&(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) getsockname$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, &(0x7f0000000040)=0x20) ioctl$SOUND_MIXER_READ_RECSRC(0xffffffffffffffff, 0x80044dff, &(0x7f0000000080)) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r1, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) [ 2926.431958][T20438] BPF:hdr_len not found 08:33:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}, {0x74}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:33:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x0, 0x7ff}]}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 08:33:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x1}]}}, &(0x7f0000000840)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 08:33:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x8}, 0x20) 08:33:47 executing program 4: socketpair(0x1, 0x0, 0x27010000, &(0x7f0000000040)) [ 2926.573227][T20451] BPF:hdr_len not found 08:33:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}, {0x7a}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:33:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x0, 0x7ff}]}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 08:33:48 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) getsockname$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, &(0x7f0000000040)=0x20) ioctl$SOUND_MIXER_READ_RECSRC(0xffffffffffffffff, 0x80044dff, &(0x7f0000000080)) io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r1, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x8}, 0x20) 08:33:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x1}]}}, &(0x7f0000000840)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 08:33:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:33:48 executing program 4: socketpair(0x1, 0x0, 0x28000000, &(0x7f0000000040)) 08:33:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x0, 0x2}]}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 08:33:48 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) getsockname$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, &(0x7f0000000040)=0x20) ioctl$SOUND_MIXER_READ_RECSRC(0xffffffffffffffff, 0x80044dff, &(0x7f0000000080)) io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r1, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x4}]}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000, 0x1}, 0x20) [ 2926.786206][T20465] BPF:hdr_len not found 08:33:48 executing program 4: socketpair(0x1, 0x0, 0x28010000, &(0x7f0000000040)) 08:33:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000, 0x8}, 0x20) 08:33:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}, {0x0, [], 0x2}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:33:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x0, 0x2}]}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 08:33:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}, {0x0, [], 0x3}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:33:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x4}]}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 08:33:48 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) getsockname$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, &(0x7f0000000040)=0x20) io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r1, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) [ 2926.957247][T20482] BPF:No type found 08:33:48 executing program 4: socketpair(0x1, 0x0, 0x29000000, &(0x7f0000000040)) 08:33:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000, 0x8}, 0x20) 08:33:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x4}]}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 08:33:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}, {0x0, [], 0x4}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:33:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x0, 0x2}]}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 08:33:48 executing program 4: socketpair(0x1, 0x0, 0x29010000, &(0x7f0000000040)) [ 2927.098739][T20496] BPF:No type found 08:33:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}, {0x0, [], 0x5}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:33:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000, 0x8}, 0x20) 08:33:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x4, 0x7ff}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 08:33:48 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r1, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:48 executing program 4: socketpair(0x1, 0x0, 0x2a000000, &(0x7f0000000040)) 08:33:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x4}]}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 08:33:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}, {0x0, [], 0x6}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) [ 2927.272539][T20509] BPF:No type found 08:33:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x4, 0x7ff}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 08:33:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000840)=""/4096, 0x26, 0x1000, 0x8}, 0x20) 08:33:48 executing program 4: socketpair(0x1, 0x0, 0x2a010000, &(0x7f0000000040)) 08:33:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x4}]}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 08:33:48 executing program 4: socketpair(0x1, 0x0, 0x2b000000, &(0x7f0000000040)) 08:33:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}, {0x0, [], 0x7}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:33:48 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000840)=""/4096, 0x26, 0x1000, 0x8}, 0x20) 08:33:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x4, 0x7ff}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 08:33:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x4}]}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 08:33:48 executing program 4: socketpair(0x1, 0x0, 0x2b010000, &(0x7f0000000040)) 08:33:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}, {0x0, [], 0x8}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:33:48 executing program 4: socketpair(0x1, 0x0, 0x2c000000, &(0x7f0000000040)) 08:33:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000840)=""/4096, 0x26, 0x1000, 0x8}, 0x20) 08:33:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x4, 0x7ff}]}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000}, 0x20) 08:33:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}, {0x0, [], 0xa}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:33:49 executing program 3: io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000840)=""/4096, 0x2e, 0x1000, 0x8}, 0x20) 08:33:49 executing program 4: socketpair(0x1, 0x0, 0x2c010000, &(0x7f0000000040)) 08:33:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x4, 0x2}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 08:33:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000840)=""/4096, 0x2e, 0x1000, 0x8}, 0x20) 08:33:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x4, 0x7ff}]}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000}, 0x20) 08:33:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}, {0x0, [], 0x10}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:33:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x4, 0x2}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 08:33:49 executing program 3: io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:49 executing program 4: socketpair(0x1, 0x0, 0x2d000000, &(0x7f0000000040)) 08:33:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000840)=""/4096, 0x2e, 0x1000, 0x8}, 0x20) 08:33:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x4, 0x7ff}]}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000}, 0x20) 08:33:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}, {0x0, [], 0x28}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:33:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x4, 0x2}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 08:33:49 executing program 4: socketpair(0x1, 0x0, 0x2d010000, &(0x7f0000000040)) 08:33:49 executing program 3: io_setup(0x0, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}, {0x0, [], 0x2a}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:33:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, 0x0, 0x2e, 0x0, 0x8}, 0x20) 08:33:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x4, 0x2}]}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000}, 0x20) 08:33:49 executing program 1: io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:49 executing program 4: socketpair(0x1, 0x0, 0x2e000000, &(0x7f0000000040)) 08:33:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, 0x0, 0x2e, 0x0, 0x8}, 0x20) 08:33:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}, {0x0, [], 0x48}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:33:49 executing program 3: io_setup(0x0, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x4, 0x2}]}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000}, 0x20) 08:33:49 executing program 4: socketpair(0x1, 0x0, 0x2e010000, &(0x7f0000000040)) 08:33:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, 0x0, 0x2e, 0x0, 0x8}, 0x20) 08:33:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x4, 0x2}]}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000}, 0x20) 08:33:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000840)=""/4096, 0x26, 0x1000, 0x8}, 0x20) 08:33:49 executing program 4: socketpair(0x1, 0x0, 0x2f000000, &(0x7f0000000040)) 08:33:49 executing program 3: io_setup(0x0, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}, {0x0, [], 0x4c}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:33:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x4}]}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 08:33:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x2e, 0x1000}, 0x20) 08:33:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000840)=""/4096, 0x26, 0x1000, 0x8}, 0x20) 08:33:49 executing program 4: socketpair(0x1, 0x0, 0x2f010000, &(0x7f0000000040)) 08:33:49 executing program 3: io_setup(0x101, 0x0) io_getevents(0x0, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x4}]}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 08:33:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}, {0x0, [], 0x68}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:33:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x2e, 0x1000}, 0x20) 08:33:49 executing program 3: io_setup(0x101, 0x0) io_getevents(0x0, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x4}]}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 08:33:50 executing program 4: socketpair(0x1, 0x0, 0x30000000, &(0x7f0000000040)) 08:33:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000840)=""/4096, 0x26, 0x1000, 0x8}, 0x20) 08:33:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}, {0x0, [], 0x6c}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:33:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x2e, 0x1000}, 0x20) 08:33:50 executing program 3: io_setup(0x101, 0x0) io_getevents(0x0, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:50 executing program 4: socketpair(0x1, 0x0, 0x30010000, &(0x7f0000000040)) 08:33:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:33:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:33:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}, {0x0, [], 0x74}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:33:50 executing program 3: io_setup(0x101, &(0x7f00000000c0)) io_getevents(0x0, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000840)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 08:33:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:33:50 executing program 4: socketpair(0x1, 0x0, 0x31000000, &(0x7f0000000040)) 08:33:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}, {0x0, [], 0x7a}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:33:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:33:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:33:50 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) getsockname$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, &(0x7f0000000040)=0x20) ioctl$SOUND_MIXER_READ_RECSRC(0xffffffffffffffff, 0x80044dff, &(0x7f0000000080)) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) socket$kcm(0x29, 0x5, 0x0) io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r1, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x7, 0x1000, 0x1}, 0x20) 08:33:50 executing program 3: io_setup(0x101, &(0x7f00000000c0)) io_getevents(0x0, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:50 executing program 4: socketpair(0x1, 0x0, 0x31010000, &(0x7f0000000040)) 08:33:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:33:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:33:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x8}, 0x20) 08:33:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x9, 0x1000, 0x1}, 0x20) 08:33:50 executing program 4: socketpair(0x1, 0x0, 0x32000000, &(0x7f0000000040)) 08:33:50 executing program 3: io_setup(0x101, &(0x7f00000000c0)) io_getevents(0x0, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:50 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) getsockname$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, &(0x7f0000000040)=0x20) ioctl$SOUND_MIXER_READ_RECSRC(0xffffffffffffffff, 0x80044dff, &(0x7f0000000080)) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) socket$kcm(0x29, 0x5, 0x0) io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r1, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) [ 2929.240563][T20677] BPF:hdr_len not found 08:33:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:33:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x8}, 0x20) 08:33:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0xa, 0x1000, 0x1}, 0x20) 08:33:50 executing program 4: socketpair(0x1, 0x0, 0x32010000, &(0x7f0000000040)) 08:33:50 executing program 3: io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x0, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) [ 2929.375895][T20689] BPF:hdr_len not found 08:33:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:33:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x8}, 0x20) 08:33:50 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) getsockname$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, &(0x7f0000000040)=0x20) ioctl$SOUND_MIXER_READ_RECSRC(0xffffffffffffffff, 0x80044dff, &(0x7f0000000080)) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) socket$kcm(0x29, 0x5, 0x0) io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r1, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:50 executing program 4: socketpair(0x1, 0x0, 0x33000000, &(0x7f0000000040)) 08:33:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x18, 0x1000, 0x1}, 0x20) 08:33:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) [ 2929.507203][T20699] BPF:hdr_len not found 08:33:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000, 0x8}, 0x20) 08:33:50 executing program 3: io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x0, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:50 executing program 4: socketpair(0x1, 0x0, 0x33010000, &(0x7f0000000040)) 08:33:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x63, 0x1000, 0x1}, 0x20) [ 2929.645560][T20710] BPF:No type found 08:33:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000, 0x8}, 0x20) 08:33:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 08:33:51 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) getsockname$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, &(0x7f0000000040)=0x20) ioctl$SOUND_MIXER_READ_RECSRC(0xffffffffffffffff, 0x80044dff, &(0x7f0000000080)) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) socket$kcm(0x29, 0x5, 0x0) io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r1, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:51 executing program 4: socketpair(0x1, 0x0, 0x34000000, &(0x7f0000000040)) 08:33:51 executing program 3: io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x0, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x1000000, 0x1000, 0x1}, 0x20) 08:33:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 08:33:51 executing program 4: socketpair(0x1, 0x0, 0x34010000, &(0x7f0000000040)) [ 2929.832633][T20724] BPF:No type found 08:33:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000, 0x8}, 0x20) 08:33:51 executing program 4: socketpair(0x1, 0x0, 0x35000000, &(0x7f0000000040)) 08:33:51 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) getsockname$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, &(0x7f0000000040)=0x20) ioctl$SOUND_MIXER_READ_RECSRC(0xffffffffffffffff, 0x80044dff, &(0x7f0000000080)) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) socket$kcm(0x29, 0x5, 0x0) io_getevents(0x0, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000840)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 08:33:51 executing program 3: io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}) [ 2929.978297][T20734] BPF:No type found 08:33:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, 0x0, 0x26, 0x0, 0x8}, 0x20) 08:33:51 executing program 4: socketpair(0x1, 0x0, 0x35010000, &(0x7f0000000040)) 08:33:51 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) getsockname$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, &(0x7f0000000040)=0x20) ioctl$SOUND_MIXER_READ_RECSRC(0xffffffffffffffff, 0x80044dff, &(0x7f0000000080)) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) socket$kcm(0x29, 0x5, 0x0) io_getevents(0x0, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000840)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 08:33:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x5f5e0ff, 0x1000, 0x1}, 0x20) 08:33:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, 0x0, 0x26, 0x0, 0x8}, 0x20) 08:33:51 executing program 3: io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}) 08:33:51 executing program 4: socketpair(0x1, 0x0, 0x36000000, &(0x7f0000000040)) 08:33:51 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) getsockname$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, &(0x7f0000000040)=0x20) ioctl$SOUND_MIXER_READ_RECSRC(0xffffffffffffffff, 0x80044dff, &(0x7f0000000080)) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) socket$kcm(0x29, 0x5, 0x0) io_getevents(0x0, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000840)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 08:33:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, 0x0, 0x26, 0x0, 0x8}, 0x20) 08:33:51 executing program 4: socketpair(0x1, 0x0, 0x36010000, &(0x7f0000000040)) 08:33:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x20000442, 0x1000, 0x1}, 0x20) 08:33:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 08:33:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000840)=""/4096, 0x26, 0x1000}, 0x20) 08:33:51 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) getsockname$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, &(0x7f0000000040)=0x20) ioctl$SOUND_MIXER_READ_RECSRC(0xffffffffffffffff, 0x80044dff, &(0x7f0000000080)) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r1, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:51 executing program 3: io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}) 08:33:51 executing program 4: socketpair(0x1, 0x0, 0x37000000, &(0x7f0000000040)) 08:33:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x4, 0x1}, 0x20) 08:33:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 08:33:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000840)=""/4096, 0x26, 0x1000}, 0x20) 08:33:51 executing program 4: socketpair(0x1, 0x0, 0x37010000, &(0x7f0000000040)) 08:33:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0xa00, 0x1}, 0x20) 08:33:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000840)=""/4096, 0x26, 0x1000}, 0x20) 08:33:52 executing program 3: io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x2, &(0x7f0000000140)=[{}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:52 executing program 4: socketpair(0x1, 0x0, 0x38000000, &(0x7f0000000040)) 08:33:52 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) getsockname$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, &(0x7f0000000040)=0x20) ioctl$SOUND_MIXER_READ_RECSRC(0xffffffffffffffff, 0x80044dff, &(0x7f0000000080)) io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r1, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 08:33:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1002, 0x1}, 0x20) 08:33:52 executing program 4: socketpair(0x1, 0x0, 0x38010000, &(0x7f0000000040)) 08:33:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x1000000, 0x1000, 0x1}, 0x20) 08:33:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1003, 0x1}, 0x20) 08:33:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x4}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 08:33:52 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) getsockname$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, &(0x7f0000000040)=0x20) io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r1, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:52 executing program 3: io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x2, &(0x7f0000000140)=[{}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:52 executing program 4: socketpair(0x1, 0x0, 0x39000000, &(0x7f0000000040)) 08:33:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1004, 0x1}, 0x20) 08:33:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x4}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 08:33:52 executing program 3: io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x2, &(0x7f0000000140)=[{}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x4}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 08:33:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4}}]}, {0x6}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 08:33:52 executing program 4: socketpair(0x1, 0x0, 0x39010000, &(0x7f0000000040)) 08:33:52 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r1, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1005, 0x1}, 0x20) 08:33:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x4}]}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000}, 0x20) 08:33:52 executing program 4: socketpair(0x1, 0x0, 0x3a000000, &(0x7f0000000040)) 08:33:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1006, 0x1}, 0x20) 08:33:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x5}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:33:52 executing program 4: socketpair(0x1, 0x0, 0x3a010000, &(0x7f0000000040)) 08:33:52 executing program 3: io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x2, &(0x7f0000000140)=[{}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1007, 0x1}, 0x20) 08:33:52 executing program 2: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:52 executing program 4: socketpair(0x1, 0x0, 0x3b000000, &(0x7f0000000040)) 08:33:52 executing program 1: socketpair(0x1, 0x0, 0x9500, &(0x7f0000000040)) 08:33:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x4}]}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000}, 0x20) 08:33:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1008, 0x1}, 0x20) 08:33:52 executing program 3: io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x2, &(0x7f0000000140)=[{}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x4}]}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000}, 0x20) 08:33:52 executing program 4: socketpair(0x1, 0x0, 0x3b010000, &(0x7f0000000040)) 08:33:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x100a, 0x1}, 0x20) 08:33:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000840)=""/4096, 0x2b, 0x1000, 0x1}, 0x20) 08:33:52 executing program 2: io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x6c}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:33:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000840)=""/4096, 0x2b, 0x1000, 0x1}, 0x20) 08:33:52 executing program 3: io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x2, &(0x7f0000000140)=[{}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:52 executing program 4: socketpair(0x1, 0x0, 0x3c000000, &(0x7f0000000040)) 08:33:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1010, 0x1}, 0x20) 08:33:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x6c}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:33:53 executing program 4: socketpair(0x1, 0x0, 0x3c010000, &(0x7f0000000040)) 08:33:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000840)=""/4096, 0x2b, 0x1000, 0x1}, 0x20) 08:33:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1028, 0x1}, 0x20) 08:33:53 executing program 2: io_setup(0x0, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:53 executing program 3: io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x2, &(0x7f0000000140)=[{}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:33:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x6c}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:33:53 executing program 4: socketpair(0x1, 0x0, 0x3d000000, &(0x7f0000000040)) 08:33:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x102a, 0x1}, 0x20) 08:33:53 executing program 2: io_setup(0x0, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:33:53 executing program 3: io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x2, &(0x7f0000000140)=[{}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:53 executing program 2: io_setup(0x0, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:33:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:33:53 executing program 4: socketpair(0x1, 0x0, 0x3d010000, &(0x7f0000000040)) 08:33:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1048, 0x1}, 0x20) 08:33:53 executing program 2: io_setup(0x101, 0x0) io_getevents(0x0, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:33:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x104c, 0x1}, 0x20) 08:33:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:33:53 executing program 4: socketpair(0x1, 0x0, 0x3e000000, &(0x7f0000000040)) 08:33:53 executing program 3: io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x2, &(0x7f0000000140)=[{}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:53 executing program 2: io_setup(0x101, 0x0) io_getevents(0x0, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:33:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1068, 0x1}, 0x20) 08:33:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:33:53 executing program 4: socketpair(0x1, 0x0, 0x3e010000, &(0x7f0000000040)) 08:33:53 executing program 2: io_setup(0x101, 0x0) io_getevents(0x0, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:33:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x106c, 0x1}, 0x20) 08:33:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:33:53 executing program 3: io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], 0x0) 08:33:53 executing program 4: socketpair(0x1, 0x0, 0x3f000000, &(0x7f0000000040)) 08:33:53 executing program 2: io_setup(0x101, &(0x7f00000000c0)) io_getevents(0x0, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:33:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1074, 0x1}, 0x20) 08:33:53 executing program 4: socketpair(0x1, 0x0, 0x3f010000, &(0x7f0000000040)) 08:33:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x5f]}}, &(0x7f0000000840)=""/4096, 0x1b, 0x1000, 0x1}, 0x20) 08:33:54 executing program 2: io_setup(0x101, &(0x7f00000000c0)) io_getevents(0x0, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:33:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x5f]}}, &(0x7f0000000840)=""/4096, 0x1b, 0x1000, 0x1}, 0x20) 08:33:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x107a, 0x1}, 0x20) 08:33:54 executing program 4: socketpair(0x1, 0x0, 0x40000000, &(0x7f0000000040)) 08:33:54 executing program 3: io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], 0x0) 08:33:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x5f]}}, &(0x7f0000000840)=""/4096, 0x1b, 0x1000, 0x1}, 0x20) 08:33:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x6c}]}]}}, &(0x7f0000000840)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 08:33:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1200, 0x1}, 0x20) 08:33:54 executing program 4: socketpair(0x1, 0x0, 0x40010000, &(0x7f0000000040)) 08:33:54 executing program 2: io_setup(0x101, &(0x7f00000000c0)) io_getevents(0x0, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var]}, {0x0, [0x5f]}}, &(0x7f0000000840)=""/4096, 0x2b, 0x1000, 0x1}, 0x20) 08:33:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x2f00, 0x1}, 0x20) 08:33:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 08:33:54 executing program 4: socketpair(0x1, 0x0, 0x41000000, &(0x7f0000000040)) 08:33:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var]}, {0x0, [0x5f]}}, &(0x7f0000000840)=""/4096, 0x2b, 0x1000, 0x1}, 0x20) 08:33:54 executing program 2: io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x0, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:55 executing program 3: io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], 0x0) 08:33:55 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x9feb, 0x1}, 0x20) 08:33:55 executing program 4: socketpair(0x1, 0x0, 0x41010000, &(0x7f0000000040)) 08:33:55 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 08:33:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var]}, {0x0, [0x5f]}}, &(0x7f0000000840)=""/4096, 0x2b, 0x1000, 0x1}, 0x20) 08:33:55 executing program 2: io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x0, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x1}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:33:55 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x2}, 0x20) 08:33:55 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 08:33:55 executing program 4: socketpair(0x1, 0x0, 0x42000000, &(0x7f0000000040)) 08:33:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x1}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:33:55 executing program 2: io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x0, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:56 executing program 2: io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}) 08:33:56 executing program 4: socketpair(0x1, 0x0, 0x42010000, &(0x7f0000000040)) 08:33:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000840)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 08:33:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x1}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:33:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x3}, 0x20) 08:33:56 executing program 3: io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x2, &(0x7f0000000140)=[{}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:56 executing program 4: socketpair(0x1, 0x0, 0x43000000, &(0x7f0000000040)) 08:33:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000840)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 08:33:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x0]}}, &(0x7f0000000840)=""/4096, 0x2b, 0x1000, 0x1}, 0x20) 08:33:56 executing program 4: socketpair(0x1, 0x0, 0x43010000, &(0x7f0000000040)) 08:33:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x8}, 0x20) 08:33:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000840)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 08:33:56 executing program 2: io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}) 08:33:56 executing program 3: io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}) 08:33:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x0]}}, &(0x7f0000000840)=""/4096, 0x2b, 0x1000, 0x1}, 0x20) 08:33:57 executing program 4: socketpair(0x1, 0x0, 0x44000000, &(0x7f0000000040)) 08:33:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000840)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) [ 2935.666590][T21040] BPF:[2] FUNC_PROTO (anon) [ 2935.678030][T21040] BPF:return=0 args=( [ 2935.693573][T21040] BPF:1 (anon) [ 2935.697279][T21040] BPF:) 08:33:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x0]}}, &(0x7f0000000840)=""/4096, 0x2b, 0x1000, 0x1}, 0x20) [ 2935.721501][T21040] BPF: [ 2935.728843][T21040] BPF:Invalid arg#1 [ 2935.742296][T21040] BPF: [ 2935.742296][T21040] [ 2935.768225][T21040] BPF:[2] FUNC_PROTO (anon) 08:33:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000840)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 08:33:57 executing program 2: io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}) 08:33:57 executing program 3: io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x2, &(0x7f0000000140)=[{}, {}], &(0x7f00000001c0)={0x0, 0x989680}) [ 2935.808704][T21040] BPF:return=0 args=( 08:33:57 executing program 4: socketpair(0x1, 0x0, 0x44010000, &(0x7f0000000040)) [ 2935.832732][T21040] BPF:1 (anon) [ 2935.846137][T21040] BPF:) [ 2935.857665][T21040] BPF: [ 2935.881488][T21040] BPF:Invalid arg#1 [ 2935.900552][T21040] BPF: [ 2935.900552][T21040] 08:33:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0xa}, 0x20) 08:33:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, 0x0, 0x2b, 0x0, 0x1}, 0x20) 08:33:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000840)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 08:33:57 executing program 4: socketpair(0x1, 0x0, 0x45000000, &(0x7f0000000040)) 08:33:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x28}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:33:57 executing program 2: io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x2, &(0x7f0000000140)=[{}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x6c}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 08:33:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, 0x0, 0x2b, 0x0, 0x1}, 0x20) 08:33:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x3ee}, 0x20) 08:33:57 executing program 4: socketpair(0x1, 0x0, 0x45010000, &(0x7f0000000040)) 08:33:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x28}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:33:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x6c}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 08:33:57 executing program 2: io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x2, &(0x7f0000000140)=[{}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x3f2}, 0x20) 08:33:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, 0x0, 0x2b, 0x0, 0x1}, 0x20) 08:33:57 executing program 4: socketpair(0x1, 0x0, 0x46000000, &(0x7f0000000040)) 08:33:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x6c}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 08:33:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x28}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:33:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x3f3}, 0x20) 08:33:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000840)=""/4096, 0x2b, 0x1000}, 0x20) 08:33:57 executing program 4: socketpair(0x1, 0x0, 0x46010000, &(0x7f0000000040)) 08:33:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x6c}]}]}}, &(0x7f0000000840)=""/4096, 0x2e, 0x1000}, 0x20) 08:33:57 executing program 2: io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x2, &(0x7f0000000140)=[{}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:33:57 executing program 4: socketpair(0x1, 0x0, 0x47000000, &(0x7f0000000040)) 08:33:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x3f4}, 0x20) 08:33:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000840)=""/4096, 0x2b, 0x1000}, 0x20) 08:33:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x6c}]}]}}, &(0x7f0000000840)=""/4096, 0x2e, 0x1000}, 0x20) 08:33:57 executing program 4: socketpair(0x1, 0x0, 0x47010000, &(0x7f0000000040)) 08:33:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x3f5}, 0x20) 08:33:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:33:58 executing program 2: io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x2, &(0x7f0000000140)=[{}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000840)=""/4096, 0x2b, 0x1000}, 0x20) 08:33:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:33:58 executing program 4: socketpair(0x1, 0x0, 0x48000000, &(0x7f0000000040)) 08:33:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x6c}]}]}}, &(0x7f0000000840)=""/4096, 0x2e, 0x1000}, 0x20) 08:33:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x3f6}, 0x20) 08:33:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x2}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:33:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x16, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 08:33:58 executing program 4: socketpair(0x1, 0x0, 0x48010000, &(0x7f0000000040)) 08:33:58 executing program 2: io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x2, &(0x7f0000000140)=[{}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:33:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x3fe}, 0x20) 08:33:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x2}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:33:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xc, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:33:58 executing program 4: socketpair(0x1, 0x0, 0x49000000, &(0x7f0000000040)) 08:33:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:33:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x2}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:33:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0xffffff}, 0x20) 08:33:58 executing program 2: io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x2, &(0x7f0000000140)=[{}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:33:58 executing program 4: socketpair(0x1, 0x0, 0x49010000, &(0x7f0000000040)) 08:33:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xc, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:33:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:33:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xc, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:33:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0xffffff1f}, 0x20) 08:33:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x28}]}]}}, &(0x7f0000000840)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 08:33:58 executing program 2: io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x2, &(0x7f0000000140)=[{}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:58 executing program 4: socketpair(0x1, 0x0, 0x4a000000, &(0x7f0000000040)) 08:33:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:33:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:33:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x25) 08:33:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 08:33:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:33:58 executing program 4: socketpair(0x1, 0x0, 0x4a010000, &(0x7f0000000040)) 08:33:58 executing program 2: io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x2, &(0x7f0000000140)=[{}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:33:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 08:33:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x2f) 08:33:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:33:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:33:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 08:33:59 executing program 4: socketpair(0x1, 0x0, 0x4b000000, &(0x7f0000000040)) 08:33:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x78) 08:33:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:33:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000840)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 08:33:59 executing program 2: io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x2, &(0x7f0000000140)=[{}, {}], &(0x7f00000001c0)={0x0, 0x989680}) 08:33:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:33:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:33:59 executing program 4: socketpair(0x1, 0x0, 0x4b010000, &(0x7f0000000040)) 08:33:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000840)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 08:33:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20000120) 08:33:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x2}]}]}}, &(0x7f0000000840)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 08:33:59 executing program 2: io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], 0x0) 08:33:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:33:59 executing program 4: socketpair(0x1, 0x0, 0x4c000000, &(0x7f0000000040)) 08:33:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000840)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 08:33:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000002000000000000000100000d000000000000000000000000000000000100000d0000000000000010010000000000"], &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:33:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:33:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 08:33:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x68, r0, 0x10, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'wg0\x00'}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1f}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e23}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x12}]}, 0x68}, 0x1, 0x0, 0x0, 0x40054}, 0x4000) 08:33:59 executing program 4: socketpair(0x1, 0x0, 0x4c010000, &(0x7f0000000040)) 08:33:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xc, 0x0, [{}]}]}}, &(0x7f0000000840)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 08:33:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 08:33:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000840)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 08:34:00 executing program 2: io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], 0x0) 08:34:00 executing program 4: socketpair(0x1, 0x0, 0x4d000000, &(0x7f0000000040)) 08:34:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=""/3, 0x77, 0x3}, 0x20) 08:34:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 08:34:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 08:34:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000840)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 08:34:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000840)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 08:34:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb17e25a3e01001800000000000000280000002800000002000000000000000100000d000000000000000000000000000000000100000d00000000000000000100"], &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:34:00 executing program 4: socketpair(0x1, 0x0, 0x4d010000, &(0x7f0000000040)) 08:34:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000840)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 08:34:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 08:34:00 executing program 4: socketpair(0x1, 0x0, 0x4e000000, &(0x7f0000000040)) 08:34:01 executing program 2: io_setup(0x101, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], 0x0) 08:34:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000840)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 08:34:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x28}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 08:34:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001840)=""/4110, 0x1a, 0x100e, 0x1}, 0x20) r0 = accept$phonet_pipe(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept4$phonet_pipe(r0, 0x0, &(0x7f0000000040), 0x0) 08:34:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 08:34:01 executing program 4: socketpair(0x1, 0x0, 0x4e010000, &(0x7f0000000040)) 08:34:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x28}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 08:34:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000840)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 08:34:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xc}]}}, &(0x7f0000000840)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 08:34:01 executing program 4: socketpair(0x1, 0x0, 0x4f000000, &(0x7f0000000040)) 08:34:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000003c0)='fdinfo\x00') recvmsg$can_bcm(r0, &(0x7f0000002cc0)={&(0x7f0000001840)=@pppoe={0x18, 0x0, {0x0, @random}}, 0x80, &(0x7f0000002c40)=[{&(0x7f00000018c0)=""/70, 0x46}, {&(0x7f0000001940)=""/69, 0x45}, {&(0x7f00000019c0)=""/96, 0x60}, {&(0x7f0000001a40)=""/160, 0xa0}, {&(0x7f0000001b00)=""/4096, 0x1000}, {&(0x7f0000002b00)=""/183, 0xb7}, {&(0x7f0000000800)=""/27, 0x1b}, {&(0x7f0000002bc0)=""/90, 0x5a}], 0x8}, 0x20000) 08:34:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x28}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 08:34:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xc}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 08:34:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000840)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 08:34:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) socket$rxrpc(0x21, 0x2, 0x0) 08:34:02 executing program 4: socketpair(0x1, 0x0, 0x4f010000, &(0x7f0000000040)) 08:34:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x28}]}]}}, &(0x7f0000000840)=""/4096, 0x2e, 0x1000}, 0x20) 08:34:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x4800, {0x4}}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 08:34:02 executing program 4: socketpair(0x1, 0x0, 0x50000000, &(0x7f0000000040)) 08:34:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0xfffffffe}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:34:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x28}]}]}}, &(0x7f0000000840)=""/4096, 0x2e, 0x1000}, 0x20) 08:34:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000840)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 08:34:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xc}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 08:34:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x4800, {0x4}}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 08:34:02 executing program 4: socketpair(0x1, 0x0, 0x50010000, &(0x7f0000000040)) 08:34:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9f08020018000000000000002800000028000000020000000012000000000000000000000000010000ff00000000000000ef7777d50f857af6f3aa08e1a3010000000000"], &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:34:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x28}]}]}}, &(0x7f0000000840)=""/4096, 0x2e, 0x1000}, 0x20) 08:34:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000840)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 08:34:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xc}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 08:34:02 executing program 4: socketpair(0x1, 0x0, 0x51000000, &(0x7f0000000040)) 08:34:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x4800, {0x4}}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 08:34:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYRES32], &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) ioctl$SOUND_MIXER_READ_VOLUME(0xffffffffffffffff, 0x80044d1c, &(0x7f00000000c0)) ioctl$SOUND_MIXER_READ_CAPS(0xffffffffffffffff, 0x80044dfc, &(0x7f0000000080)) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) ioctl$SIOCPNENABLEPIPE(0xffffffffffffffff, 0x89ed, 0x0) 08:34:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x2}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 08:34:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:34:02 executing program 4: socketpair(0x1, 0x0, 0x51010000, &(0x7f0000000040)) 08:34:02 executing program 5: syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x200, 0x80801) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f00000000c0)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[], &(0x7f0000000840)=""/4096, 0x42, 0x1060, 0x1}, 0x20) 08:34:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:34:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xc}]}}, &(0x7f0000000840)=""/4096, 0x26, 0x1000}, 0x20) 