@NL80211_ATTR_BSSID={0xa, 0xf5, @random="3e39c2741b09"}, @NL80211_ATTR_MEASUREMENT_DURATION={0x6, 0xeb, 0x6}, @NL80211_ATTR_SCAN_FLAGS={0x8, 0x9e, 0x80a}, @NL80211_ATTR_SCHED_SCAN_DELAY={0x8, 0xdc, 0x1}, @NL80211_ATTR_SCHED_SCAN_MULTI={0x4}]}, @NL80211_WOWLAN_TRIG_ANY={0x4}]}]}, 0x10d0}}, 0x20) io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0xad13, 0x20, 0x0, 0x3a2, 0x0, r0}) 23:13:09 executing program 5: r0 = getpgid(0x0) r1 = memfd_secret(0x0) r2 = gettid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f0000000040)={0x8}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r1) mmap$usbmon(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1800000, 0x1010, r1, 0x9) r3 = getpgid(r0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r3, 0x10, &(0x7f0000000000)={0x65e7}) 23:13:09 executing program 6: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000000, 0x20010, 0xffffffffffffffff, 0x1) 23:13:09 executing program 5: rt_sigsuspend(&(0x7f0000000100)={[0x1]}, 0x8) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) read$usbmon(0xffffffffffffffff, &(0x7f0000000000)=""/249, 0xf9) 23:13:09 executing program 6: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) r0 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) ioctl$MON_IOCQ_RING_SIZE(r0, 0x9205) memfd_secret(0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000000000)=""/11) 23:13:09 executing program 6: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) ioctl$MON_IOCT_RING_SIZE(0xffffffffffffffff, 0x9204, 0x85faf) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x0, 0x100, 0x70bd26, 0x259fdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x5}, 0x20044001) 23:13:18 executing program 0: syz_usb_connect$hid(0x6, 0x36, &(0x7f0000000540)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46d, 0xc52b, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}, {{{0x9, 0x5, 0x81, 0x3, 0x0, 0x0, 0x0, 0x2}}}}}]}}]}}, &(0x7f0000000880)={0xa, &(0x7f0000000580)={0xa, 0x6, 0x200, 0x80, 0x1f, 0x3, 0x20, 0x3}, 0x7e, &(0x7f00000005c0)={0x5, 0xf, 0x7e, 0x6, [@ptm_cap={0x3}, @ssp_cap={0x10, 0x10, 0xa, 0x1, 0x1, 0x7, 0xf00, 0xa3a, [0xff000f]}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0x9, 0x9, 0xfffe}, @generic={0x42, 0x10, 0x4, "dfa909963b4c4a0a5f93e6fff45ee072e0265d99f99a5467b700c649cb42a77c7eb06c0d601324a9e383b942ef51bc888a1cd17688864ab47fb29ca13dbc07"}, @generic={0x13, 0x10, 0x1, "bfa6bacd313037a66f522459a4efdabd"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0xa3, 0x9, 0x8}]}, 0x4, [{0x4, &(0x7f0000000640)=@lang_id={0x4, 0x3, 0x429}}, {0xb8, &(0x7f0000000680)=@string={0xb8, 0x3, "42705c0d85706ddea3591c3d464f897257f530fb7f333ad5db89ff34e160bd630ad32754ae8d302b4040b733ddd3021c9e0041b51501dc58577d710d7d330a461033ed02f78659b9e6a6d07f525160284581bf9f7b6d74858c3d8fb0294c6d7dac1a859101803450377a0ef39210fb6700f771d15e7b42a9b032f28923b0bc8f38f5c962ae8881b006453fa75001382e5fdd3fa8ebca0c343cf8262a0d4d3bbb66f5724cb55b722d30598bf8562c1ad838f1c92fce2e"}}, {0xee, &(0x7f0000000740)=@string={0xee, 0x3, "fa6e8b74837c661128332dc7a26e58cfb24b28ada9d05c1973d222ba1ff66b18361b559b4b45a9742e86b79717211fc974cb38701973690bea498bba170459c3d0c000c8405f47e5ac1f3975fd438ab062808c46b45c7cd4ee6c6431aff885e241e12f0db4ddccfcedf2320f68bf467ac4c8cc8c42ec72012cb318a13c536c7d7ef62404b87e163944ea949594ba81f14406b251116ecc13257c3ec853daa401e5715097bec00e1d8f60fbd59b5a931d50a9ba8e50b560f531406263c917ce2722c50f8b9b9ece653f1757ffe0b7e4f69dff41f0dcb44992c5e8cf2bd7f343927e85513857734bb918177ce6"}}, {0x4, &(0x7f0000000840)=@lang_id={0x4, 0x3, 0x44e}}]}) 23:13:18 executing program 3: clock_gettime(0x0, &(0x7f0000000040)) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000080)={0x0, 0x0}, 0x8) 23:13:18 executing program 6: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) r0 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x0, 0x800, 0x70bd27, 0x25dfdbfc, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0xffffffff}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x9}]}, 0x34}, 0x1, 0x0, 0x0, 0x44008}, 0x4040001) 23:13:18 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, 0x0, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:13:18 executing program 1: syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28bd, 0x74, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x3aa}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x1, 0x1, 0x20}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0x0, 0x5, 0x20}}]}}}]}}]}}, &(0x7f0000000300)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x2, 0x4, 0x9, 0x20, 0x1f}, 0x2e, &(0x7f0000000080)={0x5, 0xf, 0x2e, 0x4, [@ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x5, 0xf, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "f3467c0fdd67206c155df2f59eeba69c"}, @wireless={0xb, 0x10, 0x1, 0x8, 0x2c, 0x80, 0x3, 0x4, 0x9}]}, 0x6, [{0x4, &(0x7f00000000c0)=@lang_id={0x4, 0x3, 0x425}}, {0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x860}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x424}}, {0xc1, &(0x7f0000000180)=@string={0xc1, 0x3, "32895dce90d627157085c353d7f94cd861200256946f1e7b957200ebcb7088ebb826877a0b86b0f934dc71ba39550de0d221e0952964ee86319a4fc65c41ea14733f81707695bb54d66124588b78f9d5ef53c1103908a97f54387f55b74b4f4bdd47e9580ca75c0a7f3e13b3af501985fb8394a5736005e605475e5b1f7e0534db2efda6ab352db55fbf8c178bc4440e0f4d799a88ae835e7454d7a0c36dd2ad100d7a4087c45832b2a0afc03e974fbae484ade32af76f8a5990c75d6e589e"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x413}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0xf8ff}}]}) 23:13:18 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2b, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:13:18 executing program 7: rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) 23:13:18 executing program 5: sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000805}, 0x40000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_NEW_SEC_DEV(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x9c, 0x0, 0x800, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_SEC_DEVICE={0x28, 0x23, 0x0, 0x1, [@NL802154_DEV_ATTR_SHORT_ADDR={0x6}, @NL802154_DEV_ATTR_SECLEVEL_EXEMPT={0x5, 0x5, 0x1}, @NL802154_DEV_ATTR_EXTENDED_ADDR={0xc, 0x4, {0xaaaaaaaaaaaa0002}}, @NL802154_DEV_ATTR_KEY_MODE={0x8}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r0}, @NL802154_ATTR_SEC_DEVICE={0x44, 0x23, 0x0, 0x1, [@NL802154_DEV_ATTR_EXTENDED_ADDR={0xc, 0x4, {0xaaaaaaaaaaaa0002}}, @NL802154_DEV_ATTR_FRAME_COUNTER={0x6, 0x1, 0x9}, @NL802154_DEV_ATTR_EXTENDED_ADDR={0xc}, @NL802154_DEV_ATTR_PAN_ID={0x6, 0x2, 0x1}, @NL802154_DEV_ATTR_SECLEVEL_EXEMPT={0x5, 0x5, 0x1}, @NL802154_DEV_ATTR_PAN_ID={0x6, 0x2, 0xffff}, @NL802154_DEV_ATTR_FRAME_COUNTER={0x6, 0x1, 0x7}]}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x9c}, 0x1, 0x0, 0x0, 0x40}, 0x24040080) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:13:18 executing program 3: clock_gettime(0x0, &(0x7f0000000040)) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000080)={0x0, 0x0}, 0x8) [ 2381.281589] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2381.289843] misc raw-gadget: fail, usb_gadget_register_driver returned -16 23:13:18 executing program 5: r0 = socket(0x2f, 0x4, 0x2cfe) syz_genetlink_get_family_id$devlink(&(0x7f0000000000), r0) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:13:18 executing program 3: clock_gettime(0x0, &(0x7f0000000040)) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000080)={0x0, 0x0}, 0x8) 23:13:18 executing program 6: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) r2 = gettid() sched_rr_get_interval(r2, &(0x7f0000000140)) sched_rr_get_interval(r2, &(0x7f0000000180)) rt_sigtimedwait(&(0x7f0000000000)={[0x2]}, &(0x7f0000000040), &(0x7f0000000100)={r0, r1+60000000}, 0x8) ioctl$PTP_PIN_SETFUNC2(0xffffffffffffffff, 0x40603d10, &(0x7f00000001c0)={'\x00', 0x1f, 0x3, 0xff}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_NETNS_FD={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x0) 23:13:18 executing program 3: clock_gettime(0x0, &(0x7f0000000040)) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000080)={0x0, 0x0}, 0x8) 23:13:18 executing program 5: mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x9, 0x1010, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x8000) ioctl$CDROM_LOCKDOOR(r0, 0x5329, 0x1) 23:13:18 executing program 3: clock_gettime(0x0, &(0x7f0000000040)) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000080)={0x0, 0x0}, 0x8) 23:13:18 executing program 3: clock_gettime(0x0, &(0x7f0000000040)) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000080)={0x0, 0x0}, 0x8) 23:13:28 executing program 6: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) r2 = gettid() sched_rr_get_interval(r2, &(0x7f0000000140)) sched_rr_get_interval(r2, &(0x7f0000000180)) rt_sigtimedwait(&(0x7f0000000000)={[0x2]}, &(0x7f0000000040), &(0x7f0000000100)={r0, r1+60000000}, 0x8) ioctl$PTP_PIN_SETFUNC2(0xffffffffffffffff, 0x40603d10, &(0x7f00000001c0)={'\x00', 0x1f, 0x3, 0xff}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_NETNS_FD={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x0) 23:13:28 executing program 0: syz_usb_connect$hid(0x6, 0x36, &(0x7f0000000540)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46d, 0xc52b, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, &(0x7f0000000880)={0xa, &(0x7f0000000580)={0xa, 0x6, 0x200, 0x80, 0x1f, 0x3, 0x20, 0x3}, 0x7e, &(0x7f00000005c0)={0x5, 0xf, 0x7e, 0x6, [@ptm_cap={0x3}, @ssp_cap={0x10, 0x10, 0xa, 0x1, 0x1, 0x7, 0xf00, 0xa3a, [0xff000f]}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0x9, 0x9, 0xfffe}, @generic={0x42, 0x10, 0x4, "dfa909963b4c4a0a5f93e6fff45ee072e0265d99f99a5467b700c649cb42a77c7eb06c0d601324a9e383b942ef51bc888a1cd17688864ab47fb29ca13dbc07"}, @generic={0x13, 0x10, 0x1, "bfa6bacd313037a66f522459a4efdabd"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0xa3, 0x9, 0x8}]}, 0x4, [{0x4, &(0x7f0000000640)=@lang_id={0x4, 0x3, 0x429}}, {0xb8, &(0x7f0000000680)=@string={0xb8, 0x3, "42705c0d85706ddea3591c3d464f897257f530fb7f333ad5db89ff34e160bd630ad32754ae8d302b4040b733ddd3021c9e0041b51501dc58577d710d7d330a461033ed02f78659b9e6a6d07f525160284581bf9f7b6d74858c3d8fb0294c6d7dac1a859101803450377a0ef39210fb6700f771d15e7b42a9b032f28923b0bc8f38f5c962ae8881b006453fa75001382e5fdd3fa8ebca0c343cf8262a0d4d3bbb66f5724cb55b722d30598bf8562c1ad838f1c92fce2e"}}, {0xee, &(0x7f0000000740)=@string={0xee, 0x3, "fa6e8b74837c661128332dc7a26e58cfb24b28ada9d05c1973d222ba1ff66b18361b559b4b45a9742e86b79717211fc974cb38701973690bea498bba170459c3d0c000c8405f47e5ac1f3975fd438ab062808c46b45c7cd4ee6c6431aff885e241e12f0db4ddccfcedf2320f68bf467ac4c8cc8c42ec72012cb318a13c536c7d7ef62404b87e163944ea949594ba81f14406b251116ecc13257c3ec853daa401e5715097bec00e1d8f60fbd59b5a931d50a9ba8e50b560f531406263c917ce2722c50f8b9b9ece653f1757ffe0b7e4f69dff41f0dcb44992c5e8cf2bd7f343927e85513857734bb918177ce6"}}, {0x4, &(0x7f0000000840)=@lang_id={0x4, 0x3, 0x44e}}]}) 23:13:28 executing program 7: rt_sigtimedwait(0x0, 0x0, 0x0, 0x0) 23:13:28 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, 0x0, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:13:28 executing program 1: syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28bd, 0x74, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x1, 0x1, 0x20}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0x0, 0x5, 0x20}}]}}}]}}]}}, &(0x7f0000000300)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x2, 0x4, 0x9, 0x20, 0x1f}, 0x2e, &(0x7f0000000080)={0x5, 0xf, 0x2e, 0x4, [@ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x5, 0xf, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "f3467c0fdd67206c155df2f59eeba69c"}, @wireless={0xb, 0x10, 0x1, 0x8, 0x2c, 0x80, 0x3, 0x4, 0x9}]}, 0x6, [{0x4, &(0x7f00000000c0)=@lang_id={0x4, 0x3, 0x425}}, {0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x860}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x424}}, {0xc1, &(0x7f0000000180)=@string={0xc1, 0x3, "32895dce90d627157085c353d7f94cd861200256946f1e7b957200ebcb7088ebb826877a0b86b0f934dc71ba39550de0d221e0952964ee86319a4fc65c41ea14733f81707695bb54d66124588b78f9d5ef53c1103908a97f54387f55b74b4f4bdd47e9580ca75c0a7f3e13b3af501985fb8394a5736005e605475e5b1f7e0534db2efda6ab352db55fbf8c178bc4440e0f4d799a88ae835e7454d7a0c36dd2ad100d7a4087c45832b2a0afc03e974fbae484ade32af76f8a5990c75d6e589e"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x413}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0xf8ff}}]}) 23:13:28 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2b, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:13:28 executing program 3: clock_gettime(0x0, &(0x7f0000000040)) 23:13:28 executing program 5: r0 = socket(0x2f, 0x4, 0x2cfe) syz_genetlink_get_family_id$devlink(&(0x7f0000000000), r0) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:13:28 executing program 5: r0 = socket(0x2f, 0x4, 0x2cfe) syz_genetlink_get_family_id$devlink(&(0x7f0000000000), r0) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) [ 2391.264953] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2391.269645] misc raw-gadget: fail, usb_gadget_register_driver returned -16 23:13:28 executing program 7: rt_sigtimedwait(0x0, 0x0, 0x0, 0x0) 23:13:28 executing program 3: clock_gettime(0x0, 0x0) 23:13:28 executing program 7: rt_sigtimedwait(0x0, 0x0, 0x0, 0x0) 23:13:28 executing program 5: r0 = socket(0x2f, 0x4, 0x2cfe) syz_genetlink_get_family_id$devlink(&(0x7f0000000000), r0) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:13:28 executing program 3: clock_gettime(0x0, 0x0) 23:13:28 executing program 5: r0 = socket(0x2f, 0x4, 0x2cfe) syz_genetlink_get_family_id$devlink(&(0x7f0000000000), r0) 23:13:28 executing program 7: clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000080)={0x0, r0+10000000}, 0x8) 23:13:37 executing program 5: socket(0x2f, 0x4, 0x2cfe) 23:13:37 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:13:37 executing program 1: syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28bd, 0x74, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}, {{{0x9, 0x5, 0x81, 0x3, 0x0, 0x1, 0x1, 0x20}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0x0, 0x5, 0x20}}]}}}]}}]}}, &(0x7f0000000300)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x2, 0x4, 0x9, 0x20, 0x1f}, 0x2e, &(0x7f0000000080)={0x5, 0xf, 0x2e, 0x4, [@ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x5, 0xf, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "f3467c0fdd67206c155df2f59eeba69c"}, @wireless={0xb, 0x10, 0x1, 0x8, 0x2c, 0x80, 0x3, 0x4, 0x9}]}, 0x6, [{0x4, &(0x7f00000000c0)=@lang_id={0x4, 0x3, 0x425}}, {0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x860}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x424}}, {0xc1, &(0x7f0000000180)=@string={0xc1, 0x3, "32895dce90d627157085c353d7f94cd861200256946f1e7b957200ebcb7088ebb826877a0b86b0f934dc71ba39550de0d221e0952964ee86319a4fc65c41ea14733f81707695bb54d66124588b78f9d5ef53c1103908a97f54387f55b74b4f4bdd47e9580ca75c0a7f3e13b3af501985fb8394a5736005e605475e5b1f7e0534db2efda6ab352db55fbf8c178bc4440e0f4d799a88ae835e7454d7a0c36dd2ad100d7a4087c45832b2a0afc03e974fbae484ade32af76f8a5990c75d6e589e"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x413}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0xf8ff}}]}) 23:13:37 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:13:37 executing program 0: syz_usb_connect$hid(0x6, 0x36, &(0x7f0000000540)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46d, 0xc52b, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) 23:13:37 executing program 3: clock_gettime(0x0, 0x0) 23:13:37 executing program 6: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) r2 = gettid() sched_rr_get_interval(r2, &(0x7f0000000140)) sched_rr_get_interval(r2, &(0x7f0000000180)) rt_sigtimedwait(&(0x7f0000000000)={[0x2]}, &(0x7f0000000040), &(0x7f0000000100)={r0, r1+60000000}, 0x8) ioctl$PTP_PIN_SETFUNC2(0xffffffffffffffff, 0x40603d10, &(0x7f00000001c0)={'\x00', 0x1f, 0x3, 0xff}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_NETNS_FD={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x0) 23:13:37 executing program 7: clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000080)={0x0, r0+10000000}, 0x8) [ 2399.997097] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2400.023662] misc raw-gadget: fail, usb_gadget_register_driver returned -16 23:13:45 executing program 5: socket(0x0, 0x4, 0x2cfe) 23:13:45 executing program 6: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) r2 = gettid() sched_rr_get_interval(r2, &(0x7f0000000140)) sched_rr_get_interval(r2, &(0x7f0000000180)) rt_sigtimedwait(&(0x7f0000000000)={[0x2]}, &(0x7f0000000040), &(0x7f0000000100)={r0, r1+60000000}, 0x8) ioctl$PTP_PIN_SETFUNC2(0xffffffffffffffff, 0x40603d10, &(0x7f00000001c0)={'\x00', 0x1f, 0x3, 0xff}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_NETNS_FD={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x0) 23:13:45 executing program 7: clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000080)={0x0, r0+10000000}, 0x8) 23:13:45 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:13:45 executing program 0: r0 = getpgid(0x0) r1 = memfd_secret(0x0) r2 = gettid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f0000000040)={0x8}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r1) mmap$usbmon(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1800000, 0x1010, r1, 0x9) r3 = getpgid(r0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r3, 0x10, &(0x7f0000000000)={0x65e7}) 23:13:45 executing program 1: syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28bd, 0x74, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}, {{{0x9, 0x5, 0x81, 0x3, 0x0, 0x0, 0x1, 0x20}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0x0, 0x5, 0x20}}]}}}]}}]}}, &(0x7f0000000300)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x2, 0x4, 0x9, 0x20, 0x1f}, 0x2e, &(0x7f0000000080)={0x5, 0xf, 0x2e, 0x4, [@ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x5, 0xf, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "f3467c0fdd67206c155df2f59eeba69c"}, @wireless={0xb, 0x10, 0x1, 0x8, 0x2c, 0x80, 0x3, 0x4, 0x9}]}, 0x6, [{0x4, &(0x7f00000000c0)=@lang_id={0x4, 0x3, 0x425}}, {0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x860}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x424}}, {0xc1, &(0x7f0000000180)=@string={0xc1, 0x3, "32895dce90d627157085c353d7f94cd861200256946f1e7b957200ebcb7088ebb826877a0b86b0f934dc71ba39550de0d221e0952964ee86319a4fc65c41ea14733f81707695bb54d66124588b78f9d5ef53c1103908a97f54387f55b74b4f4bdd47e9580ca75c0a7f3e13b3af501985fb8394a5736005e605475e5b1f7e0534db2efda6ab352db55fbf8c178bc4440e0f4d799a88ae835e7454d7a0c36dd2ad100d7a4087c45832b2a0afc03e974fbae484ade32af76f8a5990c75d6e589e"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x413}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0xf8ff}}]}) 23:13:45 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:13:45 executing program 3: rt_sigsuspend(&(0x7f0000000100)={[0x1]}, 0x8) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) read$usbmon(0xffffffffffffffff, &(0x7f0000000000)=""/249, 0xf9) [ 2408.366188] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2408.368633] misc raw-gadget: fail, usb_gadget_register_driver returned -16 23:13:45 executing program 0: r0 = getpgid(0x0) r1 = memfd_secret(0x0) r2 = gettid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f0000000040)={0x8}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r1) mmap$usbmon(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1800000, 0x1010, r1, 0x9) r3 = getpgid(r0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r3, 0x10, &(0x7f0000000000)={0x65e7}) 23:13:54 executing program 6: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) r2 = gettid() sched_rr_get_interval(r2, &(0x7f0000000140)) sched_rr_get_interval(r2, &(0x7f0000000180)) rt_sigtimedwait(&(0x7f0000000000)={[0x2]}, &(0x7f0000000040), &(0x7f0000000100)={r0, r1+60000000}, 0x8) ioctl$PTP_PIN_SETFUNC2(0xffffffffffffffff, 0x40603d10, &(0x7f00000001c0)={'\x00', 0x1f, 0x3, 0xff}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 23:13:54 executing program 0: r0 = getpgid(0x0) r1 = memfd_secret(0x0) r2 = gettid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f0000000040)={0x8}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r1) mmap$usbmon(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1800000, 0x1010, r1, 0x9) r3 = getpgid(r0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r3, 0x10, &(0x7f0000000000)={0x65e7}) 23:13:54 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:13:54 executing program 3: rt_sigsuspend(&(0x7f0000000100)={[0x1]}, 0x8) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) read$usbmon(0xffffffffffffffff, &(0x7f0000000000)=""/249, 0xf9) 23:13:54 executing program 5: socket(0x0, 0x4, 0x2cfe) 23:13:54 executing program 1: syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28bd, 0x74, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}, {{{0x9, 0x5, 0x81, 0x3, 0x0, 0x0, 0x0, 0x20}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0x0, 0x5, 0x20}}]}}}]}}]}}, &(0x7f0000000300)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x2, 0x4, 0x9, 0x20, 0x1f}, 0x2e, &(0x7f0000000080)={0x5, 0xf, 0x2e, 0x4, [@ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x5, 0xf, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "f3467c0fdd67206c155df2f59eeba69c"}, @wireless={0xb, 0x10, 0x1, 0x8, 0x2c, 0x80, 0x3, 0x4, 0x9}]}, 0x6, [{0x4, &(0x7f00000000c0)=@lang_id={0x4, 0x3, 0x425}}, {0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x860}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x424}}, {0xc1, &(0x7f0000000180)=@string={0xc1, 0x3, "32895dce90d627157085c353d7f94cd861200256946f1e7b957200ebcb7088ebb826877a0b86b0f934dc71ba39550de0d221e0952964ee86319a4fc65c41ea14733f81707695bb54d66124588b78f9d5ef53c1103908a97f54387f55b74b4f4bdd47e9580ca75c0a7f3e13b3af501985fb8394a5736005e605475e5b1f7e0534db2efda6ab352db55fbf8c178bc4440e0f4d799a88ae835e7454d7a0c36dd2ad100d7a4087c45832b2a0afc03e974fbae484ade32af76f8a5990c75d6e589e"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x413}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0xf8ff}}]}) 23:13:54 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:13:54 executing program 7: rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000080), 0x8) 23:13:54 executing program 0: r0 = getpgid(0x0) r1 = memfd_secret(0x0) r2 = gettid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f0000000040)={0x8}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r1) mmap$usbmon(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1800000, 0x1010, r1, 0x9) getpgid(r0) [ 2417.506977] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2417.510350] misc raw-gadget: fail, usb_gadget_register_driver returned -16 23:13:54 executing program 5: socket(0x0, 0x4, 0x2cfe) 23:13:54 executing program 0: r0 = getpgid(0x0) r1 = memfd_secret(0x0) r2 = gettid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f0000000040)={0x8}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r1) getpgid(r0) 23:13:54 executing program 7: rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000080), 0x8) 23:13:54 executing program 0: r0 = getpgid(0x0) memfd_secret(0x0) r1 = gettid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x10, &(0x7f0000000040)={0x8}) getpgid(r0) 23:13:54 executing program 7: rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000080), 0x8) 23:13:54 executing program 5: socket(0x2f, 0x0, 0x2cfe) 23:13:54 executing program 7: clock_gettime(0x0, 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000080), 0x8) 23:14:04 executing program 7: clock_gettime(0x0, 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000080), 0x8) 23:14:04 executing program 5: socket(0x2f, 0x0, 0x0) 23:14:04 executing program 0: r0 = getpgid(0x0) memfd_secret(0x0) gettid() getpgid(r0) 23:14:04 executing program 3: rt_sigsuspend(&(0x7f0000000100)={[0x1]}, 0x8) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) read$usbmon(0xffffffffffffffff, &(0x7f0000000000)=""/249, 0xf9) 23:14:04 executing program 6: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) r2 = gettid() sched_rr_get_interval(r2, &(0x7f0000000140)) sched_rr_get_interval(r2, &(0x7f0000000180)) rt_sigtimedwait(&(0x7f0000000000)={[0x2]}, &(0x7f0000000040), &(0x7f0000000100)={r0, r1+60000000}, 0x8) ioctl$PTP_PIN_SETFUNC2(0xffffffffffffffff, 0x40603d10, &(0x7f00000001c0)={'\x00', 0x1f, 0x3, 0xff}) 23:14:04 