08:34:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x2}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 08:34:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:34:02 executing program 4: socketpair(0x1, 0x0, 0x52000000, &(0x7f0000000040)) 08:34:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:34:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x2}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 08:34:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb01001800000000000000200000002000000003000000000000000000000d00000000000000001800000d000000000000000001000000002e00920322bfe33ffb34b61112775565ca9574144838bb401a8f64f6a64e03700c8761a83d5b52658684128da2cb58894cfef3ad021fa47d477115372c7e013fe30ba4143ca7226d3edd78d2ac1a7be04c0ba3a7"], &(0x7f0000001840)=""/4105, 0x3b, 0x1009, 0x1}, 0x20) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) prctl$PR_SVE_GET_VL(0x33, 0x17951) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0xb72b, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x3, 0x3}, 0x0, 0x0, &(0x7f0000000140)={0x5, 0x80000005, 0x4, 0x5}, &(0x7f0000000180)=0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x2}}, 0x10) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r1, 0x891a, 0x0) r2 = openat$drirender128(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dri/renderD128\x00', 0x480000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f00000004c0)={0x0, 0x1, r2, 0x38, 0x80000}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0xc0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x5, 0x3}, 0x0, 0x0, 0xfffffffffffffffd, &(0x7f0000000380)=0x100000000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=0x7}}, 0x10) 08:34:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xc}]}}, &(0x7f0000000840)=""/4096, 0x26, 0x1000}, 0x20) 08:34:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:34:02 executing program 4: socketpair(0x1, 0x0, 0x52010000, &(0x7f0000000040)) 08:34:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:34:02 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0xd381, 0x8, 0x10001, 0x640, 0xffffffffffffffff, 0x75, [], 0x0, r0, 0x1, 0x2, 0x1}, 0x40) 08:34:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x2}]}]}}, &(0x7f0000000840)=""/4096, 0x2e, 0x1000}, 0x20) 08:34:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xc}]}}, &(0x7f0000000840)=""/4096, 0x26, 0x1000}, 0x20) 08:34:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:34:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:34:03 executing program 4: socketpair(0x1, 0x0, 0x53000000, &(0x7f0000000040)) 08:34:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001840)=""/4096, 0x1a, 0x1000}, 0x20) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) connect$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @multicast1}}, 0x24) 08:34:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:34:03 executing program 4: socketpair(0x1, 0x0, 0x53010000, &(0x7f0000000040)) 08:34:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x2}]}]}}, &(0x7f0000000840)=""/4096, 0x2e, 0x1000}, 0x20) 08:34:03 executing program 5: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0xc0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0xffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x9, 0x2}, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x0, 0x2, 0x4}, &(0x7f00000000c0)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x3}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)={r0}, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:34:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:34:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0xffff0f00, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:34:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:34:03 executing program 4: socketpair(0x1, 0x0, 0x54000000, &(0x7f0000000040)) 08:34:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x2}]}]}}, &(0x7f0000000840)=""/4096, 0x2e, 0x1000}, 0x20) 08:34:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[], &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x2, 0x0) 08:34:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:34:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x2, {0x4}}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 08:34:03 executing program 4: socketpair(0x1, 0x0, 0x54010000, &(0x7f0000000040)) 08:34:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:34:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0x7, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 08:34:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000003d42e900000000280000002800000002000000000000000100000d00000000000000000000000000ea00000100000d0000000000000000010000000000"], &(0x7f0000001840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) ioctl$PPPIOCSNPMODE(r0, 0x4008744b, &(0x7f0000000080)={0x8029}) getpgrp(0xffffffffffffffff) 08:34:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 08:34:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:34:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0x7, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 08:34:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x2, {0x4}}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 08:34:03 executing program 4: socketpair(0x1, 0x0, 0x55000000, &(0x7f0000000040)) 08:34:03 executing program 4: socketpair(0x1, 0x0, 0x55010000, &(0x7f0000000040)) 08:34:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:34:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x44, 0x44, 0x2, [@union={0xe, 0x3, 0x0, 0x5, 0x0, 0x280, [{0x0, 0x4, 0x5}, {0x3, 0x4}, {0xd, 0x5}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x5e, 0x1000, 0x1}, 0x20) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x64, r0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_VLAN_ID={0x6}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x400}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e20}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x23}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x9}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0xdc}]}, 0x64}}, 0x20040080) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x58, r0, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x8}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010100}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}]}, 0x58}, 0x1, 0x0, 0x0, 0x4}, 0x20004080) 08:34:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x2, {0x4}}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 08:34:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0x7, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 08:34:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 08:34:03 executing program 4: socketpair(0x1, 0x0, 0x56000000, &(0x7f0000000040)) 08:34:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:34:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 08:34:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000840)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 08:34:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb0100fbffffffffffffff280000002800000002000000000000000100000d000000000000000000000000000000000100000d0000000000000000010000000000"], &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:34:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:34:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:34:03 executing program 4: socketpair(0x1, 0x0, 0x56010000, &(0x7f0000000040)) 08:34:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="00000000003300000020000000020000000000000a000100000d3f00000000000802000000000068646c0886b3c29f0000000000000000000000efffffffffffffff0088b4b85bbac44d803d6c1bb29ce79ca020584cf99fa2b36c4a4a9121b4ac8dfb8f595064aa081bdf853b3e47b8da82e9b1faef2b37fe887d1a48eafdc1fe0dcf8495b828099cadaa819e1511a665ecd7339261d9470f9e2ddee03baac621019a450f0f1c0bb6e576"], &(0x7f0000000480)=""/4113, 0x3a, 0x1011, 0x1}, 0x20) sendto$rxrpc(0xffffffffffffffff, &(0x7f00000000c0)="4e4c1029400f68fc223e04db0e58ea8a000a43e7413cb9c342dd26f71676823d629f903126", 0x25, 0x20004000, 0x0, 0x0) ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f0000000140)) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e23}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast2}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0x10}, 0x8000) 08:34:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x4800}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 08:34:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:34:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000840)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 08:34:03 executing program 4: socketpair(0x1, 0x0, 0x57000000, &(0x7f0000000040)) 08:34:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:34:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:34:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x4800}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 08:34:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000840)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 08:34:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000002000000000007000100000d0000030000000000000d00000000000000005216ba88986169380000000000000000"], &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) 08:34:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:34:04 executing program 4: socketpair(0x1, 0x0, 0x57010000, &(0x7f0000000040)) 08:34:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto]}}, &(0x7f0000000840)=""/4096, 0x3a, 0x1000, 0x1}, 0x20) 08:34:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@fwd={0x7}]}, {0x0, [0x0, 0x2e, 0x30, 0x61, 0x51, 0x0]}}, &(0x7f0000000140)=""/206, 0x2c, 0xce}, 0x20) 08:34:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:34:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x4800}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 08:34:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:34:04 executing program 4: socketpair(0x1, 0x0, 0x58000000, &(0x7f0000000040)) 08:34:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto]}}, &(0x7f0000000840)=""/4096, 0x3a, 0x1000, 0x1}, 0x20) 08:34:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb010018000000000000002800000028006f973c38c951e1caffffff7f0cffe500000000000000000082433e7f000000000001000000000000"], &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) ioctl$PPPIOCSACTIVE(r0, 0x40107446, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x800, 0x1f, 0x6, 0x4}, {0x8000, 0x40, 0x5, 0x100}]}) 08:34:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x4800}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 08:34:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:34:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:34:04 executing program 4: socketpair(0x1, 0x0, 0x58010000, &(0x7f0000000040)) 08:34:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x4800}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000}, 0x20) 08:34:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto]}}, &(0x7f0000000840)=""/4096, 0x3a, 0x1000, 0x1}, 0x20) 08:34:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x9, 0x100) ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, &(0x7f0000000040)) 08:34:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:34:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 08:34:04 executing program 4: socketpair(0x1, 0x0, 0x59000000, &(0x7f0000000040)) 08:34:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x4800}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000}, 0x20) 08:34:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:34:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 08:34:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x4800}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000}, 0x20) 08:34:04 executing program 5: socketpair(0x1d, 0x4, 0x2, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000080)=[0x2], 0x2) io_setup(0x4, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb01001dd6ceb265ec144c20000000200000000200000000e600000100000d000000000000000000000000ff4a06c244a2e6f6895117440800033780d5bc17d0e95faf51b00c31207ed7294abefb5d1e7d99ef27ade8bf52794055377e227438153ad3ed24c9c0ce2b51c0c7507a01b98ddfd6031a01b2e6d690b4d690cf6f2d27fa5c6ac0d83aeee31905919100862509db320699653d75862fb6849f99dea528d6b181291ab09c"], &(0x7f0000000840)=""/4096, 0x92, 0x1000, 0xffffffff}, 0x20) 08:34:04 executing program 4: socketpair(0x1, 0x0, 0x59010000, &(0x7f0000000040)) 08:34:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 08:34:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 08:34:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000840)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 08:34:04 executing program 4: socketpair(0x1, 0x0, 0x5a000000, &(0x7f0000000040)) 08:34:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 08:34:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000840)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 08:34:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 08:34:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x38, 0x76a, 0x10000001}, 0x20) 08:34:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000840)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 08:34:04 executing program 4: socketpair(0x1, 0x0, 0x5a010000, &(0x7f0000000040)) 08:34:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x7}]}}, &(0x7f0000000840)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 08:34:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 08:34:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x5, 0x3, 0x0, {0x4}}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 08:34:04 executing program 5: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x40047438, &(0x7f0000000040)=0x1) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r1, 0x891a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x17, 0x26, 0x8020000, 0x9, 0xb, r0, 0xd0, [], 0x0, r0, 0x3}, 0x40) bpf$PROG_BIND_MAP(0x23, &(0x7f00000000c0)={r1, r2}, 0xc) 08:34:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x7}]}}, &(0x7f0000000840)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 08:34:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000840)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 08:34:04 executing program 4: socketpair(0x1, 0x0, 0x5b000000, &(0x7f0000000040)) 08:34:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x7}]}}, &(0x7f0000000840)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 08:34:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x2}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 08:34:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x7}]}}, &(0x7f0000000840)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 08:34:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x7}]}}, &(0x7f0000000840)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 08:34:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x2, [@func_proto, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000840)=""/4096, 0x3a, 0x1000, 0x1}, 0x20) 08:34:05 executing program 4: socketpair(0x1, 0x0, 0x5b010000, &(0x7f0000000040)) 08:34:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000020000280000006b00000002000000000000000100000d00000000060000000000000006000000000000090000000000612e002e5f00"], &(0x7f0000001840)=""/4108, 0x42, 0x1000, 0x1}, 0x20) socket$rxrpc(0x21, 0x2, 0xa) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) iopl(0x3) write$cgroup_type(r0, &(0x7f00000000c0)='threaded\x00', 0x9) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r1, 0x891a, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) 08:34:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0x7, 0x0, [{}]}]}}, &(0x7f0000000840)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 08:34:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x2}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 08:34:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x7}]}}, &(0x7f0000000840)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 08:34:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x2, [@func_proto, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000840)=""/4096, 0x3a, 0x1000, 0x1}, 0x20) 08:34:05 executing program 4: socketpair(0x1, 0x0, 0x5c000000, &(0x7f0000000040)) 08:34:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) getsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, &(0x7f0000000000), &(0x7f0000000040)=0x4) 08:34:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:34:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0x7, 0x0, [{}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 08:34:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x2}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 08:34:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x2, [@func_proto, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000840)=""/4096, 0x3a, 0x1000, 0x1}, 0x20) 08:34:05 executing program 4: socketpair(0x1, 0x0, 0x5c010000, &(0x7f0000000040)) 08:34:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) sendto$rxrpc(0xffffffffffffffff, &(0x7f0000000000)="0d5406aaeede7a4a0a874eddb43180dffb8e48ca9fc506549de9d21d9961bb53c3870244a72896704a673dc71380d7c2658389867b002cf3299e5eea79905743bf5e9bc9c582b7f577c830", 0x4b, 0x0, &(0x7f0000000080)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e20, 0x6, @mcast2, 0x84}}, 0x24) 08:34:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, 0x0, 0x42, 0x0, 0x1}, 0x20) 08:34:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0x7, 0x0, [{}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 08:34:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000}, 0x20) 08:34:05 executing program 4: socketpair(0x1, 0x0, 0x5d000000, &(0x7f0000000040)) 08:34:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:34:05 executing program 5: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) r1 = memfd_create(&(0x7f0000000000)='\x00', 0x3) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000040)={r1, 0x1, 0x100000000}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:34:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, 0x0, 0x42, 0x0, 0x1}, 0x20) 08:34:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0x7, 0x0, [{}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 08:34:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000}, 0x20) 08:34:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:34:05 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x64, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xb}, {0x6}]}, @union={0x2, 0x5, 0x0, 0x5, 0x1, 0x6, [{0x6, 0x2}, {0x2, 0x5, 0x71}, {0x5, 0x5, 0x5e15}, {0xc, 0x4, 0x6}, {0x6, 0x5, 0x4b91}]}]}}, &(0x7f0000001840)=""/4096, 0x7e, 0x1000, 0x1}, 0x20) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r1, 0x891a, 0x0) recvfrom$rxrpc(r1, &(0x7f0000000140)=""/34, 0x22, 0x2, &(0x7f0000000180)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @empty}}, 0x24) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r0, 0x10, &(0x7f0000000080)={&(0x7f0000000000)=""/76, 0x4c}}, 0x10) 08:34:05 executing program 4: socketpair(0x1, 0x0, 0x5d010000, &(0x7f0000000040)) 08:34:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, 0x0, 0x42, 0x0, 0x1}, 0x20) 08:34:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0x7, 0x0, [{}]}]}}, &(0x7f0000000840)=""/4096, 0x2e, 0x1000}, 0x20) 08:34:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000}, 0x20) 08:34:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:34:05 executing program 5: ioctl$PPPIOCSCOMPRESS(0xffffffffffffffff, 0x4010744d) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:34:05 executing program 4: socketpair(0x1, 0x0, 0x5e000000, &(0x7f0000000040)) 08:34:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000}, 0x20) 08:34:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0x7, 0x0, [{}]}]}}, &(0x7f0000000840)=""/4096, 0x2e, 0x1000}, 0x20) 08:34:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:34:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, &(0x7f0000000000)=""/1, &(0x7f0000000040)=0x1) 08:34:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000020000280000006b00000002000000000000000100000d00000000060000000000000006000000000000090000000000612e002e5f00"], &(0x7f0000001840)=""/4108, 0x42, 0x1000, 0x1}, 0x20) socket$rxrpc(0x21, 0x2, 0xa) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) iopl(0x3) write$cgroup_type(r0, &(0x7f00000000c0)='threaded\x00', 0x9) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r1, 0x891a, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) 08:34:05 executing program 4: socketpair(0x1, 0x0, 0x5e010000, &(0x7f0000000040)) 08:34:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0x7, 0x0, [{}]}]}}, &(0x7f0000000840)=""/4096, 0x2e, 0x1000}, 0x20) 08:34:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) io_pgetevents(0x0, 0x6, 0x0, &(0x7f0000000000), &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0)={&(0x7f0000000080)={[0x34727eb3]}, 0x8}) 08:34:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000}, 0x20) 08:34:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:34:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x2}]}, {0x0, [0x2e]}}, &(0x7f0000000840)=""/4096, 0x2b, 0x1000, 0x1}, 0x20) 08:34:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x2f, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4}}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 08:34:06 executing program 4: socketpair(0x1, 0x0, 0x5f000000, &(0x7f0000000040)) 08:34:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x2, [@typedef={0x7}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x3a, 0x1000}, 0x20) 08:34:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 08:34:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x2}]}, {0x0, [0x2e]}}, &(0x7f0000000840)=""/4096, 0x2b, 0x1000, 0x1}, 0x20) 08:34:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000}, 0x20) 08:34:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x2f, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4}}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 08:34:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 08:34:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x2}]}, {0x0, [0x2e]}}, &(0x7f0000000840)=""/4096, 0x2b, 0x1000, 0x1}, 0x20) 08:34:06 executing program 4: socketpair(0x1, 0x0, 0x5f010000, &(0x7f0000000040)) 08:34:06 executing program 5: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r0, 0x800, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7f}]}, 0x24}, 0x1, 0x0, 0x0, 0x4040001}, 0x2000c080) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x113, 0x113, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @union={0x3, 0x6, 0x0, 0x5, 0x1, 0x20, [{0xa, 0x4}, {0xd, 0x0, 0x9c4}, {0xc, 0x3, 0x1ff}, {0x9, 0x5, 0xc6}, {0x8, 0x4, 0x2}, {0x10, 0x1, 0x2}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x3}}, @datasec={0x7, 0x9, 0x0, 0xf, 0x3, [{0x4, 0xfffffffa}, {0x5, 0xffff, 0x6}, {0x4, 0x4, 0xfffffffa}, {0x1, 0x3}, {0x4, 0xfff, 0x4}, {0x3, 0x6, 0x6}, {0x4, 0x4, 0x7027ff4b}, {0x2, 0x84, 0x80000001}, {0x2, 0x6, 0xffffff01}], "ce2d3b"}, @ptr={0x10, 0x0, 0x0, 0x2, 0x4}, @typedef={0x1, 0x0, 0x0, 0x8, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x12e, 0x1000, 0x1}, 0x20) r1 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000540)={0x28, 0x0, 0x0, @host}, 0x10, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000580)=0xfff, 0x8) 08:34:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x2f, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4}}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 08:34:06 executing program 5: r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@nfc, &(0x7f0000000080)=0x80, 0x800) getpeername$l2tp6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @private1}, &(0x7f0000000140)=0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:34:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4}}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 08:34:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:34:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 08:34:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:34:06 executing program 4: socketpair(0x1, 0x0, 0x60000000, &(0x7f0000000040)) 08:34:06 executing program 5: socketpair(0x8, 0x2, 0x3f, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x54, 0x0, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0xfc01}, @L2TP_ATTR_SESSION_ID={0x8}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0xe8a}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}]}, 0x54}, 0x1, 0x0, 0x0, 0x40000}, 0x200408c4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000028000000280000000200000000000000000000000000000000000000000100000d03000000000000000100000000e1ff00000000000086bfd431948db59037bcff657c4f3c7b"], &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:34:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x7}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 08:34:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:34:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4}}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 08:34:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:34:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x7}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 08:34:06 executing program 4: socketpair(0x1, 0x0, 0x60010000, &(0x7f0000000040)) 08:34:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:34:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x41, 0x3, [@struct={0x6, 0x4, 0x0, 0x4, 0x0, 0x5, [{0x7, 0x4, 0x9}, {0xe, 0x0, 0xfff}, {0xe, 0x2, 0x4}, {0x1, 0x2, 0x101}]}, @struct={0xe, 0x0, 0x0, 0x4, 0x0, 0x9}]}, {0x0, [0x2e]}}, &(0x7f0000000840)=""/4096, 0x63, 0x1000, 0x1}, 0x20) 08:34:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:34:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4}}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 08:34:06 executing program 4: socketpair(0x1, 0x0, 0x61000000, &(0x7f0000000040)) 08:34:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:34:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x7}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 08:34:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb01001800000000005f00000000000100000d00000000000000527f1d462ac84eec000100000d0000000000000000010000000000"], &(0x7f0000000840)=""/4080, 0x42, 0xff0, 0x1}, 0x20) socket$nl_generic(0x10, 0x3, 0x10) 08:34:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:34:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:34:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:34:06 executing program 4: socketpair(0x1, 0x0, 0x61010000, &(0x7f0000000040)) 08:34:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb0100180000000000000089192922937ae053c7618b2e0aaac541280000002800000002000000000000000100000d000000000000000000000000000000000100"], &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) ioctl$SOUND_OLD_MIXER_INFO(0xffffffffffffffff, 0x80304d65, &(0x7f0000000000)) 08:34:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x7}]}}, &(0x7f0000000840)=""/4096, 0x26, 0x1000}, 0x20) 08:34:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:34:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:34:07 executing program 5: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYRES64=r0], &(0x7f0000001840)=""/4099, 0x42, 0x1003, 0x1}, 0x20) wait4(0xffffffffffffffff, &(0x7f00000000c0), 0x4, &(0x7f0000000140)) clock_gettime(0xefbd8aa34c4cd931, &(0x7f0000000200)) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='cgroup\x00') ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f00000002c0)={0x18, 0x0, {0x0, @dev={[], 0x23}, 'syzkaller1\x00'}}) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r2, 0x891a, 0x0) getsockopt$TIPC_DEST_DROPPABLE(r2, 0x10f, 0x81, &(0x7f0000000000), &(0x7f0000000080)=0x4) 08:34:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:34:07 executing program 4: socketpair(0x1, 0x0, 0x62000000, &(0x7f0000000040)) 08:34:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:34:07 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x7}]}}, &(0x7f0000000840)=""/4096, 0x26, 0x1000}, 0x20) 08:34:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:34:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:34:07 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x7}]}}, &(0x7f0000000840)=""/4096, 0x26, 0x1000}, 0x20) 08:34:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 08:34:07 executing program 4: socketpair(0x1, 0x0, 0x62010000, &(0x7f0000000040)) 08:34:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x2e]}}, &(0x7f0000000840)=""/4096, 0x1b, 0x1000, 0x1}, 0x20) 08:34:07 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 08:34:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}, {0x0, [0x0, 0x61, 0x0, 0x2e]}}, &(0x7f0000000840)=""/4096, 0x46, 0x1000, 0x1}, 0x20) 08:34:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 08:34:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:34:07 executing program 4: socketpair(0x1, 0x0, 0x63000000, &(0x7f0000000040)) 08:34:07 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYRES64=r0], &(0x7f0000001840)=""/4099, 0x42, 0x1003, 0x1}, 0x20) wait4(0xffffffffffffffff, &(0x7f00000000c0), 0x4, &(0x7f0000000140)) clock_gettime(0xefbd8aa34c4cd931, &(0x7f0000000200)) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='cgroup\x00') ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f00000002c0)={0x18, 0x0, {0x0, @dev={[], 0x23}, 'syzkaller1\x00'}}) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r2, 0x891a, 0x0) getsockopt$TIPC_DEST_DROPPABLE(r2, 0x10f, 0x81, &(0x7f0000000000), &(0x7f0000000080)=0x4) 08:34:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x2e]}}, &(0x7f0000000840)=""/4096, 0x1b, 0x1000, 0x1}, 0x20) 08:34:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 08:34:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:34:07 executing program 5: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbff, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x400e000) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:34:07 executing program 4: socketpair(0x1, 0x0, 0x63010000, &(0x7f0000000040)) 08:34:07 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYRES64=r0], &(0x7f0000001840)=""/4099, 0x42, 0x1003, 0x1}, 0x20) wait4(0xffffffffffffffff, &(0x7f00000000c0), 0x4, &(0x7f0000000140)) clock_gettime(0xefbd8aa34c4cd931, &(0x7f0000000200)) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='cgroup\x00') ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f00000002c0)={0x18, 0x0, {0x0, @dev={[], 0x23}, 'syzkaller1\x00'}}) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r2, 0x891a, 0x0) getsockopt$TIPC_DEST_DROPPABLE(r2, 0x10f, 0x81, &(0x7f0000000000), &(0x7f0000000080)=0x4) 08:34:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x2f, 0x0, 0x18, 0x18, 0x2, [@array]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 08:34:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x2e]}}, &(0x7f0000000840)=""/4096, 0x1b, 0x1000, 0x1}, 0x20) 08:34:07 executing program 4: socketpair(0x1, 0x0, 0x64000000, &(0x7f0000000040)) 08:34:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 08:34:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="00000000280000002800000002000095680000000100000d0000000000005e281ad94007000000000113000d00000000000000000100"/66], &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:34:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x2f, 0x0, 0x18, 0x18, 0x2, [@array]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 08:34:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x0, 0x2}]}, {0x0, [0x2e]}}, &(0x7f0000000840)=""/4096, 0x2b, 0x1000, 0x1}, 0x20) 08:34:07 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYRES64=r0], &(0x7f0000001840)=""/4099, 0x42, 0x1003, 0x1}, 0x20) wait4(0xffffffffffffffff, &(0x7f00000000c0), 0x4, &(0x7f0000000140)) clock_gettime(0xefbd8aa34c4cd931, &(0x7f0000000200)) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='cgroup\x00') ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f00000002c0)={0x18, 0x0, {0x0, @dev={[], 0x23}, 'syzkaller1\x00'}}) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r2, 0x891a, 0x0) getsockopt$TIPC_DEST_DROPPABLE(r2, 0x10f, 0x81, &(0x7f0000000000), &(0x7f0000000080)=0x4) 08:34:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 08:34:07 executing program 4: socketpair(0x1, 0x0, 0x64010000, &(0x7f0000000040)) 08:34:07 executing program 5: inotify_init() bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000002800003be04a2d4d6ed09c5417002800000002000000000000000100000d000000000000000000000000000000000100000d0000000000000000010000000000"], &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) inotify_rm_watch(r0, 0x0) 08:34:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x2f, 0x0, 0x18, 0x18, 0x2, [@array]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 08:34:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 08:34:07 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYRES64=r0], &(0x7f0000001840)=""/4099, 0x42, 0x1003, 0x1}, 0x20) wait4(0xffffffffffffffff, &(0x7f00000000c0), 0x4, &(0x7f0000000140)) clock_gettime(0xefbd8aa34c4cd931, &(0x7f0000000200)) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='cgroup\x00') ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f00000002c0)={0x18, 0x0, {0x0, @dev={[], 0x23}, 'syzkaller1\x00'}}) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r2, 0x891a, 0x0) 08:34:07 executing program 4: socketpair(0x1, 0x0, 0x65000000, &(0x7f0000000040)) 08:34:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x2f, 0x0, 0x18, 0x18, 0x2, [@array]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 08:34:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, 0x0, 0x2a, 0x0, 0x1}, 0x20) 08:34:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) ioctl$SOUND_MIXER_READ_STEREODEVS(0xffffffffffffffff, 0x80044dfb, &(0x7f0000000000)) r0 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @private1}, &(0x7f00000000c0)=0x80, 0x800) getpeername$l2tp6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private2}, &(0x7f0000000180)=0x20) 08:34:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 08:34:07 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYRES64=r0], &(0x7f0000001840)=""/4099, 0x42, 0x1003, 0x1}, 0x20) wait4(0xffffffffffffffff, &(0x7f00000000c0), 0x4, &(0x7f0000000140)) clock_gettime(0xefbd8aa34c4cd931, &(0x7f0000000200)) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='cgroup\x00') ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f00000002c0)={0x18, 0x0, {0x0, @dev={[], 0x23}, 'syzkaller1\x00'}}) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) 08:34:08 executing program 4: socketpair(0x1, 0x0, 0x65010000, &(0x7f0000000040)) 08:34:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, 0x0, 0x2a, 0x0, 0x1}, 0x20) 08:34:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x2f, 0x0, 0x18, 0x18, 0x2, [@array]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000}, 0x20) 08:34:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000}, 0x20) 08:34:08 executing program 5: setsockopt$RXRPC_EXCLUSIVE_CONNECTION(0xffffffffffffffff, 0x110, 0x3) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:34:08 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYRES64=r0], &(0x7f0000001840)=""/4099, 0x42, 0x1003, 0x1}, 0x20) wait4(0xffffffffffffffff, &(0x7f00000000c0), 0x4, &(0x7f0000000140)) clock_gettime(0xefbd8aa34c4cd931, &(0x7f0000000200)) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='cgroup\x00') ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f00000002c0)={0x18, 0x0, {0x0, @dev={[], 0x23}, 'syzkaller1\x00'}}) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)) 08:34:08 executing program 4: socketpair(0x1, 0x0, 0x66000000, &(0x7f0000000040)) 08:34:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x2f, 0x0, 0x18, 0x18, 0x2, [@array]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000}, 0x20) 08:34:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, 0x0, 0x2a, 0x0, 0x1}, 0x20) 08:34:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000c9bd4ef2559199de864377d8403b63c600000000280000002800000002000000000004000100000d000000000000000000000000000000000100000d0000000000000000010000000000"], &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) setsockopt$RXRPC_UPGRADEABLE_SERVICE(0xffffffffffffffff, 0x110, 0x5, &(0x7f0000000040)=[0x1, 0x1], 0x2) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000000)={0x7fffffff}, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x6, [@typedef={0x0, 0x0, 0x0, 0x8, 0x3}, @typedef={0xf, 0x0, 0x0, 0x8, 0x4}, @typedef={0xf, 0x0, 0x0, 0x8, 0x4}]}, {0x0, [0x0, 0x30, 0x2e, 0x6f]}}, &(0x7f00000001c0)=""/4, 0x42, 0x4, 0x1}, 0x20) 08:34:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000}, 0x20) 08:34:08 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYRES64=r0], &(0x7f0000001840)=""/4099, 0x42, 0x1003, 0x1}, 0x20) wait4(0xffffffffffffffff, &(0x7f00000000c0), 0x4, &(0x7f0000000140)) clock_gettime(0xefbd8aa34c4cd931, &(0x7f0000000200)) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='cgroup\x00') ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f00000002c0)={0x18, 0x0, {0x0, @dev={[], 0x23}, 'syzkaller1\x00'}}) 08:34:08 executing program 4: socketpair(0x1, 0x0, 0x66010000, &(0x7f0000000040)) 08:34:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000}, 0x20) 08:34:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x2f, 0x0, 0x18, 0x18, 0x2, [@array]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000}, 0x20) 08:34:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@enum={0xc, 0x0, 0x0, 0x6, 0x4, [{0xb, 0x200}, {0x10, 0x5}, {0xd, 0x6}, {0x0, 0x6b}, {0x8, 0x8}, {0xd, 0x5}, {0x8, 0x857}, {0xd, 0x2}]}, @var={0x10, 0x0, 0x0, 0xe, 0x1}, @typedef={0x86, 0x0, 0x0, 0x8, 0x4}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x2, 0x3}}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) socket$inet6_icmp(0xa, 0x2, 0x3a) 08:34:08 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYRES64=r0], &(0x7f0000001840)=""/4099, 0x42, 0x1003, 0x1}, 0x20) wait4(0xffffffffffffffff, &(0x7f00000000c0), 0x4, &(0x7f0000000140)) clock_gettime(0xefbd8aa34c4cd931, &(0x7f0000000200)) syz_open_procfs(0x0, &(0x7f0000000280)='cgroup\x00') 08:34:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000}, 0x20) 08:34:08 executing program 0: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYRES64=r0], &(0x7f0000001840)=""/4099, 0x42, 0x1003, 0x1}, 0x20) wait4(0xffffffffffffffff, &(0x7f00000000c0), 0x4, &(0x7f0000000140)) clock_gettime(0xefbd8aa34c4cd931, &(0x7f0000000200)) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='cgroup\x00') ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f00000002c0)={0x18, 0x0, {0x0, @dev={[], 0x23}, 'syzkaller1\x00'}}) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) 08:34:08 executing program 4: socketpair(0x1, 0x0, 0x67000000, &(0x7f0000000040)) 08:34:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000}, 0x20) 08:34:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018000019d9947a8f24f0b600000000000900000018000000020000000d0000000000000a010000000d000000000000090200000000615f2e0047aff49a"], &(0x7f0000001840)=""/4106, 0x32, 0x100a, 0x1}, 0x20) 08:34:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4}}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 08:34:08 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYRES64=r0], &(0x7f0000001840)=""/4099, 0x42, 0x1003, 0x1}, 0x20) wait4(0xffffffffffffffff, &(0x7f00000000c0), 0x4, &(0x7f0000000140)) clock_gettime(0xefbd8aa34c4cd931, &(0x7f0000000200)) 08:34:08 executing program 4: socketpair(0x1, 0x0, 0x67010000, &(0x7f0000000040)) 08:34:08 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4}}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 08:34:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000}, 0x20) 08:34:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4}}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 08:34:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000800000000000000000100000d00000000000000000099316ba24b5777b1940000000100000d0000000020007c692b23828e920000010000000000"], &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x16, &(0x7f0000000140)={0x9, &(0x7f0000000080)=[{0x5, 0x2, 0x3f, 0xffff3840}, {0x1, 0x1, 0x9a, 0x9a}, {0x6, 0x9, 0x6, 0x3}, {0x111e, 0x8, 0x4, 0x7}, {0x8001, 0x0, 0x2, 0x4}, {0x5, 0x3, 0x42, 0x80000000}, {0x8, 0x1b, 0x4, 0xffffffff}, {0x3, 0x3, 0x0, 0x3f}, {0x3, 0x8, 0x3, 0x7}]}) 08:34:08 executing program 4: socketpair(0x1, 0x0, 0x68000000, &(0x7f0000000040)) 08:34:08 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYRES64=r0], &(0x7f0000001840)=""/4099, 0x42, 0x1003, 0x1}, 0x20) clock_gettime(0xefbd8aa34c4cd931, &(0x7f0000000200)) 08:34:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4}}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 08:34:08 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4}}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 08:34:08 executing program 4: socketpair(0x1, 0x0, 0x68010000, &(0x7f0000000040)) 08:34:08 executing program 1: socketpair(0x1, 0x0, 0x68000000, &(0x7f0000000040)) 08:34:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000002f0000002f00000002000000000000000100ff0f0000000000000000000000000d0000000100000f030000000200000009000000030000009baae5000000"], &(0x7f0000001840)=""/4096, 0x4a, 0x1000, 0xfffffffd}, 0x20) inotify_init1(0x80000) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001280)={&(0x7f0000000140)="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", &(0x7f0000001140)=""/146, &(0x7f0000001200)="5c3c69fd38441c7fba262d963b8530ea319b04b64c819459a51aa177c34483a0d1ac1f645a", &(0x7f0000001240)="50df7b74098f2ffcfa1629352e433c2086aaea8efb", 0x0, 0x1}, 0x38) r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000080)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x10000, 0x4000}) 08:34:08 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) clock_gettime(0xefbd8aa34c4cd931, &(0x7f0000000200)) 08:34:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:34:08 executing program 4: socketpair(0x1, 0x0, 0x69000000, &(0x7f0000000040)) 08:34:08 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4}}]}}, &(0x7f0000000840)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 08:34:08 executing program 1 (fault-call:0 fault-nth:0): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dri/renderD128\x00', 0x2080, 0x0) [ 2947.622711][T21936] FAULT_INJECTION: forcing a failure. [ 2947.622711][T21936] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2947.637847][T21936] CPU: 1 PID: 21936 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 2947.646627][T21936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2947.656680][T21936] Call Trace: [ 2947.659962][T21936] dump_stack+0x107/0x163 [ 2947.664299][T21936] should_fail.cold+0x5/0xa 08:34:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:34:09 executing program 0: bpf$BPF_BTF_LOAD(0x10, 0x0, 0x0) [ 2947.668809][T21936] _copy_from_user+0x2c/0x180 [ 2947.673490][T21936] __do_sys_bpf+0x156/0x4f10 [ 2947.678091][T21936] ? bpf_link_get_from_fd+0x110/0x110 [ 2947.683473][T21936] ? __mutex_unlock_slowpath+0xe2/0x610 [ 2947.689024][T21936] ? wait_for_completion_io+0x260/0x260 [ 2947.694586][T21936] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2947.700486][T21936] do_syscall_64+0x2d/0x70 [ 2947.705000][T21936] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2947.710897][T21936] RIP: 0033:0x45e219 08:34:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 08:34:09 executing program 0: bpf$BPF_BTF_LOAD(0x10, 0x0, 0x0) [ 2947.714785][T21936] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2947.734392][T21936] RSP: 002b:00007f6e506bfc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2947.742806][T21936] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 [ 2947.750774][T21936] RDX: 0000000000000020 RSI: 0000000020000100 RDI: 0000000000000012 [ 2947.758742][T21936] RBP: 00007f6e506bfca0 R08: 0000000000000000 R09: 0000000000000000 08:34:09 executing program 2: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) clock_gettime(0xefbd8aa34c4cd931, &(0x7f0000000200)) 08:34:09 executing program 0: bpf$BPF_BTF_LOAD(0x10, 0x0, 0x0) 08:34:09 executing program 4: socketpair(0x1, 0x0, 0x69010000, &(0x7f0000000040)) [ 2947.766718][T21936] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2947.774691][T21936] R13: 00007ffd37bdba4f R14: 00007f6e506c09c0 R15: 000000000119bf8c 08:34:09 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) io_setup(0x8001, &(0x7f0000000000)=0x0) io_destroy(r1) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_names\x00') r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r3, 0x891a, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, 0x0, 0x20, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x80}]}, 0x34}, 0x1, 0x0, 0x0, 0x840}, 0x801) io_submit(r1, 0x2, &(0x7f0000000180)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000)="a0c7a74505a4d1822c2c3939d52247ab494663946df06ef0e0cde98e6da99c5bdc4b016569c15c6a", 0x28, 0x1, 0x0, 0x3, r2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x3, 0x6, r3, &(0x7f00000000c0)="e6d14665a5b886adb0185bdf4e88f6d8d5e1ba08debe7f5e79cae57513f691ef15c5cde25480985c020903242a", 0x2d, 0x9, 0x0, 0x3, r0}]) 08:34:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:34:09 executing program 4: socketpair(0x1, 0x0, 0x6a000000, &(0x7f0000000040)) 08:34:09 executing program 1 (fault-call:0 fault-nth:1): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:09 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:34:09 executing program 2: clock_gettime(0xefbd8aa34c4cd931, &(0x7f0000000200)) 08:34:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:34:09 executing program 4: socketpair(0x1, 0x0, 0x6a010000, &(0x7f0000000040)) 08:34:09 executing program 2: clock_gettime(0x0, &(0x7f0000000200)) 08:34:09 executing program 5: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000080)) 08:34:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:34:09 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) [ 2948.103153][T21966] FAULT_INJECTION: forcing a failure. [ 2948.103153][T21966] name failslab, interval 1, probability 0, space 0, times 0 08:34:09 executing program 4: socketpair(0x1, 0x0, 0x6b000000, &(0x7f0000000040)) [ 2948.177350][T21966] CPU: 0 PID: 21966 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 2948.186169][T21966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2948.196222][T21966] Call Trace: [ 2948.199497][T21966] dump_stack+0x107/0x163 [ 2948.203838][T21966] should_fail.cold+0x5/0xa [ 2948.208345][T21966] ? btf_new_fd+0x1d1/0x2120 [ 2948.212939][T21966] ? btf_new_fd+0x1d1/0x2120 [ 2948.217529][T21966] should_failslab+0x5/0x10 [ 2948.222040][T21966] kmem_cache_alloc_trace+0x55/0x360 [ 2948.227337][T21966] btf_new_fd+0x1d1/0x2120 [ 2948.231756][T21966] ? __might_fault+0xd3/0x180 [ 2948.236533][T21966] ? lock_downgrade+0x6d0/0x6d0 [ 2948.241398][T21966] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2948.247733][T21966] ? apparmor_capable+0x1d8/0x460 [ 2948.252802][T21966] ? btf_type_snprintf_show+0x140/0x140 [ 2948.258351][T21966] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2948.264598][T21966] ? security_capable+0x8f/0xc0 [ 2948.269459][T21966] __do_sys_bpf+0x158d/0x4f10 08:34:09 executing program 5: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0xa0080, 0x0) 08:34:09 executing program 4: socketpair(0x1, 0x0, 0x6b010000, &(0x7f0000000040)) [ 2948.274146][T21966] ? bpf_link_get_from_fd+0x110/0x110 [ 2948.279530][T21966] ? __mutex_unlock_slowpath+0xe2/0x610 [ 2948.285086][T21966] ? wait_for_completion_io+0x260/0x260 [ 2948.290652][T21966] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2948.296560][T21966] do_syscall_64+0x2d/0x70 [ 2948.300977][T21966] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2948.306876][T21966] RIP: 0033:0x45e219 [ 2948.310772][T21966] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2948.330563][T21966] RSP: 002b:00007f6e506bfc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2948.339070][T21966] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 [ 2948.347279][T21966] RDX: 0000000000000020 RSI: 0000000020000100 RDI: 0000000000000012 [ 2948.355233][T21966] RBP: 00007f6e506bfca0 R08: 0000000000000000 R09: 0000000000000000 [ 2948.363388][T21966] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2948.371342][T21966] R13: 00007ffd37bdba4f R14: 00007f6e506c09c0 R15: 000000000119bf8c 08:34:09 executing program 1 (fault-call:0 fault-nth:2): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x2, [@fwd={0x10}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x3a, 0x1000, 0x1}, 0x20) ioctl$SOUND_OLD_MIXER_INFO(0xffffffffffffffff, 0x80304d65, &(0x7f0000000000)) 08:34:09 executing program 4: socketpair(0x1, 0x0, 0x6c000000, &(0x7f0000000040)) 08:34:09 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 08:34:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 08:34:09 executing program 2: clock_gettime(0x0, &(0x7f0000000200)) 08:34:09 executing program 4: socketpair(0x1, 0x0, 0x6c010000, &(0x7f0000000040)) 08:34:09 executing program 2: clock_gettime(0x0, &(0x7f0000000200)) 08:34:09 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 08:34:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb000000002800020000000000000001459631cc2fae49d700000d0000000000000000000000000100000d0000000000001b00010000001c00"/68], &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000200), 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@typedef={0x8, 0x0, 0x0, 0x8, 0x5}]}, {0x0, [0x61, 0x2e, 0x30, 0x71, 0x0]}}, &(0x7f0000000140)=""/187, 0x2b, 0xbb, 0x1}, 0x20) ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x40047451, &(0x7f0000000240)=0x7) 08:34:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) [ 2948.522609][T21995] FAULT_INJECTION: forcing a failure. [ 2948.522609][T21995] name failslab, interval 1, probability 0, space 0, times 0 [ 2948.583638][T21995] CPU: 1 PID: 21995 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 2948.593302][T21995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2948.603370][T21995] Call Trace: [ 2948.606650][T21995] dump_stack+0x107/0x163 [ 2948.610991][T21995] should_fail.cold+0x5/0xa [ 2948.615552][T21995] ? btf_new_fd+0x41b/0x2120 [ 2948.620146][T21995] ? btf_new_fd+0x41b/0x2120 [ 2948.624740][T21995] should_failslab+0x5/0x10 [ 2948.629367][T21995] kmem_cache_alloc_trace+0x55/0x360 [ 2948.634654][T21995] btf_new_fd+0x41b/0x2120 [ 2948.639066][T21995] ? __might_fault+0xd3/0x180 [ 2948.643830][T21995] ? lock_downgrade+0x6d0/0x6d0 [ 2948.648687][T21995] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2948.655915][T21995] ? apparmor_capable+0x1d8/0x460 [ 2948.660948][T21995] ? btf_type_snprintf_show+0x140/0x140 [ 2948.667177][T21995] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2948.673420][T21995] ? security_capable+0x8f/0xc0 [ 2948.678303][T21995] __do_sys_bpf+0x158d/0x4f10 08:34:10 executing program 2: clock_gettime(0xefbd8aa34c4cd931, 0x0) [ 2948.683432][T21995] ? bpf_link_get_from_fd+0x110/0x110 [ 2948.689776][T21995] ? __mutex_unlock_slowpath+0xe2/0x610 [ 2948.695480][T21995] ? wait_for_completion_io+0x260/0x260 [ 2948.702204][T21995] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2948.708746][T21995] do_syscall_64+0x2d/0x70 [ 2948.713164][T21995] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2948.719109][T21995] RIP: 0033:0x45e219 [ 2948.723001][T21995] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2948.742777][T21995] RSP: 002b:00007f6e506bfc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2948.751190][T21995] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 [ 2948.760204][T21995] RDX: 0000000000000020 RSI: 0000000020000100 RDI: 0000000000000012 [ 2948.768741][T21995] RBP: 00007f6e506bfca0 R08: 0000000000000000 R09: 0000000000000000 [ 2948.777199][T21995] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2948.785163][T21995] R13: 00007ffd37bdba4f R14: 00007f6e506c09c0 R15: 000000000119bf8c 08:34:10 executing program 1 (fault-call:0 fault-nth:3): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:10 executing program 4: socketpair(0x1, 0x0, 0x6d000000, &(0x7f0000000040)) 08:34:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 08:34:10 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) 08:34:10 executing program 2 (fault-call:0 fault-nth:0): clock_gettime(0xefbd8aa34c4cd931, 0x0) 08:34:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @union={0x8, 0x1, 0x0, 0x5, 0x0, 0x6aa, [{0x4, 0x3, 0x5}]}]}}, &(0x7f0000000840)=""/4096, 0x46, 0x1000, 0x1}, 0x20) [ 2948.950046][T22016] FAULT_INJECTION: forcing a failure. [ 2948.950046][T22016] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2948.985438][T22019] FAULT_INJECTION: forcing a failure. [ 2948.985438][T22019] name failslab, interval 1, probability 0, space 0, times 0 [ 2948.991183][T22016] CPU: 0 PID: 22016 Comm: syz-executor.2 Not tainted 5.11.0-rc1-syzkaller #0 [ 2949.007141][T22016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2949.017193][T22016] Call Trace: [ 2949.020469][T22016] dump_stack+0x107/0x163 [ 2949.024803][T22016] should_fail.cold+0x5/0xa [ 2949.029479][T22016] _copy_to_user+0x2c/0x150 [ 2949.033981][T22016] simple_read_from_buffer+0xcc/0x160 [ 2949.039355][T22016] proc_fail_nth_read+0x187/0x220 [ 2949.044378][T22016] ? proc_exe_link+0x1d0/0x1d0 [ 2949.049135][T22016] ? security_file_permission+0x248/0x560 [ 2949.054861][T22016] ? proc_exe_link+0x1d0/0x1d0 [ 2949.059623][T22016] vfs_read+0x1b5/0x570 [ 2949.063790][T22016] ksys_read+0x12d/0x250 [ 2949.068024][T22016] ? vfs_write+0xa30/0xa30 [ 2949.072436][T22016] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2949.078328][T22016] do_syscall_64+0x2d/0x70 [ 2949.082733][T22016] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2949.088621][T22016] RIP: 0033:0x417b11 [ 2949.092511][T22016] Code: 75 14 b8 00 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 6a fc ff ff 48 89 04 24 b8 00 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2949.112119][T22016] RSP: 002b:00007f69d25d6c70 EFLAGS: 00000293 ORIG_RAX: 0000000000000000 [ 2949.120525][T22016] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 0000000000417b11 [ 2949.128487][T22016] RDX: 000000000000000f RSI: 00007f69d25d6cb0 RDI: 0000000000000003 [ 2949.136453][T22016] RBP: 00007f69d25d6ca0 R08: 0000000000000000 R09: 0000000000000000 08:34:10 executing program 4: socketpair(0x1, 0x0, 0x6d010000, &(0x7f0000000040)) 08:34:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) [ 2949.144414][T22016] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 2949.152373][T22016] R13: 00007ffde27f50bf R14: 00007f69d25d79c0 R15: 000000000119bf8c [ 2949.160514][T22019] CPU: 1 PID: 22019 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 2949.170247][T22019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2949.180399][T22019] Call Trace: [ 2949.183683][T22019] dump_stack+0x107/0x163 [ 2949.188026][T22019] should_fail.cold+0x5/0xa [ 2949.192543][T22019] should_failslab+0x5/0x10 08:34:10 executing program 5: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) recvmsg$kcm(r0, &(0x7f00000000c0)={&(0x7f0000000000)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000140)=""/172, 0xac}], 0x1, &(0x7f0000000200)=""/105, 0x69}, 0x2061) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000001840)=""/4102, 0x42, 0x1006, 0x1}, 0x20) [ 2949.197061][T22019] __kmalloc_node+0x79/0x420 [ 2949.201651][T22019] ? kvmalloc_node+0x61/0xf0 [ 2949.206252][T22019] kvmalloc_node+0x61/0xf0 [ 2949.210674][T22019] btf_new_fd+0x466/0x2120 [ 2949.215181][T22019] ? __might_fault+0xd3/0x180 [ 2949.219891][T22019] ? lock_downgrade+0x6d0/0x6d0 [ 2949.225679][T22019] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2949.232168][T22019] ? apparmor_capable+0x1d8/0x460 [ 2949.237250][T22019] ? btf_type_snprintf_show+0x140/0x140 [ 2949.242803][T22019] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2949.249501][T22019] ? security_capable+0x8f/0xc0 [ 2949.254878][T22019] __do_sys_bpf+0x158d/0x4f10 [ 2949.260140][T22019] ? bpf_link_get_from_fd+0x110/0x110 [ 2949.265527][T22019] ? __mutex_unlock_slowpath+0xe2/0x610 [ 2949.271080][T22019] ? wait_for_completion_io+0x260/0x260 [ 2949.277578][T22019] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2949.283476][T22019] do_syscall_64+0x2d/0x70 [ 2949.287890][T22019] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2949.294990][T22019] RIP: 0033:0x45e219 [ 2949.298980][T22019] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2949.318905][T22019] RSP: 002b:00007f6e506bfc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2949.327318][T22019] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 [ 2949.335289][T22019] RDX: 0000000000000020 RSI: 0000000020000100 RDI: 0000000000000012 [ 2949.343481][T22019] RBP: 00007f6e506bfca0 R08: 0000000000000000 R09: 0000000000000000 08:34:10 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @union={0x8, 0x1, 0x0, 0x5, 0x0, 0x6aa, [{0x4, 0x3, 0x5}]}]}}, &(0x7f0000000840)=""/4096, 0x46, 0x1000, 0x1}, 0x20) [ 2949.351628][T22019] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 2949.359849][T22019] R13: 00007ffd37bdba4f R14: 00007f6e506c09c0 R15: 000000000119bf8c 08:34:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000}, 0x20) 08:34:10 executing program 5: ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, &(0x7f0000000000)=0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], &(0x7f0000001840)=""/4096, 0x40, 0x1000, 0x1}, 0x20) 08:34:10 executing program 1 (fault-call:0 fault-nth:4): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:10 executing program 4: socketpair(0x1, 0x0, 0x6e000000, &(0x7f0000000040)) 08:34:10 executing program 0 (fault-call:0 fault-nth:0): bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) 08:34:10 executing program 2: clock_gettime(0xefbd8aa34c4cd931, 0x0) [ 2949.544677][T22036] FAULT_INJECTION: forcing a failure. [ 2949.544677][T22036] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2949.570247][T22036] CPU: 0 PID: 22036 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2949.579311][T22036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2949.589369][T22036] Call Trace: [ 2949.591516][T22041] FAULT_INJECTION: forcing a failure. [ 2949.591516][T22041] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2949.592649][T22036] dump_stack+0x107/0x163 [ 2949.592681][T22036] should_fail.cold+0x5/0xa [ 2949.616024][T22036] _copy_from_user+0x2c/0x180 [ 2949.622116][T22036] __do_sys_bpf+0x156/0x4f10 [ 2949.626991][T22036] ? bpf_link_get_from_fd+0x110/0x110 [ 2949.632369][T22036] ? __mutex_unlock_slowpath+0xe2/0x610 [ 2949.638600][T22036] ? wait_for_completion_io+0x260/0x260 [ 2949.644605][T22036] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2949.650506][T22036] do_syscall_64+0x2d/0x70 [ 2949.655528][T22036] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2949.661424][T22036] RIP: 0033:0x45e219 [ 2949.665313][T22036] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2949.686231][T22036] RSP: 002b:00007fea660dec68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 08:34:11 executing program 4: socketpair(0x1, 0x0, 0x6e010000, &(0x7f0000000040)) 08:34:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000}, 0x20) [ 2949.695547][T22036] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 [ 2949.703519][T22036] RDX: 0000000000000020 RSI: 0000000020000100 RDI: 0000000000000010 [ 2949.711540][T22036] RBP: 00007fea660deca0 R08: 0000000000000000 R09: 0000000000000000 [ 2949.719510][T22036] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2949.727473][T22036] R13: 00007ffd39a9296f R14: 00007fea660df9c0 R15: 000000000119bf8c [ 2949.735872][T22041] CPU: 1 PID: 22041 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 08:34:11 executing program 2: clock_gettime(0xefbd8aa30000000b, 0x0) 08:34:11 executing program 0 (fault-call:0 fault-nth:1): bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) [ 2949.744653][T22041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2949.754703][T22041] Call Trace: [ 2949.757977][T22041] dump_stack+0x107/0x163 [ 2949.762406][T22041] should_fail.cold+0x5/0xa [ 2949.767882][T22041] _copy_from_user+0x2c/0x180 [ 2949.772660][T22041] btf_new_fd+0x4e3/0x2120 [ 2949.777123][T22041] ? __might_fault+0xd3/0x180 [ 2949.781801][T22041] ? lock_downgrade+0x6d0/0x6d0 [ 2949.786668][T22041] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2949.792917][T22041] ? apparmor_capable+0x1d8/0x460 [ 2949.797946][T22041] ? btf_type_snprintf_show+0x140/0x140 [ 2949.803941][T22041] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2949.810361][T22041] ? security_capable+0x8f/0xc0 [ 2949.815224][T22041] __do_sys_bpf+0x158d/0x4f10 [ 2949.820920][T22041] ? bpf_link_get_from_fd+0x110/0x110 [ 2949.824679][T22044] FAULT_INJECTION: forcing a failure. [ 2949.824679][T22044] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2949.826300][T22041] ? __mutex_unlock_slowpath+0xe2/0x610 [ 2949.826331][T22041] ? wait_for_completion_io+0x260/0x260 [ 2949.826366][T22041] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2949.857010][T22041] do_syscall_64+0x2d/0x70 [ 2949.861430][T22041] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2949.868309][T22041] RIP: 0033:0x45e219 [ 2949.872677][T22041] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2949.892976][T22041] RSP: 002b:00007f6e506bfc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2949.901391][T22041] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 [ 2949.909380][T22041] RDX: 0000000000000020 RSI: 0000000020000100 RDI: 0000000000000012 [ 2949.917433][T22041] RBP: 00007f6e506bfca0 R08: 0000000000000000 R09: 0000000000000000 [ 2949.925483][T22041] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2949.933530][T22041] R13: 00007ffd37bdba4f R14: 00007f6e506c09c0 R15: 000000000119bf8c 08:34:11 executing program 5: accept$phonet_pipe(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x10) [ 2949.962555][T22044] CPU: 1 PID: 22044 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2949.971416][T22044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2949.981723][T22044] Call Trace: [ 2949.985006][T22044] dump_stack+0x107/0x163 [ 2949.989376][T22044] should_fail.cold+0x5/0xa [ 2949.993896][T22044] _copy_to_user+0x2c/0x150 [ 2949.998416][T22044] simple_read_from_buffer+0xcc/0x160 [ 2950.003808][T22044] proc_fail_nth_read+0x187/0x220 08:34:11 executing program 4: socketpair(0x1, 0x0, 0x6f000000, &(0x7f0000000040)) 08:34:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000840)=""/4096, 0x1a, 0x1000}, 0x20) [ 2950.008846][T22044] ? proc_exe_link+0x1d0/0x1d0 [ 2950.013795][T22044] ? security_file_permission+0x248/0x560 [ 2950.019533][T22044] ? proc_exe_link+0x1d0/0x1d0 [ 2950.024310][T22044] vfs_read+0x1b5/0x570 [ 2950.028484][T22044] ksys_read+0x12d/0x250 [ 2950.032749][T22044] ? vfs_write+0xa30/0xa30 [ 2950.037199][T22044] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2950.043377][T22044] do_syscall_64+0x2d/0x70 [ 2950.047808][T22044] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2950.053801][T22044] RIP: 0033:0x417b11 [ 2950.057699][T22044] Code: 75 14 b8 00 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 6a fc ff ff 48 89 04 24 b8 00 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2950.078378][T22044] RSP: 002b:00007fea660dec70 EFLAGS: 00000293 ORIG_RAX: 0000000000000000 [ 2950.087665][T22044] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 0000000000417b11 [ 2950.095633][T22044] RDX: 000000000000000f RSI: 00007fea660decb0 RDI: 0000000000000003 [ 2950.104610][T22044] RBP: 00007fea660deca0 R08: 0000000000000000 R09: 0000000000000000 08:34:11 executing program 1 (fault-call:0 fault-nth:5): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) [ 2950.112587][T22044] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 2950.120728][T22044] R13: 00007ffd39a9296f R14: 00007fea660df9c0 R15: 000000000119bf8c 08:34:11 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x175a40, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r0, 0x80045006, &(0x7f0000000180)) clock_gettime(0xefbd8aa34c4cd931, 0x0) clock_gettime(0x1, &(0x7f00000000c0)) 08:34:11 executing program 4: socketpair(0x1, 0x0, 0x6f010000, &(0x7f0000000040)) 08:34:11 executing program 3: clock_gettime(0xefbd8aa30000000b, 0x0) 08:34:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb01001800e80000000000280000002800000002000000000000000100000d000000000000000000b8c500000000000100000d0000000000000000010000000000"], &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) [ 2950.265449][T22057] FAULT_INJECTION: forcing a failure. [ 2950.265449][T22057] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2950.279200][T22057] CPU: 0 PID: 22057 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 2950.287973][T22057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2950.298022][T22057] Call Trace: [ 2950.301286][T22057] dump_stack+0x107/0x163 [ 2950.305831][T22057] should_fail.cold+0x5/0xa [ 2950.310477][T22057] _copy_to_user+0x2c/0x150 [ 2950.314968][T22057] bpf_verifier_vlog+0x1b2/0x2e0 [ 2950.320247][T22057] __btf_verifier_log+0xbb/0xf0 [ 2950.325667][T22057] ? btf_id_cmp_func+0x90/0x90 [ 2950.330907][T22057] btf_parse_hdr+0x392/0xbc0 [ 2950.335481][T22057] ? btf_enum_log+0xa0/0xa0 [ 2950.340056][T22057] btf_new_fd+0x717/0x2120 [ 2950.344541][T22057] ? __might_fault+0xd3/0x180 [ 2950.349198][T22057] ? lock_downgrade+0x6d0/0x6d0 [ 2950.354035][T22057] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2950.360260][T22057] ? apparmor_capable+0x1d8/0x460 [ 2950.365282][T22057] ? btf_type_snprintf_show+0x140/0x140 [ 2950.370818][T22057] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2950.377040][T22057] ? security_capable+0x8f/0xc0 [ 2950.381966][T22057] __do_sys_bpf+0x158d/0x4f10 [ 2950.386639][T22057] ? bpf_link_get_from_fd+0x110/0x110 [ 2950.391995][T22057] ? __mutex_unlock_slowpath+0xe2/0x610 [ 2950.397538][T22057] ? wait_for_completion_io+0x260/0x260 [ 2950.403158][T22057] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2950.409036][T22057] do_syscall_64+0x2d/0x70 [ 2950.413433][T22057] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2950.419314][T22057] RIP: 0033:0x45e219 [ 2950.423200][T22057] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2950.443066][T22057] RSP: 002b:00007f6e506bfc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2950.451458][T22057] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 08:34:11 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) [ 2950.462118][T22057] RDX: 0000000000000020 RSI: 0000000020000100 RDI: 0000000000000012 [ 2950.470239][T22057] RBP: 00007f6e506bfca0 R08: 0000000000000000 R09: 0000000000000000 [ 2950.478197][T22057] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 2950.486146][T22057] R13: 00007ffd37bdba4f R14: 00007f6e506c09c0 R15: 000000000119bf8c 08:34:11 executing program 1 (fault-call:0 fault-nth:6): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:11 executing program 4: socketpair(0x1, 0x0, 0x70000000, &(0x7f0000000040)) 08:34:12 executing program 5: ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000000)=@buf={0x1000, &(0x7f0000001840)="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"}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x50, 0x0, 0x8, 0x70bd26, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x7}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0xeaa}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e20}, @L2TP_ATTR_SESSION_ID={0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x40000000}, @L2TP_ATTR_PW_TYPE={0x6}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xcc}]}, 0x50}, 0x1, 0x0, 0x0, 0x841}, 0x88d4) 08:34:12 executing program 3: clock_gettime(0xefbd8aa30000000b, 0x0) 08:34:12 executing program 0: bpf$BPF_BTF_LOAD(0x2, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) 08:34:12 executing program 2: r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@un=@abs, &(0x7f0000000080)=0x80, 0x400) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="0000a332db86cd027e20559967eba3b89d1ee4ec5f3b1a6e2f7bd81975f6e138675cd2111a58a13f3e08270100575fbe31c287344695df86", @ANYRES16=0x0, @ANYBLOB="100027bd7000ffdbdf25010000000800020002000000080001002e7a257c180b4366a805ce08ced3a47f02000000"], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4000) clock_gettime(0xefbd8aa34c4cd931, 0x0) [ 2950.675929][T22071] FAULT_INJECTION: forcing a failure. [ 2950.675929][T22071] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2950.744191][T22071] CPU: 1 PID: 22071 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 2950.753269][T22071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2950.763484][T22071] Call Trace: [ 2950.766764][T22071] dump_stack+0x107/0x163 [ 2950.771108][T22071] should_fail.cold+0x5/0xa [ 2950.775621][T22071] _copy_to_user+0x2c/0x150 [ 2950.780135][T22071] bpf_verifier_vlog+0x1b2/0x2e0 [ 2950.785294][T22071] __btf_verifier_log+0xbb/0xf0 [ 2950.790158][T22071] ? btf_id_cmp_func+0x90/0x90 [ 2950.794946][T22071] btf_parse_hdr+0x3d1/0xbc0 [ 2950.799637][T22071] ? btf_enum_log+0xa0/0xa0 [ 2950.804158][T22071] btf_new_fd+0x717/0x2120 [ 2950.808583][T22071] ? __might_fault+0xd3/0x180 [ 2950.813438][T22071] ? lock_downgrade+0x6d0/0x6d0 [ 2950.818476][T22071] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2950.825624][T22071] ? apparmor_capable+0x1d8/0x460 [ 2950.830775][T22071] ? btf_type_snprintf_show+0x140/0x140 [ 2950.836326][T22071] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 08:34:12 executing program 4: socketpair(0x1, 0x0, 0x70010000, &(0x7f0000000040)) 08:34:12 executing program 0: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) 08:34:12 executing program 4: socketpair(0x1, 0x0, 0x71000000, &(0x7f0000000040)) [ 2950.842723][T22071] ? security_capable+0x8f/0xc0 [ 2950.847597][T22071] __do_sys_bpf+0x158d/0x4f10 [ 2950.852382][T22071] ? bpf_link_get_from_fd+0x110/0x110 [ 2950.857775][T22071] ? __mutex_unlock_slowpath+0xe2/0x610 [ 2950.863330][T22071] ? wait_for_completion_io+0x260/0x260 [ 2950.869882][T22071] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2950.875822][T22071] do_syscall_64+0x2d/0x70 [ 2950.880849][T22071] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2950.886841][T22071] RIP: 0033:0x45e219 08:34:12 executing program 0: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) [ 2950.890735][T22071] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2950.911296][T22071] RSP: 002b:00007f6e506bfc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2950.919818][T22071] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 [ 2950.927824][T22071] RDX: 0000000000000020 RSI: 0000000020000100 RDI: 0000000000000012 [ 2950.935799][T22071] RBP: 00007f6e506bfca0 R08: 0000000000000000 R09: 0000000000000000 08:34:12 executing program 0: bpf$BPF_BTF_LOAD(0x5, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) 08:34:12 executing program 3: clock_gettime(0xefbd8aa30000000b, 0x0) [ 2950.944172][T22071] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 2950.952140][T22071] R13: 00007ffd37bdba4f R14: 00007f6e506c09c0 R15: 000000000119bf8c 08:34:12 executing program 1 (fault-call:0 fault-nth:7): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:12 executing program 2: openat$dsp1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp1\x00', 0x400881, 0x0) clock_gettime(0xefbd8aa34c4cd931, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp1\x00', 0x100200, 0x0) ioctl$SNDCTL_DSP_GETODELAY(r1, 0x80045017, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000100)) bind$bt_sco(r0, &(0x7f0000000000), 0x8) connect$bt_sco(0xffffffffffffffff, &(0x7f0000000140), 0x8) 08:34:12 executing program 4: socketpair(0x1, 0x0, 0x71010000, &(0x7f0000000040)) 08:34:12 executing program 3: clock_gettime(0x0, 0x0) 08:34:12 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) 08:34:12 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) syz_open_procfs(r0, &(0x7f0000000080)='children\x00') bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb01001800000000200000280000002800000002130000000000000100000d000000000000000000000000000000000100000d000000000000c9ac56446590a5ad"], &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:34:12 executing program 4: socketpair(0x1, 0x0, 0x72000000, &(0x7f0000000040)) 08:34:12 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) [ 2951.222016][T22107] FAULT_INJECTION: forcing a failure. [ 2951.222016][T22107] name fail_usercopy, interval 1, probability 0, space 0, times 0 08:34:12 executing program 3: clock_gettime(0x0, 0x0) 08:34:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000000)=0x4, 0x8) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)={0xd991}, 0x8) recvfrom$rxrpc(r0, &(0x7f0000000080)=""/66, 0x42, 0x10001, &(0x7f0000000140)=@in6={0x21, 0xfd, 0x2, 0x1c, {0xa, 0x4e22, 0xfffff800, @loopback, 0x918f}}, 0x24) [ 2951.264723][T22107] CPU: 1 PID: 22107 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 2951.273743][T22107] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2951.284184][T22107] Call Trace: [ 2951.287470][T22107] dump_stack+0x107/0x163 [ 2951.291840][T22107] should_fail.cold+0x5/0xa [ 2951.296355][T22107] _copy_to_user+0x2c/0x150 [ 2951.300869][T22107] bpf_verifier_vlog+0x1b2/0x2e0 [ 2951.305818][T22107] __btf_verifier_log+0xbb/0xf0 08:34:12 executing program 3: clock_gettime(0x0, 0x0) [ 2951.310684][T22107] ? btf_id_cmp_func+0x90/0x90 [ 2951.315817][T22107] btf_parse_hdr+0x410/0xbc0 [ 2951.320416][T22107] ? btf_enum_log+0xa0/0xa0 [ 2951.324938][T22107] btf_new_fd+0x717/0x2120 [ 2951.329451][T22107] ? __might_fault+0xd3/0x180 [ 2951.334222][T22107] ? lock_downgrade+0x6d0/0x6d0 [ 2951.339085][T22107] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2951.345335][T22107] ? apparmor_capable+0x1d8/0x460 [ 2951.350373][T22107] ? btf_type_snprintf_show+0x140/0x140 [ 2951.355922][T22107] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 08:34:12 executing program 5: ioctl$vim2m_VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000000)={0x0, 0x0, 0x10000, 0x400}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) [ 2951.362166][T22107] ? security_capable+0x8f/0xc0 [ 2951.367057][T22107] __do_sys_bpf+0x158d/0x4f10 [ 2951.371745][T22107] ? bpf_link_get_from_fd+0x110/0x110 [ 2951.377130][T22107] ? __mutex_unlock_slowpath+0xe2/0x610 [ 2951.382689][T22107] ? wait_for_completion_io+0x260/0x260 [ 2951.388252][T22107] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2951.394161][T22107] do_syscall_64+0x2d/0x70 [ 2951.398586][T22107] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2951.404579][T22107] RIP: 0033:0x45e219 [ 2951.408473][T22107] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2951.428279][T22107] RSP: 002b:00007f6e506bfc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2951.436707][T22107] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 [ 2951.444857][T22107] RDX: 0000000000000020 RSI: 0000000020000100 RDI: 0000000000000012 [ 2951.452922][T22107] RBP: 00007f6e506bfca0 R08: 0000000000000000 R09: 0000000000000000 [ 2951.460899][T22107] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 2951.469139][T22107] R13: 00007ffd37bdba4f R14: 00007f6e506c09c0 R15: 000000000119bf8c 08:34:12 executing program 1 (fault-call:0 fault-nth:8): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto]}}, &(0x7f0000000840)=""/4096, 0x3a, 0x1000, 0x1}, 0x20) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="83d4126e3983ba240d0584eefc8216f941d13a5b9c31caa6f06d4b63ca487c58c1b149b8785d1e53f25c8b4dbdcbbcbb801746a141ae16ad3d6f3d54ac7f2502243663b764c29d36e68f4505e72db796bf241231a0e09df1ddb786f386ad297d3dc81cbe95de6c84bdd93f9ac8e52e0cb4ff944273fef1252c99da", 0x7b) 08:34:12 executing program 4: socketpair(0x1, 0x0, 0x72010000, &(0x7f0000000040)) 08:34:12 executing program 2: clock_gettime(0x5, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x3d1901, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) ioctl$SOUND_MIXER_WRITE_VOLUME(r0, 0xc0044d1c, &(0x7f0000000000)=0x1d) 08:34:12 executing program 0: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) 08:34:12 executing program 3: openat$dsp1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp1\x00', 0x400881, 0x0) clock_gettime(0xefbd8aa34c4cd931, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp1\x00', 0x100200, 0x0) ioctl$SNDCTL_DSP_GETODELAY(r1, 0x80045017, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000100)) bind$bt_sco(r0, &(0x7f0000000000), 0x8) connect$bt_sco(0xffffffffffffffff, &(0x7f0000000140), 0x8) [ 2951.626488][T22131] FAULT_INJECTION: forcing a failure. [ 2951.626488][T22131] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2951.679072][T22131] CPU: 0 PID: 22131 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 2951.687977][T22131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2951.698715][T22131] Call Trace: [ 2951.702037][T22131] dump_stack+0x107/0x163 [ 2951.707205][T22131] should_fail.cold+0x5/0xa [ 2951.712421][T22131] _copy_to_user+0x2c/0x150 [ 2951.717590][T22131] bpf_verifier_vlog+0x1b2/0x2e0 [ 2951.722840][T22131] __btf_verifier_log+0xbb/0xf0 [ 2951.728715][T22131] ? btf_id_cmp_func+0x90/0x90 [ 2951.734401][T22131] btf_parse_hdr+0x451/0xbc0 [ 2951.740055][T22131] ? btf_enum_log+0xa0/0xa0 [ 2951.745671][T22131] btf_new_fd+0x717/0x2120 [ 2951.751192][T22131] ? __might_fault+0xd3/0x180 [ 2951.756471][T22131] ? lock_downgrade+0x6d0/0x6d0 [ 2951.761667][T22131] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2951.768074][T22131] ? apparmor_capable+0x1d8/0x460 [ 2951.773450][T22131] ? btf_type_snprintf_show+0x140/0x140 08:34:13 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) clock_gettime(0xefbd8aa34c4cd931, 0x0) [ 2951.780053][T22131] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2951.786625][T22131] ? security_capable+0x8f/0xc0 [ 2951.791574][T22131] __do_sys_bpf+0x158d/0x4f10 [ 2951.796262][T22131] ? bpf_link_get_from_fd+0x110/0x110 [ 2951.801670][T22131] ? __mutex_unlock_slowpath+0xe2/0x610 [ 2951.807226][T22131] ? wait_for_completion_io+0x260/0x260 [ 2951.812799][T22131] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2951.818710][T22131] do_syscall_64+0x2d/0x70 [ 2951.823217][T22131] entry_SYSCALL_64_after_hwframe+0x44/0xa9 08:34:13 executing program 2: clock_gettime(0xefbd8aa34c4cd931, 0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) io_setup(0x8001, &(0x7f0000000000)=0x0) io_destroy(r2) io_pgetevents(r2, 0x1000010005, 0x0, &(0x7f0000000240), &(0x7f0000000140)={r0, r1+60000000}, &(0x7f00000001c0)={&(0x7f0000000040)={[0x788704ea]}, 0x8}) openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x6002) [ 2951.829115][T22131] RIP: 0033:0x45e219 [ 2951.833012][T22131] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2951.852722][T22131] RSP: 002b:00007f6e506bfc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2951.861263][T22131] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 [ 2951.869221][T22131] RDX: 0000000000000020 RSI: 0000000020000100 RDI: 0000000000000012 08:34:13 executing program 3 (fault-call:0 fault-nth:0): clock_gettime(0xefbd8aa30000000b, 0x0) 08:34:13 executing program 0: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) 08:34:13 executing program 4: socketpair(0x1, 0x0, 0x73000000, &(0x7f0000000040)) 08:34:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x77, 0x77, 0x2, [@datasec={0x1, 0x7, 0x0, 0xf, 0x3, [{0x1, 0x200003ff, 0x9}, {0x3, 0x5, 0x6}, {0x3, 0x9, 0x8}, {0x4, 0x8, 0x3ff}, {0x3, 0x80, 0x7}, {0x4, 0x74f3, 0x7}, {0x1, 0x7, 0x8}], "d0b29a"}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x80000, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x92, 0x1000, 0x1}, 0x20) [ 2951.877181][T22131] RBP: 00007f6e506bfca0 R08: 0000000000000000 R09: 0000000000000000 [ 2951.885150][T22131] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000008 [ 2951.893232][T22131] R13: 00007ffd37bdba4f R14: 00007f6e506c09c0 R15: 000000000119bf8c 08:34:13 executing program 1 (fault-call:0 fault-nth:9): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:13 executing program 2: ioctl$PPPIOCATTCHAN(0xffffffffffffffff, 0x40047438, &(0x7f0000000080)=0x3) clock_gettime(0xefbd8aa34c4cd931, 0x0) ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, &(0x7f0000000000)=0x2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f0000000040)) 08:34:13 executing program 4: socketpair(0x1, 0x0, 0x73010000, &(0x7f0000000040)) 08:34:13 executing program 0: bpf$BPF_BTF_LOAD(0xa, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) 08:34:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000002800000028d9241a9e5a6117ae0000000100000d000000000000000000008e00000000004eac919c291f0100000d00000000000000b82690e59a2cba5644b898a4a300a07ba6bb9cd144b517b64bb41ec49e17e4849394a5898d176bcb7c032d2b14abdc3c144e574e2ba006839b40615fa173a70ccd348f0c0443923f4add841e6e415b4aea1c240acbe252e331af85c5b1f643c94195c0a3560b3a1bc61ca987dde0964db17fd6808ec42eb27aaf95de8187445b7b07557b4389"], &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) [ 2952.035268][T22148] FAULT_INJECTION: forcing a failure. [ 2952.035268][T22148] name fail_usercopy, interval 1, probability 0, space 0, times 0 08:34:13 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) bind$bt_sco(r0, &(0x7f0000000000), 0x8) clock_gettime(0xefbd8aa34c4cd931, 0x0) [ 2952.098306][T22148] CPU: 0 PID: 22148 Comm: syz-executor.3 Not tainted 5.11.0-rc1-syzkaller #0 [ 2952.106705][T22153] FAULT_INJECTION: forcing a failure. [ 2952.106705][T22153] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2952.108441][T22148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2952.108455][T22148] Call Trace: [ 2952.108462][T22148] dump_stack+0x107/0x163 [ 2952.108493][T22148] should_fail.cold+0x5/0xa [ 2952.150679][T22148] _copy_to_user+0x2c/0x150 [ 2952.155631][T22148] put_timespec64+0xb2/0x120 [ 2952.160324][T22148] ? ns_to_timespec64+0xc0/0xc0 [ 2952.165269][T22148] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2952.172310][T22148] ? ns_to_timespec64+0x55/0xc0 [ 2952.177167][T22148] __x64_sys_clock_gettime+0x1b6/0x260 [ 2952.182627][T22148] ? __ia32_sys_clock_settime+0x280/0x280 [ 2952.188343][T22148] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2952.195599][T22148] do_syscall_64+0x2d/0x70 [ 2952.200021][T22148] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2952.206271][T22148] RIP: 0033:0x45e219 [ 2952.210597][T22148] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2952.234025][T22148] RSP: 002b:00007fbd3e18dc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000e4 [ 2952.242439][T22148] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 [ 2952.250406][T22148] RDX: 0000000000000000 RSI: 0000000000000000 RDI: efbd8aa30000000b [ 2952.258371][T22148] RBP: 00007fbd3e18dca0 R08: 0000000000000000 R09: 0000000000000000 [ 2952.266679][T22148] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2952.274642][T22148] R13: 00007ffe8200ad9f R14: 00007fbd3e18e9c0 R15: 000000000119bf8c [ 2952.282615][T22153] CPU: 1 PID: 22153 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 08:34:13 executing program 4: socketpair(0x1, 0x0, 0x74000000, &(0x7f0000000040)) [ 2952.291645][T22153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2952.301845][T22153] Call Trace: [ 2952.305774][T22153] dump_stack+0x107/0x163 [ 2952.311141][T22153] should_fail.cold+0x5/0xa [ 2952.316492][T22153] _copy_to_user+0x2c/0x150 [ 2952.321850][T22153] bpf_verifier_vlog+0x1b2/0x2e0 [ 2952.327157][T22153] __btf_verifier_log+0xbb/0xf0 [ 2952.332483][T22153] ? btf_id_cmp_func+0x90/0x90 [ 2952.337344][T22153] btf_parse_hdr+0x492/0xbc0 [ 2952.341944][T22153] ? btf_enum_log+0xa0/0xa0 [ 2952.346454][T22153] btf_new_fd+0x717/0x2120 [ 2952.350852][T22153] ? __might_fault+0xd3/0x180 [ 2952.355509][T22153] ? lock_downgrade+0x6d0/0x6d0 [ 2952.360348][T22153] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2952.366909][T22153] ? apparmor_capable+0x1d8/0x460 [ 2952.372574][T22153] ? btf_type_snprintf_show+0x140/0x140 [ 2952.378211][T22153] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2952.384622][T22153] ? security_capable+0x8f/0xc0 [ 2952.389552][T22153] __do_sys_bpf+0x158d/0x4f10 [ 2952.394322][T22153] ? bpf_link_get_from_fd+0x110/0x110 [ 2952.399690][T22153] ? __mutex_unlock_slowpath+0xe2/0x610 [ 2952.405250][T22153] ? wait_for_completion_io+0x260/0x260 [ 2952.410893][T22153] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2952.416963][T22153] do_syscall_64+0x2d/0x70 [ 2952.421447][T22153] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2952.427323][T22153] RIP: 0033:0x45e219 [ 2952.431198][T22153] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2952.450987][T22153] RSP: 002b:00007f6e506bfc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2952.459731][T22153] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 [ 2952.467869][T22153] RDX: 0000000000000020 RSI: 0000000020000100 RDI: 0000000000000012 [ 2952.475992][T22153] RBP: 00007f6e506bfca0 R08: 0000000000000000 R09: 0000000000000000 08:34:13 executing program 1 (fault-call:0 fault-nth:10): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) [ 2952.491870][T22153] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000009 [ 2952.502557][T22153] R13: 00007ffd37bdba4f R14: 00007f6e506c09c0 R15: 000000000119bf8c 08:34:13 executing program 3 (fault-call:0 fault-nth:1): clock_gettime(0xefbd8aa30000000b, 0x0) 08:34:14 executing program 0: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) 08:34:14 executing program 5: syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x7f, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) socket$inet6_udp(0xa, 0x2, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0xd47, 0xc, 0x8, 0x10001}, {0x6fec, 0x7, 0x4, 0x20}, {0x9, 0x8, 0x1}, {0x3, 0x58, 0xce}]}) 08:34:14 executing program 4: socketpair(0x1, 0x0, 0x74010000, &(0x7f0000000040)) 08:34:14 executing program 2: clock_gettime(0xefbd8aa34c4cd931, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cmdline\x00') r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r1, 0x891a, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) [ 2952.672331][T22167] FAULT_INJECTION: forcing a failure. [ 2952.672331][T22167] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2952.686864][T22168] FAULT_INJECTION: forcing a failure. [ 2952.686864][T22168] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2952.717163][T22167] CPU: 1 PID: 22167 Comm: syz-executor.3 Not tainted 5.11.0-rc1-syzkaller #0 [ 2952.725968][T22167] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2952.736728][T22167] Call Trace: [ 2952.740871][T22167] dump_stack+0x107/0x163 [ 2952.745578][T22167] should_fail.cold+0x5/0xa [ 2952.750178][T22167] _copy_to_user+0x2c/0x150 [ 2952.754689][T22167] simple_read_from_buffer+0xcc/0x160 [ 2952.760081][T22167] proc_fail_nth_read+0x187/0x220 [ 2952.765117][T22167] ? proc_exe_link+0x1d0/0x1d0 08:34:14 executing program 4: socketpair(0x1, 0x0, 0x75000000, &(0x7f0000000040)) [ 2952.770500][T22167] ? security_file_permission+0x248/0x560 [ 2952.777067][T22167] ? proc_exe_link+0x1d0/0x1d0 [ 2952.782184][T22167] vfs_read+0x1b5/0x570 [ 2952.786878][T22167] ksys_read+0x12d/0x250 [ 2952.791763][T22167] ? vfs_write+0xa30/0xa30 [ 2952.796185][T22167] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2952.803069][T22167] do_syscall_64+0x2d/0x70 [ 2952.808018][T22167] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2952.813924][T22167] RIP: 0033:0x417b11 08:34:14 executing program 2: clock_gettime(0x1, 0x0) ioctl$SNDCTL_DSP_GETODELAY(0xffffffffffffffff, 0x80045017, &(0x7f0000000000)) [ 2952.817944][T22167] Code: 75 14 b8 00 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 6a fc ff ff 48 89 04 24 b8 00 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2952.837558][T22167] RSP: 002b:00007fbd3e18dc70 EFLAGS: 00000293 ORIG_RAX: 0000000000000000 [ 2952.845968][T22167] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 0000000000417b11 [ 2952.854525][T22167] RDX: 000000000000000f RSI: 00007fbd3e18dcb0 RDI: 0000000000000003 [ 2952.863249][T22167] RBP: 00007fbd3e18dca0 R08: 0000000000000000 R09: 0000000000000000 08:34:14 executing program 4: socketpair(0x1, 0x0, 0x75010000, &(0x7f0000000040)) [ 2952.872135][T22167] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 2952.880984][T22167] R13: 00007ffe8200ad9f R14: 00007fbd3e18e9c0 R15: 000000000119bf8c [ 2952.890692][T22168] CPU: 0 PID: 22168 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 2952.899481][T22168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2952.909622][T22168] Call Trace: [ 2952.912899][T22168] dump_stack+0x107/0x163 [ 2952.917243][T22168] should_fail.cold+0x5/0xa [ 2952.921840][T22168] _copy_to_user+0x2c/0x150 [ 2952.926352][T22168] bpf_verifier_vlog+0x1b2/0x2e0 [ 2952.931301][T22168] __btf_verifier_log+0xbb/0xf0 [ 2952.936157][T22168] ? btf_id_cmp_func+0x90/0x90 [ 2952.940940][T22168] btf_parse_hdr+0x4d3/0xbc0 [ 2952.945541][T22168] ? btf_enum_log+0xa0/0xa0 [ 2952.950589][T22168] btf_new_fd+0x717/0x2120 [ 2952.955706][T22168] ? __might_fault+0xd3/0x180 [ 2952.960835][T22168] ? lock_downgrade+0x6d0/0x6d0 [ 2952.965978][T22168] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2952.972378][T22168] ? apparmor_capable+0x1d8/0x460 [ 2952.977747][T22168] ? btf_type_snprintf_show+0x140/0x140 [ 2952.984122][T22168] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2952.990817][T22168] ? security_capable+0x8f/0xc0 [ 2952.996040][T22168] __do_sys_bpf+0x158d/0x4f10 [ 2953.001289][T22168] ? bpf_link_get_from_fd+0x110/0x110 [ 2953.007721][T22168] ? __mutex_unlock_slowpath+0xe2/0x610 [ 2953.013293][T22168] ? wait_for_completion_io+0x260/0x260 [ 2953.019277][T22168] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2953.025941][T22168] do_syscall_64+0x2d/0x70 [ 2953.031185][T22168] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2953.037665][T22168] RIP: 0033:0x45e219 [ 2953.041717][T22168] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2953.061327][T22168] RSP: 002b:00007f6e506bfc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 08:34:14 executing program 4: socketpair(0x1, 0x0, 0x76000000, &(0x7f0000000040)) 08:34:14 executing program 2: clock_gettime(0xefbd8aa34c4cd931, 0x0) io_pgetevents(0x0, 0xee3f, 0x3, &(0x7f0000000000)=[{}, {}, {}], 0x0, &(0x7f00000000c0)={&(0x7f0000000080), 0x8}) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) 08:34:14 executing program 0: bpf$BPF_BTF_LOAD(0xc, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) [ 2953.070497][T22168] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 [ 2953.078465][T22168] RDX: 0000000000000020 RSI: 0000000020000100 RDI: 0000000000000012 [ 2953.086434][T22168] RBP: 00007f6e506bfca0 R08: 0000000000000000 R09: 0000000000000000 [ 2953.094532][T22168] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000a [ 2953.102516][T22168] R13: 00007ffd37bdba4f R14: 00007f6e506c09c0 R15: 000000000119bf8c 08:34:14 executing program 1 (fault-call:0 fault-nth:11): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:14 executing program 3: clock_gettime(0xefbd8aa30000000b, 0x0) 08:34:14 executing program 4: socketpair(0x1, 0x0, 0x76010000, &(0x7f0000000040)) 08:34:14 executing program 5: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000000c0)={&(0x7f0000001840)="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", &(0x7f0000000140)=""/206, &(0x7f0000000240)="a094755ce73b00f0994675d316e93eb29bf477c711f386292f03aafe10d0ac7ddbbcea70d72239e53a1ada08defec657301012937e6ab628c97eb8d3adfe1c48480ae87e5a69", &(0x7f00000002c0)="4735fd219fe7af80f3a7bb9f79044cbc0aadaf62adfb33bc5a2598a45ec1d7f781c1a490bc387667a47015193aa70abf618cf9ef5b26c0fd5b4af764f8f88dce110e3f9d0ea0f25a2b2e613c054d9ddfac9383940cc5b7e5721d7203bc354335bc647da72466c66a4228ecf446350e", 0xfffffffe, r0, 0x4}, 0x38) setsockopt$PNPIPE_INITSTATE(0xffffffffffffffff, 0x113, 0x4, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0x5, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x1}, {0x9, 0x3}, {0x10, 0x1}]}]}, {0x0, [0x61, 0x61, 0x30]}}, &(0x7f0000000840)=""/4096, 0x55, 0x1000, 0x1}, 0x20) 08:34:14 executing program 2: openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0xa0000, 0x0) clock_gettime(0x4, 0x0) io_getevents(0x0, 0xd3e6, 0x4, &(0x7f0000000000)=[{}, {}, {}, {}], &(0x7f0000000080)={0x77359400}) 08:34:14 executing program 0: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) 08:34:14 executing program 4: socketpair(0x1, 0x0, 0x77000000, &(0x7f0000000040)) [ 2953.298025][T22202] FAULT_INJECTION: forcing a failure. [ 2953.298025][T22202] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2953.329178][T22202] CPU: 0 PID: 22202 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 2953.338013][T22202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2953.348260][T22202] Call Trace: [ 2953.351639][T22202] dump_stack+0x107/0x163 [ 2953.355993][T22202] should_fail.cold+0x5/0xa [ 2953.360528][T22202] _copy_to_user+0x2c/0x150 [ 2953.365062][T22202] bpf_verifier_vlog+0x1b2/0x2e0 [ 2953.370016][T22202] __btf_verifier_log+0xbb/0xf0 [ 2953.374887][T22202] ? btf_id_cmp_func+0x90/0x90 [ 2953.379686][T22202] btf_parse_hdr+0x514/0xbc0 [ 2953.384288][T22202] ? btf_enum_log+0xa0/0xa0 [ 2953.388804][T22202] btf_new_fd+0x717/0x2120 [ 2953.393232][T22202] ? __might_fault+0xd3/0x180 08:34:14 executing program 0: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) 08:34:14 executing program 4: socketpair(0x1, 0x0, 0x77010000, &(0x7f0000000040)) 08:34:14 executing program 0: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) [ 2953.397920][T22202] ? lock_downgrade+0x6d0/0x6d0 [ 2953.402782][T22202] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2953.409040][T22202] ? apparmor_capable+0x1d8/0x460 [ 2953.414090][T22202] ? btf_type_snprintf_show+0x140/0x140 [ 2953.419642][T22202] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2953.425907][T22202] ? security_capable+0x8f/0xc0 [ 2953.430780][T22202] __do_sys_bpf+0x158d/0x4f10 [ 2953.435746][T22202] ? bpf_link_get_from_fd+0x110/0x110 [ 2953.441501][T22202] ? __mutex_unlock_slowpath+0xe2/0x610 08:34:14 executing program 0: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) 08:34:14 executing program 4: socketpair(0x1, 0x0, 0x78000000, &(0x7f0000000040)) [ 2953.447072][T22202] ? wait_for_completion_io+0x260/0x260 [ 2953.452641][T22202] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2953.458817][T22202] do_syscall_64+0x2d/0x70 [ 2953.463248][T22202] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2953.469162][T22202] RIP: 0033:0x45e219 [ 2953.473075][T22202] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2953.492791][T22202] RSP: 002b:00007f6e506bfc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2953.501227][T22202] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 [ 2953.509212][T22202] RDX: 0000000000000020 RSI: 0000000020000100 RDI: 0000000000000012 [ 2953.517195][T22202] RBP: 00007f6e506bfca0 R08: 0000000000000000 R09: 0000000000000000 [ 2953.525183][T22202] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000b [ 2953.533174][T22202] R13: 00007ffd37bdba4f R14: 00007f6e506c09c0 R15: 000000000119bf8c 08:34:14 executing program 1 (fault-call:0 fault-nth:12): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:14 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) 08:34:14 executing program 4: socketpair(0x1, 0x0, 0x78010000, &(0x7f0000000040)) 08:34:14 executing program 2: r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@caif=@rfm, &(0x7f0000000080)=0x80, 0x0) connect$can_bcm(r0, &(0x7f00000000c0), 0x10) clock_gettime(0xefbd8aa34c4cd931, 0x0) 08:34:14 executing program 3: clock_gettime(0xefbd8aa30000000b, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) get_robust_list(r0, &(0x7f0000000140)=&(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)}}, &(0x7f0000000180)=0x18) 08:34:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x2, [@const={0x8, 0x0, 0x0, 0xa, 0x5}, @var={0xb, 0x0, 0x0, 0xe, 0x4}, @fwd={0xd}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x1, 0x71cc}}]}}, &(0x7f0000000840)=""/4096, 0x5a, 0x1000, 0x1}, 0x20) 08:34:15 executing program 4: socketpair(0x1, 0x0, 0x79000000, &(0x7f0000000040)) 