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x27, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:14:04 executing program 1: syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28bd, 0x74, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}, {{}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0x0, 0x5, 0x20}}]}}}]}}]}}, &(0x7f0000000300)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x2, 0x4, 0x9, 0x20, 0x1f}, 0x2e, &(0x7f0000000080)={0x5, 0xf, 0x2e, 0x4, [@ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x5, 0xf, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "f3467c0fdd67206c155df2f59eeba69c"}, @wireless={0xb, 0x10, 0x1, 0x8, 0x2c, 0x80, 0x3, 0x4, 0x9}]}, 0x6, [{0x4, &(0x7f00000000c0)=@lang_id={0x4, 0x3, 0x425}}, {0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x860}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x424}}, {0xc1, &(0x7f0000000180)=@string={0xc1, 0x3, "32895dce90d627157085c353d7f94cd861200256946f1e7b957200ebcb7088ebb826877a0b86b0f934dc71ba39550de0d221e0952964ee86319a4fc65c41ea14733f81707695bb54d66124588b78f9d5ef53c1103908a97f54387f55b74b4f4bdd47e9580ca75c0a7f3e13b3af501985fb8394a5736005e605475e5b1f7e0534db2efda6ab352db55fbf8c178bc4440e0f4d799a88ae835e7454d7a0c36dd2ad100d7a4087c45832b2a0afc03e974fbae484ade32af76f8a5990c75d6e589e"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x413}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0xf8ff}}]}) 23:14:04 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, 0x0, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:14:04 executing program 7: clock_gettime(0x0, 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000080), 0x8) [ 2427.107698] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2427.113338] misc raw-gadget: fail, usb_gadget_register_driver returned -16 23:14:04 executing program 5: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) r2 = gettid() sched_rr_get_interval(r2, &(0x7f0000000140)) sched_rr_get_interval(r2, &(0x7f0000000180)) rt_sigtimedwait(&(0x7f0000000000)={[0x2]}, &(0x7f0000000040), &(0x7f0000000100)={r0, r1+60000000}, 0x8) ioctl$PTP_PIN_SETFUNC2(0xffffffffffffffff, 0x40603d10, &(0x7f00000001c0)={'\x00', 0x1f, 0x3, 0xff}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 23:14:04 executing program 0: r0 = getpgid(0x0) memfd_secret(0x0) getpgid(r0) 23:14:04 executing program 7: clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) rt_sigtimedwait(0x0, 0x0, &(0x7f0000000080)={0x0, r0+10000000}, 0x0) 23:14:04 executing program 0: r0 = getpgid(0x0) getpgid(r0) 23:14:04 executing program 7: clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) rt_sigtimedwait(0x0, 0x0, &(0x7f0000000080)={0x0, r0+10000000}, 0x0) 23:14:04 executing program 0: getpgid(0x0) 23:14:04 executing program 7: clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) rt_sigtimedwait(0x0, 0x0, &(0x7f0000000080)={0x0, r0+10000000}, 0x0) 23:14:04 executing program 0: getpgid(0x0) 23:14:14 executing program 1: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28bd, 0x74, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, &(0x7f0000000300)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x2, 0x4, 0x9, 0x20, 0x1f}, 0x2e, &(0x7f0000000080)={0x5, 0xf, 0x2e, 0x4, [@ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x5, 0xf, 0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "f3467c0fdd67206c155df2f59eeba69c"}, @wireless={0xb, 0x10, 0x1, 0x8, 0x2c, 0x80, 0x3, 0x4, 0x9}]}, 0x6, [{0x4, &(0x7f00000000c0)=@lang_id={0x4, 0x3, 0x425}}, {0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x860}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x424}}, {0xc1, &(0x7f0000000180)=@string={0xc1, 0x3, "32895dce90d627157085c353d7f94cd861200256946f1e7b957200ebcb7088ebb826877a0b86b0f934dc71ba39550de0d221e0952964ee86319a4fc65c41ea14733f81707695bb54d66124588b78f9d5ef53c1103908a97f54387f55b74b4f4bdd47e9580ca75c0a7f3e13b3af501985fb8394a5736005e605475e5b1f7e0534db2efda6ab352db55fbf8c178bc4440e0f4d799a88ae835e7454d7a0c36dd2ad100d7a4087c45832b2a0afc03e974fbae484ade32af76f8a5990c75d6e589e"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x413}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0xf8ff}}]}) 23:14:14 executing program 7: clock_gettime(0x0, &(0x7f0000000040)) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) 23:14:14 executing program 5: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) r2 = gettid() sched_rr_get_interval(r2, &(0x7f0000000140)) sched_rr_get_interval(r2, &(0x7f0000000180)) rt_sigtimedwait(&(0x7f0000000000)={[0x2]}, &(0x7f0000000040), &(0x7f0000000100)={r0, r1+60000000}, 0x8) ioctl$PTP_PIN_SETFUNC2(0xffffffffffffffff, 0x40603d10, &(0x7f00000001c0)={'\x00', 0x1f, 0x3, 0xff}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 23:14:14 executing program 3: rt_sigsuspend(&(0x7f0000000100)={[0x1]}, 0x8) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:14:14 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, 0x0, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:14:14 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x27, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:14:14 executing program 6: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) r2 = gettid() sched_rr_get_interval(r2, &(0x7f0000000140)) sched_rr_get_interval(r2, &(0x7f0000000180)) rt_sigtimedwait(&(0x7f0000000000)={[0x2]}, &(0x7f0000000040), &(0x7f0000000100)={r0, r1+60000000}, 0x8) 23:14:14 executing program 0: getpgid(0x0) [ 2437.155693] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2437.159153] misc raw-gadget: fail, usb_gadget_register_driver returned -16 23:14:14 executing program 0: getpgid(0x0) getpgid(0x0) 23:14:14 executing program 0: getpgid(0x0) getpgid(0x0) 23:14:14 executing program 0: getpgid(0x0) getpgid(0x0) 23:14:14 executing program 0: r0 = getpgid(0x0) r1 = memfd_secret(0x0) r2 = gettid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f0000000040)={0x8}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r1) mmap$usbmon(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1800000, 0x1010, r1, 0x9) r3 = getpgid(r0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r3, 0x10, &(0x7f0000000000)={0x65e7}) 23:14:14 executing program 0: r0 = getpgid(0x0) r1 = memfd_secret(0x0) r2 = gettid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f0000000040)={0x8}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r1) mmap$usbmon(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1800000, 0x1010, r1, 0x9) r3 = getpgid(r0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r3, 0x10, &(0x7f0000000000)={0x65e7}) 23:14:14 executing program 0: r0 = getpgid(0x0) r1 = memfd_secret(0x0) r2 = gettid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f0000000040)={0x8}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r1) mmap$usbmon(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1800000, 0x1010, r1, 0x9) r3 = getpgid(r0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r3, 0x10, &(0x7f0000000000)={0x65e7}) 23:14:14 executing program 0: r0 = getpgid(0x0) r1 = memfd_secret(0x0) r2 = gettid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f0000000040)={0x8}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r1) mmap$usbmon(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1800000, 0x1010, r1, 0x9) getpgid(r0) 23:14:24 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x27, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:14:24 executing program 0: getpgid(0x0) r0 = memfd_secret(0x0) r1 = gettid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x10, &(0x7f0000000040)={0x8}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) mmap$usbmon(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1800000, 0x1010, r0, 0x9) 23:14:24 executing program 6: clock_gettime(0x0, &(0x7f00000000c0)) r0 = gettid() sched_rr_get_interval(r0, &(0x7f0000000140)) sched_rr_get_interval(r0, &(0x7f0000000180)) 23:14:24 executing program 3: rt_sigsuspend(&(0x7f0000000100)={[0x1]}, 0x8) 23:14:24 executing program 7: clock_gettime(0x0, &(0x7f0000000040)) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) 23:14:24 executing program 5: r0 = getpgid(0x0) r1 = memfd_secret(0x0) r2 = gettid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f0000000040)={0x8}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r1) mmap$usbmon(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1800000, 0x1010, r1, 0x9) r3 = getpgid(r0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r3, 0x10, &(0x7f0000000000)={0x65e7}) 23:14:24 executing program 1: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28bd, 0x74, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) 23:14:24 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, 0x0, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) [ 2446.897956] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2446.901797] misc raw-gadget: fail, usb_gadget_register_driver returned -16 23:14:24 executing program 5: r0 = getpgid(0x0) r1 = memfd_secret(0x0) r2 = gettid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f0000000040)={0x8}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r1) mmap$usbmon(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1800000, 0x1010, r1, 0x9) r3 = getpgid(r0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r3, 0x10, &(0x7f0000000000)={0x65e7}) 23:14:24 executing program 6: clock_gettime(0x0, &(0x7f00000000c0)) r0 = gettid() sched_rr_get_interval(r0, &(0x7f0000000140)) 23:14:24 executing program 0: getpgid(0x0) r0 = memfd_secret(0x0) r1 = gettid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x10, &(0x7f0000000040)={0x8}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) 23:14:24 executing program 0: getpgid(0x0) memfd_secret(0x0) r0 = gettid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x10, &(0x7f0000000040)={0x8}) 23:14:24 executing program 5: r0 = getpgid(0x0) r1 = memfd_secret(0x0) r2 = gettid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f0000000040)={0x8}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r1) mmap$usbmon(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1800000, 0x1010, r1, 0x9) r3 = getpgid(r0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r3, 0x10, &(0x7f0000000000)={0x65e7}) 23:14:24 executing program 6: clock_gettime(0x0, &(0x7f00000000c0)) sched_rr_get_interval(0x0, &(0x7f0000000140)) 23:14:24 executing program 0: getpgid(0x0) memfd_secret(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000040)={0x8}) 23:14:24 executing program 5: r0 = getpgid(0x0) r1 = memfd_secret(0x0) r2 = gettid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f0000000040)={0x8}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r1) mmap$usbmon(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1800000, 0x1010, r1, 0x9) getpgid(r0) 23:14:33 executing program 7: clock_gettime(0x0, &(0x7f0000000040)) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) 23:14:33 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:14:33 executing program 5: getpgid(0x0) r0 = memfd_secret(0x0) r1 = gettid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x10, &(0x7f0000000040)={0x8}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) mmap$usbmon(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1800000, 0x1010, r0, 0x9) 23:14:33 executing program 1: getpgid(0x0) memfd_secret(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000040)={0x8}) 23:14:33 executing program 0: getpgid(0x0) memfd_secret(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000040)={0x8}) 23:14:33 executing program 3: rt_sigsuspend(0x0, 0x0) 23:14:33 executing program 6: clock_gettime(0x0, &(0x7f00000000c0)) sched_rr_get_interval(0x0, &(0x7f0000000140)) 23:14:33 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x0, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:14:33 executing program 0: getpgid(0x0) memfd_secret(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000040)={0x8}) 23:14:34 executing program 5: getpgid(0x0) r0 = memfd_secret(0x0) r1 = gettid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x10, &(0x7f0000000040)={0x8}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) 23:14:34 executing program 3: rt_sigsuspend(0x0, 0x0) 23:14:34 executing program 0: getpgid(0x0) r0 = gettid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x10, &(0x7f0000000040)={0x8}) 23:14:34 executing program 6: clock_gettime(0x0, &(0x7f00000000c0)) sched_rr_get_interval(0x0, &(0x7f0000000140)) 23:14:34 executing program 1: getpgid(0x0) memfd_secret(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000040)={0x8}) 23:14:34 executing program 6: r0 = gettid() sched_rr_get_interval(r0, &(0x7f0000000140)) 23:14:34 executing program 3: rt_sigsuspend(0x0, 0x0) [ 2463.119616] kworker/u10:4 (329) used greatest stack depth: 23424 bytes left 23:14:44 executing program 3: rt_sigsuspend(&(0x7f0000000100), 0x8) 23:14:44 executing program 7: clock_gettime(0x0, &(0x7f0000000040)) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000080)={0x0, 0x0}, 0x8) 23:14:44 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:14:44 executing program 6: gettid() sched_rr_get_interval(0x0, &(0x7f0000000140)) 23:14:44 executing program 0: r0 = gettid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x10, &(0x7f0000000040)={0x8}) 23:14:44 executing program 1: getpgid(0x0) memfd_secret(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000040)={0x8}) 23:14:44 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x0, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:14:44 executing program 5: getpgid(0x0) memfd_secret(0x0) r0 = gettid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x10, &(0x7f0000000040)={0x8}) 23:14:44 executing program 7: clock_gettime(0x0, &(0x7f0000000040)) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000080)={0x0, 0x0}, 0x8) 23:14:44 executing program 0: gettid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000040)={0x8}) 23:14:44 executing program 6: gettid() sched_rr_get_interval(0x0, &(0x7f0000000140)) 23:14:44 executing program 1: getpgid(0x0) memfd_secret(0x0) 23:14:44 executing program 5: getpgid(0x0) memfd_secret(0x0) gettid() 23:14:44 executing program 1: getpgid(0x0) 23:14:44 executing program 7: clock_gettime(0x0, &(0x7f0000000040)) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000080)={0x0, 0x0}, 0x8) 23:14:44 executing program 6: gettid() sched_rr_get_interval(0x0, &(0x7f0000000140)) 23:14:44 executing program 0: gettid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000040)={0x8}) 23:14:55 executing program 7: rt_sigsuspend(0x0, 0x0) 23:14:55 executing program 6: r0 = gettid() sched_rr_get_interval(r0, 0x0) 23:14:55 executing program 5: getpgid(0x0) memfd_secret(0x0) 23:14:55 executing program 1: clock_gettime(0x0, &(0x7f00000000c0)) sched_rr_get_interval(0x0, &(0x7f0000000140)) 23:14:55 executing program 0: gettid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000040)={0x8}) 23:14:55 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:14:55 executing program 3: rt_sigsuspend(&(0x7f0000000100), 0x8) 23:14:55 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x0, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:14:55 executing program 5: getpgid(0x0) 23:14:55 executing program 6: r0 = gettid() sched_rr_get_interval(r0, 0x0) 23:14:55 executing program 1: clock_gettime(0x0, &(0x7f00000000c0)) sched_rr_get_interval(0x0, &(0x7f0000000140)) 23:14:55 executing program 7: rt_sigsuspend(0x0, 0x0) 23:14:55 executing program 0: r0 = gettid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x0, 0x0) 23:14:55 executing program 6: r0 = gettid() sched_rr_get_interval(r0, 0x0) 23:14:55 executing program 5: rt_sigsuspend(&(0x7f0000000100), 0x8) 23:14:55 executing program 1: clock_gettime(0x0, &(0x7f00000000c0)) sched_rr_get_interval(0x0, &(0x7f0000000140)) 23:14:55 executing program 7: rt_sigsuspend(0x0, 0x0) 23:14:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) r0 = memfd_secret(0x0) r1 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r1) sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000001180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001140)={&(0x7f00000010c0)={0x68, 0x0, 0x20, 0x70bd2b, 0x25dfdbfe, {{}, {}, {0x4c, 0x18, {0x4, @link='syz1\x00'}}}, ["", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20000040}, 0x40000) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) read$ptp(r0, &(0x7f00000000c0)=""/4096, 0x1000) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:14:55 executing program 6: mmap$usbmon(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) ioctl$MON_IOCQ_RING_SIZE(0xffffffffffffffff, 0x9205) r0 = memfd_secret(0x0) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x9, 0x5}}, './file0\x00'}) sendmsg$NL80211_CMD_SET_WOWLAN(r1, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000940)={0x10d0, 0x0, 0x504, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void, @val={0xc, 0x99, {0x7, 0x7}}}}, [@NL80211_ATTR_WOWLAN_TRIGGERS={0xc, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE={0x4}, @NL80211_WOWLAN_TRIG_MAGIC_PKT={0x4}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0x1070, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_PKT_PATTERN={0x30, 0x4, 0x0, 0x1, [{0x2c, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0x4}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x7fff}, @NL80211_PKTPAT_MASK={0x14, 0x1, "93aeb13ed09ee16b3d4608bbfe81f71f"}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x1}]}]}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE={0x4}, @NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE={0x4}, @NL80211_WOWLAN_TRIG_TCP_CONNECTION={0x101c, 0xe, 0x0, 0x1, [@NL80211_WOWLAN_TCP_DATA_INTERVAL={0x8, 0x9, 0x8}, @NL80211_WOWLAN_TCP_WAKE_PAYLOAD={0x1004, 0xa, "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"}, @NL80211_WOWLAN_TCP_DST_MAC={0xa}]}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_RFKILL_RELEASE={0x4}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_DISCONNECT={0x4}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0x34, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_NET_DETECT={0x2c, 0x12, 0x0, 0x1, [@NL80211_ATTR_BSSID={0xa, 0xf5, @random="3e39c2741b09"}, @NL80211_ATTR_MEASUREMENT_DURATION={0x6, 0xeb, 0x6}, @NL80211_ATTR_SCAN_FLAGS={0x8, 0x9e, 0x80a}, @NL80211_ATTR_SCHED_SCAN_DELAY={0x8, 0xdc, 0x1}, @NL80211_ATTR_SCHED_SCAN_MULTI={0x4}]}, @NL80211_WOWLAN_TRIG_ANY={0x4}]}]}, 0x10d0}}, 0x20) io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0xad13, 0x20, 0x0, 0x3a2, 0x0, r0}) 23:14:55 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="24ecd8aa91ed936dd1936b80ac0b1c2c61edd810200b8f7cde65a3f47f57f9e47021d47e36155f4ab8fd0521fc8ab1463e48e8989a8f9a2a25f0e5c666dc47ebcc803c20b96fc196a4b4bc1b36167fa10509c7cd1f85f05d2daba7fc8dd644ab46218800"/110, @ANYRES16=r1, @ANYBLOB="020828bd7000fcdbdf250b00000006000a000300000006000a00feff0000"], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) read$usbmon(0xffffffffffffffff, &(0x7f0000000200)=""/102, 0x66) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r0, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x692d1e5235b6c1fc}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x20, r1, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000040}, 0x4) 23:14:56 executing program 1: sched_rr_get_interval(0x0, &(0x7f0000000140)) 23:14:56 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, 0x0, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:14:56 executing program 3: rt_sigsuspend(&(0x7f0000000100), 0x8) 23:14:56 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="24ecd8aa91ed936dd1936b80ac0b1c2c61edd810200b8f7cde65a3f47f57f9e47021d47e36155f4ab8fd0521fc8ab1463e48e8989a8f9a2a25f0e5c666dc47ebcc803c20b96fc196a4b4bc1b36167fa10509c7cd1f85f05d2daba7fc8dd644ab46218800"/110, @ANYRES16=r1, @ANYBLOB="020828bd7000fcdbdf250b00000006000a000300000006000a00feff0000"], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) read$usbmon(0xffffffffffffffff, &(0x7f0000000200)=""/102, 0x66) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r0, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x692d1e5235b6c1fc}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x20, r1, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000040}, 0x4) 23:14:56 executing program 6: mmap$usbmon(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) ioctl$MON_IOCQ_RING_SIZE(0xffffffffffffffff, 0x9205) r0 = memfd_secret(0x0) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x9, 0x5}}, './file0\x00'}) sendmsg$NL80211_CMD_SET_WOWLAN(r1, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000940)={0x10d0, 0x0, 0x504, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void, @val={0xc, 0x99, {0x7, 0x7}}}}, [@NL80211_ATTR_WOWLAN_TRIGGERS={0xc, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE={0x4}, @NL80211_WOWLAN_TRIG_MAGIC_PKT={0x4}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0x1070, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_PKT_PATTERN={0x30, 0x4, 0x0, 0x1, [{0x2c, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0x4}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x7fff}, @NL80211_PKTPAT_MASK={0x14, 0x1, "93aeb13ed09ee16b3d4608bbfe81f71f"}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x1}]}]}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE={0x4}, @NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE={0x4}, @NL80211_WOWLAN_TRIG_TCP_CONNECTION={0x101c, 0xe, 0x0, 0x1, [@NL80211_WOWLAN_TCP_DATA_INTERVAL={0x8, 0x9, 0x8}, @NL80211_WOWLAN_TCP_WAKE_PAYLOAD={0x1004, 0xa, "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"}, @NL80211_WOWLAN_TCP_DST_MAC={0xa}]}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_RFKILL_RELEASE={0x4}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_DISCONNECT={0x4}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0x34, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_NET_DETECT={0x2c, 0x12, 0x0, 0x1, [@NL80211_ATTR_BSSID={0xa, 0xf5, @random="3e39c2741b09"}, @NL80211_ATTR_MEASUREMENT_DURATION={0x6, 0xeb, 0x6}, @NL80211_ATTR_SCAN_FLAGS={0x8, 0x9e, 0x80a}, @NL80211_ATTR_SCHED_SCAN_DELAY={0x8, 0xdc, 0x1}, @NL80211_ATTR_SCHED_SCAN_MULTI={0x4}]}, @NL80211_WOWLAN_TRIG_ANY={0x4}]}]}, 0x10d0}}, 0x20) io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0xad13, 0x20, 0x0, 0x3a2, 0x0, r0}) 23:14:56 executing program 1: sched_rr_get_interval(0x0, 0x0) 23:14:56 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x27, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:14:56 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) r0 = memfd_secret(0x0) r1 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r1) sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000001180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001140)={&(0x7f00000010c0)={0x68, 0x0, 0x20, 0x70bd2b, 0x25dfdbfe, {{}, {}, {0x4c, 0x18, {0x4, @link='syz1\x00'}}}, ["", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20000040}, 0x40000) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) read$ptp(r0, &(0x7f00000000c0)=""/4096, 0x1000) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:14:56 executing program 1: sched_rr_get_interval(0x0, 0x0) 23:14:56 executing program 6: mmap$usbmon(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) ioctl$MON_IOCQ_RING_SIZE(0xffffffffffffffff, 0x9205) r0 = memfd_secret(0x0) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x9, 0x5}}, './file0\x00'}) sendmsg$NL80211_CMD_SET_WOWLAN(r1, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000940)={0x10d0, 0x0, 0x504, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void, @val={0xc, 0x99, {0x7, 0x7}}}}, [@NL80211_ATTR_WOWLAN_TRIGGERS={0xc, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE={0x4}, @NL80211_WOWLAN_TRIG_MAGIC_PKT={0x4}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0x1070, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_PKT_PATTERN={0x30, 0x4, 0x0, 0x1, [{0x2c, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0x4}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x7fff}, @NL80211_PKTPAT_MASK={0x14, 0x1, "93aeb13ed09ee16b3d4608bbfe81f71f"}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x1}]}]}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE={0x4}, @NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE={0x4}, @NL80211_WOWLAN_TRIG_TCP_CONNECTION={0x101c, 0xe, 0x0, 0x1, [@NL80211_WOWLAN_TCP_DATA_INTERVAL={0x8, 0x9, 0x8}, @NL80211_WOWLAN_TCP_WAKE_PAYLOAD={0x1004, 