08:34:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000001000028000000413d89acd09e18b6c0dcda0c0100000d000000000000000000000000000000000100000d13007c78f63ec44f6eb7000000000dd3e49ea8e109a59e493d12cb6f59a8759d5c5be153005a96357fffe27df9c23762f91f09c5784202f4c7544f341cc397cd41f3d9c5857bcdb28c59363a74df20bb62f2cfad228480040e75672ffcf0e17cf208df845fe84a1bdc9a286b88c49ef2d0f1f252213896cb8f9eaa4e554a7fbfa8cfe3e15a1ff77f88a528c89be5824687a77f1db63999c7d9df6eed2fcc00634c2ee6be253cc20b9b88fba50c3ead3d"], &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:34:15 executing program 0: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) 08:34:15 executing program 2: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000001c0)={0x3}, 0x8) clock_gettime(0xefbd8aa34c4cd931, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000)={0x3ff, 0x1, 0x5, 0x2, 0x4, 0x5, 0xff, 0x10000}, &(0x7f0000000040)={0x20, 0x1f, 0xb9, 0x9, 0x5, 0x9, 0x9, 0x5}, &(0x7f0000000080)={0x7f, 0x9, 0x7f, 0x5, 0x4, 0x2, 0x0, 0x3}, &(0x7f0000000100)={r0, r1+10000000}, &(0x7f0000000180)={&(0x7f0000000140)={[0x3]}, 0x8}) [ 2953.671027][T22230] FAULT_INJECTION: forcing a failure. [ 2953.671027][T22230] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2953.737821][T22230] CPU: 0 PID: 22230 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 2953.746652][T22230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2953.757216][T22230] Call Trace: [ 2953.760496][T22230] dump_stack+0x107/0x163 [ 2953.764848][T22230] should_fail.cold+0x5/0xa [ 2953.769472][T22230] _copy_to_user+0x2c/0x150 [ 2953.774894][T22230] bpf_verifier_vlog+0x1b2/0x2e0 [ 2953.780229][T22230] __btf_verifier_log+0xbb/0xf0 [ 2953.785191][T22230] ? btf_id_cmp_func+0x90/0x90 [ 2953.790145][T22230] btf_parse_hdr+0x555/0xbc0 [ 2953.794753][T22230] ? btf_enum_log+0xa0/0xa0 [ 2953.799369][T22230] btf_new_fd+0x717/0x2120 [ 2953.803802][T22230] ? __might_fault+0xd3/0x180 [ 2953.809446][T22230] ? lock_downgrade+0x6d0/0x6d0 [ 2953.814320][T22230] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2953.821549][T22230] ? apparmor_capable+0x1d8/0x460 [ 2953.827094][T22230] ? btf_type_snprintf_show+0x140/0x140 [ 2953.833560][T22230] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2953.840335][T22230] ? security_capable+0x8f/0xc0 [ 2953.845659][T22230] __do_sys_bpf+0x158d/0x4f10 [ 2953.850952][T22230] ? bpf_link_get_from_fd+0x110/0x110 [ 2953.857421][T22230] ? __mutex_unlock_slowpath+0xe2/0x610 [ 2953.862992][T22230] ? wait_for_completion_io+0x260/0x260 [ 2953.869472][T22230] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2953.875959][T22230] do_syscall_64+0x2d/0x70 [ 2953.881304][T22230] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2953.888048][T22230] RIP: 0033:0x45e219 [ 2953.891954][T22230] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2953.911587][T22230] RSP: 002b:00007f6e506bfc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2953.920016][T22230] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 [ 2953.928000][T22230] RDX: 0000000000000020 RSI: 0000000020000100 RDI: 0000000000000012 08:34:15 executing program 0: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) 08:34:15 executing program 3: getsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, &(0x7f0000000000), &(0x7f0000000040)=0x4) clock_gettime(0xefbd8aa30000000b, 0x0) [ 2953.935991][T22230] RBP: 00007f6e506bfca0 R08: 0000000000000000 R09: 0000000000000000 [ 2953.943987][T22230] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000c [ 2953.951978][T22230] R13: 00007ffd37bdba4f R14: 00007f6e506c09c0 R15: 000000000119bf8c 08:34:15 executing program 1 (fault-call:0 fault-nth:13): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) socketpair(0x15, 0x1, 0x6, &(0x7f0000000340)={0xffffffffffffffff}) sendmsg$NLBL_CALIPSO_C_LIST(r0, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0xeaf39c4e1c746086}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x2c, 0x0, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x2040000) 08:34:15 executing program 3: prctl$PR_SET_ENDIAN(0x14, 0x1) clock_gettime(0x3, 0x0) iopl(0x7) 08:34:15 executing program 2: clock_gettime(0x8, 0x0) 08:34:15 executing program 0: bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) 08:34:15 executing program 4: socketpair(0x1, 0x0, 0x79010000, &(0x7f0000000040)) 08:34:15 executing program 0: bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) 08:34:15 executing program 2: clock_gettime(0xefbd8aa34c4cd931, 0x0) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dri/renderD128\x00', 0x24400, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x64, r1, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_VLAN_ID={0x6}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x400}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e20}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x23}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x9}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0xdc}]}, 0x64}}, 0x20040080) openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qrtr-tun\x00', 0x2000) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x400, 0x70bd28, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x85}, 0x0) [ 2954.127083][T22256] FAULT_INJECTION: forcing a failure. [ 2954.127083][T22256] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2954.169032][T22256] CPU: 0 PID: 22256 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 2954.177960][T22256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2954.188034][T22256] Call Trace: [ 2954.191322][T22256] dump_stack+0x107/0x163 [ 2954.195682][T22256] should_fail.cold+0x5/0xa [ 2954.200304][T22256] _copy_to_user+0x2c/0x150 [ 2954.204833][T22256] bpf_verifier_vlog+0x1b2/0x2e0 [ 2954.209878][T22256] __btf_verifier_log+0xbb/0xf0 [ 2954.214750][T22256] ? btf_id_cmp_func+0x90/0x90 [ 2954.219544][T22256] btf_parse_hdr+0x566/0xbc0 [ 2954.224149][T22256] ? btf_enum_log+0xa0/0xa0 [ 2954.228668][T22256] btf_new_fd+0x717/0x2120 [ 2954.233093][T22256] ? __might_fault+0xd3/0x180 [ 2954.237778][T22256] ? lock_downgrade+0x6d0/0x6d0 [ 2954.242725][T22256] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2954.249060][T22256] ? apparmor_capable+0x1d8/0x460 [ 2954.254401][T22256] ? btf_type_snprintf_show+0x140/0x140 [ 2954.260019][T22256] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2954.266294][T22256] ? security_capable+0x8f/0xc0 [ 2954.271157][T22256] __do_sys_bpf+0x158d/0x4f10 [ 2954.276113][T22256] ? bpf_link_get_from_fd+0x110/0x110 [ 2954.281498][T22256] ? __mutex_unlock_slowpath+0xe2/0x610 [ 2954.287052][T22256] ? wait_for_completion_io+0x260/0x260 [ 2954.292705][T22256] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2954.298612][T22256] do_syscall_64+0x2d/0x70 [ 2954.303033][T22256] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2954.308938][T22256] RIP: 0033:0x45e219 08:34:15 executing program 3: clock_gettime(0x7, 0x0) 08:34:15 executing program 0: bpf$BPF_BTF_LOAD(0x17, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) 08:34:15 executing program 0: bpf$BPF_BTF_LOAD(0x18, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) 08:34:15 executing program 2: clock_gettime(0xefbd8aa34c4cd931, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x423, 0x400080) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x4c, 0x0, 0x400, 0x70bd25, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40804}, 0x4) [ 2954.312946][T22256] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2954.332571][T22256] RSP: 002b:00007f6e506bfc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2954.340996][T22256] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 [ 2954.348976][T22256] RDX: 0000000000000020 RSI: 0000000020000100 RDI: 0000000000000012 [ 2954.356962][T22256] RBP: 00007f6e506bfca0 R08: 0000000000000000 R09: 0000000000000000 08:34:15 executing program 1 (fault-call:0 fault-nth:14): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:15 executing program 2: ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x40, 0x4, 0x45, 0x9}, {0x8, 0x3f, 0x5, 0x81}]}) clock_gettime(0xefbd8aa34c4cd931, 0x0) io_setup(0x8, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r2, 0x891a, 0x0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r3, 0x891a, 0x0) setsockopt$PNPIPE_INITSTATE(r3, 0x113, 0x4, &(0x7f0000000240)=0x1, 0x4) sendmsg$MPTCP_PM_CMD_GET_ADDR(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x0, 0x20, 0x70bd29, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4004080}, 0x8000) io_getevents(0x0, 0xf933, 0x0, &(0x7f0000000180), &(0x7f0000000140)={r0, r1+10000000}) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20ncci\x00', 0x349000, 0x0) getsockname$l2tp6(r4, &(0x7f00000002c0)={0xa, 0x0, 0x0, @private2}, &(0x7f0000000300)=0x20) 08:34:15 executing program 3: clock_gettime(0x2, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) 08:34:15 executing program 0: bpf$BPF_BTF_LOAD(0x19, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) 08:34:15 executing program 4: socketpair(0x1, 0x0, 0x7a000000, &(0x7f0000000040)) 08:34:15 executing program 5: bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000080)={&(0x7f0000000000)="7b21d864", &(0x7f0000000140)=""/252, &(0x7f0000000240)="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", &(0x7f0000000040)="51b020853022e72a58766705cb351efa87cb9b1f4e60a39e23cf335356ef9c418dca19b3d1dbdf036afbdbf9b1", 0x200}, 0x38) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) [ 2954.364955][T22256] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000d [ 2954.373031][T22256] R13: 00007ffd37bdba4f R14: 00007f6e506c09c0 R15: 000000000119bf8c 08:34:15 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) clock_gettime(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000080)={r0, 0x1, 0xffffffffffffffff, 0x2}) 08:34:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xffffffff}]}, @int={0x58d, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x3e, 0x1000, 0x1}, 0x20) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) 08:34:15 executing program 0: bpf$BPF_BTF_LOAD(0x1a, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) [ 2954.541057][T22285] FAULT_INJECTION: forcing a failure. [ 2954.541057][T22285] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2954.557167][T22285] CPU: 0 PID: 22285 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 2954.566058][T22285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2954.576713][T22285] Call Trace: [ 2954.580778][T22285] dump_stack+0x107/0x163 [ 2954.586023][T22285] should_fail.cold+0x5/0xa [ 2954.593918][T22285] _copy_to_user+0x2c/0x150 [ 2954.600608][T22285] bpf_verifier_vlog+0x1b2/0x2e0 [ 2954.605778][T22285] __btf_verifier_log+0xbb/0xf0 [ 2954.611023][T22285] ? btf_id_cmp_func+0x90/0x90 [ 2954.616548][T22285] __btf_verifier_log_type+0x749/0x870 [ 2954.623058][T22285] ? bpf_verifier_vlog+0x1c9/0x2e0 [ 2954.628444][T22285] ? btf_var_show+0x360/0x360 [ 2954.633541][T22285] ? btf_id_cmp_func+0x90/0x90 [ 2954.638760][T22285] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2954.645412][T22285] ? do_swap+0x132/0x210 [ 2954.650666][T22285] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2954.657133][T22285] ? sort_r+0x22d/0x350 [ 2954.662367][T22285] ? env_stack_push+0x390/0x390 [ 2954.667396][T22285] btf_var_check_meta+0x217/0x2a0 [ 2954.672404][T22285] btf_check_all_metas+0x394/0xa10 [ 2954.677500][T22285] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 2954.683811][T22285] ? btf_parse_str_sec+0x1e8/0x2e0 [ 2954.689001][T22285] btf_new_fd+0x876/0x2120 [ 2954.693403][T22285] ? __might_fault+0xd3/0x180 [ 2954.698156][T22285] ? lock_downgrade+0x6d0/0x6d0 [ 2954.703113][T22285] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2954.709368][T22285] ? apparmor_capable+0x1d8/0x460 [ 2954.714441][T22285] ? btf_type_snprintf_show+0x140/0x140 [ 2954.720039][T22285] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2954.726333][T22285] ? security_capable+0x8f/0xc0 [ 2954.731172][T22285] __do_sys_bpf+0x158d/0x4f10 [ 2954.735836][T22285] ? bpf_link_get_from_fd+0x110/0x110 [ 2954.741458][T22285] ? __mutex_unlock_slowpath+0xe2/0x610 [ 2954.747006][T22285] ? wait_for_completion_io+0x260/0x260 [ 2954.752581][T22285] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2954.758480][T22285] do_syscall_64+0x2d/0x70 [ 2954.762880][T22285] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2954.768935][T22285] RIP: 0033:0x45e219 [ 2954.772812][T22285] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:34:16 executing program 4: socketpair(0x1, 0x0, 0x7a010000, &(0x7f0000000040)) [ 2954.792603][T22285] RSP: 002b:00007f6e506bfc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2954.801185][T22285] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 [ 2954.809232][T22285] RDX: 0000000000000020 RSI: 0000000020000100 RDI: 0000000000000012 [ 2954.817186][T22285] RBP: 00007f6e506bfca0 R08: 0000000000000000 R09: 0000000000000000 [ 2954.825143][T22285] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000e [ 2954.833293][T22285] R13: 00007ffd37bdba4f R14: 00007f6e506c09c0 R15: 000000000119bf8c 08:34:16 executing program 1 (fault-call:0 fault-nth:15): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:16 executing program 2: clock_gettime(0x6, 0x0) 08:34:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x280, 0x0) 08:34:16 executing program 0: bpf$BPF_BTF_LOAD(0x1b, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) 08:34:16 executing program 3: clock_gettime(0x2, 0x0) 08:34:16 executing program 4: socketpair(0x1, 0x0, 0x7b000000, &(0x7f0000000040)) 08:34:16 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x1000, 0x2a0000) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) write$evdev(r0, &(0x7f0000000080)=[{{0x0, 0xea60}, 0x1f, 0x7, 0x4cd2}, {{0x0, 0x2710}, 0x5, 0x81, 0x6}, {{0x0, 0xea60}, 0x16, 0x3, 0x1}, {{0x77359400}, 0x15, 0x2, 0x9}, {{r1, r2/1000+60000}, 0x2, 0x1, 0x4}, {{0x77359400}, 0x11, 0x3, 0x9}, {{0x0, 0x2710}, 0x1f, 0x40, 0x14}], 0xa8) [ 2955.052627][T22300] FAULT_INJECTION: forcing a failure. [ 2955.052627][T22300] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2955.108694][T22300] CPU: 1 PID: 22300 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 2955.117608][T22300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2955.127672][T22300] Call Trace: [ 2955.131878][T22300] dump_stack+0x107/0x163 [ 2955.136489][T22300] should_fail.cold+0x5/0xa [ 2955.141009][T22300] _copy_to_user+0x2c/0x150 [ 2955.145526][T22300] bpf_verifier_vlog+0x1b2/0x2e0 [ 2955.150877][T22300] btf_verifier_log+0x1c8/0x270 08:34:16 executing program 0: bpf$BPF_BTF_LOAD(0x1c, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) 08:34:16 executing program 2: sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="64000000fe41a1e8b9dc602e403d8b57cead8ba8", @ANYRES16=0x0, @ANYBLOB="00012cbd7000fbdbdf25020000000900030073797a8c9200000005000400020000001400020063616966300000000600000000000000050004000200000009000300737900030073797a3100000000050000000200000053071c5d8b12743e22ba7e4547650ea5e8a9e40ee4e630a5a5fcb8e295afe3badb75cbc4cfa71f93832b6847f2309dc00c32d0ab7bfeb7f0d23713ed4410eedc63ea18519de2bf311f8317897e781bb4ad577b0b"], 0x64}, 0x1, 0x0, 0x0, 0x80}, 0x840) clock_gettime(0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002940)='net/ptype\x00') r1 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f00000029c0)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f0000002a80)={&(0x7f0000002980)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000002a40)={&(0x7f0000002a00)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="00012bbd7000ffdbdf2500020000000800020002000000"], 0x2c}, 0x1, 0x0, 0x0, 0x8851}, 0x10) [ 2955.155744][T22300] ? btf_free_rcu+0xd0/0xd0 [ 2955.160949][T22300] __btf_verifier_log_type+0x4df/0x870 [ 2955.166431][T22300] ? bpf_verifier_vlog+0x1c9/0x2e0 [ 2955.171555][T22300] ? btf_var_show+0x360/0x360 [ 2955.176993][T22300] ? btf_id_cmp_func+0x90/0x90 [ 2955.181768][T22300] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2955.188015][T22300] ? do_swap+0x132/0x210 [ 2955.192447][T22300] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2955.198703][T22300] ? sort_r+0x22d/0x350 [ 2955.202881][T22300] ? env_stack_push+0x390/0x390 [ 2955.208425][T22300] btf_var_check_meta+0x217/0x2a0 [ 2955.213547][T22300] btf_check_all_metas+0x394/0xa10 [ 2955.219063][T22300] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 2955.225489][T22300] ? btf_parse_str_sec+0x1e8/0x2e0 [ 2955.230610][T22300] btf_new_fd+0x876/0x2120 [ 2955.235206][T22300] ? __might_fault+0xd3/0x180 [ 2955.239887][T22300] ? lock_downgrade+0x6d0/0x6d0 [ 2955.244748][T22300] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2955.251907][T22300] ? apparmor_capable+0x1d8/0x460 08:34:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000002000000000000001a00000d00000000000000000000008d00000000415a984a0000000000000040010000000000"], &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) geteuid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0}) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r1, 0x891a, 0x0) ioctl$SOUND_MIXER_READ_RECSRC(r1, 0x80044dff, &(0x7f00000000c0)) prctl$PR_SET_ENDIAN(0x14, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, &(0x7f0000000080)={r0, 0x1ff, 0x7}) [ 2955.257455][T22300] ? btf_type_snprintf_show+0x140/0x140 [ 2955.263182][T22300] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2955.270001][T22300] ? security_capable+0x8f/0xc0 [ 2955.275601][T22300] __do_sys_bpf+0x158d/0x4f10 [ 2955.281163][T22300] ? bpf_link_get_from_fd+0x110/0x110 [ 2955.286676][T22300] ? __mutex_unlock_slowpath+0xe2/0x610 [ 2955.292229][T22300] ? wait_for_completion_io+0x260/0x260 [ 2955.298344][T22300] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2955.305088][T22300] do_syscall_64+0x2d/0x70 [ 2955.309617][T22300] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2955.315697][T22300] RIP: 0033:0x45e219 [ 2955.319596][T22300] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2955.339418][T22300] RSP: 002b:00007f6e506bfc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2955.348374][T22300] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 08:34:16 executing program 5: ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, &(0x7f0000000080)={0xa, &(0x7f0000000000)=[{0x5, 0x5, 0x8, 0x4}, {0x1ff, 0x0, 0x0, 0x5}, {0x8001, 0x8, 0x3, 0x80}, {0x6, 0x4, 0x8, 0x1f}, {0x8001, 0x2, 0x30, 0x1}, {0xb4, 0x0, 0x3, 0x1}, {0x3, 0x8, 0x5, 0x7}, {0x0, 0x7, 0xaa, 0x7e}, {0x9530, 0x0, 0x8, 0x817}, {0x40, 0x2, 0xff, 0x2}]}) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, &(0x7f00000000c0)=0x5fc6) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:34:16 executing program 3: prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f00000001c0)) clock_gettime(0xefbd8aa30000000b, 0x0) get_robust_list(0x0, &(0x7f0000000140)=&(0x7f0000000100)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)}}, &(0x7f0000000180)=0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb8, 0xb8, 0x6, [@int={0xd, 0x0, 0x0, 0x1, 0x0, 0x51, 0x0, 0x45, 0x3}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}, @typedef={0x6, 0x0, 0x0, 0x8, 0x2}, @ptr={0x8, 0x0, 0x0, 0x2, 0x5}, @typedef={0x6, 0x0, 0x0, 0x8, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x4}}, @restrict={0x9, 0x0, 0x0, 0xb, 0x3}, @union={0x8, 0x6, 0x0, 0x5, 0x1, 0xd7ec, [{0xa, 0x3, 0x7}, {0x3, 0x2, 0xad}, {0xc, 0x3, 0x2}, {0x2}, {0x4, 0x4, 0xfffffffa}, {0x3, 0x3, 0x4f4}]}]}, {0x0, [0x0, 0x30, 0x2e, 0x61]}}, &(0x7f0000000300)=""/238, 0xd6, 0xee}, 0x20) [ 2955.356362][T22300] RDX: 0000000000000020 RSI: 0000000020000100 RDI: 0000000000000012 [ 2955.364370][T22300] RBP: 00007f6e506bfca0 R08: 0000000000000000 R09: 0000000000000000 [ 2955.372723][T22300] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000f [ 2955.381425][T22300] R13: 00007ffd37bdba4f R14: 00007f6e506c09c0 R15: 000000000119bf8c 08:34:16 executing program 1 (fault-call:0 fault-nth:16): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:16 executing program 4: socketpair(0x1, 0x0, 0x7b010000, &(0x7f0000000040)) 08:34:16 executing program 2: clock_gettime(0xefbd8aa34c4cd931, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$vim2m_VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000040)={0x5, 0x2, 0x4, 0xe000, 0x10001, {r0, r1/1000+60000}, {0x3, 0x2, 0x5, 0x4, 0x1, 0x4, "3e8f88de"}, 0x3, 0x2, @offset=0x7, 0x5}) 08:34:16 executing program 0: bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) 08:34:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000002000000000048ff57bc30ac865f0000000000000000000000000000019e1955e95323d4aa2d00000d0000000000000000010000000000"], &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x7, 0x1, 0x9, 0x800, 0xffffffffffffffff, 0x2000, [], 0x0, r0, 0x4, 0x4, 0x1}, 0x40) connect$bt_sco(r0, &(0x7f0000000040), 0x8) 08:34:16 executing program 3: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dri/renderD128\x00', 0x480140, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0xc40, 0x0) clock_gettime(0x5, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x1f07e) sendto$l2tp6(0xffffffffffffffff, &(0x7f0000000080)="31d028392f83342e8ca2cabf0782a4b3f64bba72161f7a896597faeac494d818d4243c02118f1b4b8bcadc1bb0fbb163767b4bba3ad29f33aa72f6e196501cf4b78337", 0x43, 0x4000000, &(0x7f0000000100)={0xa, 0x0, 0x3, @local, 0x400, 0x4}, 0x20) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x44, r1, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xf1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x404d004}, 0x20000040) ioctl$SOUND_MIXER_WRITE_RECSRC(0xffffffffffffffff, 0xc0044dff, &(0x7f0000000040)=0x9) 08:34:16 executing program 0: bpf$BPF_BTF_LOAD(0x1e, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) 08:34:16 executing program 4: socketpair(0x1, 0x0, 0x7c000000, &(0x7f0000000040)) 08:34:17 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x100, 0x0) clock_gettime(0xefbd8aa34c4cd931, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x13, 0x1, 0x1ff, 0x80000000, 0x32, r0, 0x7, [], 0x0, r0, 0x5, 0x4, 0x4}, 0x40) ioctl$sock_ifreq(r0, 0x891a, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000040)=0x3) [ 2955.604326][T22335] FAULT_INJECTION: forcing a failure. [ 2955.604326][T22335] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2955.635628][T22335] CPU: 1 PID: 22335 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 08:34:17 executing program 4: socketpair(0x1, 0x0, 0x7c010000, &(0x7f0000000040)) [ 2955.644792][T22335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2955.654852][T22335] Call Trace: [ 2955.658129][T22335] dump_stack+0x107/0x163 [ 2955.662474][T22335] should_fail.cold+0x5/0xa [ 2955.667166][T22335] _copy_to_user+0x2c/0x150 [ 2955.671682][T22335] bpf_verifier_vlog+0x1b2/0x2e0 [ 2955.676805][T22335] __btf_verifier_log+0xbb/0xf0 [ 2955.682108][T22335] ? btf_id_cmp_func+0x90/0x90 [ 2955.686898][T22335] __btf_verifier_log_type+0x606/0x870 [ 2955.692371][T22335] ? bpf_verifier_vlog+0x1c9/0x2e0 [ 2955.697594][T22335] ? btf_var_show+0x360/0x360 08:34:17 executing program 4: socketpair(0x1, 0x0, 0x7d000000, &(0x7f0000000040)) [ 2955.703505][T22335] ? btf_id_cmp_func+0x90/0x90 [ 2955.708286][T22335] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2955.714538][T22335] ? do_swap+0x132/0x210 [ 2955.718784][T22335] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2955.725063][T22335] ? sort_r+0x22d/0x350 [ 2955.729223][T22335] ? env_stack_push+0x390/0x390 [ 2955.734171][T22335] btf_var_check_meta+0x217/0x2a0 [ 2955.739202][T22335] btf_check_all_metas+0x394/0xa10 [ 2955.744319][T22335] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 2955.750567][T22335] ? btf_parse_str_sec+0x1e8/0x2e0 [ 2955.755771][T22335] btf_new_fd+0x876/0x2120 [ 2955.760192][T22335] ? __might_fault+0xd3/0x180 [ 2955.764871][T22335] ? lock_downgrade+0x6d0/0x6d0 [ 2955.769733][T22335] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2955.775989][T22335] ? apparmor_capable+0x1d8/0x460 [ 2955.781026][T22335] ? btf_type_snprintf_show+0x140/0x140 [ 2955.786750][T22335] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2955.793175][T22335] ? security_capable+0x8f/0xc0 [ 2955.798044][T22335] __do_sys_bpf+0x158d/0x4f10 08:34:17 executing program 4: socketpair(0x1, 0x0, 0x7d010000, &(0x7f0000000040)) [ 2955.802741][T22335] ? bpf_link_get_from_fd+0x110/0x110 [ 2955.808304][T22335] ? __mutex_unlock_slowpath+0xe2/0x610 [ 2955.813854][T22335] ? wait_for_completion_io+0x260/0x260 [ 2955.819415][T22335] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2955.825319][T22335] do_syscall_64+0x2d/0x70 [ 2955.829739][T22335] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2955.835726][T22335] RIP: 0033:0x45e219 [ 2955.839636][T22335] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2955.859340][T22335] RSP: 002b:00007f6e506bfc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2955.867763][T22335] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 [ 2955.875826][T22335] RDX: 0000000000000020 RSI: 0000000020000100 RDI: 0000000000000012 [ 2955.883890][T22335] RBP: 00007f6e506bfca0 R08: 0000000000000000 R09: 0000000000000000 [ 2955.891865][T22335] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000010 [ 2955.899836][T22335] R13: 00007ffd37bdba4f R14: 00007f6e506c09c0 R15: 000000000119bf8c 08:34:17 executing program 1 (fault-call:0 fault-nth:17): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:17 executing program 4: socketpair(0x1, 0x0, 0x7e000000, &(0x7f0000000040)) 08:34:17 executing program 5: tkill(0xffffffffffffffff, 0x2a) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0x10, &(0x7f00000000c0)={&(0x7f0000000040)={0x4, 0xd44ffbb9e33c7a82, 0x2, {0x77359400}, {0x77359400}, {0x0, 0x0, 0x1, 0x1}, 0x1, @can={{0x2}, 0x8, 0x2, 0x0, 0x0, "97115e9f2c6277a3"}}, 0x48}, 0x1, 0x0, 0x0, 0x8800}, 0x20008805) getpriority(0x2, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x80401, 0x0) ioctl$SOUND_MIXER_READ_CAPS(r0, 0x80044dfc, &(0x7f0000000180)) 08:34:17 executing program 3: clock_gettime(0xefbd8aa30000000b, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000000)=0x200, 0x8) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) 08:34:17 executing program 0: bpf$BPF_BTF_LOAD(0x21, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) 08:34:17 executing program 2: clock_gettime(0xefbd8aa34c4cd931, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x0, 0x9, 0xff, 0xfffffff7}, {0x4, 0x80, 0x9, 0x25}, {0x8, 0x8, 0xcb, 0x400}, {0x0, 0x6, 0x5, 0x5}, {0xb26d, 0x0, 0xdd, 0xffff}]}) prctl$PR_SVE_GET_VL(0x33, 0x471d) 08:34:17 executing program 4: socketpair(0x1, 0x0, 0x7e010000, &(0x7f0000000040)) 08:34:17 executing program 3: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f00000002c0)={0x1c, r0, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_OFFSET={0x6}]}, 0x1c}}, 0x20040080) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000600)=ANY=[@ANYBLOB="20000000cf90f2a60f15df62274c52083aa14b7d34a3eb4c1f9ad3c8631f1c7081708b4fa457d8ae4b0fc4c6db669d3095c7d3d6dacef9f6cb7c89b05b841a8808a25dbcc6a0be794e072a704146780570db9b52ce772b66e8095db818ea9767a65db8642f2527c4824006e5f5872a4287e21189477c6ccafd58cd18330b231692206dae05c6042006db5035bbba7b7eb9aee8184b09c72a98f8433bafdb73ddb0dfc75f6041b07f41dfcf2950b45bfb6d543961d6949ce8d82bf3eda65407850d73fd", @ANYRES16=r0, @ANYBLOB="100028bd7000fddbdf25070000000c0016000100010000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000800}, 0x10040004) clock_gettime(0xefbd8aa30000000b, 0x0) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000540)="3e259bcd271e037105b4e5f25dfded8edbc419c015c94413071f89016571189e5a25051a9627b6f04bc91bc6b5c6a38ad49f21fbcacd7aabfa31d7077aa4956925f5d921ca2cb6af4789307bec680d1d3a2d649fb68544b5cb95f6d0af5a671a93a7f3c808aa46641c046171ea5baaf90a8f5c4ea8b51229b52abf8af3af967f225f9a516834d8f329367230e202f92d8080f17952b18c6291261658e040a1b7739e92", 0xa3) [ 2956.085823][T22368] FAULT_INJECTION: forcing a failure. [ 2956.085823][T22368] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2956.146797][T22368] CPU: 1 PID: 22368 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 2956.155863][T22368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2956.165922][T22368] Call Trace: [ 2956.170114][T22368] dump_stack+0x107/0x163 [ 2956.174457][T22368] should_fail.cold+0x5/0xa [ 2956.178970][T22368] _copy_to_user+0x2c/0x150 [ 2956.183655][T22368] bpf_verifier_vlog+0x1b2/0x2e0 [ 2956.188787][T22368] __btf_verifier_log_type+0x635/0x870 [ 2956.194876][T22368] ? bpf_verifier_vlog+0x1c9/0x2e0 [ 2956.200219][T22368] ? btf_var_show+0x360/0x360 [ 2956.205581][T22368] ? btf_id_cmp_func+0x90/0x90 [ 2956.210394][T22368] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2956.216899][T22368] ? do_swap+0x132/0x210 [ 2956.221356][T22368] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2956.227857][T22368] ? sort_r+0x22d/0x350 [ 2956.232105][T22368] ? env_stack_push+0x390/0x390 [ 2956.237493][T22368] btf_var_check_meta+0x217/0x2a0 [ 2956.242537][T22368] btf_check_all_metas+0x394/0xa10 [ 2956.247931][T22368] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 2956.254756][T22368] ? btf_parse_str_sec+0x1e8/0x2e0 [ 2956.260861][T22368] btf_new_fd+0x876/0x2120 [ 2956.266144][T22368] ? __might_fault+0xd3/0x180 [ 2956.271423][T22368] ? lock_downgrade+0x6d0/0x6d0 [ 2956.276703][T22368] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2956.283190][T22368] ? apparmor_capable+0x1d8/0x460 [ 2956.288225][T22368] ? btf_type_snprintf_show+0x140/0x140 [ 2956.293862][T22368] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2956.300109][T22368] ? security_capable+0x8f/0xc0 [ 2956.305904][T22368] __do_sys_bpf+0x158d/0x4f10 [ 2956.310590][T22368] ? bpf_link_get_from_fd+0x110/0x110 [ 2956.316249][T22368] ? __mutex_unlock_slowpath+0xe2/0x610 [ 2956.322694][T22368] ? wait_for_completion_io+0x260/0x260 [ 2956.328256][T22368] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2956.334161][T22368] do_syscall_64+0x2d/0x70 [ 2956.338584][T22368] entry_SYSCALL_64_after_hwframe+0x44/0xa9 08:34:17 executing program 4: socketpair(0x1, 0x0, 0x7f000000, &(0x7f0000000040)) 08:34:17 executing program 3: clock_gettime(0x2, 0x0) io_setup(0x8001, &(0x7f0000000000)=0x0) io_destroy(r0) io_pgetevents(r0, 0xf53c, 0x3, &(0x7f0000000000)=[{}, {}, {}], &(0x7f0000000080)={0x0, 0x989680}, &(0x7f0000000100)={&(0x7f00000000c0)={[0x4]}, 0x8}) [ 2956.344481][T22368] RIP: 0033:0x45e219 [ 2956.348370][T22368] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2956.368158][T22368] RSP: 002b:00007f6e506bfc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2956.376575][T22368] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 [ 2956.384547][T22368] RDX: 0000000000000020 RSI: 0000000020000100 RDI: 0000000000000012 08:34:17 executing program 0: bpf$BPF_BTF_LOAD(0x22, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) 08:34:17 executing program 2: clock_gettime(0xefbd8aa34c4cd931, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x553001, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0x4002, 0x2}) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000080)={0x8000, 0xffffffffffffffd0, 0x2, 0x1ff, 0x0, 0xfff, 0xdc79, 0x6}, &(0x7f00000000c0)={0xb53, 0x20, 0xcd, 0x200, 0x800, 0x401, 0x4, 0x3}, &(0x7f0000000100)={0x25, 0x9, 0x7, 0xfb, 0x7, 0x5, 0x3b, 0x4}, &(0x7f0000000180)={r1, r2+60000000}, &(0x7f0000000200)={&(0x7f00000001c0)={[0x4]}, 0x8}) [ 2956.392520][T22368] RBP: 00007f6e506bfca0 R08: 0000000000000000 R09: 0000000000000000 [ 2956.400858][T22368] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000011 [ 2956.409083][T22368] R13: 00007ffd37bdba4f R14: 00007f6e506c09c0 R15: 000000000119bf8c 08:34:17 executing program 1 (fault-call:0 fault-nth:18): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb010018000000000000002800000028003d130782b5a8fb355e000002000000000000000100000d000000000000000000000000000000000100000d0000000000"], &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:34:17 executing program 4: socketpair(0x1, 0x0, 0x7f010000, &(0x7f0000000040)) 08:34:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) ioctl$SOUND_MIXER_WRITE_RECSRC(r0, 0xc0044dff, &(0x7f0000000000)=0x8) 08:34:17 executing program 0: bpf$BPF_BTF_LOAD(0x23, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) 08:34:17 executing program 3: getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$PPPIOCSACTIVE(0xffffffffffffffff, 0x40107446, &(0x7f0000000140)={0x9, &(0x7f00000000c0)=[{0x100, 0x4, 0x3, 0x8000}, {0x1f, 0x7, 0x20, 0xfe}, {0x9, 0x0, 0x80, 0x3}, {0x1, 0x1, 0xfc, 0x1821}, {0x2, 0x72, 0x0, 0x2}, {0x9, 0xff, 0x6, 0x7fff}, {0x6, 0x8, 0xcb, 0x1}, {0x1, 0x20, 0x5, 0x7ff}, {0x3, 0x1f, 0x75, 0x3}]}) clock_gettime(0xefbd8aa30000000b, 0x0) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1000, 0xc200) [ 2956.571294][T22391] FAULT_INJECTION: forcing a failure. [ 2956.571294][T22391] name fail_usercopy, interval 1, probability 0, space 0, times 0 08:34:18 executing program 2: clock_gettime(0xefbd8aa34c4cd931, 0x0) socket$tipc(0x1e, 0x2, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000000)) 08:34:18 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) [ 2956.632798][T22391] CPU: 0 PID: 22391 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 2956.641804][T22391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2956.651875][T22391] Call Trace: [ 2956.655416][T22391] dump_stack+0x107/0x163 [ 2956.659758][T22391] should_fail.cold+0x5/0xa [ 2956.664272][T22391] _copy_to_user+0x2c/0x150 [ 2956.668786][T22391] bpf_verifier_vlog+0x1b2/0x2e0 [ 2956.673734][T22391] __btf_verifier_log+0xbb/0xf0 [ 2956.678854][T22391] ? btf_id_cmp_func+0x90/0x90 [ 2956.683650][T22391] ? _copy_to_user+0xdc/0x150 [ 2956.688332][T22391] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2956.694758][T22391] __btf_verifier_log_type+0x549/0x870 [ 2956.700251][T22391] ? bpf_verifier_vlog+0x1c9/0x2e0 [ 2956.705706][T22391] ? btf_var_show+0x360/0x360 [ 2956.710851][T22391] ? btf_id_cmp_func+0x90/0x90 [ 2956.715771][T22391] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2956.722266][T22391] ? do_swap+0x132/0x210 [ 2956.726730][T22391] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2956.732956][T22391] ? sort_r+0x22d/0x350 [ 2956.737476][T22391] ? env_stack_push+0x390/0x390 [ 2956.742312][T22391] btf_var_check_meta+0x217/0x2a0 [ 2956.747400][T22391] btf_check_all_metas+0x394/0xa10 [ 2956.752499][T22391] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 2956.758726][T22391] ? btf_parse_str_sec+0x1e8/0x2e0 [ 2956.763824][T22391] btf_new_fd+0x876/0x2120 [ 2956.768264][T22391] ? __might_fault+0xd3/0x180 [ 2956.772994][T22391] ? lock_downgrade+0x6d0/0x6d0 [ 2956.777834][T22391] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2956.784061][T22391] ? apparmor_capable+0x1d8/0x460 [ 2956.789089][T22391] ? btf_type_snprintf_show+0x140/0x140 [ 2956.794832][T22391] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2956.801280][T22391] ? security_capable+0x8f/0xc0 [ 2956.806215][T22391] __do_sys_bpf+0x158d/0x4f10 [ 2956.810877][T22391] ? bpf_link_get_from_fd+0x110/0x110 [ 2956.816323][T22391] ? __mutex_unlock_slowpath+0xe2/0x610 [ 2956.821853][T22391] ? wait_for_completion_io+0x260/0x260 [ 2956.827393][T22391] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2956.833536][T22391] do_syscall_64+0x2d/0x70 [ 2956.837937][T22391] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2956.843839][T22391] RIP: 0033:0x45e219 [ 2956.847737][T22391] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2956.867367][T22391] RSP: 002b:00007f6e506bfc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2956.875779][T22391] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 08:34:18 executing program 3: clock_gettime(0x2, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x8, 0x3, 0x1f, 0x9}, {0x7f9e, 0x3f, 0x0, 0x8}, {0x5, 0x0, 0x6, 0x3}]}) 08:34:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@typedef={0x5, 0x0, 0x0, 0x8, 0x3}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x1}, {0x9, 0x4}, {0x0, 0xfffffffd}]}]}}, &(0x7f0000000840)=""/4096, 0x4a, 0x1000, 0x1}, 0x20) 08:34:18 executing program 4: socketpair(0x1, 0x0, 0x80010000, &(0x7f0000000040)) [ 2956.883751][T22391] RDX: 0000000000000020 RSI: 0000000020000100 RDI: 0000000000000012 [ 2956.891704][T22391] RBP: 00007f6e506bfca0 R08: 0000000000000000 R09: 0000000000000000 [ 2956.899657][T22391] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000012 [ 2956.907609][T22391] R13: 00007ffd37bdba4f R14: 00007f6e506c09c0 R15: 000000000119bf8c 08:34:18 executing program 1 (fault-call:0 fault-nth:19): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:18 executing program 3: ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) clock_gettime(0xefbd8aa30000000b, 0x0) 08:34:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x30]}}, &(0x7f0000001840)=""/4096, 0x1b, 0x1000, 0x1}, 0x20) 08:34:18 executing program 4: socketpair(0x1, 0x0, 0x81000000, &(0x7f0000000040)) 08:34:18 executing program 2: clock_gettime(0xefbd8aa34c4cd931, 0x0) r0 = socket$l2tp6(0xa, 0x2, 0x73) accept4(r0, &(0x7f0000000500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000580)=0x80, 0x0) setsockopt$RXRPC_SECURITY_KEY(r1, 0x110, 0x1, &(0x7f00000005c0)='\x00', 0x1) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x0, 0x1, 0x70bd2d, 0x25dfdbff, {}, [@L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x4}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast1}]}, 0x34}, 0x1, 0x0, 0x0, 0x11}, 0x4004000) 08:34:18 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x7, 0x1000}, 0x20) [ 2957.119637][T22412] FAULT_INJECTION: forcing a failure. [ 2957.119637][T22412] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2957.168870][T22412] CPU: 1 PID: 22412 Comm: syz-executor.1 Not tainted 5.11.0-rc1-syzkaller #0 [ 2957.178694][T22412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2957.188755][T22412] Call Trace: [ 2957.192033][T22412] dump_stack+0x107/0x163 [ 2957.196380][T22412] should_fail.cold+0x5/0xa [ 2957.200894][T22412] _copy_to_user+0x2c/0x150 [ 2957.205404][T22412] simple_read_from_buffer+0xcc/0x160 [ 2957.210956][T22412] proc_fail_nth_read+0x187/0x220 [ 2957.216208][T22412] ? proc_exe_link+0x1d0/0x1d0 [ 2957.220972][T22412] ? security_file_permission+0x248/0x560 [ 2957.227529][T22412] ? proc_exe_link+0x1d0/0x1d0 [ 2957.232765][T22412] vfs_read+0x1b5/0x570 [ 2957.236948][T22412] ksys_read+0x12d/0x250 [ 2957.241287][T22412] ? vfs_write+0xa30/0xa30 [ 2957.245706][T22412] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2957.251607][T22412] do_syscall_64+0x2d/0x70 [ 2957.256020][T22412] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2957.262007][T22412] RIP: 0033:0x417b11 [ 2957.265901][T22412] Code: 75 14 b8 00 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 6a fc ff ff 48 89 04 24 b8 00 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2957.286187][T22412] RSP: 002b:00007f6e506bfc70 EFLAGS: 00000293 ORIG_RAX: 0000000000000000 [ 2957.294735][T22412] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 0000000000417b11 [ 2957.302807][T22412] RDX: 000000000000000f RSI: 00007f6e506bfcb0 RDI: 0000000000000003 [ 2957.311553][T22412] RBP: 00007f6e506bfca0 R08: 0000000000000000 R09: 0000000000000000 08:34:18 executing program 3: clock_gettime(0x5, 0x0) clock_gettime(0x5, &(0x7f0000000000)) write$evdev(0xffffffffffffffff, &(0x7f00000000c0)=[{{0x0, 0xea60}, 0x15, 0x22, 0x3f}, {{0x0, 0x2710}, 0x2, 0x81, 0x9}, {{}, 0x4, 0xff, 0x3}], 0x48) 08:34:18 executing program 4: socketpair(0x1, 0x0, 0x81010000, &(0x7f0000000040)) 08:34:18 executing program 3: clock_gettime(0xafe75f6ffb4dba53, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_DEL(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x78, 0x0, 0x100, 0x70bd2b, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1_to_bond\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'geneve1\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}]}, 0x78}}, 0x200000c0) 08:34:18 executing program 4: socketpair(0x1, 0x0, 0x82000000, &(0x7f0000000040)) 08:34:18 executing program 3: setreuid(0xffffffffffffffff, 0xffffffffffffffff) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x42000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) prctl$PR_SET_ENDIAN(0x14, 0x2) mmap$qrtrtun(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000001, 0x10, 0xffffffffffffffff, 0x5f37) clock_gettime(0xefbd8aa30000000b, 0x0) [ 2957.320026][T22412] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000013 [ 2957.328012][T22412] R13: 00007ffd37bdba4f R14: 00007f6e506c09c0 R15: 000000000119bf8c 08:34:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) socket$pppoe(0x18, 0x1, 0x0) 08:34:18 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:18 executing program 4: socketpair(0x1, 0x0, 0x82010000, &(0x7f0000000040)) 08:34:18 executing program 2: clock_gettime(0x0, 0x0) 08:34:18 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x700, 0x1000}, 0x20) 08:34:18 executing program 3: clock_gettime(0xefbd8aa30000000b, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000180)={0x40}, 0x4) ptrace$setregset(0x4205, 0x0, 0x1, &(0x7f00000000c0)={&(0x7f0000000000)="b99f30dd3ba5b793b044c6101963e5c11f1ddec4820dce8a5a69f8c3c051c8f52787a85f250923f1873d86e1e523eeda69e7be8b5cd8c24eec18618fb8e2e42f26df185dcad6db4c0d2b6022e2fe1ef8d91aee79ac89483964ba00d8755f8490df8042920d37466758e90470d304b8def5eaddde794cdef887d44405960243817e4f27", 0x83}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, 0x0, 0x2, 0x70bd2a, 0x25dfdbfd, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0x1}, @L2TP_ATTR_PW_TYPE={0x6}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x40) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x2000, 0x0) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, &(0x7f0000000140)={r0, 0x0, 0x1000000000000, 0xfffff000}) 08:34:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @fwd={0x2}]}}, &(0x7f0000001840)=""/4105, 0x3a, 0x1009, 0x1}, 0x20) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x3c}}}, 0x24) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r0, 0x10, &(0x7f00000000c0)={&(0x7f0000000040)=""/81, 0x51}}, 0x10) socket$inet6_icmp(0xa, 0x2, 0x3a) 08:34:19 executing program 4: socketpair(0x1, 0x0, 0x83000000, &(0x7f0000000040)) 08:34:19 executing program 2: clock_gettime(0xefbd8aa34c4cd931, 0x0) socket$inet6_icmp(0xa, 0x2, 0x3a) socket$can_bcm(0x1d, 0x2, 0x2) 08:34:19 executing program 1: bpf$BPF_BTF_LOAD(0x2, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:19 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x7000000, 0x1000}, 0x20) 08:34:19 executing program 3: io_setup(0x2fab381e, &(0x7f0000000000)=0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) io_getevents(r0, 0x200, 0x8, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000180)={r1, r2+10000000}) clock_gettime(0xefbd8aa30000000b, 0x0) openat$drirender128(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dri/renderD128\x00', 0x0, 0x0) 08:34:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001800000000000000200000050000000500000000000008040000210000008f0000010000da0d00000000000000000100000000f6"], &(0x7f0000000840)=""/4096, 0x3d, 0x1000, 0x1}, 0x20) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000000)={0x0, 0x2, 0x4, 0x1, 0x6, {0x77359400}, {0x3, 0x1, 0x9, 0x0, 0x5, 0x8, "3cb681b1"}, 0x6, 0x1, @offset=0x1, 0x61}) 08:34:19 executing program 4: socketpair(0x1, 0x0, 0x83010000, &(0x7f0000000040)) 08:34:19 executing program 1: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:19 executing program 2: clock_gettime(0x5, 0x0) 08:34:19 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x300}, 0x20) 08:34:19 executing program 3: clock_gettime(0x2, 0x0) 08:34:19 executing program 4: socketpair(0x1, 0x0, 0x84000000, &(0x7f0000000040)) 08:34:19 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x200100, 0x0) 08:34:19 executing program 2: clock_gettime(0x1cb40f7d22393b9f, 0x0) io_setup(0xfff, &(0x7f0000000000)=0x0) io_getevents(r0, 0x7fff, 0x8, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000140)={0x77359400}) 08:34:19 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x500}, 0x20) 08:34:19 executing program 1: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:19 executing program 3: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x8, 0x44040) clock_gettime(0xefbd8aa30000000b, 0x0) 08:34:19 executing program 4: socketpair(0x1, 0x0, 0x84010000, &(0x7f0000000040)) 08:34:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) socket$l2tp6(0xa, 0x2, 0x73) iopl(0x15) 08:34:19 executing program 1: bpf$BPF_BTF_LOAD(0x5, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:19 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x600}, 0x20) 08:34:19 executing program 4: socketpair(0x1, 0x0, 0x85000000, &(0x7f0000000040)) 08:34:19 executing program 3: getrandom(&(0x7f0000000000)=""/206, 0xce, 0x7) clock_gettime(0x5, 0x0) 08:34:19 executing program 2: clock_gettime(0xefbd8aa34c4cd931, 0x0) io_setup(0x8000, &(0x7f0000000040)=0x0) io_getevents(r0, 0x54a, 0x4, &(0x7f0000000080)=[{}, {}, {}, {}], &(0x7f0000000100)) openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) socket$l2tp6(0xa, 0x2, 0x73) 08:34:19 executing program 5: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) inotify_rm_watch(r0, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f0000000000)=""/154, &(0x7f00000000c0)=0x9a) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:34:19 executing program 1: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:19 executing program 4: socketpair(0x1, 0x0, 0x85010000, &(0x7f0000000040)) 08:34:19 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x700}, 0x20) 08:34:19 executing program 3: clock_gettime(0x0, 0x0) 08:34:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000002000000000000000100000d00000000000000746d000000000000000100000d000000000000000001000000000015fc584ad219f14066bc903de9da8a1c2ac9db49e42bb684d314d98e7e39915c2b3c75993132745de13a178ce6077bf4c64d8883ee70b97fcc718dde48853104c3b147f52307783ae351b1c98500000000a261d602ef57ca1aab298d986d1b9dc35c7f1980b41ef3d4d41ddb88d6b0d9483f6f93915fff432f50e1bb6ef695"], &(0x7f0000000840)=""/4096, 0x66, 0x1000, 0x1}, 0x20) 08:34:19 executing program 1: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:19 executing program 4: socketpair(0x1, 0x0, 0x86000000, &(0x7f0000000040)) 08:34:19 executing program 2: clock_gettime(0xefbd8aa34c4cd931, 0x0) getsockopt$PNPIPE_INITSTATE(0xffffffffffffffff, 0x113, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x2401, 0x0) r2 = inotify_add_watch(r0, &(0x7f0000000180)='./file0\x00', 0x0) inotify_rm_watch(r1, r2) ioctl$sock_ifreq(r0, 0x8942, 0x0) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000000)=""/139) 08:34:19 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x900}, 0x20) 08:34:19 executing program 5: socket$tipc(0x1e, 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:34:20 executing program 3: clock_gettime(0x1, 0x0) 08:34:20 executing program 2: clock_gettime(0x6, 0x0) 08:34:20 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:20 executing program 4: socketpair(0x1, 0x0, 0x86010000, &(0x7f0000000040)) 08:34:20 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0xa00}, 0x20) 08:34:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb010018000000000000012800000028a6c8894d45dc075e9753606a558911d200000002000000000000000100000d000000"], &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) wait4(0x0, &(0x7f0000000000), 0x1, &(0x7f0000000040)) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r0, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x2, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x8, 0x2}, 0x0, 0x0, &(0x7f0000000200)={0x1, 0x2, 0x4, 0x4}, &(0x7f0000000240)=0x956, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x6}}, 0x10) 08:34:20 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f0000000000)) 08:34:20 executing program 2: clock_gettime(0x0, 0x0) 08:34:20 executing program 1: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:20 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0xb00}, 0x20) 08:34:20 executing program 4: socketpair(0x1, 0x0, 0x87000000, &(0x7f0000000040)) 08:34:20 executing program 5: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) ioctl$sock_ifreq(r0, 0x8948, &(0x7f0000000080)={'\x00', @ifru_data=&(0x7f0000000040)="10dca63ab5f55dcf9f615f1feef0ff8e58c4fec0e165b2fc00b7b70ad04c0c0c"}) ioctl$sock_ifreq(r0, 0x8913, &(0x7f0000000000)={'macvtap0\x00', @ifru_hwaddr=@multicast}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:34:20 executing program 2: clock_gettime(0xefbd8aa34c4cd931, 0x0) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_tables_matches\x00') ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f00000059c0)={'sit0\x00', &(0x7f0000005940)={'syztnl1\x00', 0x0, 0x4, 0x80, 0x27, 0x8, 0x58, @mcast2, @mcast2, 0x1, 0x80, 0x2, 0x6}}) clock_gettime(0x0, &(0x7f0000005a40)={0x0, 0x0}) sendmsg$can_bcm(r0, &(0x7f0000005b40)={&(0x7f0000005a00)={0x1d, r1}, 0x10, &(0x7f0000005b00)={&(0x7f0000005a80)={0x1, 0x710, 0x7, {r2, r3/1000+10000}, {}, {0x2, 0x0, 0x0, 0x1}, 0x1, @can={{0x0, 0x1, 0x0, 0x1}, 0x6, 0x0, 0x0, 0x0, "b36aafe7f70366e6"}}, 0x48}, 0x1, 0x0, 0x0, 0x20048000}, 0x4000890) 08:34:20 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x20, 0x4, 0x22, 0xfffffffb}, {0x401, 0x3f, 0x5, 0x5}, {0x5f1, 0x60, 0x6, 0x6f}, {0x5, 0xfd, 0x2, 0x9}, {0x80, 0xe7, 0x1, 0x9}, {0x3ff, 0x56, 0x39, 0x2}]}) clock_gettime(0xefbd8aa30000000b, 0x0) setsockopt$RXRPC_SECURITY_KEY(0xffffffffffffffff, 0x110, 0x1, &(0x7f0000000080)='![/*{-\'$X^{\'{(,(-:(\\^\\\x00', 0x17) 08:34:20 executing program 1: bpf$BPF_BTF_LOAD(0xa, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:20 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0xc00}, 0x20) 08:34:20 executing program 4: socketpair(0x1, 0x0, 0x87010000, &(0x7f0000000040)) 08:34:20 executing program 2: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$vim2m_VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000040)={0x7, 0xc07c07737b28101, 0x4, 0x40, 0x40000001, {r0, r1/1000+60000}, {0x1, 0x0, 0x0, 0xb3, 0x80, 0x0, "6b5efb10"}, 0x2, 0x1, @userptr=0x80000000}) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x1, 0x18}, 0xc) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000480)={0xffffad69, 0xd22, 0x6}) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000440)={&(0x7f00000000c0)="81d6aa61177619688122d85c4826077a3fba9f4a6b7d1975d10097ad1c89d6e01ad9d15b0b59b47a2a271f75d7014a4cadfd9a6fc7f401899e89752ac49017f639c6740e6c579640fb28", &(0x7f0000000140)=""/198, &(0x7f0000000240)="60ead30b05a357c6de24f30e892ed0a7559cdd2c9d232fe41c51df911e5287df1822fad6161cd0c24fca729cdbd3a0e137f36c94ec78010956f8d75889960da89f4d579fab2b04fdcf02cb97e6d0fafba6c2d51e7272274485d24691ad4cabfe53271aa4b00c6f494a6f76c683705f05f43083fdb0be514dc66dd4aaa33d38c30e6bf2e0a8e926295d0494b42acd0916f9bb489f5be23173d9e69149cb26d134490e4618", &(0x7f0000000300)="2ddb8a0fa954c580e5902c2a173d95de7ca8665e616eb154ed6cd94f7d1f94dc75241c4cf6c0e504b6f595c220ee700aea0b82234107eda99f56f8448f537927786db23e944e25aaa272ccf96a78485e9150c886b2b65e7310c2dc5983a9dba2b99684faf41471e49e24b931193c139b58941babd8eea4e077eb2cb520b41f4a66ba4a174e3219bdd9c50df0af81f76149a6ef181eb66947e3a195a0c0475628e9015a5fbe5dca691190ea000b9629a22734c2436781aadb81ba8f29e87b07ca4da0fa010e3da96b9c4307584b4414079cc069f45cd639c06c6ed7eb1c795a9a8459c9b76f8915b90e01", 0xd4, r2, 0x4}, 0x38) 08:34:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x4c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x4c}, 0x1, 0x0, 0x0, 0x894}, 0x40) 08:34:20 executing program 3: clock_gettime(0x0, 0x0) 08:34:20 executing program 1: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:20 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0xd00}, 0x20) 08:34:20 executing program 4: socketpair(0x1, 0x0, 0x88000000, &(0x7f0000000040)) 08:34:20 executing program 2: clock_gettime(0xefbd8aa34c4cd931, 0x0) getrandom(&(0x7f0000000000)=""/249, 0xf9, 0x6) 08:34:20 executing program 4: socketpair(0x1, 0x0, 0x88010000, &(0x7f0000000040)) 08:34:20 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000002000000000000000100040d0000000000000000fa000001000000000000000000000000000000000000004d0848670c9b0eafff645c31f7f649db12eec62f91602cdc2b397d86359374084fe66d9009fc5434f6d9dba47ba7b2debf9e54938b3105"], &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 08:34:20 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r1, 0x891a, 0x0) ioctl$PPPIOCGDEBUG(r1, 0x80047441, &(0x7f00000000c0)) ioctl$sock_ifreq(r0, 0x891a, 0x0) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)=0x1) clock_gettime(0xefbd8aa30000000b, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)}, 0x10) 08:34:20 executing program 1: bpf$BPF_BTF_LOAD(0xc, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:20 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) clock_gettime(0xefbd8aa34c4cd931, 0x0) io_setup(0x393, &(0x7f0000000000)=0x0) io_destroy(r0) io_getevents(r0, 0x3ff, 0x0, &(0x7f0000000000), &(0x7f0000000080)={0x0, 0x989680}) 08:34:20 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0xe00}, 0x20) 08:34:20 executing program 4: socketpair(0x1, 0x0, 0x89000000, &(0x7f0000000040)) 08:34:20 executing program 3: clock_gettime(0xefbd8aa30000000b, 0x0) io_setup(0x8001, &(0x7f0000000000)=0x0) io_destroy(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cgroup\x00') io_cancel(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x5, 0xaf19, 0xffffffffffffffff, &(0x7f0000000000)="47ff62f64b7eba994682adaa00e4518f452b951db4e2fe1675dd1a15130b81c6296566465408c086947246c95ce44c65e5bd73e6db4fea3566ee62c80da7455ad508d56298b6473cefa7852a05fbd380f3ad42b42e2f10f3e25eae1f284c127a3a5f6e44a5da15f7ade752d86699ee0e1aea09663e59336d5d9873cd56919f592dafcd7b9b8723d620cf346a76cbeb713c7d5ca1af7dd51a5549abbcc331ca40410437d8a39a39308aed11501a3373058d27e7c488c7130b7f173c075645bfe491c9d61b0ca983", 0xc7, 0x5a40000000000000, 0x0, 0x3, r1}, &(0x7f0000000180)) 08:34:20 executing program 1: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:20 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x20, 0x4, 0x22, 0xfffffffb}, {0x401, 0x3f, 0x5, 0x5}, {0x5f1, 0x60, 0x6, 0x6f}, {0x5, 0xfd, 0x2, 0x9}, {0x80, 0xe7, 0x1, 0x9}, {0x3ff, 0x56, 0x39, 0x2}]}) clock_gettime(0xefbd8aa30000000b, 0x0) setsockopt$RXRPC_SECURITY_KEY(0xffffffffffffffff, 0x110, 0x1, &(0x7f0000000080)='![/*{-\'$X^{\'{(,(-:(\\^\\\x00', 0x17) 08:34:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='schedstat\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r0, 0xc0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x4, 0x2}, 0x0, 0x0, &(0x7f00000000c0)={0x4, 0xf, 0x0, 0x8001}, &(0x7f0000000100)=0x101, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2}}, 0x10) clock_gettime(0xefbd8aa34c4cd931, 0x0) 08:34:20 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0xf00}, 0x20) 08:34:21 executing program 4: socketpair(0x1, 0x0, 0x89010000, &(0x7f0000000040)) 08:34:21 executing program 1: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:21 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x20, 0x4, 0x22, 0xfffffffb}, {0x401, 0x3f, 0x5, 0x5}, {0x5f1, 0x60, 0x6, 0x6f}, {0x5, 0xfd, 0x2, 0x9}, {0x80, 0xe7, 0x1, 0x9}, {0x3ff, 0x56, 0x39, 0x2}]}) clock_gettime(0xefbd8aa30000000b, 0x0) setsockopt$RXRPC_SECURITY_KEY(0xffffffffffffffff, 0x110, 0x1, &(0x7f0000000080)='![/*{-\'$X^{\'{(,(-:(\\^\\\x00', 0x17) 08:34:21 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1007}, 0x20) 08:34:21 executing program 3: clock_gettime(0xefbd8aa30000000b, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 08:34:21 executing program 4: socketpair(0x1, 0x0, 0x8a000000, &(0x7f0000000040)) 08:34:21 executing program 2: io_pgetevents(0x0, 0x6, 0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)={&(0x7f0000000080)={[0x2]}, 0x8}) clock_gettime(0xefbd8aa34c4cd931, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qrtr-tun\x00', 0x200) mmap$qrtrtun(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xbad81e634337545c, r0, 0x0) 08:34:21 executing program 1: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:21 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x20, 0x4, 0x22, 0xfffffffb}, {0x401, 0x3f, 0x5, 0x5}, {0x5f1, 0x60, 0x6, 0x6f}, {0x5, 0xfd, 0x2, 0x9}, {0x80, 0xe7, 0x1, 0x9}, {0x3ff, 0x56, 0x39, 0x2}]}) clock_gettime(0xefbd8aa30000000b, 0x0) setsockopt$RXRPC_SECURITY_KEY(0xffffffffffffffff, 0x110, 0x1, &(0x7f0000000080)='![/*{-\'$X^{\'{(,(-:(\\^\\\x00', 0x17) 08:34:21 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1100}, 0x20) 08:34:21 executing program 4: socketpair(0x1, 0x0, 0x8a010000, &(0x7f0000000040)) 08:34:21 executing program 3: clock_gettime(0x3, 0x0) 08:34:21 executing program 2: clock_gettime(0x3, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0xf0, 0x18}, 0xc) socket$pppoe(0x18, 0x1, 0x0) 08:34:21 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1200}, 0x20) 08:34:21 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x20, 0x4, 0x22, 0xfffffffb}, {0x401, 0x3f, 0x5, 0x5}, {0x5f1, 0x60, 0x6, 0x6f}, {0x5, 0xfd, 0x2, 0x9}, {0x80, 0xe7, 0x1, 0x9}, {0x3ff, 0x56, 0x39, 0x2}]}) clock_gettime(0xefbd8aa30000000b, 0x0) 08:34:21 executing program 1: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:21 executing program 4: socketpair(0x1, 0x0, 0x8b000000, &(0x7f0000000040)) 08:34:21 executing program 2: clock_gettime(0x7, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000000)='NLBL_CALIPSO\x00') r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) getrandom(&(0x7f00000001c0)=""/165, 0xa5, 0x2) r1 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000080)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_LIST(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="34358d99b1f95a44bedd07c5910c", @ANYRES16=r1, @ANYBLOB="020028bd7000fcdbdf25030000000800020002000000080002000200000008000200020000000800020002000000"], 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 08:34:21 executing program 3: clock_gettime(0xefbd8aa30000000b, 0x0) ioctl$SOUND_MIXER_READ_CAPS(0xffffffffffffffff, 0x80044dfc, &(0x7f0000000000)) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x64, r0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_VLAN_ID={0x6}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x400}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e20}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x23}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x9}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0xdc}]}, 0x64}}, 0x20040080) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r0, 0x1, 0x70bd27, 0x25dfdbfc, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x8}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @dev={0xac, 0x14, 0x14, 0x20}}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x460e5) 08:34:21 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x20, 0x4, 0x22, 0xfffffffb}, {0x401, 0x3f, 0x5, 0x5}, {0x5f1, 0x60, 0x6, 0x6f}, {0x5, 0xfd, 0x2, 0x9}, {0x80, 0xe7, 0x1, 0x9}, {0x3ff, 0x56, 0x39, 0x2}]}) 08:34:21 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1300}, 0x20) 08:34:21 executing program 1: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:21 executing program 4: socketpair(0x1, 0x0, 0x8b010000, &(0x7f0000000040)) 08:34:21 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x20, 0x4, 0x22, 0xfffffffb}, {0x401, 0x3f, 0x5, 0x5}, {0x5f1, 0x60, 0x6, 0x6f}, {0x5, 0xfd, 0x2, 0x9}, {0x80, 0xe7, 0x1, 0x9}, {0x3ff, 0x56, 0x39, 0x2}]}) 08:34:21 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1400}, 0x20) 08:34:21 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x400, 0x70bd2d, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) clock_gettime(0xefbd8aa30000000b, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r1, 0x891a, 0x0) recvfrom$l2tp6(r1, &(0x7f0000000000)=""/13, 0xd, 0x10000, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, 0x20) 08:34:21 executing program 1: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:21 executing program 4: socketpair(0x1, 0x0, 0x8c000000, &(0x7f0000000040)) 08:34:21 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:21 executing program 2: clock_gettime(0xefbd8aa34c4cd931, 0x0) getpeername$l2tp6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @private1}, &(0x7f00000001c0)=0x20) ioctl$SOUND_MIXER_READ_CAPS(0xffffffffffffffff, 0x80044dfc, &(0x7f0000000140)) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x48, 0x0, 0x100, 0x70bd2b, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e23}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @empty}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @remote}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/nf_conntrack_expect\x00') r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/udplite\x00') ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000280)={r1, 0x0, 0x1000000, 0xfffffffffffff000}) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0x10, &(0x7f00000000c0)={&(0x7f0000000040)={0x1, 0x44, 0x8004, {0x77359400}, {0x0, 0x2710}, {0x2, 0x0, 0x1, 0x1}, 0x1, @can={{0x1, 0x1, 0x0, 0x1}, 0x8, 0x2, 0x0, 0x0, '\x00\b\x00\x00\x00\x00\x00\b'}}, 0x48}}, 0x24000080) 08:34:21 executing program 3: ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x40047451, &(0x7f0000000040)=0x2) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="7ac29b5102b8b89119ba668a00", @ANYRES16=0x0, @ANYBLOB="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"], 0x58}, 0x1, 0x0, 0x0, 0x4004081}, 0x880) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dri/renderD128\x00', 0x800, 0x0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)) clock_gettime(0xefbd8aa30000000b, 0x0) 08:34:21 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1500}, 0x20) 08:34:22 executing program 1: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:22 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:22 executing program 4: socketpair(0x1, 0x0, 0x8c010000, &(0x7f0000000040)) 08:34:22 executing program 2: io_setup(0x80000001, &(0x7f0000000080)) clock_gettime(0xefbd8aa34c4cd931, 0x0) 08:34:22 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1600}, 0x20) 08:34:22 executing program 1: bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:22 executing program 4: socketpair(0x1, 0x0, 0x8d000000, &(0x7f0000000040)) 08:34:22 executing program 3: clock_gettime(0xefbd8aa30000000b, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x9, 0x10000) r0 = accept4(0xffffffffffffffff, &(0x7f0000000c00)=@tipc, &(0x7f0000000c80)=0x80, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)={0x40, 0x0, 0x1, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x1f}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_COOKIE={0xc}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x62ef}]}, 0x40}, 0x1, 0x0, 0x0, 0xc055}, 0x4) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) io_getevents(0x0, 0x8, 0x3, &(0x7f00000002c0)=[{}, {}, {}], &(0x7f0000000100)={r1, r2+10000000}) recvfrom$l2tp6(0xffffffffffffffff, &(0x7f0000000140)=""/198, 0xc6, 0x60000001, &(0x7f0000000240)={0xa, 0x0, 0x0, @private0}, 0x20) pselect6(0x40, &(0x7f0000000040)={0xd12, 0xa22, 0x2, 0x9, 0x9, 0x40, 0x1, 0x10000}, &(0x7f0000000080)={0x8, 0x6, 0x3, 0x80000001, 0x100000001, 0x0, 0x8000, 0x80000000}, &(0x7f0000000340)={0x401, 0x7463, 0x20, 0x1, 0x78456feb, 0x6}, &(0x7f0000000380)={0x0, 0x989680}, &(0x7f0000000400)={&(0x7f00000003c0)={[0x6]}, 0x8}) io_setup(0x0, &(0x7f0000000280)) 08:34:22 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:22 executing program 2: clock_gettime(0xefbd8aa34c4cd931, 0x0) io_setup(0xd5, &(0x7f0000000000)=0x0) io_getevents(r0, 0x7fff, 0x8, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) 08:34:22 executing program 4: socketpair(0x1, 0x0, 0x8d010000, &(0x7f0000000040)) 08:34:22 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1700}, 0x20) 08:34:22 executing program 1: bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:22 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 08:34:22 executing program 4: socketpair(0x1, 0x0, 0x8e000000, &(0x7f0000000040)) 08:34:22 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1800}, 0x20) 08:34:22 executing program 3: clock_gettime(0xefbd8aa30000000b, 0x0) io_setup(0x4d7, &(0x7f0000000000)=0x0) io_getevents(r0, 0x622, 0x9, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000180)) 08:34:22 executing program 2: clock_gettime(0x3, 0x0) inotify_init() 08:34:22 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 08:34:22 executing program 1: bpf$BPF_BTF_LOAD(0x17, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:22 executing program 4: socketpair(0x1, 0x0, 0x8e010000, &(0x7f0000000040)) 08:34:22 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1900}, 0x20) 08:34:22 executing program 2: clock_gettime(0xefbd8aa34c4cd931, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap$qrtrtun(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000001, 0x110, 0xffffffffffffffff, 0x2000e5) io_setup(0x63d, &(0x7f0000000000)=0x0) io_pgetevents(r0, 0x7fffffff, 0x4, &(0x7f0000000180)=[{}, {}, {}, {}], &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={&(0x7f0000000100), 0x1}) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200004}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x84}, 0x40000) 08:34:22 executing program 3: clock_gettime(0xefbd8aa30000000b, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000000)='mptcp_pm\x00') 08:34:22 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 08:34:22 executing program 1: bpf$BPF_BTF_LOAD(0x18, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:22 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1a00}, 0x20) 08:34:22 executing program 4: socketpair(0x1, 0x0, 0x8f000000, &(0x7f0000000040)) 08:34:22 executing program 3: clock_gettime(0xefbd8aa30000000c, 0x0) 08:34:22 executing program 2: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x40, 0x0) clock_gettime(0xefbd8aa34c4cd931, 0x0) 08:34:22 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x20, 0x4, 0x22, 0xfffffffb}, {0x401, 0x3f, 0x5, 0x5}, {0x5f1, 0x60, 0x6, 0x6f}, {0x5, 0xfd, 0x2, 0x9}, {0x80, 0xe7, 0x1, 0x9}]}) 08:34:22 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1b00}, 0x20) 08:34:22 executing program 1: bpf$BPF_BTF_LOAD(0x19, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:22 executing program 4: socketpair(0x1, 0x0, 0x8f010000, &(0x7f0000000040)) 08:34:22 executing program 3: clock_gettime(0xefbd8aa30000000b, 0x0) r0 = getpgrp(0xffffffffffffffff) get_robust_list(r0, &(0x7f0000000080)=&(0x7f0000000100)={&(0x7f0000000000)}, &(0x7f00000000c0)=0xfffffffffffffff9) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x240006, 0x0) ptrace$setregset(0x4205, r0, 0x200, &(0x7f0000000040)={&(0x7f0000000140)="0b422f85166a59f38a3bc769006b26d08020e8ee8707e158bf02f52eb3d9765461ddc739d00eb0eb000f388f32c38685e8587448f78b9c19b9f350f2a992e66d43d3e75190848be2375d6ac8d4ba0e424915eacd352ba59c8785a9356171e09269d3e9982f5c66fa3144f897bf735b", 0x6f}) 08:34:22 executing program 2: clock_gettime(0x2, 0x0) 08:34:22 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1c00}, 0x20) 08:34:23 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x20, 0x4, 0x22, 0xfffffffb}, {0x401, 0x3f, 0x5, 0x5}, {0x5f1, 0x60, 0x6, 0x6f}, {0x5, 0xfd, 0x2, 0x9}]}) 08:34:23 executing program 1: bpf$BPF_BTF_LOAD(0x1a, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:23 executing program 4: socketpair(0x1, 0x0, 0x90000000, &(0x7f0000000040)) 08:34:23 executing program 2: clock_gettime(0xefbd8aa34c4cd931, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000580)='net/psched\x00') bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000006c0)={r1, &(0x7f00000005c0)="060fd9904ff9688e9c01d5705b65adc6dfc62b45af48d4567869b7ebf9bae4c70e4e76763a57fe1432b2b7b2ccbe4c01b0660de80c151d25afc1ac1811c41bb742c39a16eb7dfef145d31c62407daeb9afb1fff2bd40a76be92b74ea602e3cb3033a269d4ad7dd3b74f0bbd637c7574fb176608e05f40a9544e1e27e769a9551560e081f2447b4326b6de47a42217a65d0d90597e59499f4321732de0ea927747ad713fa7fff37eeecd28e640e5f5badce699397f6c31532fd8cfc7dd3e881af", &(0x7f0000000680)=""/42}, 0x20) ioctl$PPPIOCSACTIVE(r0, 0x40107446, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1, 0x6, 0x80, 0x8}, {0x5, 0x5, 0xff, 0x8}, {0x4, 0x7f, 0x9, 0x3}]}) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f00000000c0)=0x10001) recvmsg$can_bcm(r0, &(0x7f00000004c0)={&(0x7f0000000140)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/180, 0xb4}, {&(0x7f0000000280)=""/159, 0x9f}, {&(0x7f0000000340)=""/106, 0x6a}], 0x3, &(0x7f00000003c0)=""/243, 0xf3}, 0x40000040) r3 = inotify_add_watch(r0, &(0x7f0000000540)='./file0\x00', 0x10000100) inotify_rm_watch(r0, r3) connect$bt_sco(r2, &(0x7f0000000500)={0x1f, @none}, 0x8) socketpair(0x25, 0x80000, 0xbc, &(0x7f0000000100)) 08:34:23 executing program 1: bpf$BPF_BTF_LOAD(0x1b, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:23 executing program 3: clock_gettime(0xefbd8aa30000000b, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x8800, 0x0) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) 08:34:23 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1d00}, 0x20) 08:34:23 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x20, 0x4, 0x22, 0xfffffffb}, {0x401, 0x3f, 0x5, 0x5}, {0x5f1, 0x60, 0x6, 0x6f}]}) 08:34:23 executing program 4: socketpair(0x1, 0x0, 0x90010000, &(0x7f0000000040)) 08:34:23 executing program 2: clock_gettime(0x7, 0x0) 08:34:23 executing program 1: bpf$BPF_BTF_LOAD(0x1c, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:23 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1e00}, 0x20) 08:34:23 executing program 3: clock_gettime(0xefbd8aa30000000b, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x64, r1, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_VLAN_ID={0x6}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x400}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e20}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x23}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x9}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0xdc}]}, 0x64}}, 0x20040080) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x54, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x100000001}, @L2TP_ATTR_FD={0x8, 0x17, @udp6}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x5}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x54}, 0x1, 0x0, 0x0, 0x40800}, 0x4000) 08:34:23 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x4, 0x22, 0xfffffffb}, {0x401, 0x3f, 0x5, 0x5}]}) 08:34:23 executing program 4: socketpair(0x1, 0x0, 0x91000000, &(0x7f0000000040)) 08:34:23 executing program 2: clock_gettime(0xefbd8aa34c4cd931, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x40940, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x808, 0x131942) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x842) ioctl$sock_ifreq(r1, 0x891a, 0x0) getsockopt$PNPIPE_INITSTATE(r1, 0x113, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 08:34:23 executing program 1: bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:23 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1f00}, 0x20) 08:34:23 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x20, 0x4, 0x22, 0xfffffffb}]}) 08:34:23 executing program 4: socketpair(0x1, 0x0, 0x91010000, &(0x7f0000000040)) 08:34:23 executing program 3: clock_gettime(0xefbd8aa30000000b, 0x0) sendto$l2tp6(0xffffffffffffffff, &(0x7f0000000000)="3602bc07d9e7c41a51928ea2d8d2e06eb809f8ec0a994bca0912dda3eaa114de8cf6db23ed42feba9d7efc580d24065ac5bbc9f1117a3717e6ab0c175745b5d140729a52ca1d6a823b7e8542c3836aa0ee38bf0346c819318f1f7a9c3c07e8d4d96a4f8aae7515f90e365fa9c3169acf178dd551f955eb1f7e151684522732b12881d41a26a57232c77f208c9fcf862280e708b644b7a978ef5fcbe3016815371d075e552acf2bc4feda2bbbddfa3a5265", 0xb1, 0x40010, &(0x7f00000000c0)={0xa, 0x0, 0x9, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x22}}, 0x4626, 0x1}, 0x20) 08:34:23 executing program 1: bpf$BPF_BTF_LOAD(0x1e, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:23 executing program 2: clock_gettime(0xefbd8aa34c4cd931, 0x0) socket$tipc(0x1e, 0x2, 0x0) 08:34:23 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)) 08:34:23 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x2000}, 0x20) 08:34:23 executing program 4: socketpair(0x1, 0x0, 0x92000000, &(0x7f0000000040)) 08:34:23 executing program 3: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001040)={0xffffffffffffffff, 0x10, &(0x7f0000001000)={&(0x7f0000000000)=""/4096, 0x1000}}, 0x10) clock_gettime(0x6, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080)='l2tp\x00') 08:34:23 executing program 2: syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xff, 0x0) clock_gettime(0xefbd8aa34c4cd931, 0x0) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x2850, 0xdb, 0x4, 0xde6}, {0x7, 0x4, 0x2, 0x6}, {0x4, 0x80, 0xfb}, {0x100, 0x4, 0x1f, 0x8}]}) 08:34:23 executing program 1: bpf$BPF_BTF_LOAD(0x21, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:23 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x2100}, 0x20) 08:34:23 executing program 4: socketpair(0x1, 0x0, 0x92010000, &(0x7f0000000040)) 08:34:23 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)) 08:34:23 executing program 3: prctl$PR_SET_ENDIAN(0x14, 0x2) clock_gettime(0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000010c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x96, 0x96, 0x6, [@fwd={0x8}, @datasec={0x5, 0x1, 0x0, 0xf, 0x1, [{0x5, 0xffffffe1, 0x4}], "be"}, @datasec={0x7, 0x2, 0x0, 0xf, 0x1, [{0x3, 0x3, 0x610}, {0x2, 0x2, 0x3}], "eb"}, @restrict={0xd, 0x0, 0x0, 0xb, 0x5}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x8, 0x3}, {0x9}, {0xa, 0x3}, {0x4, 0x1}, {0x3, 0x1}]}, @volatile={0xa, 0x0, 0x0, 0x9, 0x3}]}, {0x0, [0x30, 0x61, 0x2e, 0x2e]}}, &(0x7f00000000c0)=""/4096, 0xb6, 0x1000, 0x1}, 0x20) 08:34:23 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x2200}, 0x20) 08:34:23 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000)=0x3, 0x8) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000340)={&(0x7f0000000040)="a6720f01070d9d2580b10f20f82a6c8874d7b789a09674d10329f19cd24fd0849dfd84f7d83bfcc92eaa32d12580e76408744ae748505482ca947de8968163ff494e0c0bc1c736e7471edb7f874ef145dd9c4a6991f695c5e97c9c7e63c6e1eab1eb5e71942c8ec1b932390f035e2ff4ebb6b3fc4546693bba9b769959dade7ab1dcd9897050feb951bf77893aba017baf2242d038dfb02b925594d1e3944678bf5847673b988fdd46f91adaf11133b301c5a1b32683c9e636476f3f5d641b7e32f5af178f4c774aeecdc73a316b0e5eff0205e79d44cb9d8bb7a978894b84ce6cf1490449b7f424b32dd75ab46aafb650", &(0x7f0000000140)=""/23, &(0x7f0000000180)="7cfb408aa885e741f31be560398df53c45df069f61077127a74ef8330166abf19e6dd59ce92e534e94fe408fc07b87e2991459d0e4056178526516678d64494a48723466e82cd6f5a8ad212316edbdfa8db048a34450f791e0f242f538c7f692", &(0x7f0000000200)="f4108cf34a1ca5ed9926411509ef53f31e7c0f29adf0321737c57437611150441a0bab05a3380343cb2679948e3490faa3d448b9d3827ca43e88542783cc61bccf542ec30ece8b98a3658ae818090f9fcefebe2e62ea73625627dc95d69c43b997e4e4d773ef0b003d050c5a143854ec684bf52a801448c29862dc349e1cae21030637f6046cfbc4ebad127b3a2f312aa24d706e164463995ba918ebcf6f3b472caf6399e6c97957cf9cb70f010c4d972033a4cc7db31e90e10931a6d0cf4c80ea1406eca11c7158486053cf2cd082f989accd0611f7a60964bc0141ec156412a985742a201ef3", 0x5, r1, 0x4}, 0x38) clock_gettime(0xefbd8aa34c4cd931, 0x0) syz_open_dev$dri(&(0x7f0000000380)='/dev/dri/card#\x00', 0x0, 0x8040) 08:34:23 executing program 1: bpf$BPF_BTF_LOAD(0x22, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:23 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)) 08:34:23 executing program 4: socketpair(0x1, 0x0, 0x93000000, &(0x7f0000000040)) 08:34:24 executing program 2: socket$kcm(0x29, 0x5, 0x0) memfd_create(&(0x7f0000000000)='-{\'@!&.\x00', 0x7) 08:34:24 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x2300}, 0x20) 08:34:24 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x4, 0x22, 0xfffffffb}]}) 08:34:24 executing program 1: bpf$BPF_BTF_LOAD(0x23, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:24 executing program 3: clock_gettime(0xefbd8aa30000000b, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, &(0x7f0000000000)={0x0, 0x6d159e36, 0x3ff}) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x0) 08:34:24 executing program 4: socketpair(0x1, 0x0, 0x93010000, &(0x7f0000000040)) 08:34:24 executing program 2: clock_gettime(0xefbd8aa34c4cd931, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, r1, 0x2, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x2}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x9}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x3}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast2}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000841) 08:34:24 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) 08:34:24 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x4, 0x22, 0xfffffffb}]}) 08:34:24 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:24 executing program 3: clock_gettime(0xefbd8aa30000000b, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000001c0)) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) io_setup(0x8001, &(0x7f0000000000)=0x0) io_destroy(r2) io_pgetevents(r2, 0x0, 0x3, &(0x7f0000000200)=[{}, {}, {}], &(0x7f0000000280)={0x77359400}, 0x0) pselect6(0x40, &(0x7f0000000000)={0x200, 0xffffffff, 0xfff, 0x101, 0x2, 0x8, 0xffffffffffffffff, 0x26}, &(0x7f0000000040)={0x3, 0x3ff, 0x9, 0xff, 0x0, 0x94, 0x3f, 0xf2da}, &(0x7f0000000080)={0x2, 0x3e71, 0x3, 0xe6400000000, 0x1, 0x5, 0x2, 0x4e7}, &(0x7f0000000100)={r0, r1+10000000}, &(0x7f0000000180)={&(0x7f0000000140)={[0x3ff]}, 0x8}) 08:34:24 executing program 4: socketpair(0x1, 0x0, 0x94000000, &(0x7f0000000040)) 08:34:24 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb0100180000000000000018000000000000000000000000000a00000000000000000000000500000000000017d7152479a59ddb1c4f5e81"], &(0x7f00000000c0)=""/184, 0x32, 0xb8, 0xffffffff}, 0x20) getrusage(0x1, &(0x7f0000000240)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000300)) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r1, 0x891a, 0x0) connect$bt_sco(r1, &(0x7f0000000200), 0x8) read$qrtrtun(r0, &(0x7f0000000040)=""/79, 0x4f) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x84200, 0x0) ioctl$PPPIOCSMRU1(r2, 0x40047452, &(0x7f00000001c0)=0x400) clock_gettime(0xefbd8aa34c4cd931, 0x0) 08:34:24 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x7}, 0x20) 08:34:24 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x4, 0x22, 0xfffffffb}]}) 08:34:24 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:24 executing program 4: socketpair(0x1, 0x0, 0x94010000, &(0x7f0000000040)) 08:34:24 executing program 2: clock_gettime(0xefbd8aa34c4cd931, 0x0) inotify_init() r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x240080, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 08:34:24 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x700}, 0x20) 08:34:24 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000000)={0x8}, 0x4) clock_gettime(0xefbd8aa30000000b, 0x0) 08:34:24 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x20, 0x0, 0x22, 0xfffffffb}]}) 08:34:24 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x8, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:24 executing program 4: socketpair(0x1, 0x0, 0x95000000, &(0x7f0000000040)) 08:34:24 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x7000000}, 0x20) 08:34:24 executing program 2: clock_gettime(0xefbd8aa34c4cd931, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) connect$bt_sco(r0, &(0x7f0000000000)={0x1f, @none}, 0x8) 08:34:24 executing program 3: clock_gettime(0xefbd8aa30000000b, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000000)=0x2, 0x8) r0 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000080)='mptcp_pm\x00') ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000140)={'ip6_vti0\x00', &(0x7f00000000c0)={'syztnl1\x00', 0x0, 0x4, 0xf8, 0x2, 0x10000000, 0x21, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={[], [], @loopback}, 0x8000, 0x80, 0x2, 0x1ff}}) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, r0, 0x10, 0x70bd2b, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}, @MPTCP_PM_ATTR_ADDR={0x14, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x20004800}, 0x4000) 08:34:24 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0xa, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:24 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffffffb}]}) 08:34:24 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x78) 08:34:24 executing program 4: socketpair(0x1, 0x0, 0x95010000, &(0x7f0000000040)) 08:34:24 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000000)=0x800) clock_gettime(0xefbd8aa34c4cd931, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x64, r1, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_VLAN_ID={0x6}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x400}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e20}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x23}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x9}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0xdc}]}, 0x64}}, 0x20040080) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x1}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x40}, 0x24008084) 08:34:24 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:24 executing program 3: clock_gettime(0xefbd8aa30000000b, 0x0) sendmsg$MPTCP_PM_CMD_GET_LIMITS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="8cbf12526c832bb1f853494aa78b631ab797893eb8", @ANYRES16=0x0, @ANYBLOB="200026bd7000fcdbdf2506000000240001800800060000000000060005004e220000060005004e2000000800030064010101080002000500000008000200010000003c00018008000300ac1e01010500020009000000140004000000000000000000000000000000000014000400fc0000000000000000000000000000010800020000000000"], 0x8c}, 0x1, 0x0, 0x0, 0x11}, 0x4) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000180)=""/146) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000480)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000080)={0x50, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private1}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e23}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x50}}, 0x84) ioctl$sock_ifreq(r0, 0x891a, 0x0) mmap$qrtrtun(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x4033, r0, 0x3) r1 = syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x1, 0x555001) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000004c0)='stack\x00') ioctl$sock_ipv6_tunnel_SIOCADD6RD(r2, 0x89f9, &(0x7f0000000580)={'ip6_vti0\x00', &(0x7f0000000500)={'syztnl2\x00', 0x0, 0x0, 0x80, 0x6, 0x7ff, 0x8, @private1={0xfc, 0x1, [], 0x1}, @ipv4={[], [], @broadcast}, 0x10, 0x40, 0x5, 0x7}}) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000280)=""/248) 08:34:24 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x20}]}) 08:34:25 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20000120) 08:34:25 executing program 2: clock_gettime(0x6, 0x0) 08:34:25 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:25 executing program 4: socketpair(0x1, 0x0, 0x96000000, &(0x7f0000000040)) 08:34:25 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x20}]}) 08:34:25 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_targets\x00') ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r1, 0x891a, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000180)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r1, 0x40082102, &(0x7f0000000200)=r2) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dri/renderD128\x00', 0x0, 0x0) clock_gettime(0xefbd8aa30000000b, 0x0) ioctl$SOUND_MIXER_READ_CAPS(0xffffffffffffffff, 0x80044dfc, &(0x7f0000000240)) ioctl$vim2m_VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x5, 0x2, 0x4, 0x800, 0x4, {}, {0x1, 0x1, 0x81, 0x5, 0x81, 0xe0, "56b74824"}, 0x1000, 0x3, @planes=&(0x7f0000000340)={0x80, 0xffffffff, @userptr=0x10001}, 0x3, 0x0, r0}) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000400)={0x1, 0x6, 0x4, 0x8, 0x7, {0x0, 0xea60}, {0x4, 0x2, 0x20, 0x3f, 0x0, 0x80, "b8f7e9c8"}, 0xf9b2c2f9, 0x1, @fd, 0x400, 0x0, r3}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vim2m\x00', 0x2, 0x0) pselect6(0x40, &(0x7f0000000000)={0x3, 0x401, 0x4, 0xff, 0x7ff, 0x6, 0x800, 0x401}, &(0x7f0000000040)={0x2000000000006, 0x7ff, 0x7fffffff, 0x0, 0x1, 0x9, 0x7, 0x8001}, &(0x7f0000000080)={0x300, 0x40, 0x7fffffff, 0x2, 0x6, 0x1f, 0x200, 0x6}, &(0x7f00000000c0), &(0x7f0000000140)={&(0x7f0000000100)={[0x4]}, 0x8}) 08:34:25 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) 08:34:25 executing program 2: clock_gettime(0xefbd8aa34c4cd931, 0x0) io_setup(0x8001, &(0x7f0000000000)=0x0) io_destroy(r0) io_pgetevents(r0, 0xffffffff, 0x8, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={[0x7]}, 0x8}) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000340)='SMC_PNETID\x00') sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x68, r1, 0x4, 0x70bd26, 0x25dfdbff, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'bridge_slave_1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x68}, 0x1, 0x0, 0x0, 0x20004000}, 0x10) pselect6(0x40, &(0x7f0000000000)={0x80000000, 0x81, 0x4, 0x0, 0x1000, 0x7000000000000000, 0x7ff, 0x9}, &(0x7f0000000040)={0x0, 0x1b, 0x5, 0x90b, 0x0, 0x7ff, 0x8a19, 0x200}, &(0x7f0000000080)={0x7, 0x1000, 0x6, 0x76, 0x6, 0x81, 0xff}, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140)={&(0x7f0000000100)={[0x1000]}, 0x8}) 08:34:25 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x3, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:25 executing program 4: socketpair(0x1, 0x0, 0x96010000, &(0x7f0000000040)) 08:34:25 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000001840)=""/4099, 0x0, 0x1003}, 0x20) 08:34:25 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x20}]}) 08:34:25 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x4, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:25 executing program 3: clock_gettime(0x1, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000000)=[{{0x77359400}, 0x11, 0x3, 0x400}], 0x18) 08:34:25 executing program 4: socketpair(0x1, 0x0, 0x97000000, &(0x7f0000000040)) 08:34:25 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000040)={0x0, &(0x7f0000001840)=""/4078, 0x0, 0xfee, 0x1}, 0x20) ioctl$SOUND_MIXER_WRITE_RECSRC(0xffffffffffffffff, 0xc0044dff, &(0x7f0000000000)=0x12) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000080)=0xef, 0x8) 08:34:25 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_tables_targets\x00') ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r1, 0x891a, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000180)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r1, 0x40082102, &(0x7f0000000200)=r2) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dri/renderD128\x00', 0x0, 0x0) clock_gettime(0xefbd8aa30000000b, 0x0) ioctl$SOUND_MIXER_READ_CAPS(0xffffffffffffffff, 0x80044dfc, &(0x7f0000000240)) ioctl$vim2m_VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x5, 0x2, 0x4, 0x800, 0x4, {}, {0x1, 0x1, 0x81, 0x5, 0x81, 0xe0, "56b74824"}, 0x1000, 0x3, @planes=&(0x7f0000000340)={0x80, 0xffffffff, @userptr=0x10001}, 0x3, 0x0, r0}) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000400)={0x1, 0x6, 0x4, 0x8, 0x7, {0x0, 0xea60}, {0x4, 0x2, 0x20, 0x3f, 0x0, 0x80, "b8f7e9c8"}, 0xf9b2c2f9, 0x1, @fd, 0x400, 0x0, r3}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vim2m\x00', 0x2, 0x0) pselect6(0x40, &(0x7f0000000000)={0x3, 0x401, 0x4, 0xff, 0x7ff, 0x6, 0x800, 0x401}, &(0x7f0000000040)={0x2000000000006, 0x7ff, 0x7fffffff, 0x0, 0x1, 0x9, 0x7, 0x8001}, &(0x7f0000000080)={0x300, 0x40, 0x7fffffff, 0x2, 0x6, 0x1f, 0x200, 0x6}, &(0x7f00000000c0), &(0x7f0000000140)={&(0x7f0000000100)={[0x4]}, 0x8}) 08:34:25 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x5, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:25 executing program 3: socket$tipc(0x1e, 0x2, 0x0) clock_gettime(0xefbd8aa30000000b, 0x0) 08:34:25 executing program 2: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x400001, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x284500, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000080)={0x0, 0x1, r0}) 08:34:25 executing program 5: clock_gettime(0xefbd8aa34c4cd931, 0x0) io_setup(0x8001, &(0x7f0000000000)=0x0) io_destroy(r0) io_pgetevents(r0, 0xffffffff, 0x8, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={[0x7]}, 0x8}) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000340)='SMC_PNETID\x00') sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x68, r1, 0x4, 0x70bd26, 0x25dfdbff, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'bridge_slave_1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x68}, 0x1, 0x0, 0x0, 0x20004000}, 0x10) pselect6(0x40, &(0x7f0000000000)={0x80000000, 0x81, 0x4, 0x0, 0x1000, 0x7000000000000000, 0x7ff, 0x9}, &(0x7f0000000040)={0x0, 0x1b, 0x5, 0x90b, 0x0, 0x7ff, 0x8a19, 0x200}, &(0x7f0000000080)={0x7, 0x1000, 0x6, 0x76, 0x6, 0x81, 0xff}, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140)={&(0x7f0000000100)={[0x1000]}, 0x8}) 08:34:25 executing program 4: socketpair(0x1, 0x0, 0x97010000, &(0x7f0000000040)) 08:34:25 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) socketpair(0x4, 0x800, 0x2, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$l2tp6(r0, &(0x7f0000000200)="301104e41aa102c1934ea7ad2ed11c337a422439e41d0eedfc222d7d26eddf71986a555f16b03a137204377725b9cc5422783402144881417c3601f123c667d740e072533389d0b16ff89b9a84ae96921e15dcd82fdce4ba8d306eada62c0c121eef632d11e2e9f4c714fb63b7d3867e948112ddf68469f8f5ab539e072f3c9c4cc061f136", 0x85, 0x0, &(0x7f00000002c0)={0xa, 0x0, 0xd5, @empty, 0x8, 0x1}, 0x20) 08:34:25 executing program 3: socket$tipc(0x1e, 0x2, 0x0) ioctl$PPPIOCATTCHAN(0xffffffffffffffff, 0x40047438, &(0x7f0000000080)=0x1) clock_gettime(0xefbd8aa30000000b, 0x0) clock_gettime(0x5, &(0x7f0000000000)) socketpair(0x22, 0xa, 0x5, &(0x7f0000000040)) 08:34:25 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x6, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:25 executing program 4: socketpair(0x1, 0x0, 0x98000000, &(0x7f0000000040)) 08:34:25 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f0000000040)) clock_gettime(0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000940)={'syztnl2\x00', &(0x7f0000000780)={'syztnl2\x00', 0x0, 0x4, 0x4, 0x12, 0x0, 0x22, @empty, @ipv4={[], [], @rand_addr=0x64010102}, 0x700, 0x7800, 0x7, 0x6}}) connect$can_bcm(r0, &(0x7f0000000980)={0x1d, r1}, 0x10) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x5}, 0x8) 08:34:25 executing program 5: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000000)={0x8}, 0x4) clock_gettime(0xefbd8aa30000000b, 0x0) 08:34:25 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000000)={0x0, &(0x7f0000001840)=""/4112, 0x0, 0x1010, 0x1}, 0x20) 08:34:25 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x7, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:25 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp6\x00') ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, &(0x7f0000000000)) socket$inet6_udp(0xa, 0x2, 0x0) clock_gettime(0xefbd8aa34c4cd931, 0x0) r2 = inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000243) inotify_rm_watch(r0, r2) io_pgetevents(0x0, 0x0, 0xa, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x0, &(0x7f0000000240)={&(0x7f0000000200)={[0x5]}, 0x8}) 08:34:25 executing program 3: clock_gettime(0xefbd8aa30000000b, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(0xffffffffffffffff, 0x80045006, &(0x7f0000000040)) sched_yield() r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp1\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d00, &(0x7f00000000c0)) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x1}, 0x10) socketpair(0x4, 0x80000, 0x0, &(0x7f0000000100)) 08:34:25 executing program 4: socketpair(0x1, 0x0, 0x98010000, &(0x7f0000000040)) 08:34:26 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) r0 = socket$vsock_stream(0x28, 0x1, 0x0) io_cancel(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x7, 0x1ff, r0, &(0x7f0000001840)="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", 0x1000, 0x200, 0x0, 0x2}, &(0x7f0000000040)) 08:34:26 executing program 5: clock_gettime(0xefbd8aa34c4cd931, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap$qrtrtun(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000001, 0x110, 0xffffffffffffffff, 0x2000e5) io_setup(0x63d, &(0x7f0000000000)=0x0) io_pgetevents(r0, 0x7fffffff, 0x4, &(0x7f0000000180)=[{}, {}, {}, {}], &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={&(0x7f0000000100), 0x1}) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200004}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x84}, 0x40000) 08:34:26 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x8, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:26 executing program 2: ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, &(0x7f0000000000)={0x0, 0xfffffffffffffffa, 0x1}) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000080)={0x5, &(0x7f0000000040)=[{0x1, 0x0, 0x3, 0xfe4}, {0xfe4, 0xff, 0x6, 0x9}, {0x5, 0x4, 0x1, 0x5}, {0x80, 0x9, 0xca, 0x9}, {0xfc1a, 0x0, 0x9, 0x8}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f00000000c0)) clock_gettime(0xefbd8aa34c4cd931, 0x0) 08:34:26 executing program 3: clock_gettime(0xefbd8aa30000000b, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x4, 0x3, 0x1, 0x8, 0x1a, @local, @private2, 0x7, 0x10, 0xcf2, 0x4}}) 08:34:26 executing program 4: socketpair(0x1, 0x0, 0x99000000, &(0x7f0000000040)) 08:34:26 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000000)={0x0, &(0x7f0000001180)=""/4117, 0x0, 0xfffffffffffffea6}, 0x20) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$smc(&(0x7f00000000c0)='SMC_PNETID\x00') sendmsg$SMC_PNETID_DEL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x54, r1, 0x20, 0x70bd25, 0x25dfdbfb, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'wg0\x00'}]}, 0x54}, 0x1, 0x0, 0x0, 0x2000c000}, 0x84) 08:34:26 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0xa, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:26 executing program 2: clock_gettime(0x6, 0x0) clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(0xffffffffffffffff, 0x28, 0x6, &(0x7f0000000000)={r0, r1/1000+10000}, 0x10) 08:34:26 executing program 5: clock_gettime(0xefbd8aa34c4cd931, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap$qrtrtun(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000001, 0x110, 0xffffffffffffffff, 0x2000e5) io_setup(0x63d, &(0x7f0000000000)=0x0) io_pgetevents(r0, 0x7fffffff, 0x4, &(0x7f0000000180)=[{}, {}, {}, {}], &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={&(0x7f0000000100), 0x1}) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200004}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x84}, 0x40000) 08:34:26 executing program 3: clock_gettime(0x0, 0x0) select(0x40, &(0x7f0000000000)={0x1, 0x6, 0x7, 0x3, 0x9d6, 0x4, 0x6, 0xbf}, &(0x7f0000000040)={0x8, 0x80000000, 0x1f, 0x5, 0x3, 0x4, 0x9, 0x1}, &(0x7f0000000080)={0x9, 0x20, 0x2, 0xffffffffffffff75, 0x3ff, 0x3, 0xfff, 0x2}, &(0x7f00000000c0)={0x0, 0xea60}) 08:34:26 executing program 2: clock_gettime(0x2, 0x0) 08:34:26 executing program 0: setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000000)=0x1, 0x8) bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f00000000c0)={'syztnl1\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x29, 0x81, 0xff, 0x5, 0x24, @remote, @ipv4={[], [], @rand_addr=0x64010102}, 0x1, 0x7}}) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r1, 0x891a, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r2, 0x891a, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0xffff, 0x20, 0x8, 0xc40, 0xffffffffffffffff, 0x40000000, [], r0, r2, 0x2, 0x2, 0xffffffff}, 0x40) 08:34:26 executing program 4: socketpair(0x1, 0x0, 0x99010000, &(0x7f0000000040)) 08:34:26 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x10, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:26 executing program 5: clock_gettime(0xefbd8aa34c4cd931, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap$qrtrtun(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000001, 0x110, 0xffffffffffffffff, 0x2000e5) io_setup(0x63d, &(0x7f0000000000)=0x0) io_pgetevents(r0, 0x7fffffff, 0x4, &(0x7f0000000180)=[{}, {}, {}, {}], &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={&(0x7f0000000100), 