0xa, "4821d9c81ec329dc9d561cf8d2a33488a85d60d224c5f7fdef36627d717762a5d2953519fc79f358cd40c0c3490f878f6adf3ed3275c1deed77c24cbe0563afa05e3793b607d280f6aa145e98a899a46286bd164d4f12eee111da3e03d093085be134a313238589afc66c194105099dae5e563f7a14859da5f539d3e0a6b229a2954cf616f9cae8f207b629d03965dcad1deea11782c07ff02dc0fafb8f17f793d4724973aacfd46701f3bb03fa1efa324ea8e474673d733a483f67416289688f5af097b7881a435cc1f22c9f6353728a18090fad8ed59f8795b8537e7e600b8a394f2453895db60a9837370af1e809ee4de9da142d409e867e49dfd86c5fb81e2f7bbbfb772dacd1e05c707bfae47ace03ce0af530a73b64a6b873b38522d31deab1088e9a93ff2f39514f73de049ff1c43161c5a6c042b2daea10c14437cffd02f28e943d5864837b07101fa443fc5ae2f768362c911981c72363f366b7c662b9bcc4a326c2ed2d6cd5eeec20444d0aee73ddbf38c178e551dcbaa8d193e1d4e9af8b4ee4d5f9978587a42542ccf95d66c93a17b38dd44bc382780e39681119817f8951157dfe0d425fccd9e0c1f7e9cb2bef29ac854766aef1347aca3c60422d90bfb5384e37d2535722fa145c65e580ae24094ef43f2548368d066f04eae35a2666db9116391c61a87ef0038afd39e45311b6ad1a91df079b601c5199fdb7e34f149a0db3e14f75d0879ca6a8f8cf58fb73dfb4e8f332c209cd89b6e5f867d7f1d4ced9a122eb5cc63a67d09e1cee90dc7772d24d088a17b7ec669fad0fd2ff4ddb6ecf7986f4a4113706614c2a0120c1b4e94f09ca555a6e59aacc1e487e687f794468ba6afee396b08e36bf324c48c6df11029691d09394ad06525aa1666e4013a54e6e4e5cf16e014b915a9a9fc8d6e20100b3b37159d245a988f26d47850a8f41ea44747e60122b2097eddaa7c697bcd874046f1fe78063ad6ce91dd92e6e4f02bf26350dd2b832498467dace985d0ad43ac5f42d0c2747c9bc4e0f0b2286b52dd437e636db7216b67c4ba208c1fb3df99c011656ed6ca40e080b1ed1ac2dd6cc76817193d2c2af6a3b5bdc4c50c7b38bd780ee297eed21fa161f2843cfe0b2fbea0845c524eea920dd29600070e7af63946928c8a3a034a8d7ec18462db52000c08857a0c14eb2ee4ea99b4dccc96208af6e00053e83f9a356196a597cecbd3c16fbebbaa1dada448f46ec5c3c6364b9eba42f01a7575a35b109cd2cfd414569a501c5db31d3088b1ae24c65a7c005ba6591212937122f558351579d82576b2f6975372e7869f1f9fd854d404eed40bbe303d64ba1c40581e86e4094549b4ad39b6121dbf5c66c93e1a9f3fc5cfc2d77c4281b86ea8d5113dd663cc47e23abefaa345d89b4b05c8a86a59b75c46cae78aba883a9c95370402e8d5523784b5c43779a1e58b6ba3684c00ff4d9fd9b477341cde81095073d79a6ab9e09dd108cebda0f53318091e746568bf4b8e1e3f9f1f0292d8e0ba1f50835c81cca36d7b34089cd859a6112904823d525fc994f6bdd1b52676f4c316b04784c618e8ce1637fbc80ad85e5c610904c5ee8b344f0bc72250a3eadb47f54913a87aec45e11224e5b1e9f7bc7e1cf2ad3cdf85e0974c427b6bd8bdd832e49a8381ac54bb3832ec533fc85d54a7e188091ad52786f4740ba2923ca919cd204be1845f3a5cfb831a9664df2b9d262524c312aaa995b23ac4d7a2d41b560a2dcceee8310523c60916be612851ce4ebd8f26e77f6059b5024bca36db5b76c0a69d58cf3fd207053be98cd2026e3cbe484182df9252bbb3523c047d6b9f5d91a57a37dede913483c9e06a976dbbad8d740b1d1716a2656e7e4b7b1ce3c6f68c85b93846587274fa711ce39e650090012686153d7c0eeb564c15f51902462f71510a84342a6d22a700be25e9cf64a21eb9b96505488b246406d3af0aaba1c6307c036af7492a893f7fca68a6adf539c6da031ca9a981fac0d84b6b773d7332c0c8aa716ec042603297584b00e6e4d2c360c9841c3688215258bde2333f1c45934117ea9fbf6df652c7357b614de7c6c772693f4f492201924622d5d954faa112c9803560e5797daa09d514f30087398693de7b13af8c822422b06fd174bbc2f14316c43b615886cf67f8e21da8c2e115df4576ada443c1db10f919c937bd8b7d1766c767e9d79b70618bf2179a2afcc45ae395d61da361f65b4623eb4fdb64839eb2e280e35d84a02c79efc1f57f11fb552e2492fdb5b83ee2fcd76bd90295c805296fea8fb493a11b838f96ff8db1d3d99e0b8481ca46d71e35da046ad8b416f553231fe5e65d2d32c474a53dc4abe4a4e26c2943d849c8df9fccfa7f8db059175d5f9d754cef76f4e0e843d1e3845cc44be8c4ce8ad656f0690e7177daa7e974a84d4a341f5637895486ed0b9d79a79d46dcd92af4bd0219e9861e4c292ebb108512ba3c8f0413b62bd3bed01178be0576bd14e5c511caec8440edb1d8b91d20166027676ac4b51175ef382ec862a47a4d309a63e74cfadb0a8a1ec6c2900260c1c9d5e7003f44f6a75ef9f5d4e3b0a1db7972107e8ad534392ec633f0352a9049ccc7dc416a6b0d19a84b3d1e2a2212c49962e13d1286ebf6afca1c6b3fb799adfe636405bbf4276eced9da15c1dd0a8809013c4b68e5dd2001fa365d1f564e117ce915b64d10b788cc47bf18652922126b3ac14b54dc79aee1576b3350319ddd28c59cb7d2bbe5c23d32fa0f8ed7df2c9adcab61a23c8be9faeb8a0154d666497f1331f131d7151552ded619f861a2daad96d659835d0a395e328ed2cef6ab073e2604b4333ccc818f331486f008be2c2ebb3c364fdc5f22a3113202d1416977e57d5646f8a923378526d1849c1ae7a53397b089bd1d72f4a92f55745ca4bc65ecf0085a391430576bd8068d89026ba01013f8e9938667cc80b3f496e7ac31d63b5eec8e2893ab482d2e4d6c77c8090b5d7c535e668d1b7deb1c06000f6e38d700fbba670d7a7ecd14588dfd801ffd0f5aa3a725e1cbed413806966592d844d2eff2d9d8bbca70d0379b2533227a3ae3e79a8d76ada856da741c22249c04db04934f9746eb81556870d6d67d2fa65fc16f267b55f5b4b7bc2e163590d794004f162a913e02bec01a80fa793cd42e7572cd01dd77c8500cef19bdb78a2feeb5c6f9937d3387b5227fde9cf639b672d8173181fe4d7d13db997c0ec0c4df07661ecaa4082cad43bd476574f4b75e958c513bb4082c9de81231a9fc01796d10c335ef68b606c04772f9e1b4cdce1bf9ea993e17e4c55c53fdb675b702354999877e5b4ca2fcfc4ab13a8b51c46c55ed23efea2024fd581418ec36df06078a98df6933c5e7181378030bb519e469a489bb697264e20762e88409ecdb1a1dffe1e0c6e442a3e76ad8724c3a2dda7a1633b3bd44ff7063aef0039e966b8c5a5db3c407aac3dcf8e2bac2fe25b23a4d46afc97566758caaccd67804328c411635c8545e25d32b36491d238695082cf66ee11c0a505375fa24e0dec115b7589892223ff15be2b72a8780d9d837d9d61db451002101bbded10f006403d64ad0476a544f01ddcd38d10962d619cc771e4e9bbf3300fb7606aa68382cb732ef76498dc5df0c646da53904b2fd64108016f9db10eb71ccc6c13964cb80d02b70869bc5c60128bf42cc180228d58de9893ef23e07c6b6399883f1d95b6c554bbd5396aebe64096c41671ca67b4c9e130763a222713d1200e34ea436866cac3b0b8d400d61efa8597abe1c1b923ff0e2f368a31f6b82f1dadc2b376dd1a4f3ff2ec4c227480aef1c308d98f7593931cce4d7042367be2183fe214286fd37ad1a2cb249bb7f86c97121dc99244ba48c5dbf8ac23632d7ae01cdf90c01375e5c8c2c6ebeceb2b30bfc2a2b31c494b0165d3aea7a13cd06278ce95964d3de5a4df559fd7221905694709801c9526568d4d9adc7ffedca16be2758222d86c01e042f0108f6e29c0e4a2a8db509692953adb1ac2b4a780337ac0d42e56e8910a11722c70a46e791d6e50449f949ef864a5e6c22aa3d0e9dde32aabe90492bdec2529ca94e1df9a426915a41c4303497a3d1ca4074b22c3a0fa0be756e0404b8acf69a1481d0b3e5a72d7ab6ea0eeba87f4e6008d9a939f8fa2dc03e401a701948b5a8e528b13da7e9dd3e7cd928811f0c2f44c49b19af4a37f410402ee5ad10456f10d3ec619c02d1f2e66b1635ba8909edc7ff9657d376e8f92e53293e82a955916877dd8aa316f9bbf1a5b464e47483988a67a684f28270f80b6d8dd921c8334781ea95482dd7d5b1ea68e23b1f96dd80002fa74421ea06bd09fd43cda0ca6a9b611ac4fdc741293b92538f6c4ba946b40d5cf776d7fea65e9da087d9ea48eb68640944be6db8f5938fc56c6cee62e9d9f0f8e4be97e8b2d8a0e21a0949538921a93c6915915d9fbc00e28f99ac01f78ecabaf7eadc2da5220761ec2c69614ed6c1408a02780b47740d64ae72b6021dbd76b10e5de09e5673f33cf04eda6c78aabee7a49f6f3a21ba708c56424345a6313fe6d866b9045d2376c16eb284ee7458ec985a4ad71454a435775cd461faae587673760ed3da14d2d5340f4dbb273545f8553fa4b8c21f4273ec7045d1c2993784d01bfdf52608d4971ddc2135896882c74e29cdcdfc718c28980685325af9002c59efb8afecf959af0cab68395744f7adb27962c3a8b477dee69667194557c75bebdcfa2f9ef02a098b6091a3a905d3e17b1bc6298b0aa388c9d24b6d9b5f49a34f84588c73df817de82a404b49b0de33ee6b064fee7d2370a1ab6d6eb12863ce703b56dfa71cc6142310155acb06278fd2b0da86ea77cfafbd6a5656bc0e0082ed8b0305b0b755b6f2d23883581a408481f7f6eeb7845abced85dfd525cae5cc6825b23c4e6dcb7800d58120059843db8d03d10ae095b7653af2a34927c03f98604b8685e7b41219a37b618d0ef1496df8442af37a078f88bf43fbf53a75964ed2fe799cb3f0df80b407e05e1977411dad8259a4df04465071455e4142b8ac476368d81804f181cd567eb49578c90ad318bb8cba80dee0c4c64265f143440cf6430a4dd9aca1e2ca082419116ed7bf3f387580112959e2d0bdef45052642903a88000d489983151116a3f314a1e2e1343897b12f6124caea5f244ad728cab10dda338cf055ab8620b46f4c38d84c897d936e029809e3ae19a38f5bbfa07f1383864988d92d4915703696549e4125730ac7acf8bbfa44471a235fc09b6c310b3969408fdea08f243cd7f6ce325f467422367db60fdb0a6ead089a8182179362fdd378e0ffaf029d1951675b0498fe81802363c492cc5cc277c8163164abcb68fa7b5525c84aeefbcb790e1d676ee5347ef2716eb4bd6e606bd6f64a26054bb728f5133c5d01037a08be24ca4cb69aa545a1ad40ed6da927f82a2bdfae44d1407e4a278e66cf52b314d413fd8d26883d6136e7c30ff8ef15cf3b4df5dbaaa65c905b366ba619fdf1ffacdf25ce6ea909de6355cd0ab926acae179cd64e0ea10f3a23f0479d29bbd4d795c85ea11b207763873cf635a5cc8a6cb71c89928fa0a8745a8d9da18834ec3a7a343204c574618f9e4c7214e3d1d2df428204effd8ac8c28e1f386c9b7cc1304564ab0a4b4b64f9a46f8f7d5cc400c6e84565805bc215e45d8c5d5e2ca21f91be1ef44c883f2335aeadfecb777fb15a83a8bd181399806f0b266874492112b54900998a7feb4feaf17143dc4da4abe85158e3"}, @NL80211_WOWLAN_TCP_DST_MAC={0xa}]}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_RFKILL_RELEASE={0x4}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_DISCONNECT={0x4}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0x34, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_NET_DETECT={0x2c, 0x12, 0x0, 0x1, [@NL80211_ATTR_BSSID={0xa, 0xf5, @random="3e39c2741b09"}, @NL80211_ATTR_MEASUREMENT_DURATION={0x6, 0xeb, 0x6}, @NL80211_ATTR_SCAN_FLAGS={0x8, 0x9e, 0x80a}, @NL80211_ATTR_SCHED_SCAN_DELAY={0x8, 0xdc, 0x1}, @NL80211_ATTR_SCHED_SCAN_MULTI={0x4}]}, @NL80211_WOWLAN_TRIG_ANY={0x4}]}]}, 0x10d0}}, 0x20) io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0xad13, 0x20, 0x0, 0x3a2, 0x0, r0}) 23:15:06 executing program 6: mmap$usbmon(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) ioctl$MON_IOCQ_RING_SIZE(0xffffffffffffffff, 0x9205) r0 = memfd_secret(0x0) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x9, 0x5}}, './file0\x00'}) io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0xad13, 0x20, 0x0, 0x3a2, 0x0, r0}) 23:15:06 executing program 5: rt_sigsuspend(&(0x7f0000000100), 0x8) 23:15:06 executing program 3: r0 = memfd_secret(0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x80, 0x3, 0xffff8001}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) ioctl$CDROMVOLCTRL(r0, 0x530a, &(0x7f0000000000)={0x3, 0x3, 0x4, 0x3}) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x400) 23:15:06 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, 0x0, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:15:06 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) r0 = memfd_secret(0x0) r1 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r1) sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000001180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001140)={&(0x7f00000010c0)={0x68, 0x0, 0x20, 0x70bd2b, 0x25dfdbfe, {{}, {}, {0x4c, 0x18, {0x4, @link='syz1\x00'}}}, ["", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20000040}, 0x40000) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) read$ptp(r0, &(0x7f00000000c0)=""/4096, 0x1000) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:15:06 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x27, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:15:06 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="24ecd8aa91ed936dd1936b80ac0b1c2c61edd810200b8f7cde65a3f47f57f9e47021d47e36155f4ab8fd0521fc8ab1463e48e8989a8f9a2a25f0e5c666dc47ebcc803c20b96fc196a4b4bc1b36167fa10509c7cd1f85f05d2daba7fc8dd644ab46218800"/110, @ANYRES16=r1, @ANYBLOB="020828bd7000fcdbdf250b00000006000a000300000006000a00feff0000"], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) read$usbmon(0xffffffffffffffff, &(0x7f0000000200)=""/102, 0x66) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r0, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x692d1e5235b6c1fc}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x20, r1, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000040}, 0x4) 23:15:06 executing program 1: sched_rr_get_interval(0x0, 0x0) 23:15:06 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="24ecd8aa91ed936dd1936b80ac0b1c2c61edd810200b8f7cde65a3f47f57f9e47021d47e36155f4ab8fd0521fc8ab1463e48e8989a8f9a2a25f0e5c666dc47ebcc803c20b96fc196a4b4bc1b36167fa10509c7cd1f85f05d2daba7fc8dd644ab46218800"/110, @ANYRES16=r1, @ANYBLOB="020828bd7000fcdbdf250b00000006000a000300000006000a00feff0000"], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) read$usbmon(0xffffffffffffffff, &(0x7f0000000200)=""/102, 0x66) 23:15:06 executing program 3: r0 = memfd_secret(0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x80, 0x3, 0xffff8001}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) ioctl$CDROMVOLCTRL(r0, 0x530a, &(0x7f0000000000)={0x3, 0x3, 0x4, 0x3}) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x400) 23:15:06 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) r0 = memfd_secret(0x0) r1 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r1) sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000001180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001140)={&(0x7f00000010c0)={0x68, 0x0, 0x20, 0x70bd2b, 0x25dfdbfe, {{}, {}, {0x4c, 0x18, {0x4, @link='syz1\x00'}}}, ["", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20000040}, 0x40000) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) read$ptp(r0, &(0x7f00000000c0)=""/4096, 0x1000) 23:15:17 executing program 5: rt_sigsuspend(&(0x7f0000000100), 0x8) 23:15:17 executing program 6: mmap$usbmon(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) ioctl$MON_IOCQ_RING_SIZE(0xffffffffffffffff, 0x9205) r0 = memfd_secret(0x0) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x9, 0x5}}, './file0\x00'}) io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0xad13, 0x20, 0x0, 0x3a2, 0x0, r0}) 23:15:17 executing program 3: r0 = memfd_secret(0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x80, 0x3, 0xffff8001}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) ioctl$CDROMVOLCTRL(r0, 0x530a, &(0x7f0000000000)={0x3, 0x3, 0x4, 0x3}) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x400) 23:15:17 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x27, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:15:17 executing program 1: r0 = memfd_secret(0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x80, 0x3, 0xffff8001}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) ioctl$CDROMVOLCTRL(r0, 0x530a, &(0x7f0000000000)={0x3, 0x3, 0x4, 0x3}) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x400) 23:15:17 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="24ecd8aa91ed936dd1936b80ac0b1c2c61edd810200b8f7cde65a3f47f57f9e47021d47e36155f4ab8fd0521fc8ab1463e48e8989a8f9a2a25f0e5c666dc47ebcc803c20b96fc196a4b4bc1b36167fa10509c7cd1f85f05d2daba7fc8dd644ab46218800"/110, @ANYRES16=r1, @ANYBLOB="020828bd7000fcdbdf250b00000006000a000300000006000a00feff0000"], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) 23:15:17 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) r0 = memfd_secret(0x0) r1 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r1) sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000001180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001140)={&(0x7f00000010c0)={0x68, 0x0, 0x20, 0x70bd2b, 0x25dfdbfe, {{}, {}, {0x4c, 0x18, {0x4, @link='syz1\x00'}}}, ["", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20000040}, 0x40000) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) 23:15:17 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, 0x0, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:15:17 executing program 6: mmap$usbmon(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) ioctl$MON_IOCQ_RING_SIZE(0xffffffffffffffff, 0x9205) r0 = memfd_secret(0x0) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0xad13, 0x20, 0x0, 0x3a2, 0x0, r0}) 23:15:17 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) r0 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000001180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001140)={&(0x7f00000010c0)={0x68, 0x0, 0x20, 0x70bd2b, 0x25dfdbfe, {{}, {}, {0x4c, 0x18, {0x4, @link='syz1\x00'}}}, ["", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20000040}, 0x40000) 23:15:17 executing program 3: r0 = memfd_secret(0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x80, 0x3, 0xffff8001}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) ioctl$CDROMVOLCTRL(r0, 0x530a, &(0x7f0000000000)={0x3, 0x3, 0x4, 0x3}) 23:15:26 executing program 5: rt_sigsuspend(0x0, 0x0) 23:15:26 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00), &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:15:26 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="24ecd8aa91ed936dd1936b80ac0b1c2c61edd810200b8f7cde65a3f47f57f9e47021d47e36155f4ab8fd0521fc8ab1463e48e8989a8f9a2a25f0e5c666dc47ebcc803c20b96fc196a4b4bc1b36167fa10509c7cd1f85f05d2daba7fc8dd644ab46218800"/110, @ANYRES16=r1, @ANYBLOB="020828bd7000fcdbdf250b00000006000a000300000006000a00feff0000"], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:15:26 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) r0 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000001180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001140)={&(0x7f00000010c0)={0x68, 0x0, 0x20, 0x70bd2b, 0x25dfdbfe, {{}, {}, {0x4c, 0x18, {0x4, @link='syz1\x00'}}}, ["", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20000040}, 0x40000) 23:15:26 executing program 1: r0 = memfd_secret(0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x80, 0x3, 0xffff8001}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) ioctl$CDROMVOLCTRL(r0, 0x530a, &(0x7f0000000000)={0x3, 0x3, 0x4, 0x3}) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x400) 23:15:26 executing program 6: mmap$usbmon(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) ioctl$MON_IOCQ_RING_SIZE(0xffffffffffffffff, 0x9205) r0 = memfd_secret(0x0) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000000)) io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0xad13, 0x20, 0x0, 0x3a2, 0x0, r0}) 23:15:26 executing program 3: r0 = memfd_secret(0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x80, 0x3, 0xffff8001}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) 23:15:26 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0x0, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:15:26 executing program 1: r0 = memfd_secret(0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x80, 0x3, 0xffff8001}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) ioctl$CDROMVOLCTRL(r0, 0x530a, &(0x7f0000000000)={0x3, 0x3, 0x4, 0x3}) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x400) 23:15:26 executing program 6: mmap$usbmon(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) ioctl$MON_IOCQ_RING_SIZE(0xffffffffffffffff, 0x9205) r0 = memfd_secret(0x0) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000000)) io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0xad13, 0x20, 0x0, 0x3a2, 0x0, r0}) 23:15:26 executing program 1: r0 = memfd_secret(0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x80, 0x3, 0xffff8001}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) ioctl$CDROMVOLCTRL(r0, 0x530a, &(0x7f0000000000)={0x3, 0x3, 0x4, 0x3}) 23:15:26 executing program 5: rt_sigsuspend(0x0, 0x0) 23:15:26 executing program 3: memfd_secret(0x0) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) ioctl$PTP_PIN_GETFUNC(r0, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x80, 0x3, 0xffff8001}) 23:15:26 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="24ecd8aa91ed936dd1936b80ac0b1c2c61edd810200b8f7cde65a3f47f57f9e47021d47e36155f4ab8fd0521fc8ab1463e48e8989a8f9a2a25f0e5c666dc47ebcc803c20b96fc196a4b4bc1b36167fa10509c7cd1f85f05d2daba7fc8dd644ab46218800"/110, @ANYRES16, @ANYBLOB="020828bd7000fcdbdf250b00000006000a000300000006000a00feff0000"], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:15:35 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) r0 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) 23:15:35 executing program 1: r0 = memfd_secret(0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x80, 0x3, 0xffff8001}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) ioctl$CDROMVOLCTRL(r0, 0x530a, &(0x7f0000000000)={0x3, 0x3, 0x4, 0x3}) 23:15:35 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00), &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:15:35 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0x0, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:15:35 executing program 3: memfd_secret(0x0) ioctl$PTP_PIN_GETFUNC(0xffffffffffffffff, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x80, 0x3, 0xffff8001}) 23:15:35 executing program 6: mmap$usbmon(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) ioctl$MON_IOCQ_RING_SIZE(0xffffffffffffffff, 0x9205) r0 = memfd_secret(0x0) io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0xad13, 0x20, 0x0, 0x3a2, 0x0, r0}) 23:15:35 executing program 7: sendmsg$NL802154_CMD_SET_SHORT_ADDR(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="24ecd8aa91ed936dd1936b80ac0b1c2c61edd810200b8f7cde65a3f47f57f9e47021d47e36155f4ab8fd0521fc8ab1463e48e8989a8f9a2a25f0e5c666dc47ebcc803c20b96fc196a4b4bc1b36167fa10509c7cd1f85f05d2daba7fc8dd644ab46218800"/110, @ANYRES16, @ANYBLOB="020828bd7000fcdbdf250b00000006000a000300000006000a00feff0000"], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:15:35 executing program 5: rt_sigsuspend(0x0, 0x0) 23:15:35 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) r0 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) 23:15:35 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) r0 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) 23:15:35 executing program 3: memfd_secret(0x0) ioctl$PTP_PIN_GETFUNC(0xffffffffffffffff, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x80, 0x3, 0xffff8001}) 23:15:35 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:15:35 executing program 6: mmap$usbmon(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) ioctl$MON_IOCQ_RING_SIZE(0xffffffffffffffff, 0x9205) io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0xad13, 0x20, 0x0, 0x3a2}) 23:15:35 executing program 1: r0 = memfd_secret(0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x80, 0x3, 0xffff8001}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) 23:15:35 executing program 7: sendmsg$NL802154_CMD_SET_SHORT_ADDR(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="24ecd8aa91ed936dd1936b80ac0b1c2c61edd810200b8f7cde65a3f47f57f9e47021d47e36155f4ab8fd0521fc8ab1463e48e8989a8f9a2a25f0e5c666dc47ebcc803c20b96fc196a4b4bc1b36167fa10509c7cd1f85f05d2daba7fc8dd644ab46218800"/110, @ANYRES16, @ANYBLOB="020828bd7000fcdbdf250b00000006000a000300000006000a00feff0000"], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:15:35 executing program 3: memfd_secret(0x0) ioctl$PTP_PIN_GETFUNC(0xffffffffffffffff, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x80, 0x3, 0xffff8001}) 23:15:35 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) r0 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) 23:15:35 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) 23:15:44 executing program 1: memfd_secret(0x0) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) ioctl$PTP_PIN_GETFUNC(r0, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x80, 0x3, 0xffff8001}) 23:15:44 executing program 6: mmap$usbmon(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) ioctl$MON_IOCQ_RING_SIZE(0xffffffffffffffff, 0x9205) io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0xad13, 0x20, 0x0, 0x3a2}) 23:15:44 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00), &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:15:44 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0x0, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:15:44 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) r0 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) 23:15:44 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) 23:15:44 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) ioctl$PTP_PIN_GETFUNC(r0, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x80, 0x3, 0xffff8001}) 23:15:44 executing program 7: sendmsg$NL802154_CMD_SET_SHORT_ADDR(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="24ecd8aa91ed936dd1936b80ac0b1c2c61edd810200b8f7cde65a3f47f57f9e47021d47e36155f4ab8fd0521fc8ab1463e48e8989a8f9a2a25f0e5c666dc47ebcc803c20b96fc196a4b4bc1b36167fa10509c7cd1f85f05d2daba7fc8dd644ab46218800"/110, @ANYRES16, @ANYBLOB="020828bd7000fcdbdf250b00000006000a000300000006000a00feff0000"], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:15:44 executing program 6: mmap$usbmon(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) ioctl$MON_IOCQ_RING_SIZE(0xffffffffffffffff, 0x9205) io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0xad13, 0x20, 0x0, 0x3a2}) 23:15:44 executing program 7: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="24ecd8aa91ed936dd1936b80ac0b1c2c61edd810200b8f7cde65a3f47f57f9e47021d47e36155f4ab8fd0521fc8ab1463e48e8989a8f9a2a25f0e5c666dc47ebcc803c20b96fc196a4b4bc1b36167fa10509c7cd1f85f05d2daba7fc8dd644ab46218800"/110, @ANYRES16, @ANYBLOB="020828bd7000fcdbdf250b00000006000a000300000006000a00feff0000"], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:15:44 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, 0x0, 0x41, 0x0) ioctl$PTP_PIN_GETFUNC(r0, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x80, 0x3, 0xffff8001}) 23:15:44 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) 23:15:44 