0x1}) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200004}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x84}, 0x40000) 08:34:26 executing program 3: clock_gettime(0x7, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000000)=0x2, 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tpin6, &(0x7f0000000100)=0x80, 0x800) prctl$PR_SET_ENDIAN(0x14, 0x2) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="04000000", @ANYRES16=0x0, @ANYBLOB="04002abd7000fedbdf250800000008001900ac14142508001700", @ANYRES32=r0, @ANYBLOB="050004000700000006000300ff0700000c000f00faffffffffffffff05002200000000001400080076657468305f746f5f62617461647600050004000700000006001b004e2400000c0016000700000000000000"], 0x78}, 0x1, 0x0, 0x0, 0x4040091}, 0x20000081) 08:34:26 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x12, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:26 executing program 4: socketpair(0x1, 0x0, 0x9a000000, &(0x7f0000000040)) 08:34:26 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000000)={0x0, &(0x7f0000000040)=""/4111, 0x20, 0xfffffffffffffce3, 0xffffffff}, 0x20) 08:34:26 executing program 2: connect$bt_sco(0xffffffffffffffff, &(0x7f0000000000)={0x1f, @none}, 0x8) clock_gettime(0xefbd8aa34c4cd931, 0x0) io_getevents(0x0, 0x0, 0x1, &(0x7f0000000040)=[{}], &(0x7f0000000080)={0x0, 0x989680}) 08:34:26 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x48, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:26 executing program 0: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000000)="2e5a05e9237c8303068e491019877d1b441e6157fce419cfd62652bf2a7e64bf1c7fed4e8f01dee02225de89a9f94d8152ba32268e315c38f3454031857ca1e170cc696655b5fde9cede33340860b0c1cecf7e66eae07bab727115cca8bca7b513842bda63f0ee8ac4adbb13197f8fda8413af2e24188867b1c2be8e6a2852f9074f34463ca99594408e5c481063c0b77b39b45883d446b483f614021d2e752747934b51ccbc5be84bbdbde27ff952bb541a76c134c9bee542efe1be61fd78d481abafa23ed696d42ec0c3d41b42f18487df39c12f601641c64212973c573ed3ea301a31ab4f110825e43ffbf176d6"}, 0x20) bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r1, 0x891a, 0x0) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x2c, 0x0, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10000004}, 0x8040) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r2, 0x891a, 0x0) recvfrom$rxrpc(r2, &(0x7f0000000180)=""/139, 0x8b, 0x2000, 0x0, 0x0) 08:34:26 executing program 5: clock_gettime(0xefbd8aa34c4cd931, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap$qrtrtun(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000001, 0x110, 0xffffffffffffffff, 0x2000e5) io_setup(0x63d, &(0x7f0000000000)=0x0) io_pgetevents(r0, 0x7fffffff, 0x4, &(0x7f0000000180)=[{}, {}, {}, {}], &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={&(0x7f0000000100), 0x1}) 08:34:26 executing program 3: sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x0, 0x2, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1ff}, @L2TP_ATTR_PW_TYPE={0x6}]}, 0x30}, 0x1, 0x0, 0x0, 0x800}, 0x8040) clock_gettime(0xefbd8aa30000000b, 0x0) 08:34:26 executing program 2: clock_gettime(0xefbd8aa34c4cd931, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0xffffffe0, 0x5, 0x4, 0x2, 0xffffffffffffffff, 0x9, [], 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x1}, 0x40) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1d, 0x2, 0xffff, 0x2, 0x980, r1, 0x7, [], 0x0, r0, 0x0, 0x2, 0x4}, 0x40) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r2, &(0x7f00000000c0)="0c083b3485e51cfe23e3c1b405b3bf813c107ce4303be22763e3d8ff8b5d495799c19b3f206e435c710c56759565b05f969942b6b7694eba484f78c1b88a1c93004cd602f847098079ea0afc739c6e6d2ed7c0f9a0b0d3432e77acc80ed3b7063819cc0a750d577d3968"}, 0x20) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000040)={r0, r1}, 0xc) 08:34:26 executing program 4: socketpair(0x1, 0x0, 0x9a010000, &(0x7f0000000040)) 08:34:26 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x4c, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:26 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000040)=[0x0, 0x3], 0x2) ioctl$sock_ifreq(r0, 0x891a, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f0000001840)=""/4096, &(0x7f0000000000)=0x1000) 08:34:26 executing program 4: socketpair(0x1, 0x0, 0x9b000000, &(0x7f0000000040)) 08:34:26 executing program 2: clock_gettime(0xefbd8aa34c4cd931, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0xffffffffffffffff, 0x1, 0x10}, 0xc) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000580)='/proc/capi/capi20ncci\x00', 0x52b480, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(0xffffffffffffffff, 0x28, 0x6, &(0x7f0000000d40)={0x0, 0x2710}, 0x10) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={r0, 0x28, &(0x7f00000004c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000540)={r1, 0x69963908, 0x8}, 0xc) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sco\x00') clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000300)={0x1, 0x80000000003, 0x400, 0x4, 0x5, 0x5, 0x5}, &(0x7f0000000340)={0x4, 0x7fffffff, 0x10000, 0x20, 0x1, 0x2, 0x5, 0x5}, &(0x7f0000000380)={0x3, 0x5, 0xffffffffffffffff, 0x800000000, 0xd4, 0x5, 0x80, 0xdb0c}, &(0x7f0000000400)={r3, r4+10000000}, &(0x7f0000000480)={&(0x7f0000000440)={[0x320]}, 0x8}) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000002c0)={0xa3}, 0x4) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000040)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e23, @empty}}, 0x24) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000200)={0x18, 0x0, {0x4, @multicast, 'macvlan1\x00'}}) sendto$rxrpc(0xffffffffffffffff, &(0x7f0000000080)="8231871fc2de1b597edb8da63f384ed227083221fb79f1c43afc36b2b8f96a5c13bcf0cfabdb73caf451cc1c58d92f2d870a4e8db3fe3051ed2c32ea293eeba958eab204ccd74a92d5cba94f17e2c62c8eadcdf148318adf1db02f58abfc7c7c90f27d434958f6ca76203ec9564e3ffacbd2bff01d604b903900d0fb8b2bec611dfd376768dbb75739d0db599f3f00435638b92cdd4de4f740016f312ebdd93a887177feccca1038f5fea4381762e797e61c7b249e3755d6d87fb9ed89d05b2390ba2880d501ec", 0xc7, 0x4800, &(0x7f0000000180)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e23, @loopback}}, 0xfffffffffffffed3) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffffff, 0x10001}) r5 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r5, 0x891a, 0x0) ioctl$SIOCPNENABLEPIPE(r5, 0x89ed, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r5, 0x80045006, &(0x7f0000000240)) 08:34:26 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x68, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:26 executing program 3: socket$inet6_icmp(0xa, 0x2, 0x3a) clock_gettime(0x3, 0x0) 08:34:26 executing program 5: clock_gettime(0xefbd8aa34c4cd931, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap$qrtrtun(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000001, 0x110, 0xffffffffffffffff, 0x2000e5) io_pgetevents(0x0, 0x7fffffff, 0x4, &(0x7f0000000180)=[{}, {}, {}, {}], &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={&(0x7f0000000100), 0x1}) 08:34:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x6c, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:27 executing program 4: socketpair(0x1, 0x0, 0x9b010000, &(0x7f0000000040)) 08:34:27 executing program 0: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x8919, 0x0) getsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000000), &(0x7f0000001080)=0x4) bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000040)={0x0, &(0x7f0000000080)=""/4082, 0x0, 0xff2, 0x1}, 0x20) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000010c0)={0x4}, 0x8) 08:34:27 executing program 5: clock_gettime(0xefbd8aa34c4cd931, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) io_pgetevents(0x0, 0x7fffffff, 0x4, &(0x7f0000000180)=[{}, {}, {}, {}], &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={&(0x7f0000000100), 0x1}) 08:34:27 executing program 2: clock_gettime(0xefbd8aa34c4cd931, 0x0) ioctl$PPPIOCATTCHAN(0xffffffffffffffff, 0x40047438, &(0x7f0000000000)) 08:34:27 executing program 3: clock_gettime(0x1, 0x0) 08:34:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x74, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:27 executing program 4: socketpair(0x1, 0x0, 0x9c000000, &(0x7f0000000040)) 08:34:27 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000580)={&(0x7f0000000440), 0x10, &(0x7f0000000540)={&(0x7f00000004c0)={0x3, 0x434, 0x6, {0x77359400}, {r1, r2/1000+10000}, {0x1}, 0x1, @can={{0x2, 0x1, 0x0, 0x1}, 0x1, 0x0, 0x0, 0x0, "231a9e849e607157"}}, 0x48}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040050) bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) io_getevents(0x0, 0x0, 0x7, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f00000002c0)={r3, r4+60000000}) tkill(0xffffffffffffffff, 0x2a) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x64, 0x6, [@const={0xa, 0x0, 0x0, 0xa, 0x5}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x3, 0x4}, {0xa, 0x5}, {0xd, 0x4}, {0x4}, {0x8, 0x4}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x2, 0x2}}, @const={0x0, 0x0, 0x0, 0xa, 0x2}]}, {0x0, [0xcf, 0x61, 0x30, 0x2e]}}, &(0x7f00000000c0)=""/40, 0x82, 0x28, 0x1}, 0x20) 08:34:27 executing program 5: clock_gettime(0xefbd8aa34c4cd931, 0x0) io_pgetevents(0x0, 0x7fffffff, 0x4, &(0x7f0000000180)=[{}, {}, {}, {}], &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={&(0x7f0000000100), 0x1}) 08:34:27 executing program 2: ioctl$SNDCTL_DSP_GETODELAY(0xffffffffffffffff, 0x80045017, &(0x7f0000000000)) clock_gettime(0xefbd8aa34c4cd931, 0x0) 08:34:27 executing program 3: clock_gettime(0x1, 0x0) 08:34:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x7a, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:27 executing program 4: socketpair(0x1, 0x0, 0x9c010000, &(0x7f0000000040)) 08:34:27 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) pselect6(0x40, &(0x7f0000000140)={0x0, 0x9, 0x2, 0xfffffffffffffffe, 0xfffffffffffff63e, 0x5, 0xa080, 0x1000}, &(0x7f0000000180)={0x80000000, 0x2, 0x401, 0x4, 0x8, 0x2, 0x0, 0x2c1}, &(0x7f00000001c0)={0x5, 0x4, 0xffff, 0x2bb6, 0x8, 0x2, 0x20b, 0x63}, &(0x7f0000000200)={0x0, 0x3938700}, &(0x7f0000000280)={&(0x7f0000000240)={[0x8]}, 0x8}) getrandom(&(0x7f0000000000)=""/236, 0xec, 0x2) 08:34:27 executing program 5: io_pgetevents(0x0, 0x7fffffff, 0x4, &(0x7f0000000180)=[{}, {}, {}, {}], &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={&(0x7f0000000100), 0x1}) 08:34:27 executing program 3: clock_gettime(0xefbd8aa30000000b, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) 08:34:27 executing program 2: clock_gettime(0x7, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0x2) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x4, 0x45, 0x4}]}) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000000), 0x8) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r0, 0x110, 0x3) 08:34:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x9, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:27 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000140)=""/4096, 0x0, 0x1000}, 0x84) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='syscall\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000001140)={0x0, 0x0, r0, 0x5}) recvfrom$rxrpc(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x44ec22ffb9774de3, &(0x7f0000000040)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e20, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x24) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, &(0x7f0000000080)) 08:34:27 executing program 5: io_pgetevents(0x0, 0x0, 0x4, &(0x7f0000000180)=[{}, {}, {}, {}], &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={&(0x7f0000000100), 0x1}) 08:34:27 executing program 4: socketpair(0x1, 0x0, 0x9d000000, &(0x7f0000000040)) 08:34:27 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) socketpair(0xf, 0xa, 0x3, &(0x7f0000000080)) getpeername$l2tp6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x20) clock_gettime(0xefbd8aa34c4cd931, 0x0) 08:34:27 executing program 3: ioctl$PPPIOCGDEBUG(0xffffffffffffffff, 0x80047441, &(0x7f0000000000)) clock_gettime(0x3, 0x0) 08:34:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0xa, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:27 executing program 4: socketpair(0x1, 0x0, 0x9d010000, &(0x7f0000000040)) 08:34:27 executing program 2: sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x58, 0x0, 0x400, 0x70bd2b, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}, @MPTCP_PM_ATTR_ADDR={0x4}]}, 0x58}, 0x1, 0x0, 0x0, 0x20040}, 0x20000000) clock_gettime(0xefbd8aa34c4cd931, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x8080, 0x0) 08:34:27 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) sysfs$2(0x2, 0x6f, &(0x7f0000000000)=""/91) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r1, 0x891a, 0x0) ioctl$PPPIOCGNPMODE(r1, 0xc008744c, &(0x7f00000000c0)={0x21, 0x1}) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r2, 0x891a, 0x0) sendmsg$MPTCP_PM_CMD_GET_ADDR(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES32=r0, @ANYBLOB="080028bd7000fbdbdf250300000008000300010000000800020005000000080003000300000008000200050060aac2ceb02280958478affb7bca9f95dd7028e09c15f8cc1e8ce8710bcee549cb2d36631e7cc9df6ebb1cbcb60b5c88105bc03201a63c4d6479ffc63f459028dc7ecc56089aa859bdd6ab84e687e14f3a29cc77faa80629d033ae9ac9f4f2", @ANYRES32, @ANYRESOCT=r1], 0x3c}, 0x1, 0x0, 0x0, 0x8800}, 0x4800) 08:34:27 executing program 5: io_pgetevents(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={&(0x7f0000000100), 0x8}) 08:34:27 executing program 3: ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xc0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x8001, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x4}, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x10, 0x1, 0x3c}, &(0x7f00000000c0)=0x101, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0xf0}}, 0x10) 08:34:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x2a, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:27 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0xfffffe10}, 0x20) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0xc2, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x400, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000002c0000002c000000070000001000000004000006040000000400000000003c0202000000050000000c000000040000000e000000000400000000e161613000"], &(0x7f0000000140)=""/249, 0x4b, 0xf9}, 0x20) accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0xc0800) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) 08:34:27 executing program 4: socketpair(0x1, 0x0, 0x9e000000, &(0x7f0000000040)) 08:34:27 executing program 2: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x9, 0x200000) clock_gettime(0xefbd8aa34c4cd931, 0x0) 08:34:27 executing program 5: io_pgetevents(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={&(0x7f0000000100), 0x8}) 08:34:27 executing program 3: clock_gettime(0x0, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000000)='mptcp_pm\x00') bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000300)={&(0x7f0000000340)="6e2ed1ac9e37ed9cc3278aa5bd22847a4f5ebd3ab408000000e547d4a2c9f34fd5d1be5d93a36b65bbf69bbc97f4eb6f7176dda8cc333073b36e481688f10bcb8580f52a02e5e78db90c06451392b458dbd26eb7d8a7ac6e74414c2645009fdf9a6979789910b066d43f27c102ff5261c3ad387b10877789c2518d5d9d5608d0a614e4603be6aa88269d060df6646f49317888aef308350b8d4025", &(0x7f00000000c0)=""/146, &(0x7f0000000180)="71bf7cb73b5755ab2247e33ac3fb04f398049a922b1a1f49f80b7ba10c89074f2e8b93866fec8d1bdd7b01fb8cbe8a10bb00e668b05aef6b1b1c68eb1ed1974e9d4a904097d6eb4b7451a96cb77df7964ff39fd05e284dfd89431a6cf54266f24169836ebf9b5ce7123c1a2d04fb17962ef1afffdca922aab824f6e53ec76f13c2057a1a875cf33ace7ad4e8b38b5d8ad8ebb4192313f9c143a1", &(0x7f0000000240)="aecdc22826378daec34a5a640c41de7f6e27b52177a7942b788f9cbcfc65792ea2d507360f0d6cf5e24ac46447839a63652f6b1f4bb7752566aff35cb1a1c8274ea8baa97625568cb466310c152d4d119fd1cd28c10b62ca272fdcdf61c8211c2352eab9c5156a457f1effa99b7857289b83e1eb747cff83f1e7dbd5e9d55bf01beac9636fc371fa3570146c20d60622f02e8637f0d47a439afdca4740968d75", 0xff, 0xffffffffffffffff, 0x4}, 0x38) 08:34:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x2f, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:28 executing program 4: socketpair(0x1, 0x0, 0x9e010000, &(0x7f0000000040)) 08:34:28 executing program 2: ptrace$setregs(0x2, 0x0, 0x2, &(0x7f0000000100)="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") r0 = getpgrp(0x0) r1 = syz_open_procfs(r0, &(0x7f0000000000)='fd/4\x00') ioctl$SOUND_MIXER_READ_CAPS(r1, 0x80044dfc, &(0x7f0000000040)) getpriority(0x1, r0) clock_gettime(0xefbd8aa34c4cd931, 0x0) 08:34:28 executing program 5: io_pgetevents(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={&(0x7f0000000100), 0x8}) 08:34:28 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000001840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 08:34:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x63, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:28 executing program 2: clock_gettime(0xefbd8aa34c4cd931, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000000)='SMC_PNETID\x00') pselect6(0x40, &(0x7f0000000040)={0x9, 0xc2fc, 0x100, 0x7, 0x10001, 0x8, 0x5, 0x1f}, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x1, 0x1, 0x8, 0x4, 0xffffffff80000000}, &(0x7f00000000c0)={0x1000, 0xaeb1, 0xffff, 0x7f, 0x1, 0x1a400000000, 0x3, 0x100}, &(0x7f0000000100), &(0x7f0000000180)={&(0x7f0000000140)={[0x81]}, 0x8}) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f00000001c0)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, 'syzkaller1\x00'}}) geteuid() 08:34:28 executing program 4: socketpair(0x1, 0x0, 0x9f000000, &(0x7f0000000040)) 08:34:28 executing program 3: clock_gettime(0xefbd8aa30000000b, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 08:34:28 executing program 5: io_pgetevents(0x0, 0x0, 0x3, &(0x7f0000000180)=[{}, {}, {}], &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={&(0x7f0000000100), 0x8}) 08:34:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x5f5e0ff, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:28 executing program 0: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x2c00, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)="62db94d9b66db8acb4326ec6983ba3ddc03ddf232d3f35b7ef0e0c3d98a5fe85804943de1a"}, 0x20) bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) 08:34:28 executing program 4: socketpair(0x1, 0x0, 0x9f010000, &(0x7f0000000040)) 08:34:28 executing program 3: clock_gettime(0xefbd8aa30000000b, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000002100)={&(0x7f0000000000)="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", &(0x7f0000001000)=""/34, &(0x7f0000001040)="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", &(0x7f0000002040)="95bc30330f7fae20ad6529cc0198fe02f9e78cfaa14ddf5c39a6fc18b88a188d6fd0466d3c64b157a238d56e0ecd3dc1dec3e24adfe36750b4aedb5c75ac2a99a2299c2a1597b3f4bfe29a3979d70769a4d10e63df31a07a23579d5777c43ca6bd08621ae6b7fea94f49ada591142e06a3c199c086496d1b4982adb2c12dac0ea44eb9a331a8", 0xb01, 0xffffffffffffffff, 0x4}, 0x38) 08:34:28 executing program 2: clock_gettime(0x3, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000000)) 08:34:28 executing program 5: io_pgetevents(0x0, 0x0, 0x3, &(0x7f0000000180)=[{}, {}, {}], &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={&(0x7f0000000100), 0x8}) 08:34:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:28 executing program 4: socketpair(0x1, 0x0, 0xa0000000, &(0x7f0000000040)) 08:34:28 executing program 3: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x800, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x40}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x4040000}, 0x2000000) clock_gettime(0xefbd8aa30000000b, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x40000, 0x0) ioctl$vim2m_VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000240)={0x1, 0x2, 0x4, 0x100, 0x6, {0x77359400}, {0x3, 0xc, 0x7f, 0x2, 0x6, 0x3f, "8b35f473"}, 0x1, 0x1, @userptr=0x100000000, 0x80000000, 0x0, r0}) ioctl$sock_ifreq(r0, 0x891a, 0x0) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$vim2m_VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f00000003c0)={0x5, 0x0, 0x4, 0x70000, 0x3, {r2, r3/1000+10000}, {0x1, 0x0, 0x1, 0x1, 0x2, 0xb7, "61025cc4"}, 0x4, 0x4, @planes=&(0x7f0000000380)={0x80000000, 0x0, @fd=r0, 0xffffffff}, 0x5, 0x0, r0}) r5 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000440)='/proc/capi/capi20ncci\x00', 0x200080, 0x0) ioctl$vim2m_VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000480)={0x6, 0x3, 0x4, 0x0, 0xfffffff9, {}, {0x2, 0x2, 0x24, 0x9, 0x0, 0x1f, "40c10fc5"}, 0x0, 0x0, @fd=r4, 0xffffa5ce, 0x0, r5}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r6, 0x891a, 0x0) ioctl$SIOCPNENABLEPIPE(r6, 0x89ed, 0x0) select(0x40, &(0x7f0000000100)={0x80000001, 0x44, 0x7c00000000000, 0x8, 0x9, 0x40, 0x1, 0x8001}, &(0x7f0000000140)={0x1000, 0x7fffffff, 0x1, 0x5, 0x7, 0x2, 0x1ff, 0x4}, &(0x7f0000000180)={0x6, 0xa8, 0x4, 0x7fffffff, 0x6, 0x23, 0xfffffffffffffffc, 0x7}, &(0x7f00000001c0)) 08:34:28 executing program 0: setsockopt$PNPIPE_HANDLE(0xffffffffffffffff, 0x113, 0x3, &(0x7f0000000000)=0x7, 0x4) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) recvfrom$l2tp6(r0, &(0x7f0000000080)=""/79, 0x4f, 0x2000, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev}}, 0x20) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) socket$pppoe(0x18, 0x1, 0x0) accept4$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711}, 0x10, 0x800) bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000002880)=""/4121, 0x0, 0x1019, 0x1fffc}, 0x20) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r2, 0x891a, 0x0) ioctl$SOUND_MIXER_READ_RECSRC(r2, 0x80044dff, &(0x7f0000000180)) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000001c0)) 08:34:28 executing program 5: io_pgetevents(0x0, 0x0, 0x3, &(0x7f0000000180)=[{}, {}, {}], &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={&(0x7f0000000100), 0x8}) 08:34:28 executing program 2: clock_gettime(0xefbd8aa34c4cd931, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000480)='SMC_PNETID\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_LIST(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) sendmsg$SMC_PNETID_DEL(r0, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x44, 0x0, 0x2, 0x70bd2d, 0x25dfdbff, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6tnl0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x44000}, 0x40040040) ioctl$sock_ifreq(r1, 0x891a, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) write$qrtrtun(r2, &(0x7f0000000500)="5edab06ac0f7dc4fcfcfb7c0e769705e31dcc79553845bfbbc674721a6790f5810ce816213ac0b8e4718e3d3d1931316c62d206ce569659823a7eb151ae37dcfad07becb843c613d0cd898826791626daf4f23e233be34ab75b304a6f3284b8b5c3607d9179f952e15c16cd9ff1139", 0x6f) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0)='l2tp\x00') openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xffffffffffffffd2, &(0x7f0000000280)={&(0x7f0000000200)={0x64, r3, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_VLAN_ID={0x6}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e20}, @L2TP_ATTR_L2SPEC_LEN={0x3f, 0x6, 0x23}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x9}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0xdc}]}, 0x64}}, 0x20040080) ioctl$MEDIA_IOC_REQUEST_ALLOC(r1, 0x80047c05, &(0x7f0000000580)) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB='1 \x00\x00', @ANYRES16=r3, @ANYBLOB="bd7000fddbdf250800000014001f00ed01000000000000000000000000000008000c0001000000"], 0x30}, 0x1, 0x0, 0x0, 0x20004004}, 0x4004040) 08:34:28 executing program 4: socketpair(0x1, 0x0, 0xa0010000, &(0x7f0000000040)) 08:34:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:28 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x4, 0x10}, 0xc) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000500)=[{&(0x7f00000001c0)=""/10, 0xa}, {&(0x7f0000000300)=""/108, 0x6c}, {&(0x7f0000000380)=""/111, 0x6f}, {&(0x7f0000000400)=""/44, 0x2c}, {&(0x7f0000000440)=""/10, 0xa}, {&(0x7f0000000480)=""/79, 0x4f}], 0x6, &(0x7f0000000580)=""/165, 0xa5}, 0x10001) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000700)={0x8, &(0x7f00000006c0)=[{0x1, 0xff, 0x7, 0xfff}, {0x1, 0x3, 0x0, 0x9a2}, {0x1000, 0x41, 0x3f, 0x7}, {0x3f, 0x7, 0x1, 0x6}, {0x8, 0x20, 0x7, 0x7}, {0x50f, 0x7f, 0x8, 0x1}, {0x3c, 0xff, 0x6, 0x2}, {0xfffc, 0x7, 0xb8, 0x9}]}) setsockopt$RXRPC_SECURITY_KEY(r1, 0x110, 0x1, &(0x7f0000000680)='*#\x00', 0x3) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000240)={&(0x7f0000000000)="15576ec3fc7aed16ff00abb8004eb03014c12da288c551866f7fdffcefd75dcfcd22", &(0x7f0000000040)=""/155, &(0x7f0000000100)="9a4e081d5d5e63512fca253629bb87f2acc3be5f4453dc0ef02a93842512944d1101f8f3a4b439c8a5da74a62fb3e217f563e46f6bb4ab5fbca2c935c8e46f4b400d48b44c77a73d00d776d04d2de64282079e08d39399e8c8cdb1f4c7cadcfaac552ae6a86697d600f56911bfd23cf36b53fcc197692330b19e9c7b4d293fcf904ab33a5b453636d168d1bd21c7b13ca740e80e2cf6a7ec5d484be6ec8c3ba2ee43e043631153d7a9934d46db244c1d28", &(0x7f00000001c0), 0x1ff, r0}, 0x38) clock_gettime(0x3, 0x0) 08:34:28 executing program 5: io_pgetevents(0x0, 0x0, 0x3, &(0x7f0000000180)=[{}, {}, {}], &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={&(0x7f0000000100), 0x8}) 08:34:28 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000001840)=""/4096, 0x0, 0x1000, 0xffffffff}, 0x20) 08:34:28 executing program 4: socketpair(0x1, 0x0, 0xa1000000, &(0x7f0000000040)) 08:34:28 executing program 2: clock_gettime(0xefbd8aa34c4cd931, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(0xffffffffffffffff, 0x110, 0x3) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000000)=""/81) ioctl$PPPIOCSACTIVE(0xffffffffffffffff, 0x40107446, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0xffff, 0x40, 0x1f, 0x9}, {0x4, 0xff, 0x8, 0x2}, {0xfffa, 0x81, 0x9, 0xffff}]}) 08:34:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x3, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:28 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000001400)='/proc/capi/capi20ncci\x00', 0x0, 0x0) geteuid() 08:34:28 executing program 3: clock_gettime(0xefbd8aa30000000b, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000000)=""/182) 08:34:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:28 executing program 4: socketpair(0x1, 0x0, 0xa1010000, &(0x7f0000000040)) 08:34:28 executing program 2: ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f0000000000)) clock_gettime(0xefbd8aa34c4cd931, 0x0) 08:34:28 executing program 5: io_pgetevents(0x0, 0x0, 0x3, &(0x7f0000000180)=[{}, {}, {}], &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={&(0x7f0000000100), 0x8}) 08:34:28 executing program 0: ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f0000000000)) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x4802c0, 0x0) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0xc025}) 08:34:28 executing program 3: clock_gettime(0x3, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x3, 0xc0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)) 08:34:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x5, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:28 executing program 5: io_pgetevents(0x0, 0x0, 0x3, &(0x7f0000000180)=[{}, {}, {}], &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={&(0x7f0000000100), 0x8}) 08:34:29 executing program 2: clock_gettime(0x7, &(0x7f0000000000)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip_tables_matches\x00') r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r1, 0x891a, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x3) 08:34:29 executing program 4: socketpair(0x1, 0x0, 0xa2000000, &(0x7f0000000040)) 08:34:29 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000000)=0x2) 08:34:29 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) clock_gettime(0xefbd8aa30000000b, 0x0) 08:34:29 executing program 4: socketpair(0x1, 0x0, 0xa2010000, &(0x7f0000000040)) 08:34:29 executing program 5: io_pgetevents(0x0, 0x0, 0x3, &(0x7f0000000180)=[{}, {}, {}], &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={&(0x7f0000000100), 0x8}) 08:34:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x6, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:29 executing program 2: clock_gettime(0xefbd8aa34c4cd931, 0x0) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000000)={0x80fd, 0x1}) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000040)={0x3d, 0x1}) 08:34:29 executing program 3: clock_gettime(0xefbd8aa30000000b, 0x0) pselect6(0x40, &(0x7f0000000000)={0xb8bf, 0x9, 0x76c, 0x3, 0x0, 0xfffffffffffffff7, 0x5, 0x5}, &(0x7f0000000040)={0x8, 0x1, 0x8, 0x8, 0x6, 0x1, 0x80000001, 0x20}, &(0x7f0000000080)={0xbbe0, 0x5, 0xd1a, 0x7ff, 0x8d47, 0x40, 0x8, 0x81}, &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={&(0x7f0000000100)={[0xffff]}, 0x8}) 08:34:29 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r0, 0x110, 0x3) prctl$PR_SET_ENDIAN(0x14, 0x1) 08:34:29 executing program 4: socketpair(0x1, 0x0, 0xa3000000, &(0x7f0000000040)) 08:34:29 executing program 5: io_pgetevents(0x0, 0x0, 0x3, &(0x7f0000000180)=[{}, {}, {}], &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={&(0x7f0000000100), 0x8}) 08:34:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x7, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:29 executing program 2: clock_gettime(0xefbd8aa34c4cd931, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000)={0x3, 0x10001, 0x1, 0x100000000, 0x9, 0x1, 0x8, 0x3}, &(0x7f0000000040)={0x7fff, 0x800, 0x89a, 0x7f, 0x8000000000000000, 0x9, 0x2, 0x3}, &(0x7f0000000080)={0x5c19, 0x7ff, 0x8001, 0x7, 0x100000000, 0xffffffff80000000, 0x10001, 0x1}, &(0x7f0000000100)={r0, r1+10000000}, &(0x7f0000000180)={&(0x7f0000000140)={[0x80000000]}, 0x8}) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r2, 0x891a, 0x0) recvmsg$can_bcm(r2, &(0x7f00000004c0)={&(0x7f00000001c0)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/222, 0xde}, {&(0x7f0000000340)=""/104, 0x68}], 0x2, &(0x7f0000000400)=""/145, 0x91}, 0x40000000) 08:34:29 executing program 3: clock_gettime(0xefbd8aa30000000b, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) 08:34:29 executing program 4: socketpair(0x1, 0x0, 0xa3010000, &(0x7f0000000040)) 08:34:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x8, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:29 executing program 5: io_pgetevents(0x0, 0x0, 0x3, &(0x7f0000000180)=[{}, {}, {}], &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={&(0x7f0000000100), 0x8}) 08:34:29 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000140)=""/4093, 0x0, 0xffd, 0x1}, 0x20) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f0000000000)) 08:34:29 executing program 3: sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x7c, 0x0, 0x800, 0x70bd26, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x53}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @loopback}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0xd}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}]}, 0x7c}}, 0x40181) clock_gettime(0x7, 0x0) 08:34:29 executing program 2: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x64, r0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_VLAN_ID={0x6}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x400}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e20}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x23}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x9}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0xdc}]}, 0x64}}, 0x20040080) ioctl$SIOCPNENABLEPIPE(0xffffffffffffffff, 0x89ed, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r2, 0x891a, 0x0) accept4$vsock_stream(r2, &(0x7f0000000540)={0x28, 0x0, 0x2711, @host}, 0x10, 0x40800) ioctl$sock_ifreq(r1, 0x891a, 0x0) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r1, &(0x7f0000000500)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000004c0)={&(0x7f0000000100)={0x24, 0x0, 0x300, 0x70bd29, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x200080e0) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="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", @ANYRES16=r0, @ANYBLOB="010027bd7000fedbdf25020000000000220001000000"], 0x1}, 0x1, 0x0, 0x0, 0x1404c090}, 0x2000c800) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000300)={0x6906632f, 0xb, 0x4, 0x400, 0x7, {r3, r4/1000+60000}, {0x4, 0x0, 0x0, 0x3, 0x9d, 0x0, "eda68ce2"}, 0x7, 0x4, @userptr=0x9, 0x8001}) 08:34:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0xa, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:29 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r0, 0x10, &(0x7f0000000080)={&(0x7f0000000000)=""/112, 0x70}}, 0x10) io_setup(0x8, &(0x7f0000000140)) 08:34:29 executing program 4: socketpair(0x1, 0x0, 0xa4000000, &(0x7f0000000040)) 08:34:29 executing program 3: ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffffff, 0x6}) clock_gettime(0xefbd8aa30000000b, 0x0) r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$PNPIPE_HANDLE(0xffffffffffffffff, 0x113, 0x3, &(0x7f00000000c0)=0x7, 0x4) getpeername$l2tp6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000080)=0x20) 08:34:29 executing program 5: io_pgetevents(0x0, 0x0, 0x3, &(0x7f0000000180)=[{}, {}, {}], &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={&(0x7f0000000100), 0x8}) 08:34:29 executing program 4: socketpair(0x1, 0x0, 0xa4010000, &(0x7f0000000040)) 08:34:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x10, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:29 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0xeb, 0x80, 0x6}]}) r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, 0x0, &(0x7f0000000040)) clock_gettime(0xefbd8aa34c4cd931, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, &(0x7f0000000100)={0x3, 0x5}, 0x0, 0x0, &(0x7f0000000140)={0x1, 0x6, 0x1, 0x5}, &(0x7f0000000180)=0x1e, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x1}}, 0x10) socketpair(0x2b, 0x1, 0x9, &(0x7f0000000080)) r1 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) 08:34:29 executing program 3: clock_gettime(0xefbd8aa30000000b, 0x0) io_getevents(0x0, 0x0, 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000080)={0x0, 0x989680}) 08:34:29 executing program 4: socketpair(0x1, 0x0, 0xa5000000, &(0x7f0000000040)) 08:34:29 executing program 5: io_pgetevents(0x0, 0x0, 0x3, &(0x7f0000000180)=[{}, {}, {}], &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={&(0x7f0000000100), 0x8}) 08:34:29 executing program 0: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) accept4$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0xffffffff}, 0x10, 0x0) bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) 08:34:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x12, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:29 executing program 3: clock_gettime(0x4, 0x0) 08:34:29 executing program 0: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r1, 0x891a, 0x0) r2 = accept4(r1, &(0x7f0000000340)=@sco, &(0x7f00000003c0)=0x80, 0x800) connect$vsock_stream(r2, &(0x7f0000000400)={0x28, 0x0, 0x2710, @host}, 0x10) ioctl$PPPIOCGDEBUG(r1, 0x80047441, &(0x7f0000000300)) ioctl$sock_ifreq(r0, 0x891a, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00022bbd7000fbdbdf2508000000080017001276a95c8ec55d9febb620a22e4e0afd7b7b506c49df60b7ccf6a4f35a440b", @ANYRES32, @ANYBLOB="140008007465616d30000000000000000000000006001d00ff0400000500050001000000140008007465616d5f736c6176655f310000000006001a004e220000"], 0x5c}, 0x1, 0x0, 0x0, 0x1}, 0x4040) bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x64, r3, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_VLAN_ID={0x6}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x400}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e20}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x23}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x9}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0xdc}]}, 0x64}}, 0x20040080) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0x68, r3, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0xfffb}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={[], [], @broadcast}}]}, 0x68}, 0x1, 0x0, 0x0, 0x4008804}, 0x8000) 08:34:29 executing program 5: io_pgetevents(0x0, 0x0, 0x3, &(0x7f0000000180)=[{}, {}, {}], &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={&(0x7f0000000100), 0x8}) 08:34:29 executing program 4: socketpair(0x1, 0x0, 0xa5010000, &(0x7f0000000040)) [ 2968.451302][ T34] audit: type=1326 audit(1609662869.815:110): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=23381 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:29 executing program 5: io_pgetevents(0x0, 0x0, 0x4, &(0x7f0000000180)=[{}, {}, {}, {}], 0x0, &(0x7f0000000140)={&(0x7f0000000100), 0x8}) 08:34:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x48, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) [ 2969.181134][ T34] audit: type=1326 audit(1609662870.545:111): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=23381 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:30 executing program 2: clock_gettime(0xefbd8aa34c4cd931, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x8e, &(0x7f0000000000)="e09bdcfad5979d21ab01628dea87def06a0e784694bc8bf1bebfc98efa593fec33e024cdc7a42a3878d2bcf2d7da55594ddd9ccb382344d7b628702acff4d13d9ed8858aa2150c7e2e0acbc7cc158df53c01556217f284285213b81b66f3a3b906c1dd3eb60c959fec5bc53ad606a7b08aae855a00a652a2a0c8afc5cde65eae0778028b0b3a179bb1fd53e28a3c"}) 08:34:30 executing program 3: clock_gettime(0x3, 0x0) 08:34:30 executing program 4: socketpair(0x1, 0x0, 0xa6000000, &(0x7f0000000040)) 08:34:30 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f00000004c0)=""/97, &(0x7f0000000540)=0x61) 08:34:30 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:30 executing program 5: io_pgetevents(0x0, 0x0, 0x4, &(0x7f0000000180)=[{}, {}, {}, {}], 0x0, &(0x7f0000000140)={&(0x7f0000000100), 0x8}) 08:34:30 executing program 5: io_pgetevents(0x0, 0x0, 0x4, &(0x7f0000000180)=[{}, {}, {}, {}], 0x0, &(0x7f0000000140)={&(0x7f0000000100), 0x8}) 08:34:30 executing program 3: clock_gettime(0xefbd8aa30000000b, 0x0) r0 = accept$phonet_pipe(0xffffffffffffffff, 0x0, &(0x7f0000000000)=0xfffffffffffffd15) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) pselect6(0x40, &(0x7f0000000080)={0x95, 0x6, 0xfffffffffffffe01, 0x80, 0xfff, 0x0, 0x3, 0x5}, &(0x7f00000000c0)={0x9, 0x0, 0x4, 0x2, 0x2, 0x0, 0x1f}, &(0x7f0000000100)={0x0, 0x2, 0x7, 0x4, 0x1, 0xfffffffffffffe01, 0x0, 0x9}, &(0x7f0000000140), &(0x7f00000001c0)={&(0x7f0000000180)={[0xfffffffffffffffc]}, 0x8}) 08:34:30 executing program 4: socketpair(0x1, 0x0, 0xa6010000, &(0x7f0000000040)) 08:34:30 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x68, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:30 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000000)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0x2, 0x10}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28, &(0x7f0000000080)}, 0x10) 08:34:30 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/raw\x00') connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e23, @multicast1}}, 0x24) clock_gettime(0xefbd8aa34c4cd931, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x501002, 0x0) 08:34:30 executing program 5: io_pgetevents(0x0, 0x0, 0x4, &(0x7f0000000180)=[{}, {}, {}, {}], &(0x7f00000000c0)={0x0, 0x3938700}, 0x0) 08:34:30 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:30 executing program 3: clock_gettime(0xefbd8aa30000000b, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={0x1, &(0x7f0000000000)="7bf0a95d5c2d54545f3969fe91bfdcfdf0237580d37fb7167e541b4f7c58ea1ac06086a81bcaff3391037d06b1441e1896155bf84d9e8d3c5cfddf953d80df8d0a0c3c378c66e3f36cbe7afb0d593c93a4313536da973dc277c02572ed3301f1e85adc2b51943b80909eb5402a8b5d60f5eff2d028cfacf6c494e4d94313d7e919fff4cb51d8023f124038de2e6a34326f98342bbef70f4f5e852bac34595d8b7a245038ac10577d702ebff11d51682ceff565bef560784c", &(0x7f00000000c0)=""/108, 0x4}, 0x20) 08:34:30 executing program 2: setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000040)=0x1ff, 0x8) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000000)={0x18, 0x0, {0x2, @local, 'team_slave_0\x00'}}) clock_gettime(0xefbd8aa34c4cd931, 0x0) 08:34:30 executing program 4: socketpair(0x1, 0x0, 0xa7000000, &(0x7f0000000040)) 08:34:30 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000040)={0x0, &(0x7f0000001180)=""/4099, 0x1c, 0x1013}, 0x20) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) 08:34:30 executing program 5: io_pgetevents(0x0, 0x0, 0x4, &(0x7f0000000180)=[{}, {}, {}, {}], &(0x7f00000000c0)={0x0, 0x3938700}, 0x0) 08:34:30 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x74, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:31 executing program 3: bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e24, 0x800, @mcast1, 0x100}}, 0x24) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000140)={'ip6_vti0\x00', &(0x7f00000000c0)={'syztnl0\x00', 0x0, 0x4, 0x2, 0x4, 0x100, 0x40, @private0={0xfc, 0x0, [], 0x1}, @mcast2, 0x8, 0x8, 0x93, 0x5}}) connect$can_bcm(r0, &(0x7f0000000180)={0x1d, r1}, 0x10) clock_gettime(0x5, 0x0) r2 = getpgrp(0x0) getpriority(0x0, r2) getpriority(0x0, r2) 08:34:31 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x7fffffff, 0x42e201) ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, &(0x7f0000000040)) 08:34:31 executing program 4: socketpair(0x1, 0x0, 0xa7010000, &(0x7f0000000040)) 08:34:31 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x40047451, &(0x7f0000000000)=0x8) 08:34:31 executing program 5: io_pgetevents(0x0, 0x0, 0x4, &(0x7f0000000180)=[{}, {}, {}, {}], &(0x7f00000000c0)={0x0, 0x3938700}, 0x0) 08:34:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:31 executing program 2: sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x1c, 0x0, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0xad}]}, 0x1c}}, 0x4000) r0 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040)='mptcp_pm\x00') sendmsg$MPTCP_PM_CMD_GET_LIMITS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="61005f10c086aee7230000", @ANYRES16=r0, @ANYBLOB="00012cbd7000fcdbdf250600000008000200050000002800018014000400fe80000000000000000000000000000e0800060000000000060001000a0000000800020002000000"], 0x4c}, 0x1, 0x0, 0x0, 0xc000}, 0x4004) clock_gettime(0xefbd8aa34c4cd931, 0x0) 08:34:31 executing program 3: clock_gettime(0xefbd8aa30000000b, 0x0) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x9d, 0xb4000) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='fd\x00') r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r1, 0x891a, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vim2m\x00', 0x2, 0x0) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f00000000c0)=""/161) mmap$qrtrtun(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000000, 0x100850, r0, 0x2) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') 08:34:31 executing program 5: io_pgetevents(0x0, 0x0, 0x4, &(0x7f0000000180)=[{}, {}, {}, {}], &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={0x0}) 08:34:31 executing program 4: socketpair(0x1, 0x0, 0xa8000000, &(0x7f0000000040)) 08:34:31 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4088, 0x0, 0xff8, 0xfffffffe}, 0x20) 08:34:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x300, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:31 executing program 2: sched_yield() clock_gettime(0x2, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x600, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0x9) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000000)={r0}, 0xc) 08:34:31 executing program 3: clock_gettime(0x4, 0x0) io_setup(0x10001, &(0x7f0000000000)=0x0) io_getevents(r0, 0x73d, 0x1, &(0x7f0000000040)=[{}], &(0x7f0000000080)={0x0, 0x989680}) 08:34:31 executing program 5: io_pgetevents(0x0, 0x0, 0x4, &(0x7f0000000180)=[{}, {}, {}, {}], &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={0x0}) 08:34:31 executing program 4: socketpair(0x1, 0x0, 0xa8010000, &(0x7f0000000040)) 08:34:31 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000001840)=""/4108, 0x0, 0x100c, 0x2}, 0x20) getsockopt$bt_sco_SCO_OPTIONS(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000000)=""/112, &(0x7f0000000080)=0x70) 08:34:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x500, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:31 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) ioctl$PPPIOCGDEBUG(0xffffffffffffffff, 0x80047441, &(0x7f0000000000)) 08:34:31 executing program 2: clock_gettime(0x1, 0x0) 08:34:31 executing program 4: socketpair(0x1, 0x0, 0xa9000000, &(0x7f0000000040)) 08:34:31 executing program 5: io_pgetevents(0x0, 0x0, 0x4, &(0x7f0000000180)=[{}, {}, {}, {}], &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={0x0}) 08:34:31 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/rt_cache\x00') ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) clock_gettime(0xefbd8aa30000000b, 0x0) 08:34:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x600, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:31 executing program 2: clock_gettime(0xefbd8aa34c4cd931, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) ioctl$vim2m_VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000000)={0x0, 0x2, 0x4, 0x100020, 0x3, {0x77359400}, {0x1, 0xc, 0x7, 0xad, 0x1, 0x33, "440db951"}, 0x5, 0x4, @offset=0x1, 0x9}) 08:34:31 executing program 4: socketpair(0x1, 0x0, 0xa9010000, &(0x7f0000000040)) 08:34:31 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000000)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x80400000}, 0x20) 08:34:31 executing program 5: clock_gettime(0xefbd8aa30000000b, 0x0) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x9d, 0xb4000) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='fd\x00') r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r1, 0x891a, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vim2m\x00', 0x2, 0x0) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f00000000c0)=""/161) mmap$qrtrtun(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000000, 0x100850, r0, 0x2) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') 08:34:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x700, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:31 executing program 3: clock_gettime(0x0, 0x0) 08:34:31 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000000)=""/136) clock_gettime(0xefbd8aa34c4cd931, 0x0) 08:34:31 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) getsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, &(0x7f0000000000), &(0x7f0000000040)=0x4) 08:34:31 executing program 4: socketpair(0x1, 0x0, 0xaa000000, &(0x7f0000000040)) 08:34:31 executing program 5: clock_gettime(0xefbd8aa30000000b, 0x0) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x9d, 0xb4000) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='fd\x00') r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r1, 0x891a, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vim2m\x00', 0x2, 0x0) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f00000000c0)=""/161) mmap$qrtrtun(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000000, 0x100850, r0, 0x2) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') 08:34:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0xa00, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:31 executing program 4: socketpair(0x1, 0x0, 0xaa010000, &(0x7f0000000040)) 08:34:31 executing program 2: clock_gettime(0xefbd8aa34c4cd931, 0x0) syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0xffffffffffffffe0, 0x40) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) recvfrom$l2tp6(r0, &(0x7f0000000100)=""/255, 0xff, 0x40000000, &(0x7f0000000200)={0xa, 0x0, 0x0, @local}, 0x20) ioctl$sock_ifreq(r0, 0x891a, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r2, 0x891a, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r1, 0x89f9, &(0x7f00000003c0)={'syztnl2\x00', &(0x7f0000000340)={'ip6_vti0\x00', 0x0, 0x29, 0x0, 0x3, 0x3, 0x50, @private2={0xfc, 0x2, [], 0x1}, @rand_addr=' \x01\x00', 0x8000, 0x10, 0x7, 0xffff}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000006140)={'ip6tnl0\x00', &(0x7f00000060c0)={'syztnl0\x00', 0x0, 0x2f, 0x6, 0x0, 0x3ff, 0x60, @local, @mcast2, 0x1, 0x7800, 0xc4, 0x1ff}}) sendmsg$MPTCP_PM_CMD_GET_ADDR(r2, &(0x7f0000006280)={&(0x7f0000000240), 0xc, &(0x7f0000006240)={&(0x7f0000006180)={0xb8, 0x0, 0x1, 0x70bd27, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x5}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r3}]}, @MPTCP_PM_ATTR_ADDR={0x40, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @dev={0xac, 0x14, 0x14, 0x2d}}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @loopback}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x3}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @empty}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xd9}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}, @MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r4}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010101}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) ioctl$sock_ifreq(r1, 0x891a, 0x0) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000040)={0x3e, 0x5, 0x4, 0x20, 0xeb7, {}, {0x3, 0x0, 0x3, 0x44, 0xbd, 0x7, "5a1630da"}, 0x8000, 0x0, @offset=0x4842, 0x4, 0x0, r0}) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$PPPIOCATTCHAN(r0, 0x40047438, &(0x7f0000000000)=0x3) 08:34:31 executing program 3: clock_gettime(0xefbd8aa30000000b, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f0000000140)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000180)={0x5f5}, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f00000001c0)=[{0x6}]}) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x42000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[], 0x44}, 0x1, 0x0, 0x0, 0x400c810}, 0x4004000) accept4$phonet_pipe(r0, &(0x7f0000000040), &(0x7f0000000080)=0x10, 0x80800) 08:34:31 executing program 0: sendto$rxrpc(0xffffffffffffffff, &(0x7f0000000180)="e0470002f338ac46dae63c9b9b3fdad59e1177f8fdfce36a605612a0f3c6260f94bbd0bcf3fb3548812f68cfaa8f7b2d2b9775e701f6b2c063d7cf5dc126689c5becc9b4b88fc53e3cac3a49d3b12f5c909d81af2bf0c9a256ee98bc0adbb6d4b96a499f88adfbbf534f1e0ba6a7ab5758857a98f58d9e2d5d60707c8c0fac408e6a2d6ad8777260e6917e8103e33cc219f65945d44c708e3c935690042726a00d2b08327830b75122af98b0f816d57a4cb700df3aa3f550b6ce6bc1a2b4e61e8d51e42ccc1f1012f71da890248b361b1c634900f9c04ad2e4af013bf4f893c49809751110cd8d14e7adad89a4d9", 0xee, 0x4000, &(0x7f0000000000)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e22, 0xf76, @private1={0xfc, 0x1, [], 0x1}, 0xa7a3}}, 0x24) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @hyper}, 0x10, 0x0) bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r0, 0x110, 0x3) 08:34:31 executing program 4: socketpair(0x1, 0x0, 0xab000000, &(0x7f0000000040)) 08:34:31 executing program 5: clock_gettime(0xefbd8aa30000000b, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={0x1, &(0x7f0000000000)="7bf0a95d5c2d54545f3969fe91bfdcfdf0237580d37fb7167e541b4f7c58ea1ac06086a81bcaff3391037d06b1441e1896155bf84d9e8d3c5cfddf953d80df8d0a0c3c378c66e3f36cbe7afb0d593c93a4313536da973dc277c02572ed3301f1e85adc2b51943b80909eb5402a8b5d60f5eff2d028cfacf6c494e4d94313d7e919fff4cb51d8023f124038de2e6a34326f98342bbef70f4f5e852bac34595d8b7a245038ac10577d702ebff11d51682ceff565bef560784c", &(0x7f00000000c0)=""/108, 0x4}, 0x20) 08:34:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x1200, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:32 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0xeb, 0x80, 0x6}]}) r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, 0x0, &(0x7f0000000040)) clock_gettime(0xefbd8aa34c4cd931, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, &(0x7f0000000100)={0x3, 0x5}, 0x0, 0x0, &(0x7f0000000140)={0x1, 0x6, 0x1, 0x5}, &(0x7f0000000180)=0x1e, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x1}}, 0x10) socketpair(0x2b, 0x1, 0x9, &(0x7f0000000080)) r1 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) 08:34:32 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) mmap$qrtrtun(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4, 0x100010, r0, 0x9) [ 2970.639886][ T34] audit: type=1326 audit(1609662871.995:112): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=23537 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:32 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0xeb, 0x80, 0x6}]}) r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, 0x0, &(0x7f0000000040)) clock_gettime(0xefbd8aa34c4cd931, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, &(0x7f0000000100)={0x3, 0x5}, 0x0, 0x0, &(0x7f0000000140)={0x1, 0x6, 0x1, 0x5}, &(0x7f0000000180)=0x1e, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x1}}, 0x10) socketpair(0x2b, 0x1, 0x9, &(0x7f0000000080)) r1 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) 08:34:32 executing program 4: socketpair(0x1, 0x0, 0xab010000, &(0x7f0000000040)) 08:34:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x4800, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) [ 2970.740519][ T34] audit: type=1326 audit(1609662872.105:113): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=23550 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:32 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000000)={0x0, &(0x7f0000001840)=""/4076, 0x0, 0xfec, 0x1}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) 08:34:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c00, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) [ 2970.796745][ T34] audit: type=1326 audit(1609662872.155:114): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=23554 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:32 executing program 3: clock_gettime(0xefbd8aa30000000b, 0x0) ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x722, &(0x7f0000000000)="77492cb4631969a853c96beb24276cc7ce323714e5aa90b0308ac64f29d11795022693a2fa376b7baaf795c77efd0d407ac69e6ba525217e41252e103037ca6eee438333c873ec2d6f9fd7dc92bb30509ecd37c8fc460da065b9c76b4ec9fb43c8a28576045669fc52361fc8da6bb9fffc27c305dd2cd4f52aa69c6c8f87bb7bb45721") 08:34:32 executing program 4: socketpair(0x1, 0x0, 0xac000000, &(0x7f0000000040)) 08:34:32 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x0) 08:34:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x6800, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:32 executing program 0: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x3ff}, 0x8) 08:34:32 executing program 2: clock_gettime(0xefbd8aa30000000b, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f0000000140)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000180)={0x5f5}, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f00000001c0)=[{0x6}]}) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x42000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[], 0x44}, 0x1, 0x0, 0x0, 0x400c810}, 0x4004000) accept4$phonet_pipe(r0, &(0x7f0000000040), &(0x7f0000000080)=0x10, 0x80800) 08:34:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c00, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:33 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0xeb, 0x80, 0x6}]}) r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, 0x0, &(0x7f0000000040)) clock_gettime(0xefbd8aa34c4cd931, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, &(0x7f0000000100)={0x3, 0x5}, 0x0, 0x0, &(0x7f0000000140)={0x1, 0x6, 0x1, 0x5}, &(0x7f0000000180)=0x1e, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x1}}, 0x10) socketpair(0x2b, 0x1, 0x9, &(0x7f0000000080)) r1 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) 08:34:33 executing program 4: socketpair(0x1, 0x0, 0xac010000, &(0x7f0000000040)) 08:34:33 executing program 3: clock_gettime(0x3, 0x0) ioctl$SOUND_MIXER_WRITE_VOLUME(0xffffffffffffffff, 0xc0044d05, &(0x7f0000000000)=0x22) 08:34:33 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000001180)=""/4119, 0x0, 0x1017}, 0x20) 08:34:33 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x7400, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) [ 2971.599060][ T34] audit: type=1326 audit(1609662872.955:115): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=23583 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:33 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/nfsfs\x00') ioctl$PPPIOCSNPMODE(r0, 0x4008744b, &(0x7f0000000040)={0xc3856d653c02e879, 0x3}) socket$pppoe(0x18, 0x1, 0x0) bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000001840)=""/4096, 0x0, 0x1000}, 0x28) 08:34:33 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a00, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:33 executing program 4: socketpair(0x1, 0x0, 0xad000000, &(0x7f0000000040)) 08:34:33 executing program 3: clock_gettime(0x6, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) clock_gettime(0x1, &(0x7f0000000040)) [ 2971.739714][ T34] audit: type=1326 audit(1609662873.095:116): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=23590 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:33 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0xff0f, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:33 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) accept4$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0xffffffff}, 0x10, 0x0) bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) 08:34:33 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x63) sendto$l2tp6(0xffffffffffffffff, &(0x7f0000000000)="6952757a18e9c326e1179f8efc18f27b42c1003fe3d7ea7f2d9896ce91f1515bba7a9ab2f323393a95539691930acf2537a0e918a4836693bda517cf2be02a6391f820ca1966a4e46e70f35b9a00f95e1e397331542117226ebe7d2e4d2c62c0d3fafc6fdf33ed06b5fc30a9558daa2a80f7050cc69927e3468467e23086069df99ebf4494ebf8635c51d9924c096fb9b1871be94e9df872e9bd2535936d38a46b393b90611f056810999de06ba3be9c07fb83f09a113519c9fecd083ea2512c54f2417973e9c14c4f83c48df805e00430c3701ac70c002dc1548c3154fe62188129636a9b82", 0xe6, 0xc0, &(0x7f0000000140)={0xa, 0x0, 0x62593a59, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x0, 0x1}, 0x20) 08:34:33 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0xeb, 0x80, 0x6}]}) r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, 0x0, &(0x7f0000000040)) clock_gettime(0xefbd8aa34c4cd931, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, &(0x7f0000000100)={0x3, 0x5}, 0x0, 0x0, &(0x7f0000000140)={0x1, 0x6, 0x1, 0x5}, &(0x7f0000000180)=0x1e, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x1}}, 0x10) socketpair(0x2b, 0x1, 0x9, &(0x7f0000000080)) r1 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) 08:34:33 executing program 4: socketpair(0x1, 0x0, 0xad010000, &(0x7f0000000040)) 08:34:33 executing program 3: clock_gettime(0xefbd8aa30000000b, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x8938, 0x0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000400)) r1 = getpgrp(0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00082cbd7000fedbdf250800000014001f00fc0000050007000200f9ff070009000100000006000e0001040000050012004c000000050006000500000006001a004e2300"/78], 0x58}, 0x1, 0x0, 0x0, 0x20044000}, 0x20080000) iopl(0x7) r2 = accept4$tipc(r0, &(0x7f0000000440), &(0x7f0000000480)=0x10, 0x80000) accept4(r2, 0x0, &(0x7f00000004c0), 0x80000) syz_open_procfs(r1, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000240)=""/84) r3 = getpgrp(r1) ioctl$SOUND_MIXER_READ_STEREODEVS(r0, 0x80044dfb, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb010018000000000000009900000099000000060000000a000000000000010000000075003e070500000002000084400000000400000001800000000000000100000004000000070000000f0000000000000c020000000000000000000003000000000500000001000000ff0700000f0000000200000f02000000010000000300000001040000030000000000000001000000f3d90f0000000100000f030000000400000003000000c90200001cbfe0000000005f612e3000"], &(0x7f0000000100)=""/217, 0xba, 0xd9, 0x1}, 0x20) getpgrp(r3) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r4, 0x11, 0x2, &(0x7f0000001fc0)=""/72, &(0x7f0000002040)=0x48) 08:34:33 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0xffffff, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:33 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001080)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000001400)='/proc/capi/capi20ncci\x00', 0x3a9280, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)}, 0x10) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r1, 0x891a, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r2, 0x891a, 0x0) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0xd4, 0x0, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x3}, @MPTCP_PM_ATTR_ADDR={0x34, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @remote}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @loopback}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}]}, @MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @private0}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @broadcast}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast1}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x1}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @dev={0xac, 0x14, 0x14, 0x25}}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x4000854}, 0x4800) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000013c0)={r1, 0xc0, &(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000011c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000001200)={0x4, 0x2}, 0x0, 0x0, &(0x7f0000001240)={0x5, 0x2, 0x3, 0x80}, &(0x7f0000001280)=0x40, 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)=0x2027}}, 0x10) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f00000010c0)=""/247) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 08:34:33 executing program 2: clock_gettime(0x3, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x3, 0xc0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)) 08:34:34 executing program 0: accept4(0xffffffffffffffff, &(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, &(0x7f0000000280)=0x80, 0x80000) getsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) 08:34:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x1000000, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:34 executing program 4: socketpair(0x1, 0x0, 0xae000000, &(0x7f0000000040)) 08:34:34 executing program 2: clock_gettime(0x3, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x3, 0xc0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)) [ 2972.642260][ T34] audit: type=1326 audit(1609662874.005:117): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=23620 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:34 executing program 3: sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, 0x0, 0x300, 0x70bd27, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20008000}, 0x5) 08:34:34 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd26, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40188}, 0x24006054) 08:34:34 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0xeb, 0x80, 0x6}]}) r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, 0x0, &(0x7f0000000040)) clock_gettime(0xefbd8aa34c4cd931, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, &(0x7f0000000100)={0x3, 0x5}, 0x0, 0x0, &(0x7f0000000140)={0x1, 0x6, 0x1, 0x5}, &(0x7f0000000180)=0x1e, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x1}}, 0x10) socketpair(0x2b, 0x1, 0x9, &(0x7f0000000080)) socket$rxrpc(0x21, 0x2, 0x2) 08:34:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000000, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:34 executing program 2: clock_gettime(0x3, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x3, 0xc0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)) 08:34:34 executing program 0: setreuid(0xee01, 0x0) setreuid(0x0, 0x0) bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000000)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) 08:34:34 executing program 4: socketpair(0x1, 0x0, 0xae010000, &(0x7f0000000040)) 08:34:34 executing program 3: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x10, &(0x7f0000000080)={&(0x7f0000000000)=""/108, 0x6c}}, 0x10) clock_gettime(0xefbd8aa30000000b, 0x0) socketpair(0x0, 0x5, 0x1, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000140), &(0x7f0000000180)=0x4) 08:34:34 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001080)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000001400)='/proc/capi/capi20ncci\x00', 0x3a9280, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)}, 0x10) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r1, 0x891a, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r2, 0x891a, 0x0) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0xd4, 0x0, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x3}, @MPTCP_PM_ATTR_ADDR={0x34, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @remote}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @loopback}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}]}, @MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @private0}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @broadcast}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast1}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x1}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @dev={0xac, 0x14, 0x14, 0x25}}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x4000854}, 0x4800) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000013c0)={r1, 0xc0, &(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000011c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000001200)={0x4, 0x2}, 0x0, 0x0, &(0x7f0000001240)={0x5, 0x2, 0x3, 0x80}, &(0x7f0000001280)=0x40, 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)=0x2027}}, 0x10) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f00000010c0)=""/247) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 08:34:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x3000000, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:34 executing program 4: socketpair(0x1, 0x0, 0xaf000000, &(0x7f0000000040)) 08:34:34 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f00000002c0)={0x0, &(0x7f0000001840)=""/4088, 0x43, 0xff8}, 0x20) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) io_destroy(0x0) ioctl$sock_ifreq(r1, 0x891a, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r2, 0x891a, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000280)={0x0, 0x1, r2, 0x7}) ioctl$vim2m_VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000040)={0x1, 0x3ff, 0x8000, 0x0, r1}) recvmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000080)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000140)=""/33, 0x21}], 0x1, &(0x7f00000001c0)=""/75, 0x4b}, 0x40) [ 2973.563588][ T34] audit: type=1326 audit(1609662874.925:118): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=23651 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:35 executing program 2: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000001400)='/proc/capi/capi20ncci\x00', 0x0, 0x0) geteuid() 08:34:35 executing program 3: accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000040)=""/15) clock_gettime(0xefbd8aa30000000b, 0x0) 08:34:35 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0xeb, 0x80, 0x6}]}) r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, 0x0, &(0x7f0000000040)) clock_gettime(0xefbd8aa34c4cd931, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, &(0x7f0000000100)={0x3, 0x5}, 0x0, 0x0, &(0x7f0000000140)={0x1, 0x6, 0x1, 0x5}, &(0x7f0000000180)=0x1e, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x1}}, 0x10) socketpair(0x2b, 0x1, 0x9, &(0x7f0000000080)) 08:34:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000000, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:35 executing program 4: socketpair(0x1, 0x0, 0xaf010000, &(0x7f0000000040)) 08:34:35 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) sysfs$2(0x2, 0x8, &(0x7f0000000000)=""/146) 08:34:35 executing program 2: clock_gettime(0xefbd8aa34c4cd931, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000480)='SMC_PNETID\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_LIST(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) sendmsg$SMC_PNETID_DEL(r0, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x44, 0x0, 0x2, 0x70bd2d, 0x25dfdbff, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6tnl0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x44000}, 0x40040040) ioctl$sock_ifreq(r1, 0x891a, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) write$qrtrtun(r2, &(0x7f0000000500)="5edab06ac0f7dc4fcfcfb7c0e769705e31dcc79553845bfbbc674721a6790f5810ce816213ac0b8e4718e3d3d1931316c62d206ce569659823a7eb151ae37dcfad07becb843c613d0cd898826791626daf4f23e233be34ab75b304a6f3284b8b5c3607d9179f952e15c16cd9ff1139", 0x6f) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0)='l2tp\x00') openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xffffffffffffffd2, &(0x7f0000000280)={&(0x7f0000000200)={0x64, r3, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_VLAN_ID={0x6}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e20}, @L2TP_ATTR_L2SPEC_LEN={0x3f, 0x6, 0x23}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x9}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0xdc}]}, 0x64}}, 0x20040080) ioctl$MEDIA_IOC_REQUEST_ALLOC(r1, 0x80047c05, &(0x7f0000000580)) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB='1 \x00\x00', @ANYRES16=r3, @ANYBLOB="bd7000fddbdf250800000014001f00ed01000000000000000000000000000008000c0001000000"], 0x30}, 0x1, 0x0, 0x0, 0x20004004}, 0x4004040) 08:34:35 executing program 3: clock_gettime(0xefbd8aa30000000b, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000040)={0xffff, 0x81, 0x5, 0x6, 0x4, 0x1, 0x0, 0x71e7}, &(0x7f0000000080)={0x8000, 0x1f, 0xfffffffffffffff9, 0xaff9, 0x1f, 0x7f98, 0x100000001, 0xf1}, &(0x7f00000000c0)={0xee1f, 0x5, 0x4c, 0xffffffffffffffff, 0xd510, 0x100000000, 0xda0, 0x4}, &(0x7f0000000140)={r0, r1+10000000}, &(0x7f00000001c0)={&(0x7f0000000180)={[0xf4]}, 0x8}) memfd_create(&(0x7f0000000000)='\x00\x00\xff', 0x5) 08:34:35 executing program 4: socketpair(0x1, 0x0, 0xb0000000, &(0x7f0000000040)) 08:34:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x5000000, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:35 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0xeb, 0x80, 0x6}]}) r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, 0x0, &(0x7f0000000040)) clock_gettime(0xefbd8aa34c4cd931, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, &(0x7f0000000100)={0x3, 0x5}, 0x0, 0x0, &(0x7f0000000140)={0x1, 0x6, 0x1, 0x5}, &(0x7f0000000180)=0x1e, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x1}}, 0x10) socketpair(0x2b, 0x1, 0x9, &(0x7f0000000080)) socket$rxrpc(0x21, 0x2, 0x2) 08:34:35 executing program 3: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f00000001c0)={0x4, 0x2, 0x4, 0x100, 0x1, {0x77359400}, {0x1, 0x2, 0x7a, 0x1c, 0x7, 0x2, "b0a2f232"}, 0x10001, 0x2, @planes=&(0x7f0000000180)={0xa00, 0x200, @userptr=0xfffffffffffffffe, 0x3}, 0x7}) 08:34:35 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r0, 0x10, &(0x7f0000000140)={&(0x7f0000000000)=""/194, 0xc2}}, 0x10) [ 2974.512093][ T34] audit: type=1326 audit(1609662875.875:119): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=23683 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:36 executing program 4: socketpair(0x1, 0x0, 0xb0010000, &(0x7f0000000040)) [ 2974.612794][ T34] audit: type=1326 audit(1609662875.975:120): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=23690 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:36 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0xeb, 0x80, 0x6}]}) r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, 0x0, &(0x7f0000000040)) clock_gettime(0xefbd8aa34c4cd931, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, &(0x7f0000000100)={0x3, 0x5}, 0x0, 0x0, &(0x7f0000000140)={0x1, 0x6, 0x1, 0x5}, &(0x7f0000000180)=0x1e, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x1}}, 0x10) 08:34:36 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000140)=""/4096, 0x0, 0x1000}, 0x20) 08:34:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x6000000, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:36 executing program 3: clock_gettime(0x4, 0x0) 08:34:36 executing program 4: socketpair(0x1, 0x0, 0xb1000000, &(0x7f0000000040)) 08:34:36 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) recvfrom$rxrpc(0xffffffffffffffff, &(0x7f0000000040)=""/115, 0x73, 0x2000, 0x0, 0x0) 08:34:36 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='sessionid\x00') ioctl$PPPIOCSNPMODE(r1, 0x4008744b, &(0x7f0000000000)={0xfd, 0x3}) sendto$rxrpc(r1, &(0x7f0000000080)="707edd5be5e23e47f92cd223c57c85b76a6904e6c8aedda245000e8108b8fb02", 0x20, 0x41, &(0x7f00000000c0)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e23, @loopback}}, 0x24) clock_gettime(0xefbd8aa30000000b, 0x0) 08:34:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x7000000, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) [ 2975.394473][ T34] audit: type=1326 audit(1609662876.755:121): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=23708 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:36 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0xeb, 0x80, 0x6}]}) r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, 0x0, &(0x7f0000000040)) clock_gettime(0xefbd8aa34c4cd931, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, &(0x7f0000000100)={0x3, 0x5}, 0x0, 0x0, &(0x7f0000000140)={0x1, 0x6, 0x1, 0x5}, &(0x7f0000000180)=0x1e, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x1}}, 0x10) socketpair(0x2b, 0x1, 0x9, &(0x7f0000000080)) socket$rxrpc(0x21, 0x2, 0x2) 08:34:36 executing program 4: socketpair(0x1, 0x0, 0xb1010000, &(0x7f0000000040)) 08:34:36 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000000)={0x0, &(0x7f0000000040)=""/4103, 0x0, 0x1007}, 0xffffff4c) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) r1 = accept$phonet_pipe(r0, &(0x7f00000010c0), &(0x7f0000001100)=0x10) ioctl$sock_ifreq(r1, 0x8934, 0x0) restart_syscall() r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001280)={0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000014c0)={r2, 0xfffffffffffffe37, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)=0x5, 0x0, 0x0, 0x0, &(0x7f0000001300)={0x9, 0x4}, 0x0, 0x0, &(0x7f0000001340)={0x0, 0x1, 0x810, 0x6}, &(0x7f0000001380)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=0x800000100}}, 0x10) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000011c0)='net/ipx\x00') setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r3, 0x110, 0x3) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001200)={0xffffffffffffffff, 0xf0, 0x18}, 0xc) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001240)={r3, r4}, 0xc) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001080)={0xffffffffffffffff, r0}, 0xc) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001140)='statm\x00') ioctl$PPPIOCGUNIT(r5, 0x80047456, &(0x7f0000001180)) 08:34:36 executing program 3: clock_gettime(0xefbd8aa30000000b, 0x0) sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB=' @\x00\x00', @ANYRES16=0x0, @ANYBLOB="00022cbd7000fbdbdf25010000000900030073797a3200000000"], 0x20}, 0x1, 0x0, 0x0, 0x800}, 0x80) set_mempolicy(0x3, &(0x7f0000000100)=0x3ff, 0x3ff) [ 2975.564889][ T34] audit: type=1326 audit(1609662876.925:122): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=23717 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:37 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0xeb, 0x80, 0x6}]}) r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, 0x0, &(0x7f0000000040)) clock_gettime(0xefbd8aa34c4cd931, 0x0) 08:34:37 executing program 4: socketpair(0x1, 0x0, 0xb2000000, &(0x7f0000000040)) 08:34:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x8000000, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:37 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101000, 0x0) 08:34:37 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='sessionid\x00') ioctl$PPPIOCSNPMODE(r1, 0x4008744b, &(0x7f0000000000)={0xfd, 0x3}) sendto$rxrpc(r1, &(0x7f0000000080)="707edd5be5e23e47f92cd223c57c85b76a6904e6c8aedda245000e8108b8fb02", 0x20, 0x41, &(0x7f00000000c0)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e23, @loopback}}, 0x24) clock_gettime(0xefbd8aa30000000b, 0x0) 08:34:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0xa000000, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:37 executing program 4: socketpair(0x1, 0x0, 0xb2010000, &(0x7f0000000040)) 08:34:37 executing program 0: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) r1 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000480)={0x0, 0x1, r1, 0x7a, 0x80000}) ioctl$sock_ifreq(0xffffffffffffffff, 0x891a, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000007100)={&(0x7f0000005f40)="4f898425ccf08ba47667e5a65f7cbf12b128b39b4c5c99dee5672682358942a63f506605b366ff272b05437e07b426f287f91335f70fa42f78c9c4d12af49ea2f2b9c8bf1521fd9a47c1c84748c5a633b30eef2dd437001c8b97f3db0f5aaa52303d385e20eb98baca707a2e90cccec9c9446c31a2f84aafd7cf3f62b1c5c4779d725f718cdeda42f78bb4e7f4fb3dedad6e4cb26698e41959d94360fbf1cd38dcc76af25c5c698f7f8f5e698eab35cab9f0ed3c44acc6b52625d2f75910ac07485ebeab89353102fdd8e88b01f038d265c66b8a87d4ffa183d035004568b8e8a1f6acf61f4dbf02876ea27ccd8b4bdb6935a5dd30780089244215166832f116e0bfab017c0799b1b63dcbc38c855e114b2e85c91aff00302bad03643c88c739aeb6fc608a8c1e1b294405eb056b694304c1a387ff9c04e32d70a5297a0a566b67f19bb51c0b4c06939abc171950e54b66aa8a022c97a66d83048ecfaa2680fbc192f09802527724ed4479313d059509c062b45b9f6637baad545bfd0ea3e6037e63adb77a157dce4629b5257d3d088ec8d04a3088b5ebb554742656c9a3906c8d36a39de92d82e9373016a66d7a92a9af05cf71be9dd82a69b9499923936acb574a1cdce5f90f14dc035801f78d5fe021e1d9ab422f6b5119a2723e621f7cf170b374183fa8b83417caeed234a8e23636934e68fa9e13bb930e27de18c7e3ceb2100758566c55284d7ebe720261b3d3751a7f3f0c58846ed12a557f143ddf38d140d7ba761d407b7e3a3e78a018d1f4f2c54c7373024f31f9948be6a73afecdf1cf3bcfbe713c1b730e686f99f5355d4aa98acaf6d2953d853d6a8e7d958b35d5ebd057f3b83b1dd469aaed4b69393223752e3cf59c305c8b13c6afba80abd459266867c29e8d63bff1d362b135966dfd9298a5c61f45f5980bfbe01a1be0fa48918f5f52864f33761cbc6f1b70d6447a7c6378d5ea490d812a0b260118cdc3e6e763ef5c5757a29ae4e7d965f25c3410c47bbfd42fa8e6e31c6509c6bc04fd53805265891c7162ddce8a6639a00c2a5fbd65dbb123c2110d5a2be9c301e1befea085abc5642d934af277b5894e929dbe9f4d4c051d227b4d20761883af68fb3233c508753e5b8246b9b656704d0f45ff3ccb5f8e76bec44cb43a83e1580173eb9fbb6bc13305d79f9c115872f316680296ad6c48bffa605d8924d0a18a0c161df6ab07d190844b7b5001f613dca6d7645bb5ea56f4e967cad7cee77512a3e8e920d5b9c913b75aa191ffcb1b24c3b096fdae6704c681bbd4651a4e6d07a0fd5e9847b4b01325d99054221430006747a4d393bcf6f9f3d33705ec66969c6b97d66a1566ca4c0e3652fb5c492c96218d259b430256931105f7f5e1f57d4cf6db97be7bf6d452feef109942e247ce4acdcd9eb1db1a75d1c6d704245309ca0c9a60025b4e08340df9412301986456ab90c3cd1144489e8e974c938b9a49f419e9e7db7c32461431fe7ea5216ea5e2908adc0bdf0837e08f7525b9f81976ed3e80f873550a0847aad58f3b866e2bc38f37073908b60ad5ee98e5c77b292055c1c8780aef04d89de748de1cfb2732545e81319c36b76056fe5576d1d01634f21578183c162b07976f68a108506eff470696ad369448bc1845b1ee2c77a70619f2b47fd1cd6dd841e1f5c93cd4b444a365eba7e9623e874651ab17fae2a0aabc353d32752b87743216c73ce1f337cfd0cf8e0c05a70a02faa9994a18ab16c9d76a7bb48d0205a1e4f7d0f6cb58932b13b9f36d306342151a4796fb0b795cfd27c9935e5dfe04616aa848e3937340c3e00e8617c37a303951418e244d4a02b03219927827bd6e9ba041287b336df18da52929ad639a5162effa141ae3afe82aaadfe30a2f706924a9436d43af1f31b982179d3e5d4e072eca59b72fba2549700c828ed78de5cd1a3769388a5c7c0577b2f37f67c557f421fa18356855347ed69a5090b5f7a4abf6bbd8450f2c284163433714b4e39ba4a2c55cbc1cdc8c31c700bbf13569a2557bc1f0e54d0085e99a1c81f54b2d3d152cd3a13f7eee0d763f50b982e252f034ce0c92cdfc18f1f57d51949999e85f827b5e99e19e0ac9694a73b9b9afe2be701eba554a2b4ae4c63b8d88007862f507cc23a0cb35111ac59acc10188bb5e414563bf3d7ea1e20a95c656e6d66f219f4fd543ddf4ecff909dc2e77e5f12c2a457c4788948a80967699d2c03f2dbb2a1401aca6391e5d29ea3d8380c1e7295a6fa361df0aae5cc5f7b77577ad82bc0a8bdef56f1b71670328fbc51d77a099ac573b3bc49bdb31538aa01b9d465be9d12e6ca8cfb5cc16f7c5fa919cdb5be3f89e0952f897db8ac3d96166242d9b95ffdc8c8630fefe07459f2ea2c430880aeda4ec4d9bebf8a24bb7f45738c22b3d20ac2b695ad5acc929a53f5be4fa003a3216b2141c805b7a153fcb9dd2ea1e180a508acd61099fcd2e25e892c9acd5af146719ebc63beaee79c8b1500967ef432a7a89646b4376a2f1ebe02d4207d246cfce49ae186a070ac55e6800b7b701eef36c5ba8e70ad2cdbeca6691a2a1e292798e27141b7ac14106c9daacbd84ea99372c3f25e1d3ac3597604e044d75cd30c1cbf8f97d9c0576f054fef677eef14b6c6f89eaf7da1628b8c31f8008d60a80c06bf5863e52aee4a8c6080a4c343b1bcae5a87ccae9e8263404bdbaae156e19576cceaed04be93907856b23ba4a3ef5355b8d0367137a8b72ed84414a2f5c0cfe2386d0f374ad1d39ff214640028ed6111c6e4505cba61decbbc477e50f4f100b3ae494a2e53229cea15832db4cc0582f5310cb4a85d690f9ecda1b2e87e1c3c4000c63127136c70e926920a67e8f7154b62d75a7e217762041c96c423fd09199a63c7949b843fb8c8c0762238e35105bfca2ebed9658158005af22829a0af222c278ed75e322c3c33c1bfa2b3b894214f5ecc1f5ba858aab513c93656c66a90956e694700c1d91fcd3eed604c6d7c2388dee98c4b3ad1f3c8b200e0e02a3d660c2ab7dc2e2f836d215288dee6fc92475bebf33668c21a8ee85f580ef3e616560462d3111556a7e9ccdd67df9dbd1982d591974e7efa812244409ece5a2739865d8bc6c0e167040822a62fbeecceb6698dd19f5eb64dcb04635c53fbde09c3a2d4c5833e0e0fcf9a88cd761be41f9213e78e2b44a6efb2aeec932f50d3630b9f638a609622510996a5a52ff48ca1de1a050863d6211787c663d342d502e887d154003c8609f84632e1598012f6e7cf13ec410964ff5826da1cce8ec5c23c867260d11be6b49116e544ca3810da1b21442ad90daf714b151e9abcee5a601eb9da92de0b3fcdfa9fe535ca246fa54b0912392ba51d8e6af0f7cdc0130ded70ca790813b0602ccbd737ea48bd8c610f19742bb6a938794b0b60138a7cb2fd10143b39cd2dbad27ce2871c931b305dad79892a06c0e05be8a01dfebd124f2c60b936426529611ed659967223a80dad6eddf08efc2b447253e2804a1aa6bd2f94dacd18e6457489a4984774f3f1173f9fc6720d6c9221cc90730fe654685772d5a508d0d26b3ff33a802af5aecec3f4c2c6515843c0d1cdcb08386ee9b9d2ea5d71c0426217ab1102eb27b88837530de0599998486089306bd711ef28c7d117f7e882b2259b27b811f500efaffc3391d7bf8bb37d85b4442da0a5a2e68d109ef6576154e11a34b2ddcc0e452cb756335733f54d7a388951456c93f1cc9e485cbe649375f0c040a1ce23c9b843e24be13e867a4336c299d5be13e792dc70e72d102145abaa9e077aa5873f31d32d307b8131538a05ec89533b2797aad5c96206b83e0ef7935dc1b224f86d5cdc1d6eaca89432153be174abf0ca124883149837eac4ea2b46c84973f5b103e2c2f98da9b1ec26a91c1cae46a4238096dd02f4fd45f5cad4d08da788648a3fdd5e2406148c588a9a6820ea3a846cd46b846d18fb2e5923ed1f14b238c1d32ade9ea8a691a0b6ff91d1b0dde8dc175e740c74156cd1933e6f1b866e98f0065fdf6544bbe0ba0bd000ed6a32176ab0e1940ef0dfa6ad6713161403a8154db4464ac2eb19c26d005c79c8b74b4c4a943fd18801ca4ebb3897f579f04271a7784ded81ef85202bc240e48f65bfa8d8a840883719b47877b0e75b6f1d873aec9368b1caed4af25e644c2eb94a0f528fc411ec102d8d4f256bd4318535aa83e3105d61cf457ebd0fca673a9cb0dc3cb32cc63d6fea0adf6721ac55c59c1e408328a46b061f8597416ef090d47f41947f65d49e5f85e69dbdfd15e3d6c6ff2b393b3023a20d509276cf1fd1a5b0d980288278ecff9d5076cdb2aaefc3d93fb0841aef0813821a87d92ed810086387062b521d45854bc83b7c7ddfe5e7564a7281138c427523b3b5234390aaf14d42ff0c0ffca447ccb78195b2dca27c2d6d7ca795a68062d2e5927d0ebf66e6f5c1731d7623200495c567342d42be9163c84e27624cc818eb1fbaa854d0e0560320be58b96776b553077d18ae84767fb71dc19dd987e0747aab9c38036454d12361a4db92365f3eeb7c3159bfb93d38ee0cdd1e8e094ea37650e4831aa94e6a0e86efe0871219f017923d219340680add62aa607ce51a2fabcb4955e174d3186f71cc547abb80dbed3c95c8871aab2eebe9f71bbe97a7bb800177df11772bc0501a3a42c0d615ed140408c085c6a32f77730e8895df450a5e3a090b0fc7d6c13875308aa663622cabb9f55cb35a2ee851d77cc73f34e03f02f58a179316ec0285acee9611aa59556a20f9aafe286128a8c5b7794bed4ad84dd133ea105d44d35657f1e98bf13aed8bde13eb90ebde7b992e93564854b1d8bb37762e33cf247f6f5ca45585e6594c3e47e14dd6b3fc66c49c20b4a898ccbb6143b178e8bf71e0b1de88827f7d96e1442149035b1978688938bf5911ed093a48add931b63981f4842a47615e6f91407db51c2d2b10233eac803e682e74a4098537bdff7287dfddba863b42a0f51c23e42442fa4d3ce3f09f9a6e6fcd2c866e26ef9b0a14a5c3f53e3e69cb3daaa7c548df26e3a3430c517ad40d4a9032955b6bc103d337c053540ba4262b4ed34f2f053da13aa7559d72ef78f8592f116971b242fb644d443e9e29f656d29bcd847625a0b3773d86eda301b0d619d6355c66a5fc97c8bacfde220228fe49f238dcd838b4aef684f0212e1316ec1cc88404bd0803a742c3b0f441f2af59f5638dda0da0e6a3f3fe19a68ac9d1edb7e1d86b7cffe36b34de71a539b9c3a830b15ce08962f2e974559b2b9f4e3e761e38ffe079c6e6ae47c2b1f06e2a0c46257c41e19f0fafe2068474cae5ccc251b9be16787c50285d60fe0b76266f6ad8e7cf952a0710f2506c83e90786fb8c1404da817996cf705c465ea21e07523475f0961c5b61ea58394ab351eea1f20b5cf7c47c4e2e262d52418cf1bd1ae86ab4946cba22acfd98f2a7239fcb30c6a604930058f2fafa4e9382bf8a7e0cf4bbdd6314affd46be481b827ee8731a882102056a33791477ad8fc4fe59574dcd3bf3a6efec22706abebd1d8f6def459500a1942937432b1241cfbece6bc159a3439192703aa0b076fd505a9ce29946297f76893a53ccecf32b0e470aea2c3c27a867ff624b2dd59de98e596d4faa4e0f614ce41dfc253e5aa6dd09d1aa6e81f73017f21f63ed6c47ead23f23913d999ccd629e8a3e1a9cd685ce15c5b8e42a426127d7a01752b6b441663414ea624ac2901f81708c509b4ac27b392bf5c9c965740e83826172cdc81873b", &(0x7f0000006f40)=""/112, &(0x7f0000006fc0)="19", &(0x7f0000007000)="f46a40fb399ef84354662cc497cab5765ccbbd3424a7d51a030699b16c2e30900c3a7e4bb98653f036d75b6f1e8a5982c7cd71f4d48d0cf937b0d97531baa9fab1e14364942202832eda158f1ec4fb01208c1e39e813317faaac211da8693d985478e417e91f4dde2c1eae9bb3bf06768664858c37c77045bdeb0d29bacc0a3e9ac63037261adaedb80c33c70520256bec9f29da6a23bcdf89d2ded0dc23e34cea1c3c235b249293b61bc770dbb3f2cead46de2f9ad6209f2c871a8d34ce0862420e57fef2d95f017e32038f6b2d62c543bbb838a79cc3f6c3", 0xadf, 0xffffffffffffffff, 0x4}, 0x38) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000005ec0)={r0, 0xc0, &(0x7f0000005e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000005b00)=0xfffffffffffffff7, 0x0, 0x0, 0x0, &(0x7f0000005b40)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000005b80)={0x3, 0xf, 0xfffffff9, 0x9}, &(0x7f0000005dc0)=0x20, 0x0, 0x0, 0x0, 0x0, &(0x7f0000007140)=0x3c}}, 0x10) syz_read_part_table(0x0, 0x7, &(0x7f0000000380)=[{&(0x7f0000000000)="7e18004b88b7b0c549b681d745dddf60543fc90d32b4558f7597fa601a023cb24f38f5b9488bd4b496dc13dbe8accffcf0614339213051cfb3b20d492d6167cc107219e32ef4b7ba5d7927996d039f822237535780fa7f5b32d5c7a41307ec47ace4fea9cca5a27a839cb02637a760ce450ac7031ab9f12655f021c8e5cca860d3c6b4e6", 0x84, 0x9}, {&(0x7f0000000140)="db2c12dfaa254089e517fe74db8a5e3f75783d8adeaf6384d65e11a1ef8322a3f028cc021bc0c3c69f95410a9faf87653cc6e183f1fb182e23e24f83056eba17e44946b360363220d064679f78b767b2b8a689", 0x53, 0x3}, {&(0x7f0000000500)="e5676e41198e4b6977dae8307daa1273e7a20970531fb5077f1ef7d21c17cbf38a7118611f73", 0x26, 0x69}, {&(0x7f00000001c0)="1f305ae2b5f12b6fbec8e8f7f9f3916912aa03883f964e67c7a6a6761e44f3acc761a5a1484484a4382f27507831bfcbf1861fa77b1680e1b46e0d840c74a440fd258b430f", 0x45, 0x3}, {&(0x7f0000000240)="8926cef9a2db75fad30b88d2eb97af054d819850fd5e775f7a9339068b49ec161381af3145552c65189ef9a509c4cb7484520bc1e6200dcc3716551b6fab7effaa2f082e6bc9c9a32c00b51d5f1fc54078518886bdafb3981fd3cc0bfb05ec9fcca69a18b20dbb23f99a", 0x6a, 0x6}, {&(0x7f0000001840)="fe8b492fa66cd358351d739554a3f6b22a8effca09890490226b2325b22d9fdaf56fe06503c1a6c9f9debfbc6cba2b81906f67649f927450876515186b79f7de8086aeaca59662a425aca9b5f4def5df47694abd97a6402599ba79b9db1dd25cfa835895b7d52cfd7248ed44f371a5cc7181ce9e18ae0f067fbb1eea907f59b3f3dbb12b40c0c20469efe76c97f38c9c0dc02df8adead5f9907a07eaf37c32a9523301aef76aea92ce6ca2d5284aff3d433ae0dbd1130e3b8d6e22b35b46dd7856bbd0629624e01825e827067090dce69e353ab59eda6a465fafc31f0e2ea037fd868929ea25fc79f4a4c9244b67712577fa542c602a3634d0f904b25cd331aa94aab5d1a43310131a6211e6b847e61197e48f1b3b02eee6ac114a8675ffc9373c0fa6fd3ee41463cf98e461af90dd025ecbcef206f344c96ce9078bbe877bee482f05a86f3e41fcb6c42cf79c5c74100da469fd30ab041cbc09f5f0685415270018cdb15d105ea7d85160023d3635df73aca93dfc2516468cbdb1641fdba1227683f4b641221e632635c39e09875175cbbfce3b9c5921e278554ab7e1b8c9a91552df5e538fa0c6250038d0d3eb76263bbb46acb180aa80e03533497b9f684331ef024180735c52c032a751daacbf0e3822ad57823ea0f798079c9614f49d518bdf335f40e1e90d076cc2dffe79b7c606f728649ee5f90802c69061d451b4f2bdc7f7b3a3bfa4c96ed6854e9f73e6b359c6ef0afe094cae0dc06cd5b22dcc381d59cbaf28083a043cc881f60474a9f8406a7a70c7e2111419edf70326ef082e8be5897ea59f13179678e40c775d54218860e113649237db28d0d31409e63f739b56d3106a03043a3a2f9f49945f073fb600e2d73b61a08012fc761330dd112a4f5312adfea3ee0f254b791e1e4a5c3192dee79348b673a6c93b4e2e170066d1fc796b74d2fffd478e210b3e95d69811136010770493b539809fb914eda64770a99351fe81de7e1cc9cd7a27bb206cdac4008e1af08f79db0ede1c37d0335fb2eae94ded18444309e680733389a091ab11b9d7e04a15db7a870e57b65c31230afa07a520cf8877c774a49bb9abd38ff72c9ea3c9c7b1fb32389089e0957deb3d6f2a28862fde22729634c7dc668f136a6e570e6989924e9ab4ffe78f24a4aba67fc9936595c45b05b8e212436a97158029df11e9a8dbd3e3119a2b40e0a807e9cb3e31864774a5523e39b78c5beff7d7582a710f1258eab04b85b514485d97444e5cfe21bb50c57019f75d26a30ddf6ff51d4619a1436c5bf92cd638a59938a561988757d28ab22a6af532ea8a8c10737566769c1fd71cba5183117393abfd9929e0116d87623b8d8be1a1f74b2286ba1d53d04e2397250ada7a3199035c43e25eb8b6cf3d0ff39f11d17c25bf22a92a72b925ea463927bb5e313754ec5249a7fef1172a70eadc007bbfde2aa1d2575ec640b457a0790958fda8ed17581417c0e72ee0233c2304bb65e0e2648c548c24601c81abc5cfd5bb7933cadbd104e09f49a1b74f4a739f550677dfe609dc6ab19da72e324b8ecc5dcc4943e6941f8ad3472193b4a94da542ba96e9cbb4c75c61afbb49308f9323b313aa0f69b92727143123d999174d5d2678cc7bb989f256d7aec9ccc603cd65de5d10fa8315ac3b6a547e9bebb8b45b02d4de384d95fabbc10543abebe90a66dafa3e093cd0caffacc94976e09f231156e9f1cda5d39beab4990cb84dcf28e34e8902f4d1d45c4dd50e3001cff112a74a55539950e3608ed6c1464cff85b1b5bcdb5f00942625f4a5a3de2ef8e94481b5dd6970cd2a85645d070e681cbe25245ca034d4ccd0e84301f1173f35351e95d22677cfa838c5eedcc07549d0b3b6ff129a8118b398ec07770ead0999f008d9bc3bec66547b63aff2592081016526ee26645e2d3b172ce664b943c7fdbac35641026702eeba2316b771eaea5b66a480ddd344777e48a004cb8bd841790eb206bae7da8776f8cd92966c3f8d632c66e71126605ca05d3598d5a1422f628a5fd21ec16f54641b2b2c644a656844c78c976c9dff1f18f69de3860037c9f35f8f5ca414b1ca652bc8a257d63b5989398ad35ddc9e0516036bdf3910982e739d9599fc45e62897deb4cc43f25449a2135e6da0772b8c3eea1c05f06e489d1f8938db20b20e4a8b2037986a0b1a7a4dcf06fed339efdd0378281e8d3e197cef7ef9b2b03e422c1fee56a36154c26562cd5b286f4d5811d2057ba84c95774587dfa65511e417a7d7d641167930339850d317c438ed734153a7c50bade3714bf1eb412769e64288ce0d6f8baca56d9a6877c41b54e9f07f5b03d1e4fee5510e267f6a60e5beb5a803d2d5c464e70c830749e46d80edb2b5597ad96cdc38238fd7d7cbbbee880546667dc8e6367dd0747af056bc9e670456e883a6fe7486de1a11926dce520286cad3df53fe92424967598683426f4f231b838d53ddd37bb0d571d697b04c2a58588f085a428e03dd5e31410273f60d3f6a3e441a1f20c28e4001566e60417eaf792139a5de0a331a338629f012d55ebc4a1b5620e362b482fb1a71e05ce8c40794b19f63dcb89af6664c1861473bb23214007b3c2cb2915592567474a57ec3e6a8f53294526992e176ca3895633171e4abcefccae7ba575f2b829555cca1a25e406bd80b2212bc4b8d0917109dc79eba0f59b751717cc4e4a3cf860d9642ccb899b720f1aea5732f22c2dc7f7dfb66d66941efd94cd212f1a6731022a1a96d540631bc29ccc6fdba25f4fec5f2204cb6405e93632da07945ce2f3d4797bf0669f3100c9a5d6f5f703a80b6124ba2967a041273e41f896b84c3760b8d3e2a4ad699145020e94a13081301d7bea9d7ac87f8b6c4a130e4d1323fe8901320346661a48669707f6a862ad3078deedafe419dc870bf1c2cde41fc0d931686942787282175e3f877ba9d0e0b34a4453d3987ca1e981c7e9ced51c86a04e1b15e8c22dbcaf3b5477f1e06daf7a5b4e2141ca94f2593113884c0b12f01000314b5153fbb6fcc059434f3d4d2acfa88942805918061b894f799602c393b0b02c9c0db09cad9feb05ab2c53f2947702aaf7ce49add8b9e33c83e431cb8b70269329061120ead3f8306527d06ab42798ad55b8e1caea8aef7c7d7af3748ac1135252ed863d5844ecd1e10d30d13ad45f3599b80af86c4f6e2f09843c16d96b9eb16f709583f7ed7e837490696ee8b0c5b790d2cdc002f14eebdfc216ea2e0eacd93ac32dcf2ed757eabd7adb545ac303f4db28839bd49282c67e40549a13b65745c40dd840b70a8c3bdaf6e27a956941758f6e34ba2acafc8c1ccf36a737fe2cc55916891df5926f25f0c9fcaaffaab0755a86bcc8d1a0e0dd46842ad46dc4e13152393cc23715e38ef42b8dbe5b62af116ea14d189d6c5ece8f7e976d0ec1edbe47cec0d2532011c71af33569385536d4a05720e1dca553adc0c441bd180bbe5d02d40ca43d2be338531d1259383f097cc630145bedca90a6ac1aadc312dd7ce5777fdec5c1a80b919da94fac452c321d3eccc93722e3ba03e9bd4b8b1e334528a9b6739483de5e890950c72e42f733868125edfc1806eb034095cf83c629b2efc227b80e331ec3eba83f9db9396deb0bfb4f9e81d5080d9ab4b51f28375ea77d70cb9f22cce56c389d743758322f277bffed657891ee38de2471af2ea206121558240bae5b7fdcfb20bdffb7e7457a1752c3def89951ec82244ddd20a988abf288a0fcc7013837f8d3eef6c804e6a3cee1365309593307b65cd84b5e878ccb0853d713df3ffbabe64a395f782059163191d03b62bbe4f7fb95e00fcc0986704cbd7284ed8107f9dbafb131e1376359efaedd790f0d6e4f6b846e300269486044de1a3bcb58ae13e3f5e957d892cb56cf65d087d4e15ae78527a06cd35d0558ce1aef6966d70df965204dafeff210ee3cf6e3545c5e771ad26d4b1c52ae799a5c8c9246c8c01037403b10f073ab5ed718a8b3e29289128b31569ba4287a4cc03df9817ce6d6b1e9eea7f5964a0c969441358bc3fb722b1465bcc99b10c3c0d096ec85615d560061bd6e9de097ef77bda2f815e40e9f9a5baccd37982db6941eb4da8092fdcff14c9a0d0f9237e3ad7d872b1c3cc16993feb63928790a8e6c2c67ccb9870a13d57ee2ad4f52e0b7c8f24a6698814e9a3c77b8b570d087664d1e7f481afe30f52b0af8b5829b0f66b9fbcac37a3b568e71e5406fca85afa618a4bc28dbafa024f0fd3397021c8b750859cee61b32c927b77ca3628d4666aa7089ae8e26a2daf4f311f2886d09a52893d9f9254bd1361c3aabba29620ab7ebb06de1110397918841af6dff7f945481a7e6509ca0fe349360b6e35ae8d4134128444e887789a43a94b428ea9647f944ac59ff0ab2b89fda80b5d39bf370a47d41bf4df7b92047d9c0a42dc683f7ee18074761bcda8189644113a2532e11a6b1a2678fcaa024272d5375f3ec5af0d19ba19009f479026805cd9c015f1c27d9969b2aee52ba3ef9a6c5cc8c3a7080bb29a5d82c55323218e85ca393645c7e04e6c9ee5a7e7246dcbe67279876b538c7cce054713317039782d1ad3f3692a3348812bc846bc0314c8ec66ab93f56829a8649e785e27be4f8e32ca74a1be25094184010bda609ea62b4d3adc6dcb1f566bfb0a21b8ec9895ecfecfea7e29829132b98d0977baa29524e16065b6b6b53422b45900cce8a02a4ffc7bd23dc2f81fd9cf1ecc46ac87c56e2a754acccb2b166ee97e7aa1f005c7b0f2219ebc95779a4fe9d7a64de64299f9dc3f5e6113bd372c55b8eb6215c157ebee4a31168e2d69657a263d403f39341999b815ec353a1cd0598bb0033bd42ad49b894dc8f90737b1e5bef898b615fd919efbc43f6f56624602adc606a16b5a124cb3b8945d581547c0a3cc4b1c69f98295a0a122144e45d7ca47ce6606280d6771a13f4d01ed2ff5beb953ef1c604d388cf7baa3ed8da96e20599d790a881aad07d8c93e1b85110f6b2b1a44f797608de521f54897ec3086d0a9a8756274874af3c8c5337bd396bb3ce2fea367cfa8e79dad5b43a7d979fdd1763a401a700b7c423566615f10b095adff1b8e86e3a2795ecfb5435e8bb0705f6c0c2dfad91940e5f5ab73a13196bd7684675d0c1eb517e11249248d2fc9238d896afa0bf9a45ca498e2f582bf3cf23334c9fb9c8ed9dc06e529280fd37683e3df2f084f23836b2507eec37a766e2e559d73377bd518d41fde18f72d789c827684aea4c44013a69dfb3483767a9d3762f68d4298a5e9f61d8e8f20d3db3995bc36be99f334ff3d93d0c5d4042fba60fe43447968489be39ed0e004fd0e06e90fbf589a8043e0a9124c0cac666a261321ce3ec91cfa23860ad09b71472638ac6dedf16d671926e5581e573a0f773b9d25b6508f99d0406ebc6d503087075064c183f62f13a048d50270a1c46edb22fa289abdf6442f38f7e2edc85cca88b81533255e424cd571d543d371736868cc34716a476dcba105677ac1637692f79c91c8983c53f6a10ab4e6cc9072a71e6183b19600259da01d85bc094e98abb6e2f04b3400b29cc7ddd557d922eb212fad45a1b026dc8f1491aee070d4baef91e558add03f643d43850bf6bd9aad6ec7c786591dd294e75d39f0e5fc5d4841ada6f3ef4d59a203f091d7404ea41d4d3d40b4bbfa76fed3284e98f6a8bcfb0e200013ebae467f4d931c376cec99d90c34bfeca708580fb07dd47fa4d68c7c02c9b128c0e7d5df34760c6f39c264f8ca5d", 0x1000, 0x80000000}, {&(0x7f00000002c0)="bb86fa416c89554f06e4f31c56b7a737b110fbbb511db6fd0e1e1473139060d9d4cdbd148f51184a4254c514c77f5fdd40d0ac2ce4e1db9823404e6955daac6357f7381c086099ef9ddd19e0a9e153ebf82f3ff5de4a29b2d974c63ba3229e89a762410f384c211b33faecd71b95a91d60bb236aaea85b4c8fef67c286963f403ca40c1c8176d19f0cb2aedd20b5a95577a38ce375ec854f5cdc14", 0x9b, 0xff}]) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x800, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) accept4$vsock_stream(r0, &(0x7f00000004c0)={0x28, 0x0, 0xffffffff, @local}, 0x10, 0x400) bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) io_setup(0x5, &(0x7f0000000440)) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r0, 0x110, 0x3) recvmsg$kcm(r0, &(0x7f0000005a80)={&(0x7f0000000540)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000004a00)=[{&(0x7f0000007240)=""/4109, 0x100d}, {&(0x7f00000005c0)=""/118, 0x76}, {&(0x7f0000000640)=""/196, 