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:15:44 executing program 1: memfd_secret(0x0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) 23:15:44 executing program 7: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="24ecd8aa91ed936dd1936b80ac0b1c2c61edd810200b8f7cde65a3f47f57f9e47021d47e36155f4ab8fd0521fc8ab1463e48e8989a8f9a2a25f0e5c666dc47ebcc803c20b96fc196a4b4bc1b36167fa10509c7cd1f85f05d2daba7fc8dd644ab46218800"/110, @ANYRES16, @ANYBLOB="020828bd7000fcdbdf250b00000006000a000300000006000a00feff0000"], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:15:53 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, 0x0, 0x41, 0x0) ioctl$PTP_PIN_GETFUNC(r0, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x80, 0x3, 0xffff8001}) 23:15:53 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0x7, "e65f5967fe6d91"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:15:53 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) 23:15:53 executing program 6: mmap$usbmon(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) r0 = memfd_secret(0x0) io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0xad13, 0x20, 0x0, 0x3a2, 0x0, r0}) 23:15:53 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) 23:15:53 executing program 7: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="24ecd8aa91ed936dd1936b80ac0b1c2c61edd810200b8f7cde65a3f47f57f9e47021d47e36155f4ab8fd0521fc8ab1463e48e8989a8f9a2a25f0e5c666dc47ebcc803c20b96fc196a4b4bc1b36167fa10509c7cd1f85f05d2daba7fc8dd644ab46218800"/110, @ANYRES16, @ANYBLOB="020828bd7000fcdbdf250b00000006000a000300000006000a00feff0000"], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:15:53 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) 23:15:53 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x27, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:15:53 executing program 1: openat$ptp0(0xffffffffffffff9c, 0x0, 0x41, 0x0) 23:15:53 executing program 1: openat$ptp0(0xffffffffffffff9c, 0x0, 0x41, 0x0) 23:15:53 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, 0x0, 0x4) 23:15:53 executing program 1: openat$ptp0(0xffffffffffffff9c, 0x0, 0x41, 0x0) 23:15:53 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) 23:15:53 executing program 6: mmap$usbmon(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) r0 = memfd_secret(0x0) io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0xad13, 0x20, 0x0, 0x3a2, 0x0, r0}) 23:15:53 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) 23:15:53 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, 0x0, 0x41, 0x0) ioctl$PTP_PIN_GETFUNC(r0, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x80, 0x3, 0xffff8001}) 23:16:02 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, 0x0, 0x4) 23:16:02 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 23:16:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) 23:16:02 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x27, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:16:02 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0x7, "e65f5967fe6d91"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:16:02 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(r0, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x80, 0x3, 0xffff8001}) 23:16:02 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) 23:16:02 executing program 6: r0 = memfd_secret(0x0) io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0xad13, 0x20, 0x0, 0x3a2, 0x0, r0}) 23:16:02 executing program 3: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(0xffffffffffffffff, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x80, 0x3, 0xffff8001}) 23:16:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) 23:16:02 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) 23:16:02 executing program 3: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(0xffffffffffffffff, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x80, 0x3, 0xffff8001}) 23:16:02 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, 0x0, 0x4) 23:16:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 23:16:02 executing program 6: r0 = memfd_secret(0x0) io_uring_setup(0x0, &(0x7f0000000080)={0x0, 0xad13, 0x20, 0x0, 0x3a2, 0x0, r0}) 23:16:02 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 23:16:11 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0x7, "e65f5967fe6d91"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:16:11 executing program 3: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(0xffffffffffffffff, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x80, 0x3, 0xffff8001}) 23:16:11 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x27, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:16:11 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="24ecd8aa91ed936dd1936b80ac0b1c2c61edd810200b8f7cde65a3f47f57f9e47021d47e36155f4ab8fd0521fc8ab1463e48e8989a8f9a2a25f0e5c666dc47ebcc803c20b96fc196a4b4bc1b36167fa10509c7cd1f85f05d2daba7fc8dd644ab46218800"/110, @ANYRES16, @ANYBLOB="020828bd7000fcdbdf250b00000006000a000300000006000a00feff0000"], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:16:11 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 23:16:11 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 23:16:11 executing program 6: r0 = memfd_secret(0x0) io_uring_setup(0x0, &(0x7f0000000080)={0x0, 0xad13, 0x20, 0x0, 0x3a2, 0x0, r0}) 23:16:11 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) 23:16:11 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) 23:16:11 executing program 6: r0 = memfd_secret(0x0) io_uring_setup(0x0, &(0x7f0000000080)={0x0, 0xad13, 0x20, 0x0, 0x3a2, 0x0, r0}) 23:16:11 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) 23:16:11 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) 23:16:20 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:16:20 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xb, "e65f5967fe6d915bf138fc"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:16:20 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 23:16:20 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) 23:16:20 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(r0, 0xc0603d06, 0x0) 23:16:20 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:16:20 executing program 6: memfd_secret(0x0) io_uring_setup(0x1d3, 0x0) 23:16:20 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x0, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:16:20 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) 23:16:20 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(r0, 0xc0603d06, 0x0) 23:16:20 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:16:20 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) 23:16:20 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:16:20 executing program 6: memfd_secret(0x0) io_uring_setup(0x1d3, 0x0) 23:16:20 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 23:16:20 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:16:20 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) 23:16:20 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 23:16:20 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(r0, 0xc0603d06, 0x0) 23:16:27 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:16:27 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x0, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:16:27 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xb, "e65f5967fe6d915bf138fc"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:16:27 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:16:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) 23:16:27 executing program 6: memfd_secret(0x0) io_uring_setup(0x1d3, 0x0) 23:16:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 23:16:27 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(r0, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x0, 0x3, 0xffff8001}) 23:16:27 executing program 6: r0 = memfd_secret(0x0) io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0x0, 0x20, 0x0, 0x3a2, 0x0, r0}) 23:16:27 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) memfd_secret(0x0) memfd_secret(0x0) 23:16:27 executing program 6: r0 = memfd_secret(0x0) io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3a2, 0x0, r0}) 23:16:27 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:16:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) 23:16:27 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(r0, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x0, 0x0, 0xffff8001}) 23:16:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}]}) 23:16:27 executing program 6: r0 = memfd_secret(0x0) io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3a2, 0x0, r0}) 23:16:27 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(r0, 0xc0603d06, &(0x7f0000000080)) 23:16:36 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) 23:16:36 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:16:36 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) memfd_secret(0x0) memfd_secret(0x0) 23:16:36 executing program 6: r0 = memfd_secret(0x0) io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3a2, 0x0, r0}) 23:16:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}]}) 23:16:36 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x0, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:16:36 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xb, "e65f5967fe6d915bf138fc"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:16:36 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:16:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}]}) 23:16:36 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:16:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}]}) 23:16:36 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:16:36 executing program 6: r0 = memfd_secret(0x0) io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, r0}) 23:16:36 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="24ecd8aa91ed936dd1936b80ac0b1c2c61edd810200b8f7cde65a3f47f57f9e47021d47e36155f4ab8fd0521fc8ab1463e48e8989a8f9a2a25f0e5c666dc47ebcc803c20b96fc196a4b4bc1b36167fa10509c7cd1f85f05d2daba7fc8dd644ab46218800"/110, @ANYRES16], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:16:36 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) memfd_secret(0x0) 23:16:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}]}) 23:16:36 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) memfd_secret(0x0) memfd_secret(0x0) 23:16:45 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) memfd_secret(0x0) 23:16:45 executing program 3: sendmsg$NL802154_CMD_SET_SHORT_ADDR(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:16:45 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x27, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:16:45 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xd, "e65f5967fe6d915bf138fc73da"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:16:45 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="24ecd8aa91ed936dd1936b80ac0b1c2c61edd810200b8f7cde65a3f47f57f9e47021d47e36155f4ab8fd0521fc8ab1463e48e8989a8f9a2a25f0e5c666dc47ebcc803c20b96fc196a4b4bc1b36167fa10509c7cd1f85f05d2daba7fc8dd644ab46218800"/110], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:16:45 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) memfd_secret(0x0) memfd_secret(0x0) 23:16:45 executing program 6: memfd_secret(0x0) io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0x0, 0x20}) 23:16:45 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}]}) 23:16:45 executing program 3: sendmsg$NL802154_CMD_SET_SHORT_ADDR(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:16:45 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}]}) 23:16:45 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:16:45 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) memfd_secret(0x0) memfd_secret(0x0) 23:16:45 executing program 6: memfd_secret(0x0) io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0x0, 0x20}) 23:16:45 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) memfd_secret(0x0) 23:16:45 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}]}) 23:16:58 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:16:58 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)) 23:16:58 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xd, "e65f5967fe6d915bf138fc73da"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:16:58 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x27, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:16:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) memfd_secret(0x0) 23:16:58 executing program 6: memfd_secret(0x0) io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0x0, 0x20}) 23:16:58 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) memfd_secret(0x0) memfd_secret(0x0) 23:16:58 executing program 3: sendmsg$NL802154_CMD_SET_SHORT_ADDR(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:16:58 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)) 23:16:58 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:16:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) memfd_secret(0x0) 23:16:58 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:16:58 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}]}) memfd_secret(0x0) memfd_secret(0x0) 23:16:58 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:16:58 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)) 23:16:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) memfd_secret(0x0) 23:17:07 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x27, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:17:07 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:17:07 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xd, "e65f5967fe6d915bf138fc73da"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:17:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}]}) memfd_secret(0x0) 23:17:07 executing program 6: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:17:07 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:17:07 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}]}) memfd_secret(0x0) memfd_secret(0x0) 23:17:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}]}) 23:17:07 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, 0x0, 0x4) 23:17:07 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:17:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}]}) 23:17:07 executing program 6: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:17:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}]}) memfd_secret(0x0) 23:17:07 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}]}) memfd_secret(0x0) memfd_secret(0x0) 23:17:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}]}) 23:17:08 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, 0x0, 0x4) 23:17:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}]}) memfd_secret(0x0) 23:17:17 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, 0x0, 0x4) 23:17:17 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x1ff, 0x0, 0x1, 0x8}]}) 23:17:17 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:17:17 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x0, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:17:17 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, 0x0}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:17:17 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x0, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:17:17 executing program 6: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:17:17 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="24ecd8aa91ed936dd1936b80ac0b1c2c61edd810200b8f7cde65a3f47f57f9e47021d47e36155f4ab8fd0521fc8ab1463e48e8989a8f9a"], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:17:17 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x1ff, 0x0, 0x0, 0x8}]}) 23:17:17 executing program 6: sendmsg$NL802154_CMD_SET_SHORT_ADDR(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:17:17 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:17:17 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x0, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:17:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}]}) memfd_secret(0x0) 23:17:17 executing program 6: sendmsg$NL802154_CMD_SET_SHORT_ADDR(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:17:17 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x1ff, 0x0, 0x0, 0x8}]}) 23:17:17 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:17:17 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x1ff}]}) 23:17:17 executing program 6: sendmsg$NL802154_CMD_SET_SHORT_ADDR(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:17:17 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x0, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:17:25 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:17:25 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x1ff}]}) 23:17:25 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:17:25 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, 0x0}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:17:25 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x0, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:17:25 executing program 6: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:17:25 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}]}) memfd_secret(0x0) 23:17:25 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x0, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:17:26 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:17:26 executing program 6: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:17:26 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:17:26 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x0, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:17:35 executing program 6: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:17:35 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x0, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:17:35 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, 0x0}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:17:35 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="24ecd8aa91ed936dd1936b80ac0b1c2c61edd810200b8f7cde65a3f4"], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:17:35 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x24}}, 0x4) 23:17:35 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x0, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:17:35 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x0, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:17:35 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}]}) memfd_secret(0x0) 23:17:35 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x24}}, 0x0) 23:17:35 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='$'], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:17:35 executing program 6: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, 0x0, 0x4) 23:17:35 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x0, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:17:35 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x0, 0xd6, 0x8}]}) memfd_secret(0x0) 23:17:35 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x0, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:17:35 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='$'], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:17:45 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='$'], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:17:45 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x0, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:17:45 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x27, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:17:45 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:17:45 executing program 6: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, 0x0, 0x4) 23:17:45 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x0, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) 23:17:45 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x1ff}]}) 23:17:45 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x0, 0xd6, 0x8}]}) memfd_secret(0x0) 23:17:45 executing program 6: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, 0x0, 0x4) 23:17:45 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x0, 0x0, 0x8}]}) memfd_secret(0x0) 23:17:45 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x1ff}]}) 23:17:45 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) memfd_secret(0x0) 23:17:45 executing program 6: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:17:45 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x0, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:17:45 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="24ecd8aa91ed936dd1936b80ac0b1c"], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:17:45 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x0, 0x9, 0x6a, 0x4}]}) 23:17:54 executing program 6: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:17:54 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x27, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:17:54 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x1ff}]}) 23:17:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) memfd_secret(0x0) 23:17:54 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x0, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:17:54 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="24ec"], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:17:54 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x0, 0x9, 0x6a, 0x4}]}) 23:17:54 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:17:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) memfd_secret(0x0) 23:17:55 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='$'], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:17:55 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a}]}) memfd_secret(0x0) memfd_secret(0x0) 23:17:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x0, 0x9, 0x6a, 0x4}]}) 23:17:55 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x1ff}]}) 23:17:55 executing program 6: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:17:55 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x0, 0x0, 0x0, 0x8}]}) memfd_secret(0x0) 23:17:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x0, 0x9, 0x6a, 0x4}]}) 23:17:55 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x0, 0x0, 0x0, 0x8}]}) memfd_secret(0x0) 23:18:03 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a}]}) memfd_secret(0x0) memfd_secret(0x0) 23:18:03 executing program 6: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:18:03 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x1ff}]}) 23:18:03 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x27, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:18:03 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:18:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 23:18:03 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='$'], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:18:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {}]}) memfd_secret(0x0) 23:18:03 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='$'], 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:18:03 executing program 6: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:18:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 23:18:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {}]}) memfd_secret(0x0) 23:18:03 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x1ff}]}) 23:18:03 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a}]}) memfd_secret(0x0) memfd_secret(0x0) 23:18:03 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="24ec"], 0x24}}, 0x4) 23:18:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 23:18:03 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:18:03 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 23:18:12 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:18:12 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {}]}) memfd_secret(0x0) 23:18:12 executing program 6: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:18:12 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, 0x0, 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:18:12 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x0, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:18:12 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="24ec"], 0x24}}, 0x0) 23:18:12 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 23:18:12 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 23:18:12 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a}]}) memfd_secret(0x0) memfd_secret(0x0) 23:18:12 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a}]}) memfd_secret(0x0) memfd_secret(0x0) 23:18:12 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 23:18:12 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {}]}) memfd_secret(0x0) 23:18:12 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 23:18:12 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:18:12 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {}]}) memfd_secret(0x0) 23:18:12 executing program 6: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[], 0x24}}, 0x4) 23:18:22 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {}]}) memfd_secret(0x0) 23:18:22 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a}]}) memfd_secret(0x0) memfd_secret(0x0) 23:18:22 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x0, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:18:22 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, 0x0, 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:18:22 executing program 6: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[], 0x24}}, 0x0) 23:18:22 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 23:18:22 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x0, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:18:22 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 23:18:22 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) memfd_secret(0x0) 23:18:22 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) memfd_secret(0x0) 23:18:22 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a}]}) memfd_secret(0x0) 23:18:31 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) memfd_secret(0x0) 23:18:31 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, 0x0, 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:18:31 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x0, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:18:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}]}) 23:18:31 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a}]}) 23:18:31 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 23:18:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) memfd_secret(0x0) 23:18:31 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x0, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:18:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) memfd_secret(0x0) 23:18:31 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 23:18:31 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) memfd_secret(0x0) 23:18:31 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x0, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:18:31 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a}]}) 23:18:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}]}) 23:18:31 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)) 23:18:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}, {}]}) memfd_secret(0x0) 23:18:41 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)) 23:18:41 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x27, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:18:41 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:18:41 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x0, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:18:41 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}, {}]}) memfd_secret(0x0) 23:18:41 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}]}) 23:18:41 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:18:41 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a}]}) 23:18:41 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)) 23:18:41 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}]}) 23:18:41 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a}]}) 23:18:41 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) 23:18:41 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 23:18:41 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}, {}]}) memfd_secret(0x0) 23:18:41 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}, {}]}) memfd_secret(0x0) 23:18:41 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 23:18:41 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x0, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:18:51 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}, {}]}) memfd_secret(0x0) 23:18:51 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:18:51 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 23:18:51 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}]}) 23:18:51 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x0, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:18:51 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:18:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x1ff, 0x0, 0x1, 0x8}, {}]}) memfd_secret(0x0) 23:18:51 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x27, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:18:51 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 23:18:51 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}, {}]}) memfd_secret(0x0) 23:18:51 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0x0, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:18:51 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:18:51 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}]}) 23:18:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x1ff, 0x0, 0x1, 0x8}, {}]}) memfd_secret(0x0) 23:18:51 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 23:18:51 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}, {}]}) 23:18:51 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0x0, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:19:01 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 23:19:01 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x1ff, 0x0, 0x0, 0x8}, {}]}) memfd_secret(0x0) 23:19:01 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:19:01 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x27, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:19:01 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}, {}]}) 23:19:01 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)) 23:19:01 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0x0, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:19:01 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:19:01 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}, {}]}) 23:19:01 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:19:01 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}]}) 23:19:01 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x1ff, 0x0, 0x0, 0x8}, {}]}) memfd_secret(0x0) 23:19:01 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:19:01 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x1ff}, {}]}) memfd_secret(0x0) 23:19:10 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:19:10 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}, {}]}) 23:19:10 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(0x0, r2) 23:19:10 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x0, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:19:10 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:19:10 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}]}) 23:19:10 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0x0, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:19:10 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)) 23:19:10 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)) 23:19:10 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:19:10 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}]}) 23:19:10 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 23:19:10 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 23:19:10 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x1ff, 0x0, 0x1, 0x8}, {}]}) memfd_secret(0x0) 23:19:10 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}]}) 23:19:10 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 23:19:10 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}]}) 23:19:10 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:19:18 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 23:19:18 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1, 0x8}]}) 23:19:18 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 23:19:18 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}]}) 23:19:18 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x0, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:19:18 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(0x0, r2) 23:19:18 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x0, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:19:18 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:19:19 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8}]}) 23:19:19 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 23:19:19 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}]}) memfd_secret(0x0) 23:19:19 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 23:19:19 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) 23:19:19 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x0, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:19:19 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}]}) 23:19:19 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x0, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:19:19 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}]}) 23:19:19 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 23:19:19 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x0, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:19:19 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 23:19:28 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}]}) 23:19:28 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0x0, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:19:28 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 23:19:28 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}]}) 23:19:28 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 23:19:28 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x0, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:19:28 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) 23:19:28 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(0x0, r2) 23:19:28 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}]}) 23:19:28 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}]}) 23:19:36 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), 0xffffffffffffffff) 23:19:36 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x0, 0x6, 0x6, 0xbc}]}) 23:19:36 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x27, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:19:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) 23:19:36 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}]}) 23:19:36 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 23:19:36 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}]}) 23:19:36 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0x0, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:19:36 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}]}) 23:19:37 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x0, 0x6, 0x6, 0xbc}]}) 23:19:37 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x0, 0x6, 0x6, 0xbc}]}) 23:19:37 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x0, 0x6, 0xbc}]}) 23:19:37 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}]}) 23:19:37 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}]}) 23:19:37 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x0, 0x6, 0xbc}]}) 23:19:37 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}]}) 23:19:45 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), 0xffffffffffffffff) 23:19:45 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x27, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:19:45 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x0, 0x6, 0xbc}]}) 23:19:45 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0x0, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:19:45 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x0, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:19:45 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}]}) 23:19:45 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}]}) 23:19:45 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}]}) 23:19:45 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x0, 0xbc}]}) 23:19:45 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {}]}) 23:19:45 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:19:45 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x0, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:19:45 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) 23:19:45 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) 23:19:45 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 23:19:45 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) 23:19:54 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x27, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:19:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 23:19:54 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), 0xffffffffffffffff) 23:19:54 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x0, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:19:54 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x0, 0x1, 0x8}, {}]}) 23:19:54 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x0, 0xbc}]}) 23:19:54 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {}]}) 23:19:54 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:19:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 23:19:54 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {}]}) 23:19:54 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x0, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) 23:19:54 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x0, 0xbc}]}) 23:19:54 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:19:54 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x0, 0x4, 0x81, 0x45d}, {}]}) 23:19:54 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8}, {}]}) 23:19:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 23:20:05 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {}]}) 23:20:05 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x0, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:20:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x0, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) 23:20:05 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x0, 0x4, 0x81, 0x45d}, {}]}) 23:20:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 23:20:05 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:20:05 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6}]}) 23:20:05 executing program 2: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), 0xffffffffffffffff) 23:20:05 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6}]}) 23:20:05 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:20:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 23:20:05 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x0, 0x4, 0x81, 0x45d}, {}]}) 23:20:05 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}]}) memfd_secret(0x0) memfd_secret(0x0) 23:20:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x0, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) 23:20:05 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6}]}) 23:20:05 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:20:05 executing program 3: r0 = memfd_secret(0x0) io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, r0}) 23:20:15 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)) 23:20:15 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x5, 0x6, 0x6, 0xbc}]}) 23:20:15 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x0, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:20:15 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x0, 0x81, 0x45d}, {}]}) 23:20:15 executing program 3: r0 = memfd_secret(0x0) io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, r0}) 23:20:15 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}]}) 23:20:15 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x0, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) 23:20:15 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x0, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:20:15 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x0, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) 23:20:15 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:20:15 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x0, 0x81, 0x45d}, {}]}) 23:20:15 executing program 3: r0 = memfd_secret(0x0) io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, r0}) 23:20:15 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x0, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:20:15 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)) 23:20:15 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x5, 0x6, 0x6, 0xbc}]}) 23:20:15 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}]}) 23:20:15 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x0, 0x81, 0x45d}, {}]}) 23:20:15 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 23:20:15 executing program 3: io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0x0, 0x20}) 23:20:25 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x0, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:20:25 executing program 3: io_uring_setup(0x0, &(0x7f0000000080)={0x0, 0x0, 0x20}) 23:20:25 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)) 23:20:25 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 23:20:25 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x0, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:20:25 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x5, 0x6, 0x6, 0xbc}]}) 23:20:25 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x0, 0x45d}, {}]}) 23:20:25 executing program 2: r0 = memfd_secret(0x0) io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3a2, 0x0, r0}) 23:20:25 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x0, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}]}) 23:20:25 executing program 3: io_uring_setup(0x0, &(0x7f0000000080)={0x0, 0x0, 0x20}) 23:20:25 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x0, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:20:25 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x0, 0x45d}, {}]}) 23:20:25 executing program 2: r0 = memfd_secret(0x0) io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3a2, 0x0, r0}) 23:20:25 executing program 2: r0 = memfd_secret(0x0) io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3a2, 0x0, r0}) 23:20:34 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x0, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:20:34 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x29, {[@local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:20:34 executing program 3: io_uring_setup(0x0, &(0x7f0000000080)={0x0, 0x0, 0x20}) 23:20:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1, 0x8}]}) 23:20:34 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 23:20:34 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x0, 0x45d}, {}]}) 23:20:34 executing program 2: io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3a2}) 23:20:34 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x0, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}]}) 23:20:34 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x0, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}]}) 23:20:34 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x0, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:20:34 executing program 2: io_uring_setup(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3a2}) 23:20:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8}]}) 23:20:34 executing program 2: io_uring_setup(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3a2}) 23:20:34 executing program 3: io_uring_setup(0x1d3, 0x0) 23:20:34 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 23:20:34 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81}, {}]}) 23:20:43 executing program 2: io_uring_setup(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3a2}) 23:20:43 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81}, {}]}) 23:20:43 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) 23:20:43 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x29, {[@local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:20:43 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 23:20:43 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x0, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:20:43 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x0, 0x3f}, {0x5, 0x6, 0x6, 0xbc}]}) 23:20:43 executing program 3: io_uring_setup(0x1d3, 0x0) 23:20:43 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x0, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:20:43 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x0, 0x3f}, {0x5, 0x6, 0x6, 0xbc}]}) 23:20:43 executing program 3: io_uring_setup(0x1d3, 0x0) 23:20:43 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81}, {}]}) 23:20:43 executing program 1: io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3a2}) 23:20:43 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x0, 0x3f}, {0x5, 0x6, 0x6, 0xbc}]}) 23:20:43 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 23:20:43 executing program 2: io_uring_setup(0x1d3, 0x0) 23:20:43 executing program 3: io_uring_setup(0x1d3, &(0x7f0000000080)) 23:20:52 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x29, {[@local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:20:52 executing program 3: io_uring_setup(0x1d3, &(0x7f0000000080)) 23:20:52 executing program 1: io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3a2}) 23:20:52 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x0, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:20:52 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20}, {0x5, 0x6, 0x6, 0xbc}]}) 23:20:52 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:20:52 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x0, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}]}) 23:20:52 executing program 2: io_uring_setup(0x1d3, 0x0) 23:20:52 executing program 3: io_uring_setup(0x1d3, &(0x7f0000000080)) 23:20:53 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:20:53 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20}, {0x5, 0x6, 0x6, 0xbc}]}) 23:20:53 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x0, 0xd6, 0x8}]}) 23:20:53 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:20:53 executing program 1: io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3a2}) 23:20:53 executing program 2: io_uring_setup(0x1d3, 0x0) 23:20:53 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:21:02 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x0, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:21:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}]}) 23:21:02 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x0, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:21:02 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x0, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:21:02 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:21:02 executing program 2: io_uring_setup(0x1d3, &(0x7f0000000080)) 23:21:02 executing program 1: io_uring_setup(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3a2}) 23:21:02 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20}, {0x5, 0x6, 0x6, 0xbc}]}) 23:21:02 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:21:02 executing program 1: io_uring_setup(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3a2}) 23:21:02 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}]}) 23:21:02 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x0, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:21:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}]}) 23:21:02 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x0, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:21:02 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}]}) 23:21:02 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:21:12 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x0, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:21:12 executing program 1: io_uring_setup(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3a2}) 23:21:12 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x0, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:21:12 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x0, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:21:12 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}]}) 23:21:12 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:21:12 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}]}) 23:21:12 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}]}) 23:21:12 executing program 1: io_uring_setup(0x1d3, 0x0) 23:21:12 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x0, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:21:13 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}]}) 23:21:13 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x0, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) 23:21:13 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:21:13 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}]}) 23:21:13 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}]}) 23:21:13 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x0, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:21:13 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x0, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:21:22 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)) 23:21:22 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x0, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:21:22 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x0, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:21:22 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x0, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) 23:21:22 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}]}) 23:21:22 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x0, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:21:22 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}]}) 23:21:22 executing program 1: io_uring_setup(0x1d3, 0x0) 23:21:22 executing program 1: io_uring_setup(0x1d3, 0x0) 23:21:22 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}]}) 23:21:22 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}]}) 23:21:22 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x0, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:21:22 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x0, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:21:22 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x0, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) 23:21:22 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)) 23:21:22 executing program 1: io_uring_setup(0x1d3, &(0x7f0000000080)) 23:21:22 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x0, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:21:32 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x0, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) 23:21:32 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}]}) 23:21:32 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1ff, 0x0, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}]}) 23:21:32 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x0, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:21:32 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)) 23:21:32 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2a, {[@local=@item_012={0x0, 0x2, 0x5}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:21:32 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x0, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:21:32 executing program 1: io_uring_setup(0x1d3, &(0x7f0000000080)) 23:21:32 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}]}) 23:21:32 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:21:32 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 23:21:32 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x0, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) 23:21:32 executing program 1: io_uring_setup(0x1d3, &(0x7f0000000080)) 23:21:32 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1ff, 0x0, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}]}) 23:21:32 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x0, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:21:32 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}]}) 23:21:40 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 23:21:40 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:21:40 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 23:21:40 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1, 0x8}]}) 23:21:40 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x0, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:21:40 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}]}) 23:21:40 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1ff, 0x0, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}]}) 23:21:40 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2a, {[@local=@item_012={0x0, 0x2, 0x5}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:21:40 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 23:21:40 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 23:21:40 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x0, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:21:40 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}]}) 23:21:40 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1ff, 0x9, 0x0, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}]}) 23:21:40 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8}]}) 23:21:40 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:21:49 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x0, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:21:49 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2a, {[@local=@item_012={0x0, 0x2, 0x5}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:21:49 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:21:49 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) 23:21:49 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 23:21:49 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}]}) 23:21:49 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1ff, 0x9, 0x0, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}]}) 23:21:49 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 23:21:49 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1ff, 0x9, 0x0, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}]}) 23:21:49 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}]}) 23:21:49 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:21:49 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x0, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:21:49 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}]}) 23:21:49 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}]}) 23:21:49 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 23:21:49 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 23:21:57 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 23:21:57 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:21:57 executing program 0: io_uring_setup(0x1d3, &(0x7f0000000080)) 23:21:57 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}]}) 23:21:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}]}) 23:21:57 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:21:57 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2b, {[@local=@item_012={0x1, 0x2, 0x5, "cb"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:21:57 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 23:21:57 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x81, 0x20, 0x3f}]}) 23:21:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 23:21:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) 23:21:57 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x81, 0x20, 0x3f}]}) 23:21:57 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 23:21:57 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x0, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:21:57 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}]}) 23:21:57 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:21:57 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x81, 0x20, 0x3f}]}) 23:22:06 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) 23:22:06 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x0, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}]}) 23:22:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 23:22:06 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2b, {[@local=@item_012={0x1, 0x2, 0x5, "cb"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:22:06 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x0, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:22:06 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:22:06 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}]}) 23:22:06 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x81, 0x20, 0x3f}, {0x0, 0x6, 0x6, 0xbc}]}) 23:22:06 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x0, 0x45d}, {0x0, 0x1, 0xd6, 0x8}]}) 23:22:06 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:22:06 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 23:22:06 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) 23:22:06 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x81, 0x20, 0x3f}, {0x0, 0x6, 0x6, 0xbc}]}) 23:22:06 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x0, 0x45d}]}) 23:22:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 23:22:15 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x81, 0x20, 0x3f}, {0x0, 0x6, 0x6, 0xbc}]}) 23:22:15 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:22:15 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x0, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:22:15 executing program 7: r0 = memfd_secret(0x0) io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0x0, 0x20, 0x0, 0x3a2, 0x0, r0}) 23:22:15 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) 23:22:15 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}]}) 23:22:15 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2b, {[@local=@item_012={0x1, 0x2, 0x5, "cb"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:22:15 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 23:22:16 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:22:16 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) 23:22:16 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x81, 0x20, 0x3f}, {0x5, 0x0, 0x6, 0xbc}]}) 23:22:16 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x0, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:22:16 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) 23:22:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 23:22:16 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}]}) 23:22:16 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x0, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:22:16 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x0, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:22:16 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 23:22:25 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x81, 0x20, 0x3f}, {0x5, 0x0, 0x0, 0xbc}]}) 23:22:25 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 23:22:25 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, 0x0}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:22:25 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 23:22:25 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}]}) 23:22:25 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x0, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:22:25 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x0, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:22:25 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) 23:22:26 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x81, 0x20, 0x3f}, {0x5}]}) 23:22:26 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:22:26 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x0, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:22:26 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)) 23:22:26 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}]}) 23:22:26 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 23:22:26 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) 23:22:26 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)) 23:22:26 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:22:36 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}]}) 23:22:36 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, 0x0}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:22:36 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x5}]}) 23:22:36 executing program 0: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(r0, 0xc0603d06, 0x0) 23:22:36 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x0, 0x0}) 23:22:36 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:22:36 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)) 23:22:36 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x0, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:22:36 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:22:47 executing program 0: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(r0, 0xc0603d06, 0x0) 23:22:47 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x0, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:22:47 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, 0x0}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:22:47 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) 23:22:47 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x0, 0x0}) 23:22:47 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}]}) 23:22:47 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:22:47 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}]}) 23:22:47 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1, 0x8}]}) 23:22:47 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) 23:22:47 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x0, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:22:47 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:22:47 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x0, 0x6, 0x6, 0xbc}]}) 23:22:47 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x0, 0x0}) 23:22:47 executing program 0: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(r0, 0xc0603d06, 0x0) 23:22:47 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8}]}) 23:22:47 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) 23:22:47 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:22:57 executing program 0: ioctl$PTP_PIN_GETFUNC(0xffffffffffffffff, 0xc0603d06, 0x0) 23:22:57 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x0, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:22:57 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:22:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x0, 0x6, 0x6, 0xbc}]}) 23:22:57 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 23:22:57 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) 23:22:57 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:22:57 executing program 2: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(0xffffffffffffffff, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x80, 0x3, 0xffff8001}) 23:22:57 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:22:57 executing program 2: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(0xffffffffffffffff, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x80, 0x3, 0xffff8001}) 23:22:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x0, 0x6, 0x6, 0xbc}]}) 23:22:57 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:22:57 executing program 2: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(0xffffffffffffffff, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x80, 0x3, 0xffff8001}) 23:22:57 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 23:22:57 executing program 0: ioctl$PTP_PIN_GETFUNC(0xffffffffffffffff, 0xc0603d06, 0x0) 23:22:57 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:22:57 executing program 3: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0xfffffffc}}, './file0\x00'}) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0x1}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000440)) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000480)={'\x00', 0x9, 0x2, 0x6}) socket(0x11, 0x80000, 0xfffffff9) restart_syscall() ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000880)={'\x00', 0x100, 0x1, 0x1d}) getsockname(r0, &(0x7f0000000900)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000980)=0x80) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4d, {0x4d, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78974e"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0x7, "e65f5967fe6d91"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000cc0), r2) 23:22:57 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:23:07 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 23:23:07 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:23:07 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x0, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:23:07 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 23:23:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x0, 0x6, 0xbc}]}) 23:23:07 executing program 0: ioctl$PTP_PIN_GETFUNC(0xffffffffffffffff, 0xc0603d06, 0x0) 23:23:07 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x0, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:23:07 executing program 2: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 23:23:07 executing program 2: openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:23:07 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 23:23:07 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x0, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:23:07 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 23:23:07 executing program 0: r0 = openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(r0, 0xc0603d06, 0x0) 23:23:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x0, 0x0, 0xbc}]}) 23:23:07 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:23:15 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x0, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:23:15 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x0, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:23:15 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:23:15 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) 23:23:15 executing program 7: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(0xffffffffffffffff, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x80, 0x3, 0xffff8001}) 23:23:15 executing program 2: openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:23:15 executing program 0: r0 = openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(r0, 0xc0603d06, 0x0) 23:23:15 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5}]}) 23:23:15 executing program 2: openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:23:15 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x0, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:23:15 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) 23:23:15 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:23:16 executing program 0: r0 = openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(r0, 0xc0603d06, 0x0) 23:23:16 executing program 7: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(0xffffffffffffffff, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x80, 0x3, 0xffff8001}) 23:23:16 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) 23:23:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}, {0x5}]}) 23:23:25 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x0, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:23:25 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x0, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:23:25 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:23:25 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x0, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:23:25 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}, {}]}) 23:23:25 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) 23:23:25 executing program 7: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(0xffffffffffffffff, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x80, 0x3, 0xffff8001}) 23:23:25 executing program 0: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(0xffffffffffffffff, 0xc0603d06, 0x0) 23:23:25 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) 23:23:25 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x0, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:23:26 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}, {}]}) 23:23:26 executing program 3: mmap$usbmon(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) r0 = memfd_secret(0x0) io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0xad13, 0x20, 0x0, 0x3a2, 0x0, r0}) 23:23:26 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x0, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:23:26 executing program 7: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 23:23:26 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) 23:23:26 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:23:26 executing program 0: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(0xffffffffffffffff, 0xc0603d06, 0x0) 23:23:26 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x9, 0x1, 0x8}, {}]}) 23:23:34 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:23:34 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x0, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:23:34 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x0, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:23:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x5}]}) 23:23:34 executing program 3: memfd_secret(0x0) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) ioctl$PTP_PIN_GETFUNC(r0, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x80, 0x3, 0xffff8001}) 23:23:34 executing program 0: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(0xffffffffffffffff, 0xc0603d06, 0x0) 23:23:34 executing program 7: openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:23:34 executing program 2: mmap$usbmon(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) ioctl$MON_IOCQ_RING_SIZE(0xffffffffffffffff, 0x9205) io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0xad13, 0x20, 0x0, 0x3a2}) 23:23:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) 23:23:35 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) 23:23:42 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x0, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:23:42 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) 23:23:42 executing program 7: openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:23:42 executing program 6: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {}]}) 23:23:42 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) 23:23:42 executing program 2: mmap$usbmon(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) ioctl$MON_IOCQ_RING_SIZE(0xffffffffffffffff, 0x9205) io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0xad13, 0x20, 0x0, 0x3a2}) 23:23:42 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x0, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:23:42 executing program 0: mmap$usbmon(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) ioctl$MON_IOCQ_RING_SIZE(0xffffffffffffffff, 0x9205) io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0xad13, 0x20, 0x0, 0x3a2}) 23:23:43 executing program 7: openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:23:43 executing program 0: mmap$usbmon(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) ioctl$MON_IOCQ_RING_SIZE(0xffffffffffffffff, 0x9205) io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0xad13, 0x20, 0x0, 0x3a2}) 23:23:43 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) 23:23:43 executing program 1: r0 = memfd_secret(0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x80, 0x3, 0xffff8001}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) ioctl$CDROMVOLCTRL(r0, 0x530a, &(0x7f0000000000)={0x3, 0x3, 0x4, 0x3}) 23:23:43 executing program 0: mmap$usbmon(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) ioctl$MON_IOCQ_RING_SIZE(0xffffffffffffffff, 0x9205) io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0xad13, 0x20, 0x0, 0x3a2}) 23:23:43 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x0, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:23:43 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) r0 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) 23:23:43 executing program 2: mmap$usbmon(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) ioctl$MON_IOCQ_RING_SIZE(0xffffffffffffffff, 0x9205) io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0xad13, 0x20, 0x0, 0x3a2}) 23:23:52 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) r0 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000001180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001140)={&(0x7f00000010c0)={0x68, 0x0, 0x20, 0x70bd2b, 0x25dfdbfe, {{}, {}, {0x4c, 0x18, {0x4, @link='syz1\x00'}}}, ["", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20000040}, 0x40000) 23:23:52 executing program 0: mmap$usbmon(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0xad13, 0x20, 0x0, 0x3a2}) 23:23:52 executing program 6: r0 = memfd_secret(0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x80, 0x3, 0xffff8001}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) ioctl$CDROMVOLCTRL(r0, 0x530a, &(0x7f0000000000)={0x3, 0x3, 0x4, 0x3}) 23:23:52 executing program 2: mmap$usbmon(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0xad13, 0x20, 0x0, 0x3a2}) 23:23:52 executing program 3: r0 = memfd_secret(0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x80, 0x3, 0xffff8001}) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) ioctl$CDROMVOLCTRL(r0, 0x530a, &(0x7f0000000000)={0x3, 0x3, 0x4, 0x3}) 23:23:52 executing program 7: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) r0 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000001180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001140)={&(0x7f00000010c0)={0x68, 0x0, 0x20, 0x70bd2b, 0x25dfdbfe, {{}, {}, {0x4c, 0x18, {0x4, @link='syz1\x00'}}}, ["", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20000040}, 0x40000) 23:23:52 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x0, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:23:52 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:23:52 executing program 2: io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0xad13, 0x20, 0x0, 0x3a2}) 23:23:52 executing program 6: mmap$usbmon(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x1) ioctl$MON_IOCQ_RING_SIZE(0xffffffffffffffff, 0x9205) r0 = memfd_secret(0x0) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0xad13, 0x20, 0x0, 0x3a2, 0x0, r0}) 23:23:52 executing program 0: io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0xad13, 0x20, 0x0, 0x3a2}) 23:23:52 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) r0 = memfd_secret(0x0) r1 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r1) sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000001180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001140)={&(0x7f00000010c0)={0x68, 0x0, 0x20, 0x70bd2b, 0x25dfdbfe, {{}, {}, {0x4c, 0x18, {0x4, @link='syz1\x00'}}}, ["", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20000040}, 0x40000) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) read$ptp(r0, &(0x7f00000000c0)=""/4096, 0x1000) 23:23:52 executing program 7: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) 23:23:52 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x0, 0x8}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:23:52 executing program 1: clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000080)={r0, r1+10000000}, 0x8) 23:23:53 executing program 2: io_uring_setup(0x0, &(0x7f0000000080)={0x0, 0xad13, 0x20, 0x0, 0x3a2}) 23:23:53 executing program 6: clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) rt_sigtimedwait(0x0, 0x0, &(0x7f0000000080)={r0, r1+10000000}, 0x0) 23:23:53 executing program 7: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) 23:23:53 executing program 0: io_uring_setup(0x0, &(0x7f0000000080)={0x0, 0xad13, 0x20, 0x0, 0x3a2}) 23:24:03 executing program 1: clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000080)={r0, r1+10000000}, 0x8) 23:24:03 executing program 2: io_uring_setup(0x0, &(0x7f0000000080)={0x0, 0xad13, 0x20, 0x0, 0x3a2}) 23:24:03 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:24:03 executing program 6: clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) rt_sigtimedwait(0x0, 0x0, &(0x7f0000000080)={r0, r1+10000000}, 0x0) 23:24:03 executing program 7: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) 23:24:03 executing program 0: io_uring_setup(0x0, &(0x7f0000000080)={0x0, 0xad13, 0x20, 0x0, 0x3a2}) 23:24:03 executing program 3: clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) rt_sigtimedwait(0x0, 0x0, &(0x7f0000000080)={r0, r1+10000000}, 0x0) 23:24:03 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:24:03 executing program 2: io_uring_setup(0x0, &(0x7f0000000080)={0x0, 0xad13, 0x20, 0x0, 0x3a2}) 23:24:03 executing program 6: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000816bd7051dbe9cad969cf12961dcd91589c792536e0ffff0b009900ff07000002000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x60}, 0x1, 0x0, 0x0, 0x81}, 0x40001) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="00000000ef9b6a2bb56403445b7289824586f4ad3f9a93c9607322b1f5c76e4c0e8d90030f5c65f4d414bc424726c2b037d27250d613b59f722935d13fe8511bd20d9274f1f5db6c", @ANYRES16=r2, @ANYBLOB="080029bd7000fcdbdf252c0000000c0099000000000006000000"], 0x20}, 0x1, 0x0, 0x0, 0x8040}, 0x4004084) mmap$usbmon(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_INTERFACE(r4, &(0x7f00000006c0)={&(0x7f0000000300), 0xc, &(0x7f0000000540)={&(0x7f0000000380)={0x20, r2, 0x600, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x0, 0x31}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x24000800}, 0x10) 23:24:03 executing program 0: io_uring_setup(0x0, &(0x7f0000000080)={0x0, 0xad13, 0x20, 0x0, 0x3a2}) 23:24:03 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:24:03 executing program 7: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000816bd7051dbe9cad969cf12961dcd91589c792536e0ffff0b009900ff07000002000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x60}, 0x1, 0x0, 0x0, 0x81}, 0x40001) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="00000000ef9b6a2bb56403445b7289824586f4ad3f9a93c9607322b1f5c76e4c0e8d90030f5c65f4d414bc424726c2b037d27250d613b59f722935d13fe8511bd20d9274f1f5db6c", @ANYRES16=r2, @ANYBLOB="080029bd7000fcdbdf252c0000000c0099000000000006000000"], 0x20}, 0x1, 0x0, 0x0, 0x8040}, 0x4004084) mmap$usbmon(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_INTERFACE(r4, &(0x7f00000006c0)={&(0x7f0000000300), 0xc, &(0x7f0000000540)={&(0x7f0000000380)={0x20, r2, 0x600, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x0, 0x31}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x24000800}, 0x10) 23:24:03 executing program 3: clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) rt_sigtimedwait(0x0, 0x0, &(0x7f0000000080)={r0, r1+10000000}, 0x0) 23:24:04 executing program 2: io_uring_setup(0x1d3, 0x0) 23:24:04 executing program 0: io_uring_setup(0x1d3, 0x0) 23:24:12 executing program 7: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000816bd7051dbe9cad969cf12961dcd91589c792536e0ffff0b009900ff07000002000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x60}, 0x1, 0x0, 0x0, 0x81}, 0x40001) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="00000000ef9b6a2bb56403445b7289824586f4ad3f9a93c9607322b1f5c76e4c0e8d90030f5c65f4d414bc424726c2b037d27250d613b59f722935d13fe8511bd20d9274f1f5db6c", @ANYRES16=r2, @ANYBLOB="080029bd7000fcdbdf252c0000000c0099000000000006000000"], 0x20}, 0x1, 0x0, 0x0, 0x8040}, 0x4004084) mmap$usbmon(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_INTERFACE(r4, &(0x7f00000006c0)={&(0x7f0000000300), 0xc, &(0x7f0000000540)={&(0x7f0000000380)={0x20, r2, 0x600, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x0, 0x31}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x24000800}, 0x10) 23:24:12 executing program 1: clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000080)={r0, r1+10000000}, 0x8) 23:24:12 executing program 3: clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) rt_sigtimedwait(0x0, 0x0, &(0x7f0000000080)={r0, r1+10000000}, 0x0) 23:24:12 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1}}}, &(0x7f0000000c80)={0x2c, &(0x7f0000000b40)={0x0, 0x17, 0x27, "46540781a1d8e0e1c2b439b3ddca7dc3e511b685125c4b810c9300e41b6c29ea2210ac11d2285b"}, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:24:12 executing program 6: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000816bd7051dbe9cad969cf12961dcd91589c792536e0ffff0b009900ff07000002000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x60}, 0x1, 0x0, 0x0, 0x81}, 0x40001) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="00000000ef9b6a2bb56403445b7289824586f4ad3f9a93c9607322b1f5c76e4c0e8d90030f5c65f4d414bc424726c2b037d27250d613b59f722935d13fe8511bd20d9274f1f5db6c", @ANYRES16=r2, @ANYBLOB="080029bd7000fcdbdf252c0000000c0099000000000006000000"], 0x20}, 0x1, 0x0, 0x0, 0x8040}, 0x4004084) mmap$usbmon(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_INTERFACE(r4, &(0x7f00000006c0)={&(0x7f0000000300), 0xc, &(0x7f0000000540)={&(0x7f0000000380)={0x20, r2, 0x600, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x0, 0x31}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x24000800}, 0x10) 23:24:12 executing program 0: io_uring_setup(0x1d3, 0x0) 23:24:12 executing program 2: io_uring_setup(0x1d3, 0x0) 23:24:12 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1ff, 0x9, 0x1}, {0x0, 0x81, 0x20, 0x3f}, {0x5, 0x6, 0x6, 0xbc}, {0x6, 0x4, 0x81, 0x45d}, {0x0, 0x1, 0xd6, 0x8}, {0x7, 0x81, 0xff, 0x5}, {0x7fff, 0x9, 0x6a, 0x4}]}) memfd_secret(0x0) memfd_secret(0x0) 23:24:12 executing program 0: io_uring_setup(0x1d3, 0x0) 23:24:12 executing program 3: rt_sigtimedwait(0x0, 0x0, &(0x7f0000000080), 0x0) 23:24:12 executing program 0: io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0x0, 0x20, 0x0, 0x3a2}) 23:24:12 executing program 3: rt_sigtimedwait(0x0, 0x0, 0x0, 0x0) [ 3035.177395] kmemleak: Found object by alias at 0x607f1a6391ec [ 3035.177427] CPU: 0 UID: 0 PID: 19747 Comm: syz-executor.2 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 3035.177461] Tainted: [W]=WARN [ 3035.177468] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3035.177481] Call Trace: [ 3035.177488] [ 3035.177497] dump_stack_lvl+0xca/0x120 [ 3035.177539] __lookup_object+0x94/0xb0 [ 3035.177570] delete_object_full+0x27/0x70 [ 3035.177601] free_percpu+0x30/0x1160 [ 3035.177631] ? arch_uprobe_clear_state+0x16/0x140 [ 3035.177669] futex_hash_free+0x38/0xc0 [ 3035.177694] mmput+0x2d3/0x390 [ 3035.177729] do_exit+0x79d/0x2970 [ 3035.177755] ? signal_wake_up_state+0x85/0x120 [ 3035.177784] ? zap_other_threads+0x2b9/0x3a0 [ 3035.177815] ? __pfx_do_exit+0x10/0x10 [ 3035.177839] ? do_group_exit+0x1c3/0x2a0 [ 3035.177865] ? lock_release+0xc8/0x290 [ 3035.177898] do_group_exit+0xd3/0x2a0 [ 3035.177926] __x64_sys_exit_group+0x3e/0x50 [ 3035.177953] x64_sys_call+0x18c5/0x18d0 [ 3035.177990] do_syscall_64+0xbf/0x360 [ 3035.178012] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3035.178034] RIP: 0033:0x7f9749a76b19 [ 3035.178050] Code: Unable to access opcode bytes at 0x7f9749a76aef. [ 3035.178060] RSP: 002b:00007ffd72262128 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 3035.178082] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f9749a76b19 [ 3035.178097] RDX: 00007f9749a2972b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 3035.178111] RBP: 0000000000000000 R08: 0000001b2d22001c R09: 0000000000000000 [ 3035.178124] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3035.178137] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffd72262210 [ 3035.178167] [ 3035.178174] kmemleak: Object (percpu) 0x607f1a6391e8 (size 8): [ 3035.178187] kmemleak: comm "syz-executor.0", pid 19759, jiffies 4297702043 [ 3035.178201] kmemleak: min_count = 1 [ 3035.178208] kmemleak: count = 0 [ 3035.178216] kmemleak: flags = 0x21 [ 3035.178223] kmemleak: checksum = 0 [ 3035.178230] kmemleak: backtrace: [ 3035.178236] pcpu_alloc_noprof+0x87a/0x1170 [ 3035.178265] percpu_ref_init+0x37/0x400 [ 3035.178298] io_uring_setup+0x44c/0x2000 [ 3035.178334] __x64_sys_io_uring_setup+0xc8/0x170 [ 3035.178356] do_syscall_64+0xbf/0x360 [ 3035.178372] entry_SYSCALL_64_after_hwframe+0x77/0x7f 23:24:12 executing program 0: io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3a2}) 23:24:12 executing program 7: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000816bd7051dbe9cad969cf12961dcd91589c792536e0ffff0b009900ff07000002000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x60}, 0x1, 0x0, 0x0, 0x81}, 0x40001) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="00000000ef9b6a2bb56403445b7289824586f4ad3f9a93c9607322b1f5c76e4c0e8d90030f5c65f4d414bc424726c2b037d27250d613b59f722935d13fe8511bd20d9274f1f5db6c", @ANYRES16=r2, @ANYBLOB="080029bd7000fcdbdf252c0000000c0099000000000006000000"], 0x20}, 0x1, 0x0, 0x0, 0x8040}, 0x4004084) mmap$usbmon(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_INTERFACE(r4, &(0x7f00000006c0)={&(0x7f0000000300), 0xc, &(0x7f0000000540)={&(0x7f0000000380)={0x20, r2, 0x600, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x0, 0x31}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x24000800}, 0x10) 23:24:12 executing program 3: io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0x0, 0x20, 0x0, 0x3a2}) 23:24:12 executing program 5: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000816bd7051dbe9cad969cf12961dcd91589c792536e0ffff0b009900ff07000002000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="200028a6bba3bd7000fcdbdf080034000600000005002e000100000005003500740600000a000900aaaaaaaaaabb0000080032000000000008003400000124728697db0a15fc13c10870f1b1000005003500b300000008003b00feffffff6633f2c59b8d7be91170d367ea4458972c5817eacf0a1a97f6a5c2c9acfd4243d3329b9c011bf3d9877f82400c99918cc45ebf8d46c7fc8640f1ba0a755897073b0993e5e1f3cb63da4a5416f6a7cadc40ef0741268090a3cb2f236d2e89d6653e40cc551d7161efc90c8699e09c40a67bdcdd1e6e497fe3a678b4227b68103978edf8764b8500fc4af6deb56b4d5700451e561f6d665fc25e179e934ea30abe446b3c1e09ae4240271b50763dae3a8f3e"], 0x60}, 0x1, 0x0, 0x0, 0x81}, 0x40001) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="00000000ef9b6a2bb56403445b7289824586f4ad3f9a93c9607322b1f5c76e4c0e8d90030f5c65f4d414bc424726c2b037d27250d613b59f722935d13fe8511bd20d9274f1f5db6c", @ANYRES16=r2, @ANYBLOB="080029bd7000fcdbdf252c0000000c0099000000000006000000"], 0x20}, 0x1, 0x0, 0x0, 0x8040}, 0x4004084) mmap$usbmon(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_INTERFACE(r4, &(0x7f00000006c0)={&(0x7f0000000300), 0xc, &(0x7f0000000540)={&(0x7f0000000380)={0x20, r2, 0x600, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x0, 0x31}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x24000800}, 0x10) 23:24:21 executing program 1: clock_gettime(0x0, &(0x7f0000000040)) 23:24:21 executing program 0: io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3a2}) 23:24:21 executing program 6: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000816bd7051dbe9cad969cf12961dcd91589c792536e0ffff0b009900ff07000002000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x60}, 0x1, 0x0, 0x0, 0x81}, 0x40001) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="00000000ef9b6a2bb56403445b7289824586f4ad3f9a93c9607322b1f5c76e4c0e8d90030f5c65f4d414bc424726c2b037d27250d613b59f722935d13fe8511bd20d9274f1f5db6c", @ANYRES16=r2, @ANYBLOB="080029bd7000fcdbdf252c0000000c0099000000000006000000"], 0x20}, 0x1, 0x0, 0x0, 0x8040}, 0x4004084) mmap$usbmon(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_INTERFACE(r4, &(0x7f00000006c0)={&(0x7f0000000300), 0xc, &(0x7f0000000540)={&(0x7f0000000380)={0x20, r2, 0x600, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x0, 0x31}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x24000800}, 0x10) 23:24:21 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:24:21 executing program 2: io_uring_setup(0x1d3, 0x0) 23:24:21 executing program 7: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000816bd7051dbe9cad969cf12961dcd91589c792536e0ffff0b009900ff07000002000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x60}, 0x1, 0x0, 0x0, 0x81}, 0x40001) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="00000000ef9b6a2bb56403445b7289824586f4ad3f9a93c9607322b1f5c76e4c0e8d90030f5c65f4d414bc424726c2b037d27250d613b59f722935d13fe8511bd20d9274f1f5db6c", @ANYRES16=r2, @ANYBLOB="080029bd7000fcdbdf252c0000000c0099000000000006000000"], 0x20}, 0x1, 0x0, 0x0, 0x8040}, 0x4004084) mmap$usbmon(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:24:21 executing program 5: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000816bd7051dbe9cad969cf12961dcd91589c792536e0ffff0b009900ff07000002000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x60}, 0x1, 0x0, 0x0, 0x81}, 0x40001) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="00000000ef9b6a2bb56403445b7289824586f4ad3f9a93c9607322b1f5c76e4c0e8d90030f5c65f4d414bc424726c2b037d27250d613b59f722935d13fe8511bd20d9274f1f5db6c", @ANYRES16=r2, @ANYBLOB="080029bd7000fcdbdf252c0000000c0099000000000006000000"], 0x20}, 0x1, 0x0, 0x0, 0x8040}, 0x4004084) mmap$usbmon(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_INTERFACE(r4, &(0x7f00000006c0)={&(0x7f0000000300), 0xc, &(0x7f0000000540)={&(0x7f0000000380)={0x20, r2, 0x600, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x0, 0x31}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x24000800}, 0x10) 23:24:21 executing program 3: io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0x0, 0x20, 0x0, 0x3a2}) 23:24:21 executing program 0: io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3a2}) 23:24:21 executing program 3: io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0x0, 0x20, 0x0, 0x3a2}) 23:24:21 executing program 5: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000816bd7051dbe9cad969cf12961dcd91589c792536e0ffff0b009900ff07000002000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="200028a6bba3bd7000fcdbdf080034000600000005002e000100000005003500740600000a000900aaaaaaaaaabb0000080032000000000008003400000124728697db0a15fc13c10870f1b1000005003500b300000008003b00feffffff6633f2c59b8d7be91170d367ea4458972c5817eacf0a1a97f6a5c2c9acfd4243d3329b9c011bf3d9877f82400c99918cc45ebf8d46c7fc8640f1ba0a755897073b0993e5e1f3cb63da4a5416f6a7cadc40ef0741268090a3cb2f236d2e89d6653e40cc551d7161efc90c8699e09c40a67bdcdd1e6e497fe3a678b4227b68103978edf8764b8500fc4af6deb56b4d5700451e561f6d665fc25e179e934ea30abe446b3c1e09ae4240271b50763dae3a8f3e"], 0x60}, 0x1, 0x0, 0x0, 0x81}, 0x40001) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="00000000ef9b6a2bb56403445b7289824586f4ad3f9a93c9607322b1f5c76e4c0e8d90030f5c65f4d414bc424726c2b037d27250d613b59f722935d13fe8511bd20d9274f1f5db6c", @ANYRES16=r2, @ANYBLOB="080029bd7000fcdbdf252c0000000c0099000000000006000000"], 0x20}, 0x1, 0x0, 0x0, 0x8040}, 0x4004084) mmap$usbmon(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_INTERFACE(r4, &(0x7f00000006c0)={&(0x7f0000000300), 0xc, &(0x7f0000000540)={&(0x7f0000000380)={0x20, r2, 0x600, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x0, 0x31}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x24000800}, 0x10) 23:24:21 executing program 1: clock_gettime(0x0, 0x0) 23:24:21 executing program 7: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000816bd7051dbe9cad969cf12961dcd91589c792536e0ffff0b009900ff07000002000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="200028a6bba3bd7000fcdbdf080034000600000005002e000100000005003500740600000a000900aaaaaaaaaabb0000080032000000000008003400000124728697db0a15fc13c10870f1b1000005003500b300000008003b00feffffff6633f2c59b8d7be91170d367ea4458972c5817eacf0a1a97f6a5c2c9acfd4243d3329b9c011bf3d9877f82400c99918cc45ebf8d46c7fc8640f1ba0a755897073b0993e5e1f3cb63da4a5416f6a7cadc40ef0741268090a3cb2f236d2e89d6653e40cc551d7161efc90c8699e09c40a67bdcdd1e6e497fe3a678b4227b68103978edf8764b8500fc4af6deb56b4d5700451e561f6d665fc25e179e934ea30abe446b3c1e09ae4240271b50763dae3a8f3e"], 0x60}, 0x1, 0x0, 0x0, 0x81}, 0x40001) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="00000000ef9b6a2bb56403445b7289824586f4ad3f9a93c9607322b1f5c76e4c0e8d90030f5c65f4d414bc424726c2b037d27250d613b59f722935d13fe8511bd20d9274f1f5db6c", @ANYRES16=r2, @ANYBLOB="080029bd7000fcdbdf252c0000000c0099000000000006000000"], 0x20}, 0x1, 0x0, 0x0, 0x8040}, 0x4004084) 23:24:21 executing program 3: io_uring_setup(0x0, &(0x7f0000000080)={0x0, 0x0, 0x20, 0x0, 0x3a2}) 23:24:21 executing program 2: io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0x0, 0x20, 0x0, 0x3a2}) 23:24:21 executing program 6: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000816bd7051dbe9cad969cf12961dcd91589c792536e0ffff0b009900ff07000002000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x60}, 0x1, 0x0, 0x0, 0x81}, 0x40001) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="00000000ef9b6a2bb56403445b7289824586f4ad3f9a93c9607322b1f5c76e4c0e8d90030f5c65f4d414bc424726c2b037d27250d613b59f722935d13fe8511bd20d9274f1f5db6c", @ANYRES16=r2, @ANYBLOB="080029bd7000fcdbdf252c0000000c0099000000000006000000"], 0x20}, 0x1, 0x0, 0x0, 0x8040}, 0x4004084) mmap$usbmon(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:24:21 executing program 5: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000816bd7051dbe9cad969cf12961dcd91589c792536e0ffff0b009900ff07000002000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x60}, 0x1, 0x0, 0x0, 0x81}, 0x40001) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="00000000ef9b6a2bb56403445b7289824586f4ad3f9a93c9607322b1f5c76e4c0e8d90030f5c65f4d414bc424726c2b037d27250d613b59f722935d13fe8511bd20d9274f1f5db6c", @ANYRES16=r2, @ANYBLOB="080029bd7000fcdbdf252c0000000c0099000000000006000000"], 0x20}, 0x1, 0x0, 0x0, 0x8040}, 0x4004084) mmap$usbmon(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_INTERFACE(r4, &(0x7f00000006c0)={&(0x7f0000000300), 0xc, &(0x7f0000000540)={&(0x7f0000000380)={0x20, r2, 0x600, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x0, 0x31}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x24000800}, 0x10) 23:24:30 executing program 0: io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0x0, 0x20}) 23:24:30 executing program 3: io_uring_setup(0x0, &(0x7f0000000080)={0x0, 0x0, 0x20, 0x0, 0x3a2}) 23:24:30 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:24:30 executing program 6: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000816bd7051dbe9cad969cf12961dcd91589c792536e0ffff0b009900ff07000002000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x60}, 0x1, 0x0, 0x0, 0x81}, 0x40001) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="00000000ef9b6a2bb56403445b7289824586f4ad3f9a93c9607322b1f5c76e4c0e8d90030f5c65f4d414bc424726c2b037d27250d613b59f722935d13fe8511bd20d9274f1f5db6c", @ANYRES16=r2, @ANYBLOB="080029bd7000fcdbdf252c0000000c0099000000000006000000"], 0x20}, 0x1, 0x0, 0x0, 0x8040}, 0x4004084) 23:24:30 executing program 5: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000816bd7051dbe9cad969cf12961dcd91589c792536e0ffff0b009900ff07000002000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x60}, 0x1, 0x0, 0x0, 0x81}, 0x40001) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="00000000ef9b6a2bb56403445b7289824586f4ad3f9a93c9607322b1f5c76e4c0e8d90030f5c65f4d414bc424726c2b037d27250d613b59f722935d13fe8511bd20d9274f1f5db6c", @ANYRES16=r2, @ANYBLOB="080029bd7000fcdbdf252c0000000c0099000000000006000000"], 0x20}, 0x1, 0x0, 0x0, 0x8040}, 0x4004084) mmap$usbmon(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:24:30 executing program 1: clock_gettime(0x0, 0x0) 23:24:30 executing program 2: io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3a2}) 23:24:30 executing program 7: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000816bd7051dbe9cad969cf12961dcd91589c792536e0ffff0b009900ff07000002000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x60}, 0x1, 0x0, 0x0, 0x81}, 0x40001) 23:24:30 executing program 7: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000816bd7051dbe9cad969cf12961dcd91589c792536e0ffff0b009900ff07000002000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x60}, 0x1, 0x0, 0x0, 0x81}, 0x40001) 23:24:30 executing program 5: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000816bd7051dbe9cad969cf12961dcd91589c792536e0ffff0b009900ff07000002000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x60}, 0x1, 0x0, 0x0, 0x81}, 0x40001) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="00000000ef9b6a2bb56403445b7289824586f4ad3f9a93c9607322b1f5c76e4c0e8d90030f5c65f4d414bc424726c2b037d27250d613b59f722935d13fe8511bd20d9274f1f5db6c", @ANYRES16=r2, @ANYBLOB="080029bd7000fcdbdf252c0000000c0099000000000006000000"], 0x20}, 0x1, 0x0, 0x0, 0x8040}, 0x4004084) 23:24:30 executing program 2: io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3a2}) 23:24:30 executing program 1: clock_gettime(0x0, 0x0) 23:24:30 executing program 3: io_uring_setup(0x0, &(0x7f0000000080)={0x0, 0x0, 0x20, 0x0, 0x3a2}) 23:24:30 executing program 6: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000816bd7051dbe9cad969cf12961dcd91589c792536e0ffff0b009900ff07000002000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x60}, 0x1, 0x0, 0x0, 0x81}, 0x40001) 23:24:30 executing program 7: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000816bd7051dbe9cad969cf12961dcd91589c792536e0ffff0b009900ff07000002000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) 23:24:30 executing program 0: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000816bd7051dbe9cad969cf12961dcd91589c792536e0ffff0b009900ff07000002000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x60}, 0x1, 0x0, 0x0, 0x81}, 0x40001) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="00000000ef9b6a2bb56403445b7289824586f4ad3f9a93c9607322b1f5c76e4c0e8d90030f5c65f4d414bc424726c2b037d27250d613b59f722935d13fe8511bd20d9274f1f5db6c", @ANYRES16=r2, @ANYBLOB="080029bd7000fcdbdf252c0000000c0099000000000006000000"], 0x20}, 0x1, 0x0, 0x0, 0x8040}, 0x4004084) mmap$usbmon(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:24:30 executing program 5: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000816bd7051dbe9cad969cf12961dcd91589c792536e0ffff0b009900ff07000002000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x60}, 0x1, 0x0, 0x0, 0x81}, 0x40001) 23:24:40 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:24:40 executing program 0: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000816bd7051dbe9cad969cf12961dcd91589c792536e0ffff0b009900ff07000002000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="200028a6bba3bd7000fcdbdf080034000600000005002e000100000005003500740600000a000900aaaaaaaaaabb0000080032000000000008003400000124728697db0a15fc13c10870f1b1000005003500b300000008003b00feffffff6633f2c59b8d7be91170d367ea4458972c5817eacf0a1a97f6a5c2c9acfd4243d3329b9c011bf3d9877f82400c99918cc45ebf8d46c7fc8640f1ba0a755897073b0993e5e1f3cb63da4a5416f6a7cadc40ef0741268090a3cb2f236d2e89d6653e40cc551d7161efc90c8699e09c40a67bdcdd1e6e497fe3a678b4227b68103978edf8764b8500fc4af6deb56b4d5700451e561f6d665fc25e179e934ea30abe446b3c1e09ae4240271b50763dae3a8f3e"], 0x60}, 0x1, 0x0, 0x0, 0x81}, 0x40001) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="00000000ef9b6a2bb56403445b7289824586f4ad3f9a93c9607322b1f5c76e4c0e8d90030f5c65f4d414bc424726c2b037d27250d613b59f722935d13fe8511bd20d9274f1f5db6c", @ANYRES16=r2, @ANYBLOB="080029bd7000fcdbdf252c0000000c0099000000000006000000"], 0x20}, 0x1, 0x0, 0x0, 0x8040}, 0x4004084) mmap$usbmon(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:24:40 executing program 3: io_uring_setup(0x1d3, 0x0) 23:24:40 executing program 2: io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3a2}) 23:24:40 executing program 6: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000816bd7051dbe9cad969cf12961dcd91589c792536e0ffff0b009900ff07000002000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) 23:24:40 executing program 5: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000816bd7051dbe9cad969cf12961dcd91589c792536e0ffff0b009900ff07000002000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) 23:24:40 executing program 7: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000816bd7051dbe9cad969cf12961dcd91589c792536e0ffff0b009900ff07000002000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) 23:24:40 executing program 1: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000816bd7051dbe9cad969cf12961dcd91589c792536e0ffff0b009900ff07000002000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x60}, 0x1, 0x0, 0x0, 0x81}, 0x40001) 23:24:40 executing program 3: io_uring_setup(0x1d3, 0x0) 23:24:40 executing program 5: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000816bd7051dbe9cad969cf12961dcd91589c792536e0ffff0b009900ff07000002000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) 23:24:40 executing program 2: io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0x0, 0x20}) 23:24:40 executing program 7: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r2 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 23:24:40 executing program 1: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000816bd7051dbe9cad969cf12961dcd91589c792536e0ffff0b009900ff07000002000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x60}, 0x1, 0x0, 0x0, 0x81}, 0x40001) 23:24:40 executing program 0: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000816bd7051dbe9cad969cf12961dcd91589c792536e0ffff0b009900ff07000002000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="200028a6bba3bd7000fcdbdf080034000600000005002e000100000005003500740600000a000900aaaaaaaaaabb0000080032000000000008003400000124728697db0a15fc13c10870f1b1000005003500b300000008003b00feffffff6633f2c59b8d7be91170d367ea4458972c5817eacf0a1a97f6a5c2c9acfd4243d3329b9c011bf3d9877f82400c99918cc45ebf8d46c7fc8640f1ba0a755897073b0993e5e1f3cb63da4a5416f6a7cadc40ef0741268090a3cb2f236d2e89d6653e40cc551d7161efc90c8699e09c40a67bdcdd1e6e497fe3a678b4227b68103978edf8764b8500fc4af6deb56b4d5700451e561f6d665fc25e179e934ea30abe446b3c1e09ae4240271b50763dae3a8f3e"], 0x60}, 0x1, 0x0, 0x0, 0x81}, 0x40001) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="00000000ef9b6a2bb56403445b7289824586f4ad3f9a93c9607322b1f5c76e4c0e8d90030f5c65f4d414bc424726c2b037d27250d613b59f722935d13fe8511bd20d9274f1f5db6c", @ANYRES16=r2, @ANYBLOB="080029bd7000fcdbdf252c0000000c0099000000000006000000"], 0x20}, 0x1, 0x0, 0x0, 0x8040}, 0x4004084) mmap$usbmon(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:24:40 executing program 3: io_uring_setup(0x1d3, 0x0) 23:24:40 executing program 5: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r2 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) [ 3063.238738] kmemleak: Found object by alias at 0x607f1a6391ec [ 3063.238770] CPU: 0 UID: 0 PID: 19891 Comm: syz-executor.2 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 3063.238804] Tainted: [W]=WARN [ 3063.238811] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3063.238824] Call Trace: [ 3063.238831] [ 3063.238840] dump_stack_lvl+0xca/0x120 [ 3063.238882] __lookup_object+0x94/0xb0 [ 3063.238913] delete_object_full+0x27/0x70 [ 3063.238944] free_percpu+0x30/0x1160 [ 3063.238975] ? arch_uprobe_clear_state+0x16/0x140 [ 3063.239020] futex_hash_free+0x38/0xc0 [ 3063.239046] mmput+0x2d3/0x390 [ 3063.239081] do_exit+0x79d/0x2970 [ 3063.239106] ? signal_wake_up_state+0x85/0x120 [ 3063.239135] ? zap_other_threads+0x2b9/0x3a0 [ 3063.239166] ? __pfx_do_exit+0x10/0x10 [ 3063.239191] ? do_group_exit+0x1c3/0x2a0 [ 3063.239217] ? lock_release+0xc8/0x290 [ 3063.239249] do_group_exit+0xd3/0x2a0 [ 3063.239277] __x64_sys_exit_group+0x3e/0x50 [ 3063.239304] x64_sys_call+0x18c5/0x18d0 [ 3063.239333] do_syscall_64+0xbf/0x360 [ 3063.239355] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3063.239377] RIP: 0033:0x7f9749a76b19 [ 3063.239393] Code: Unable to access opcode bytes at 0x7f9749a76aef. [ 3063.239403] RSP: 002b:00007ffd72262128 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 3063.239425] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f9749a76b19 [ 3063.239439] RDX: 00007f9749a2972b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 3063.239453] RBP: 0000000000000000 R08: 0000001b2d22001c R09: 0000000000000000 [ 3063.239466] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3063.239479] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffd72262210 [ 3063.239509] [ 3063.239516] kmemleak: Object (percpu) 0x607f1a6391e8 (size 8): [ 3063.239529] kmemleak: comm "syz-executor.0", pid 19901, jiffies 4297730088 [ 3063.239543] kmemleak: min_count = 1 [ 3063.239550] kmemleak: count = 0 [ 3063.239557] kmemleak: flags = 0x21 [ 3063.239564] kmemleak: checksum = 0 [ 3063.239571] kmemleak: backtrace: [ 3063.239578] pcpu_alloc_noprof+0x87a/0x1170 [ 3063.239606] percpu_ref_init+0x37/0x400 [ 3063.239639] io_uring_setup+0x44c/0x2000 [ 3063.239660] __x64_sys_io_uring_setup+0xc8/0x170 [ 3063.239681] do_syscall_64+0xbf/0x360 [ 3063.239697] entry_SYSCALL_64_after_hwframe+0x77/0x7f 23:24:50 executing program 3: io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3a2}) 23:24:50 executing program 6: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000816bd7051dbe9cad969cf12961dcd91589c792536e0ffff0b009900ff07000002000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) 23:24:50 executing program 5: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r2 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) 23:24:50 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, 0x0, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:24:50 executing program 0: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000816bd7051dbe9cad969cf12961dcd91589c792536e0ffff0b009900ff07000002000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x60}, 0x1, 0x0, 0x0, 0x81}, 0x40001) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="00000000ef9b6a2bb56403445b7289824586f4ad3f9a93c9607322b1f5c76e4c0e8d90030f5c65f4d414bc424726c2b037d27250d613b59f722935d13fe8511bd20d9274f1f5db6c", @ANYRES16=r2, @ANYBLOB="080029bd7000fcdbdf252c0000000c0099000000000006000000"], 0x20}, 0x1, 0x0, 0x0, 0x8040}, 0x4004084) 23:24:50 executing program 7: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r2 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 23:24:50 executing program 1: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000816bd7051dbe9cad969cf12961dcd91589c792536e0ffff0b009900ff07000002000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x60}, 0x1, 0x0, 0x0, 0x81}, 0x40001) 23:24:51 executing program 2: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r2 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 23:24:51 executing program 7: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r2 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) 23:24:51 executing program 0: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000816bd7051dbe9cad969cf12961dcd91589c792536e0ffff0b009900ff07000002000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x60}, 0x1, 0x0, 0x0, 0x81}, 0x40001) 23:24:51 executing program 3: io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3a2}) 23:24:51 executing program 6: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r2 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 23:24:51 executing program 5: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r2 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) 23:24:51 executing program 1: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000816bd7051dbe9cad969cf12961dcd91589c792536e0ffff0b009900ff07000002000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) 23:24:51 executing program 7: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r2 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) 23:24:51 executing program 0: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000816bd7051dbe9cad969cf12961dcd91589c792536e0ffff0b009900ff07000002000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) 23:24:51 executing program 2: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r2 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 23:24:51 executing program 1: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000816bd7051dbe9cad969cf12961dcd91589c792536e0ffff0b009900ff07000002000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) 23:24:51 executing program 7: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r2 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000180)=""/13) 23:25:01 executing program 3: io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3a2}) 23:25:01 executing program 0: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r3 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r3) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000816bd7051dbe9cad969cf12961dcd91589c792536e0ffff0b009900ff07000002000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) 23:25:01 executing program 1: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r2 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 23:25:01 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, 0x0, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:25:01 executing program 2: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r2 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 23:25:01 executing program 6: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r2 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) 23:25:01 executing program 5: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r2 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000180)=""/13) 23:25:01 executing program 7: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r2 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000180)=""/13) 23:25:11 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x7fffffff, 0x2, 0x9}) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000440)) socket(0x11, 0x0, 0xfffffff9) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000b00)={0x24, &(0x7f00000009c0)={0x20, 0x6, 0x4b, {0x4b, 0x9, "4c50b810e7b10e0ce5a73777f0fbd7b19dcea5e1c75c7e3705074ea408daa792a5f7cff2c390717367630d460772288f7cc7fab22759022e6d7bcd619548d7c7820d9eaf044590af78"}}, &(0x7f0000000a40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42d}}, &(0x7f0000000a80)={0x0, 0x22, 0x2c, {[@local=@item_012={0x2, 0x2, 0x5, "cb3e"}, @local=@item_4={0x3, 0x2, 0x3, "73c32911"}, @global=@item_4={0x3, 0x1, 0x4, "cd3f3481"}, @global=@item_4={0x3, 0x1, 0x6, "73717315"}, @local=@item_4={0x3, 0x2, 0x8, "94351f46"}, @local=@item_4={0x3, 0x2, 0x8, "568e8b81"}, @main=@item_4={0x3, 0x0, 0xa, "a3cf341c"}, @global=@item_4={0x3, 0x1, 0x9, '\trG+'}, @global=@item_012={0x0, 0x1, 0x7}, @global=@item_4={0x3, 0x1, 0x3, "ca9a3af6"}]}}, &(0x7f0000000ac0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x1, 0x1, {0x22, 0x5ca}}}}, &(0x7f0000000c80)={0x2c, 0x0, &(0x7f0000000b80)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000c00)={0x20, 0x1, 0xe, "e65f5967fe6d915bf138fc73da68"}, &(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1f}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000d00), 0x52b080, 0x0) 23:25:11 executing program 2: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r2 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) 23:25:11 executing program 0: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r2 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 23:25:11 executing program 3: io_uring_setup(0x1d3, &(0x7f0000000080)={0x0, 0x0, 0x20}) 23:25:11 executing program 6: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r2 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000180)=""/13) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) 23:25:11 executing program 5: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r2 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) 23:25:11 executing program 7: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r2 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000180)=""/13) 23:25:11 executing program 1: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r2 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) 23:25:11 executing program 1: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r2 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) 23:25:11 executing program 3: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r2 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000180)=""/13) [ 3094.686830] kmemleak: Found object by alias at 0x607f1a6391ec [ 3094.686860] CPU: 1 UID: 0 PID: 20006 Comm: iou-sqp-20004 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 3094.686892] Tainted: [W]=WARN [ 3094.686899] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3094.686911] Call Trace: [ 3094.686918] [ 3094.686926] dump_stack_lvl+0xca/0x120 [ 3094.686965] __lookup_object+0x94/0xb0 [ 3094.687000] delete_object_full+0x27/0x70 [ 3094.687028] free_percpu+0x30/0x1160 [ 3094.687057] ? arch_uprobe_clear_state+0x16/0x140 [ 3094.687091] futex_hash_free+0x38/0xc0 [ 3094.687116] mmput+0x2d3/0x390 [ 3094.687160] do_exit+0x79d/0x2970 [ 3094.687191] ? __pfx_do_exit+0x10/0x10 [ 3094.687213] ? io_sq_thread+0xfbd/0x1b00 [ 3094.687241] ? lock_release+0xc8/0x290 [ 3094.687272] io_sq_thread+0xfc9/0x1b00 [ 3094.687310] ? __pfx_io_sq_thread+0x10/0x10 [ 3094.687341] ? __lock_acquire+0xc65/0x1b70 [ 3094.687364] ? __pfx_autoremove_wake_function+0x10/0x10 [ 3094.687391] ? __lock_acquire+0xc65/0x1b70 [ 3094.687428] ? do_raw_spin_lock+0x123/0x260 [ 3094.687457] ? find_held_lock+0x2b/0x80 [ 3094.687485] ? __pfx_io_sq_thread+0x10/0x10 [ 3094.687513] ? lock_release+0xc8/0x290 [ 3094.687537] ? __pfx_io_sq_thread+0x10/0x10 [ 3094.687566] ret_from_fork+0x34b/0x430 [ 3094.687597] ? __pfx_io_sq_thread+0x10/0x10 [ 3094.687624] ret_from_fork_asm+0x1a/0x30 [ 3094.687666] [ 3094.687673] kmemleak: Object (percpu) 0x607f1a6391e8 (size 8): [ 3094.687685] kmemleak: comm "syz-executor.5", pid 20007, jiffies 4297761525 [ 3094.687698] kmemleak: min_count = 1 [ 3094.687705] kmemleak: count = 0 [ 3094.687711] kmemleak: flags = 0x21 [ 3094.687718] kmemleak: checksum = 0 [ 3094.687724] kmemleak: backtrace: [ 3094.687730] pcpu_alloc_noprof+0x87a/0x1170 [ 3094.687757] percpu_ref_init+0x37/0x400 [ 3094.687787] io_uring_setup+0x44c/0x2000 [ 3094.687807] __x64_sys_io_uring_setup+0xc8/0x170 [ 3094.687827] do_syscall_64+0xbf/0x360 [ 3094.687843] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3094.715133] kmemleak: Cannot insert 0x607f1a6391ec into the object search tree (overlaps existing) [ 3094.715177] CPU: 0 UID: 0 PID: 20017 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 3094.715212] Tainted: [W]=WARN [ 3094.715219] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3094.715231] Call Trace: [ 3094.715238] [ 3094.715247] dump_stack_lvl+0xca/0x120 [ 3094.715288] __link_object+0x190/0x210 [ 3094.715321] __create_object+0x48/0x80 [ 3094.715353] pcpu_alloc_noprof+0x87a/0x1170 [ 3094.715396] __percpu_counter_init_many+0x44/0x360 [ 3094.715424] ? kasan_save_track+0x14/0x30 [ 3094.715454] io_uring_alloc_task_context+0xce/0x650 [ 3094.715486] ? file_init_path+0x506/0x770 [ 3094.715516] ? __pfx_io_uring_alloc_task_context+0x10/0x10 [ 3094.715550] ? alloc_file_pseudo+0x1a9/0x220 [ 3094.715585] __io_uring_add_tctx_node+0x291/0x4c0 [ 3094.715616] ? __pfx___io_uring_add_tctx_node+0x10/0x10 [ 3094.715652] ? __anon_inode_getfile+0x177/0x280 [ 3094.715686] io_uring_setup+0x1527/0x2000 [ 3094.715713] ? __pfx_io_uring_setup+0x10/0x10 [ 3094.715757] ? __pfx___x64_sys_futex+0x10/0x10 [ 3094.715783] ? __pfx_fput_close_sync+0x10/0x10 23:25:11 executing program 7: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r2 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) [ 3094.715810] ? dnotify_flush+0x79/0x4c0 [ 3094.715829] ? xfd_validate_state+0x55/0x180 [ 3094.715868] __x64_sys_io_uring_setup+0xc8/0x170 [ 3094.715894] do_syscall_64+0xbf/0x360 [ 3094.715915] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3094.715937] RIP: 0033:0x7fdab7fc7b19 [ 3094.715961] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3094.715982] RSP: 002b:00007fdab553d188 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 3094.716003] RAX: ffffffffffffffda RBX: 00007fdab80daf60 RCX: 00007fdab7fc7b19 [ 3094.716018] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 00000000000002c6 [ 3094.716031] RBP: 00007fdab8021f6d R08: 0000000000000000 R09: 0000000000000000 [ 3094.716044] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 3094.716056] R13: 00007ffe378ad1ff R14: 00007fdab553d300 R15: 0000000000022000 [ 3094.716086] [ 3094.716863] kmemleak: Kernel memory leak detector disabled [ 3094.716870] kmemleak: Object (percpu) 0x607f1a6391ec (size 4): [ 3094.716883] kmemleak: comm "syz-executor.1", pid 20017, jiffies 4297761581 [ 3094.716896] kmemleak: min_count = 1 [ 3094.716903] kmemleak: count = 0 [ 3094.716910] kmemleak: flags = 0x21 [ 3094.716917] kmemleak: checksum = 0 [ 3094.716924] kmemleak: backtrace: [ 3094.716930] pcpu_alloc_noprof+0x87a/0x1170 [ 3094.716958] __percpu_counter_init_many+0x44/0x360 [ 3094.716980] io_uring_alloc_task_context+0xce/0x650 [ 3094.717009] io_sq_offload_create+0xbc6/0x11a0 [ 3094.717036] io_uring_setup+0x143e/0x2000 [ 3094.717055] __x64_sys_io_uring_setup+0xc8/0x170 [ 3094.717076] do_syscall_64+0xbf/0x360 [ 3094.717092] entry_SYSCALL_64_after_hwframe+0x77/0x7f 23:25:12 executing program 5: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) memfd_secret(0x0) 23:25:12 executing program 0: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r2 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) 23:25:12 executing program 3: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r2 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000180)=""/13) [ 3094.809967] kmemleak: Automatic memory scanning thread ended 23:25:12 executing program 6: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r2 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) 23:25:12 executing program 2: r0 = memfd_secret(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x0, 0x101040) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000004c0)=""/117) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) io_uring_setup(0x2c6, &(0x7f0000000280)={0x0, 0x6cd4, 0x2, 0x2, 0x204, 0x0, r0}) r2 = memfd_secret(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000900), r2) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000180)=""/13) socket$nl_generic(0x10, 0x3, 0x10) SYZFAIL: failed to write(kmemleak, "scan") (errno 1: Operation not permitted) BUG: leak checking failed VM DIAGNOSIS: 23:25:12 Registers: info registers vcpu 0 RAX=dffffc0000000000 RBX=ffff88801550f978 RCX=ffff88801550f950 RDX=0000000000000000 RSI=ffffffff81608b3e RDI=ffff88801550f984 RBP=0000000000000000 RSP=ffff88801550f890 R8 =0000000000000001 R9 =ffff88801550f8f0 R10=000000000003be53 R11=0000000000004433 R12=ffff88801550f978 R13=0000000000000000 R14=ffff888015840000 R15=0000000000000000 RIP=ffffffff8160882e RFL=00000217 [----APC] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff8880e55dd000 00000000 00000000 LDT=0000 fffffe4300000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00005654b1263038 CR3=000000000d123000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=652e29646e616d6d6f632a282e637069 XMM03=00000000000000000000000000000000 XMM04=65726365735f64666d656d203d203072 XMM05=7830202c3078307b3d29303832303030 XMM06=202c327830202c327830202c34646336 XMM07=297d3072202c307830202c3430327830 XMM08=726365735f64666d656d203d2032720a XMM09=656e65675f7a79730a29307830287465 XMM10=796c696d61665f7465675f6b6e696c74 XMM11=3066377830282628637069742464695f XMM12=0a293272202c29303039303030303030 XMM13=37643665323230393537323262616637 XMM14=30323837633764383435393136646362 XMM15=22383766613039353434306661653964 info registers vcpu 1 RAX=0000000000879269 RBX=0000000000000001 RCX=ffffffff84bb95f7 RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff814c8304 RBP=dffffc0000000000 RSP=ffff888009717e58 R8 =0000000000000001 R9 =ffffed100d9e630a R10=ffff88806cf31853 R11=0000000000000001 R12=ffffffff8643ac50 R13=1ffff110012e2fd2 R14=0000000000000000 R15=0000000000000000 RIP=ffffffff84bb831e RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff8880e56dd000 00000000 00000000 LDT=0000 fffffe5300000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fd7fee3f3b8 CR3=000000003a536000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=ff00000000ff000000000000000000ff XMM01=25252525252525252525252525252525 XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=00000000000000000000000000000000 XMM07=00000000000000000000000000000000 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000