0xc4}, {&(0x7f0000000740)=""/173, 0xad}, {&(0x7f0000003840)=""/163, 0xa3}, {&(0x7f0000003900)=""/90, 0x5a}, {&(0x7f0000007180)=""/137, 0x89}, {&(0x7f0000003a00)=""/4096, 0x1000}], 0x8, &(0x7f0000004a80)=""/4096, 0x1000}, 0x40002062) connect$can_bcm(r3, &(0x7f0000005ac0), 0x10) io_setup(0x8001, &(0x7f0000000000)=0x0) io_destroy(r4) io_pgetevents(r4, 0xffffffffffffffaa, 0x8, &(0x7f0000005c80)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000005bc0), &(0x7f0000005c40)={&(0x7f0000005c00)={[0x80000001]}, 0x8}) ioctl$SOUND_MIXER_WRITE_RECSRC(r0, 0xc0044dff, &(0x7f0000005f00)=0x1f) [ 2976.340520][ T34] audit: type=1326 audit(1609662877.705:123): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=23736 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:37 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0xeb, 0x80, 0x6}]}) r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, 0x0, &(0x7f0000000040)) clock_gettime(0xefbd8aa34c4cd931, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, &(0x7f0000000100)={0x3, 0x5}, 0x0, 0x0, &(0x7f0000000140)={0x1, 0x6, 0x1, 0x5}, &(0x7f0000000180)=0x1e, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x1}}, 0x10) socketpair(0x2b, 0x1, 0x9, &(0x7f0000000080)) socket$rxrpc(0x21, 0x2, 0x2) 08:34:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x10000000, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:37 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0xeb, 0x80, 0x6}]}) r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, 0x0, &(0x7f0000000040)) clock_gettime(0xefbd8aa34c4cd931, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, &(0x7f0000000100)={0x3, 0x5}, 0x0, 0x0, &(0x7f0000000140)={0x1, 0x6, 0x1, 0x5}, &(0x7f0000000180)=0x1e, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x1}}, 0x10) 08:34:37 executing program 4: socketpair(0x1, 0x0, 0xb3000000, &(0x7f0000000040)) [ 2976.459463][T23746] loop0: detected capacity change from 264192 to 0 [ 2976.506614][ T34] audit: type=1326 audit(1609662877.865:124): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=23749 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 [ 2976.558585][ T34] audit: type=1326 audit(1609662877.915:125): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=23758 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:38 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0xeb, 0x80, 0x6}]}) r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, 0x0, &(0x7f0000000040)) 08:34:38 executing program 4: socketpair(0x1, 0x0, 0xb3010000, &(0x7f0000000040)) 08:34:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x12000000, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:38 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000000)={0x0, &(0x7f0000001080)=""/4120, 0x0, 0xffffffffffffffe9, 0x10}, 0x20) 08:34:38 executing program 4: socketpair(0x1, 0x0, 0xb4000000, &(0x7f0000000040)) 08:34:38 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4084, 0x0, 0xff4}, 0xfffffffffffffec6) 08:34:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x48000000, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:38 executing program 4: socketpair(0x1, 0x0, 0xb4010000, &(0x7f0000000040)) [ 2977.243199][ T34] audit: type=1326 audit(1609662878.605:126): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=23773 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:38 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0xeb, 0x80, 0x6}]}) r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, 0x0, &(0x7f0000000040)) clock_gettime(0xefbd8aa34c4cd931, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, &(0x7f0000000100)={0x3, 0x5}, 0x0, 0x0, &(0x7f0000000140)={0x1, 0x6, 0x1, 0x5}, &(0x7f0000000180)=0x1e, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x1}}, 0x10) socketpair(0x2b, 0x1, 0x9, &(0x7f0000000080)) 08:34:38 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0xeb, 0x80, 0x6}]}) r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, 0x0, &(0x7f0000000040)) clock_gettime(0xefbd8aa34c4cd931, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, &(0x7f0000000100)={0x3, 0x5}, 0x0, 0x0, &(0x7f0000000140)={0x1, 0x6, 0x1, 0x5}, &(0x7f0000000180)=0x1e, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x1}}, 0x10) 08:34:38 executing program 0: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x208280, 0x0) ioctl$SOUND_MIXER_READ_STEREODEVS(r0, 0x80044dfb, &(0x7f0000000180)) r1 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@ipx, &(0x7f0000000080)=0x80, 0xc00) connect$vsock_stream(r1, &(0x7f00000000c0)={0x28, 0x0, 0x0, @local}, 0x10) bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f00000001c0)=""/4098, 0x0, 0x1002}, 0x20) syz_open_dev$dri(&(0x7f0000001200)='/dev/dri/card#\x00', 0x100000001, 0x100) 08:34:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c000000, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) [ 2977.470907][ T34] audit: type=1326 audit(1609662878.835:127): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=23785 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:39 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0xeb, 0x80, 0x6}]}) socket$phonet_pipe(0x23, 0x5, 0x2) 08:34:39 executing program 4: socketpair(0x1, 0x0, 0xb5000000, &(0x7f0000000040)) 08:34:39 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000000)) 08:34:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x68000000, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:39 executing program 4: socketpair(0x1, 0x0, 0xb5010000, &(0x7f0000000040)) 08:34:39 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000180)={&(0x7f0000000000), 0x10, &(0x7f0000000140)={&(0x7f0000000080)={0x3, 0x6c4, 0x7f, {0x0, 0xea60}, {r1, r2/1000+60000}, {0x2, 0x0, 0x1}, 0x1, @canfd={{0x3, 0x0, 0x1}, 0x8, 0x0, 0x0, 0x0, "162474130b206783980481d55d15784e1075762928df6dd151d59c6e37d675da08a364383a58d1637ee3998b9dea6d5f2835fdc0559c367485bae23482073279"}}, 0x80}, 0x1, 0x0, 0x0, 0x10}, 0x4080) 08:34:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c000000, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x74000000, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:39 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0xeb, 0x80, 0x6}]}) r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, 0x0, &(0x7f0000000040)) clock_gettime(0xefbd8aa34c4cd931, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, &(0x7f0000000100)={0x3, 0x5}, 0x0, 0x0, &(0x7f0000000140)={0x1, 0x6, 0x1, 0x5}, &(0x7f0000000180)=0x1e, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x1}}, 0x10) 08:34:39 executing program 4: socketpair(0x1, 0x0, 0xb6000000, &(0x7f0000000040)) 08:34:39 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0xeb, 0x80, 0x6}]}) r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, 0x0, &(0x7f0000000040)) clock_gettime(0xefbd8aa34c4cd931, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, &(0x7f0000000100)={0x3, 0x5}, 0x0, 0x0, &(0x7f0000000140)={0x1, 0x6, 0x1, 0x5}, &(0x7f0000000180)=0x1e, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x1}}, 0x10) 08:34:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a000000, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:40 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0xeb, 0x80, 0x6}]}) 08:34:40 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) socket$tipc(0x1e, 0x5, 0x0) 08:34:40 executing program 4: socketpair(0x1, 0x0, 0xb6010000, &(0x7f0000000040)) 08:34:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0xff0f0000, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0xffffff00, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:40 executing program 4: socketpair(0x1, 0x0, 0xb7000000, &(0x7f0000000040)) 08:34:40 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)=0x6) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0xbe38, 0x402800) ioctl$MEDIA_IOC_REQUEST_ALLOC(r1, 0x80047c05, &(0x7f0000000080)) ioctl$EVIOCGABS0(r0, 0x80184540, &(0x7f0000000000)) 08:34:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) [ 2979.058836][ T34] kauditd_printk_skb: 4 callbacks suppressed [ 2979.058851][ T34] audit: type=1326 audit(1609662880.415:132): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=23835 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:40 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0xeb, 0x80, 0x6}]}) r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, 0x0, &(0x7f0000000040)) clock_gettime(0xefbd8aa34c4cd931, 0x0) 08:34:40 executing program 4: socketpair(0x1, 0x0, 0xb7010000, &(0x7f0000000040)) 08:34:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:40 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0xeb, 0x80, 0x6}]}) r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, 0x0, &(0x7f0000000040)) clock_gettime(0xefbd8aa34c4cd931, 0x0) [ 2979.326232][ T34] audit: type=1326 audit(1609662880.685:133): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=23852 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 [ 2979.356816][ T34] audit: type=1326 audit(1609662880.715:134): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=23856 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:41 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0xeb, 0x80, 0x6}]}) 08:34:41 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000040)={0x0, &(0x7f0000001840)=""/4084, 0x0, 0x6bf, 0xffffffff}, 0x20) ptrace$peekuser(0x3, 0x0, 0x80000001) 08:34:41 executing program 4: socketpair(0x1, 0x0, 0xb8000000, &(0x7f0000000040)) 08:34:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:41 executing program 4: socketpair(0x1, 0x0, 0xb8010000, &(0x7f0000000040)) 08:34:41 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r0, &(0x7f0000000000)="2e014e707e89137e8f86f88b228a3baee18970ed9ee06572c4c1e84bb6200986ae244c27390c91c38c02b60a601690c0a2a09935bab213784dd479fb3f0f1e27e3d83200c475b24905dc7a99fc74794f11c7a5bbc2cbb9fc34d03180050ff009084512d4e51d8f548bd2fcf735b5d091b64b6730636f90f51de6278534be9b256b6f0f32435e15f8e50bbd", &(0x7f0000000140)=""/208}, 0x20) 08:34:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:41 executing program 0: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r1, 0x891a, 0x0) getsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) r2 = accept4(r1, &(0x7f0000000080)=@isdn, &(0x7f0000000140)=0x80, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000180)=0xffffffffffffffff, 0x8) bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) [ 2979.992448][ T34] audit: type=1326 audit(1609662881.355:135): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=23867 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:41 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0xeb, 0x80, 0x6}]}) r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, 0x0, &(0x7f0000000040)) 08:34:41 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0xeb, 0x80, 0x6}]}) r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, 0x0, &(0x7f0000000040)) 08:34:41 executing program 4: socketpair(0x1, 0x0, 0xb9000000, &(0x7f0000000040)) 08:34:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) [ 2980.271233][ T34] audit: type=1326 audit(1609662881.625:136): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=23883 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 [ 2980.323580][ T34] audit: type=1326 audit(1609662881.665:137): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=23881 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:42 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:42 executing program 0: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) sendmsg$SMC_PNETID_FLUSH(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x58, 0x0, 0x800, 0x70bd27, 0x25dfdbfc, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'bridge_slave_1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x82}, 0x8040) bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) 08:34:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2f, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:42 executing program 4: socketpair(0x1, 0x0, 0xb9010000, &(0x7f0000000040)) 08:34:42 executing program 4: socketpair(0x1, 0x0, 0xba000000, &(0x7f0000000040)) 08:34:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x63, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:42 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000040)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x642000, 0x0) ioctl$sock_ifreq(r0, 0x8992, 0x0) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x2b48, 0x2, 0x10, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x24) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r1, 0x891a, 0x0) getsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 08:34:42 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:42 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0xeb, 0x80, 0x6}]}) socket$phonet_pipe(0x23, 0x5, 0x2) 08:34:42 executing program 4: socketpair(0x1, 0x0, 0xba010000, &(0x7f0000000040)) 08:34:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xeb9f, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:42 executing program 0: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) ioctl$SOUND_MIXER_WRITE_RECSRC(r0, 0xc0044dff, &(0x7f0000000000)=0x4) bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) 08:34:42 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:42 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0xeb, 0x80, 0x6}]}) socket$phonet_pipe(0x23, 0x5, 0x2) 08:34:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5f5e0ff, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:42 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) [ 2981.177078][ T34] audit: type=1326 audit(1609662882.535:138): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=23915 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:42 executing program 4: socketpair(0x1, 0x0, 0xbb000000, &(0x7f0000000040)) 08:34:42 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0xfffffffd, 0x8}, 0xc) syz_open_procfs(0x0, &(0x7f0000000200)='net/mcfilter\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x0, 0x10000, 0x200, 0xe0000, 0xe0a, r0, 0xfff, [], 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x5}, 0x40) bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) sched_yield() r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r1, 0x891a, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x28}, 0x10) 08:34:42 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) [ 2981.258496][ T34] audit: type=1326 audit(1609662882.615:139): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=23922 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x200008c3, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:43 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0xeb, 0x80, 0x6}]}) 08:34:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x8, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:43 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file1\x00', 0x0, 0x10}, 0x8) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x20001, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r1, 0x891a, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000003980)=@req={0x28, &(0x7f0000003940)={'\x00', @ifru_addrs=@can={0x1d, 0x0}}}) connect$can_bcm(0xffffffffffffffff, &(0x7f00000039c0)={0x1d, r2}, 0x10) ioctl$PPPIOCATTACH(r1, 0x4004743d, &(0x7f0000000180)=0x3) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000140)=0x8, 0x8) ioctl$SOUND_MIXER_READ_RECSRC(r0, 0x80044dff, &(0x7f00000000c0)) 08:34:43 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 08:34:43 executing program 4: socketpair(0x1, 0x0, 0xbb010000, &(0x7f0000000040)) 08:34:43 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0xeb, 0x80, 0x6}]}) [ 2982.127461][ T34] audit: type=1326 audit(1609662883.485:140): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=23944 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:43 executing program 4: socketpair(0x1, 0x0, 0xbc000000, &(0x7f0000000040)) 08:34:43 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}]}) 08:34:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x9, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) [ 2982.175612][ T34] audit: type=1326 audit(1609662883.525:141): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=23949 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:43 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000000)={0x0, &(0x7f0000001040)=""/4096, 0x0, 0x1000, 0x3}, 0x20) sendmsg$SMC_PNETID_FLUSH(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="ff2d764d", @ANYRES16=0x0, @ANYBLOB="000329bd7000fcdbdf25040000000900030073797a320000000005000400010000001400020074756e6c3000000000000000000000000900030073797a30000000000900010073797a32000000001400020073797a6b616c6c657231000000000000"], 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x20040090) 08:34:43 executing program 4: socketpair(0x1, 0x0, 0xbc010000, &(0x7f0000000040)) 08:34:43 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}]}) 08:34:44 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0xeb, 0x80, 0x6}]}) 08:34:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0xa, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:44 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netstat\x00') ioctl$SOUND_MIXER_WRITE_VOLUME(r0, 0xc0044d07, &(0x7f0000000040)=0x45) 08:34:44 executing program 4: socketpair(0x1, 0x0, 0xbd000000, &(0x7f0000000040)) 08:34:44 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}]}) 08:34:44 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0xeb, 0x80, 0x6}]}) 08:34:44 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x0, 0xeb, 0x80, 0x6}]}) 08:34:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0xb, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:44 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) 08:34:44 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x0, 0xeb, 0x80, 0x6}]}) 08:34:44 executing program 4: socketpair(0x1, 0x0, 0xbd010000, &(0x7f0000000040)) 08:34:44 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000000)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000, 0x1}, 0x20) socket$inet6_udp(0xa, 0x2, 0x0) 08:34:45 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x12, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:45 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x0, 0xeb, 0x80, 0x6}]}) 08:34:45 executing program 4: socketpair(0x1, 0x0, 0xbe000000, &(0x7f0000000040)) 08:34:45 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4083, 0x0, 0xff3}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000000)="36232c9a7b8ab6b0321002dafc146da1e065ec8af9b84cfbe6fef545d15bce743112c34a47cc59c3bc4be85fe7e82b10d5c9b7d1e0c1868d962662e1cb17d8bd062576b3f933"}, 0x20) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) sendmsg$NLBL_CALIPSO_C_LIST(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x0, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x40864}, 0x881) 08:34:45 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x2f, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:45 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:45 executing program 4: socketpair(0x1, 0x0, 0xbe010000, &(0x7f0000000040)) 08:34:45 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000000)={0x0, &(0x7f0000000040)=""/4102, 0x0, 0x1006, 0x200004}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001080), 0x4) 08:34:45 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:45 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:45 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0x0, 0x80, 0x6}]}) 08:34:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x63, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:45 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 08:34:45 executing program 4: socketpair(0x1, 0x0, 0xbf000000, &(0x7f0000000040)) 08:34:45 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:45 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000000)={0x0, &(0x7f0000001840)=""/4096, 0x0, 0x1000}, 0x20) [ 2984.220638][ T34] kauditd_printk_skb: 2 callbacks suppressed [ 2984.220652][ T34] audit: type=1326 audit(1609662885.585:144): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24020 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:45 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 08:34:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0xeb9f, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:45 executing program 4: socketpair(0x1, 0x0, 0xbf010000, &(0x7f0000000040)) 08:34:45 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 08:34:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x5f5e0ff, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:45 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 08:34:46 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0x0, 0x0, 0x6}]}) 08:34:46 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x0, 0x200000) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c0000000a0000000900000000000007000000000900000000000000000000000000000000000003000000000400000003000000020000000e200000000000070000000000302e2e2e5f5f305f00"], &(0x7f00000001c0), 0x5e}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x19, 0x2, 0x1, 0x2, 0x20, 0x1, 0x7, [], 0x0, r1, 0x1, 0x1, 0x4}, 0x40) ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, &(0x7f0000000040)=0xffffffffffffffff) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) r5 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r5, 0x891a, 0x0) ioctl$VIDIOC_QBUF(r5, 0xc058560f, &(0x7f0000000080)={0x5, 0x5, 0x4, 0xe000, 0x402, {r3, r4/1000+10000}, {0x5, 0xc, 0x0, 0x2, 0x0, 0x3f, "aaba0300"}, 0x100, 0x3, @userptr=0x80000ffffffff, 0x40, 0x0, r2}) 08:34:46 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x200008c3, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:46 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 08:34:46 executing program 4: socketpair(0x1, 0x0, 0xc0000000, &(0x7f0000000040)) 08:34:46 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}]}) 08:34:46 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0xa, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:46 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/3\x00') bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000300)={&(0x7f0000000000)="6b9e0cf71225768579cea67525e038ea2399899d04a0ba621c895d09c947b6f8dd1af23d6f76c8f31707a3de209e68d4877415d77c740077697ed0819480e6d9ec10b374a2b84a3991384bfb978dfa0413e515926d72d8b3df0129ae5ec6aabf36722dd3200485e19f2ca83b701cdde05d7e427f09231e512d0dc048f0b30daa46f38ee89758b730b31a5070db8ebdbb25b64cadb299d27130026fd2d4822ea66a2081585c", &(0x7f0000000140)=""/175, &(0x7f0000001840)="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", &(0x7f0000000200)="51dfb0243f8ce5f50d9ed4894dc9478bc100bcc19e69d5474001904e4f7719d12f64ec29111b83dd86ab85ce2555596b7652f2b0032f258601ddfe4f9839c14a58e9f33736c43d8bc755850be469edfd7d54610e69e40be00a473ed1ffb472668e6cd058f274d2796a6d4a7eb290b91ba98563163c7201d19a21f176d1ecd896e1cacf2cb48cc33820dfc26e4782cf9528c746c6bb701a0e3f92738af64281a074f9c7598a3fe9cc5d9e51ec07ec319b940e19b62cc429f85dd1fe4a689a63896d479088b456f4e1746281b8b22868407d39a7be6bdff69854b35ef981d53e1cfc512eeeed06430138146db042337648889ae22017d7be484f8da31520", 0x7ff, r0}, 0x38) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000340)=0x4) 08:34:46 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}]}) 08:34:46 executing program 4: socketpair(0x1, 0x0, 0xc0010000, &(0x7f0000000040)) 08:34:46 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) [ 2985.180844][ T34] audit: type=1326 audit(1609662886.545:145): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24060 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:46 executing program 0: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000000c0)={0x232}, 0x8) bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) ptrace$setregset(0x4205, 0x0, 0x3, &(0x7f0000000080)={&(0x7f0000000000)="4b932015f42539e6605654fd2c12c6463162858aca133a8e6d9d24a6f208e039c59a6139fdc5d5baca1dc2c9c3f93d0aadfeb791dda1d762487865a8e517ee1104af80da2620da623016fd4c474011d65b8a2efda29189", 0x57}) 08:34:47 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6}]}) 08:34:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3fe, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:47 executing program 4: socketpair(0x1, 0x0, 0xc1000000, &(0x7f0000000040)) 08:34:47 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}]}) 08:34:47 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}]}) 08:34:47 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000000)={0x1ff, 0x4, 0x4, 0x20, 0x1, {0x0, 0xea60}, {0x2, 0x2, 0x40, 0xc2, 0x1b, 0x7f, "63f6a588"}, 0x1, 0x1, @userptr=0x101, 0x5}) 08:34:47 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000001840)=""/4091, 0x0, 0xffb}, 0x20) socketpair(0x1e, 0x5, 0x7, &(0x7f0000000040)) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x80, 0x0) ptrace$setregs(0xd, 0x0, 0x1d, &(0x7f0000000140)="4d4d49e67eedd546646feb87c60d617ccbda84682cce854aaf8e06e154baa892ac658fba019acb98af354e007c7946d88208ad4f766597d838887d95dc52d3db256e915c99c8f2ed6357b5b3f881329096f872b7ba2c40a42a7ef4ad3efa783693a3423c4c6d7a84af3bc5e68d7be03bf2505c3044eb02336c826c64494b917bed1fa4200327982a2c9c08ebf3ac9761c570bdbeec78723538fc8eba4e2946e4c878abdf8d6672d2b9101dbc9eaaca02203e7b86ead8e6a284792d379a08ba35066097f4ad038e46dcbb9777fa242914def9dd1e8667b0904715e1053dad91") socketpair(0x15, 0x800, 0x200, &(0x7f0000000080)) ioctl$PPPIOCATTCHAN(0xffffffffffffffff, 0x40047438, &(0x7f00000000c0)=0x3) 08:34:47 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}]}) 08:34:47 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x0, 0xeb, 0x80, 0x6}]}) 08:34:47 executing program 4: socketpair(0x1, 0x0, 0xc1010000, &(0x7f0000000040)) [ 2986.114695][ T34] audit: type=1326 audit(1609662887.475:146): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24091 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x200008d7, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:47 executing program 0: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) read$qrtrtun(r0, &(0x7f0000000300)=""/159, 0x9f) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000140)=""/194, 0xc2}], 0x1, &(0x7f0000000240)=""/185, 0xb9}, 0x10102) bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000001840)=""/4074, 0xffffffffffffff20, 0xff5}, 0x20) 08:34:48 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}]}) 08:34:48 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x0, 0xeb, 0x80, 0x6}]}) 08:34:48 executing program 4: socketpair(0x1, 0x0, 0xc2000000, &(0x7f0000000040)) 08:34:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x200008e1, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:48 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x6}]}) 08:34:48 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000001840)=""/4096, 0x0, 0x1000}, 0x20) 08:34:48 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000000)={0x0, &(0x7f0000001140)=""/4088, 0x0, 0xff8}, 0x20) 08:34:48 executing program 4: socketpair(0x1, 0x0, 0xc2010000, &(0x7f0000000040)) 08:34:48 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x0, 0xeb, 0x80, 0x6}]}) 08:34:48 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x0, 0xeb, 0x80, 0x6}]}) 08:34:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) [ 2987.045813][ T34] audit: type=1326 audit(1609662888.405:147): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24123 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:48 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000001840)=""/4097, 0x0, 0x1001}, 0x20) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x48, 0x0, 0x400, 0x70bd2b, 0x25dfdbff, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x6}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'ip6gre0\x00'}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}]}, 0x48}}, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180), 0x4) 08:34:48 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0x0, 0x80, 0x6}]}) 08:34:48 executing program 4: socketpair(0x1, 0x0, 0xc3000000, &(0x7f0000000040)) 08:34:48 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x0, 0xeb, 0x80, 0x6}]}) 08:34:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x2, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) [ 2987.290313][ T34] audit: type=1326 audit(1609662888.655:148): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24138 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:49 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {}]}) 08:34:49 executing program 4: socketpair(0x1, 0x0, 0xc3010000, &(0x7f0000000040)) 08:34:49 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x72f, 0xfffffffd}, 0x20) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r1, 0x891a, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x8, 0x70bd2d, 0x25dfdbfb, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r0}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x40}, @L2TP_ATTR_PEER_SESSION_ID={0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x41}, 0x80) 08:34:49 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x0, 0xeb, 0x80, 0x6}]}) 08:34:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x3, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:49 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {}]}) 08:34:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x4, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:49 executing program 4: socketpair(0x1, 0x0, 0xc4000000, &(0x7f0000000040)) 08:34:49 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0x0, 0x0, 0x6}]}) 08:34:49 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0x0, 0x80, 0x6}]}) 08:34:49 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000000)={0x0, &(0x7f0000001840)=""/4096, 0x0, 0x1000, 0xfffffffc}, 0x20) 08:34:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x5, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:49 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {}]}) 08:34:49 executing program 4: socketpair(0x1, 0x0, 0xc4010000, &(0x7f0000000040)) 08:34:49 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x400080, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000040)=0x2) 08:34:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x6, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:49 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x6}]}) [ 2988.221920][ T34] audit: type=1326 audit(1609662889.585:149): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24171 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:49 executing program 4: socketpair(0x1, 0x0, 0xc5000000, &(0x7f0000000040)) 08:34:49 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000080)={r1, 0x0, r2, 0x5}) [ 2988.273255][ T34] audit: type=1326 audit(1609662889.615:150): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24178 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x7, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) [ 2988.344462][ T34] audit: type=1326 audit(1609662889.705:151): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24186 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:50 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000001840)=""/4081, 0x0, 0xff1}, 0x20) 08:34:50 executing program 4: socketpair(0x1, 0x0, 0xc5010000, &(0x7f0000000040)) 08:34:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x8, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:50 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6}]}) 08:34:50 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0x0, 0x0, 0x6}]}) 08:34:50 executing program 4: socketpair(0x1, 0x0, 0xc6000000, &(0x7f0000000040)) [ 2989.138193][ T34] audit: type=1326 audit(1609662890.495:152): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24200 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:50 executing program 0: ioctl$SOUND_MIXER_READ_RECSRC(0xffffffffffffffff, 0x80044dff, &(0x7f0000000000)) r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp1\x00', 0xce481, 0x0) ioctl$SOUND_OLD_MIXER_INFO(r0, 0x80304d65, &(0x7f0000000080)) bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) 08:34:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0xa, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:50 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x6}]}) [ 2989.197989][ T34] audit: type=1326 audit(1609662890.555:153): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24204 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:50 executing program 4: socketpair(0x1, 0x0, 0xc6010000, &(0x7f0000000040)) 08:34:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x10, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) [ 2989.286889][ T34] audit: type=1326 audit(1609662890.645:154): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24213 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:50 executing program 4: socketpair(0x1, 0x0, 0xc7000000, &(0x7f0000000040)) 08:34:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x12, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:50 executing program 0: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x8}, 0xc) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000080)={0x80000000}, 0x8) bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) 08:34:50 executing program 4: socketpair(0x1, 0x0, 0xc7010000, &(0x7f0000000040)) 08:34:51 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x6}]}) 08:34:51 executing program 0: accept$phonet_pipe(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x10) bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) 08:34:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x48, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:51 executing program 4: socketpair(0x1, 0x0, 0xc8000000, &(0x7f0000000040)) 08:34:51 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6}]}) [ 2990.065032][ T34] audit: type=1326 audit(1609662891.425:155): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24238 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:51 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x6}]}) 08:34:51 executing program 4: socketpair(0x1, 0x0, 0xc8010000, &(0x7f0000000040)) 08:34:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x4c, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:51 executing program 0: sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x50, 0x0, 0x300, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'batadv_slave_0\x00'}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x8}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x73}]}, 0x50}, 0x1, 0x0, 0x0, 0x404c001}, 0x408d0) bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) [ 2990.144157][ T34] audit: type=1326 audit(1609662891.495:156): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24242 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:51 executing program 4: socketpair(0x1, 0x0, 0xc9000000, &(0x7f0000000040)) [ 2990.187619][ T34] audit: type=1326 audit(1609662891.545:157): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24248 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x68, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:51 executing program 0: ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000040)={0x10001}, 0x4) bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) getsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, &(0x7f0000000080), &(0x7f0000000140)=0xfffffffffffffd2c) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000000c0)={0xb4}, 0x8) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) 08:34:52 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {}]}) 08:34:52 executing program 4: socketpair(0x1, 0x0, 0xc9010000, &(0x7f0000000040)) 08:34:52 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x2f0800, 0x0) r1 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x4000000) inotify_rm_watch(r0, r1) io_destroy(0x0) 08:34:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x6c, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:52 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x6}]}) 08:34:52 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x0, 0x6, 0x81}, {0x6}]}) 08:34:52 executing program 4: socketpair(0x1, 0x0, 0xca000000, &(0x7f0000000040)) [ 2991.014777][ T34] audit: type=1326 audit(1609662892.365:158): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24265 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x74, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:52 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x2f0800, 0x0) r1 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x4000000) inotify_rm_watch(r0, r1) io_destroy(0x0) 08:34:52 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {}]}) 08:34:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x7a, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) [ 2991.145933][ T34] audit: type=1326 audit(1609662892.505:159): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24274 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:52 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6}]}) 08:34:52 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {}]}) 08:34:52 executing program 4: socketpair(0x1, 0x0, 0xca010000, &(0x7f0000000040)) 08:34:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x300, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:52 executing program 4: socketpair(0x1, 0x0, 0xcb000000, &(0x7f0000000040)) [ 2991.319363][ T34] audit: type=1326 audit(1609662892.675:160): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24288 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:53 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {}]}) 08:34:53 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x0, 0x0, 0x81}, {0x6}]}) 08:34:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x500, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:53 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x6}]}) 08:34:53 executing program 4: socketpair(0x1, 0x0, 0xcb010000, &(0x7f0000000040)) 08:34:53 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {}]}) [ 2992.007379][ T34] audit: type=1326 audit(1609662893.365:161): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24301 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x600, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) [ 2992.056410][ T34] audit: type=1326 audit(1609662893.415:162): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24307 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:53 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6}]}) 08:34:53 executing program 4: socketpair(0x1, 0x0, 0xcc000000, &(0x7f0000000040)) 08:34:53 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {}]}) 08:34:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x700, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:53 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x6}]}) 08:34:53 executing program 4: socketpair(0x1, 0x0, 0xcc010000, &(0x7f0000000040)) [ 2992.259213][ T34] audit: type=1326 audit(1609662893.615:163): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24318 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:54 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {}, {0x6}]}) 08:34:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0xa00, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:54 executing program 4: socketpair(0x1, 0x0, 0xcd000000, &(0x7f0000000040)) 08:34:54 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x6}]}) 08:34:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x1200, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:54 executing program 4: socketpair(0x1, 0x0, 0xcd010000, &(0x7f0000000040)) 08:34:54 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6}]}) 08:34:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x4800, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:54 executing program 4: socketpair(0x1, 0x0, 0xce000000, &(0x7f0000000040)) 08:34:54 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x6}]}) 08:34:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x4c00, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:54 executing program 4: socketpair(0x1, 0x0, 0xce010000, &(0x7f0000000040)) 08:34:55 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x6}]}) 08:34:55 executing program 4: socketpair(0x1, 0x0, 0xcf000000, &(0x7f0000000040)) 08:34:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x6800, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:55 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x6}]}) 08:34:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x6c00, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:55 executing program 4: socketpair(0x1, 0x0, 0xcf010000, &(0x7f0000000040)) 08:34:55 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x7400, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:55 executing program 4: socketpair(0x1, 0x0, 0xd0000000, &(0x7f0000000040)) 08:34:55 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x6}]}) 08:34:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x7a00, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:55 executing program 4: socketpair(0x1, 0x0, 0xd0010000, &(0x7f0000000040)) 08:34:56 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x6}]}) 08:34:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0xff0f, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:56 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:34:56 executing program 4: socketpair(0x1, 0x0, 0xd1000000, &(0x7f0000000040)) 08:34:56 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x0, 0x6, 0x81}, {0x6}]}) [ 2994.726540][ T34] kauditd_printk_skb: 8 callbacks suppressed [ 2994.726592][ T34] audit: type=1326 audit(1609662896.085:172): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24382 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0xffffff, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:56 executing program 4: socketpair(0x1, 0x0, 0xd1010000, &(0x7f0000000040)) 08:34:56 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) [ 2994.765187][ T34] audit: type=1326 audit(1609662896.115:173): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24385 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:56 executing program 4: socketpair(0x1, 0x0, 0xd2000000, &(0x7f0000000040)) 08:34:56 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x0, 0x6, 0x81}, {0x6}]}) 08:34:56 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 08:34:56 executing program 4: socketpair(0x1, 0x0, 0xd2010000, &(0x7f0000000040)) [ 2995.098940][ T34] audit: type=1326 audit(1609662896.455:174): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24405 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:56 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x6}]}) 08:34:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x1000000, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:56 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 08:34:56 executing program 4: socketpair(0x1, 0x0, 0xd3000000, &(0x7f0000000040)) 08:34:56 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x0, 0x0, 0x81}, {0x6}]}) [ 2995.626285][ T34] audit: type=1326 audit(1609662896.985:175): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24409 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:57 executing program 4: socketpair(0x1, 0x0, 0xd3010000, &(0x7f0000000040)) 08:34:57 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 08:34:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x2000000, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) [ 2995.710639][ T34] audit: type=1326 audit(1609662897.075:176): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24415 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:57 executing program 4: socketpair(0x1, 0x0, 0xd4000000, &(0x7f0000000040)) 08:34:57 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x0, 0x0, 0x81}, {0x6}]}) 08:34:57 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}]}) 08:34:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x3000000, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) [ 2995.992534][ T34] audit: type=1326 audit(1609662897.355:177): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24433 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:57 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x0, 0x1, 0x9, 0x7}, {}, {0x6}]}) 08:34:57 executing program 4: socketpair(0x1, 0x0, 0xd4010000, &(0x7f0000000040)) 08:34:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x4000000, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:57 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}]}) 08:34:57 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {}, {0x6}]}) 08:34:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x5000000, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:57 executing program 4: socketpair(0x1, 0x0, 0xd5000000, &(0x7f0000000040)) [ 2996.598124][ T34] audit: type=1326 audit(1609662897.955:178): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24442 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:58 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}]}) [ 2996.632568][ T34] audit: type=1326 audit(1609662897.995:179): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24446 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:58 executing program 4: socketpair(0x1, 0x0, 0xd5010000, &(0x7f0000000040)) 08:34:58 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {}, {0x6}]}) 08:34:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x6000000, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:58 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {}]}) [ 2996.888269][ T34] audit: type=1326 audit(1609662898.245:180): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24461 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:58 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x0, 0x1, 0x9, 0x7}, {}, {0x6}]}) 08:34:58 executing program 4: socketpair(0x1, 0x0, 0xd6000000, &(0x7f0000000040)) 08:34:58 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {}]}) 08:34:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x7000000, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:58 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x6}]}) 08:34:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x8000000, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:58 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {}]}) [ 2997.520663][ T34] audit: type=1326 audit(1609662898.885:181): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24469 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:34:58 executing program 4: socketpair(0x1, 0x0, 0xd6010000, &(0x7f0000000040)) 08:34:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0xa000000, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:59 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x6}]}) 08:34:59 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x6}]}) 08:34:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x10000000, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:59 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x0, 0x1, 0x9, 0x7}, {}, {0x6}]}) 08:34:59 executing program 4: socketpair(0x1, 0x0, 0xd7000000, &(0x7f0000000040)) 08:34:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x12000000, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:59 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x6}]}) 08:34:59 executing program 4: socketpair(0x1, 0x0, 0xd7010000, &(0x7f0000000040)) 08:34:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x48000000, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:59 executing program 4: socketpair(0x1, 0x0, 0xd8000000, &(0x7f0000000040)) 08:34:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x4c000000, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:34:59 executing program 4: socketpair(0x1, 0x0, 0xd8010000, &(0x7f0000000040)) 08:35:00 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x6}]}) 08:35:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x68000000, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:00 executing program 4: socketpair(0x1, 0x0, 0xd9000000, &(0x7f0000000040)) 08:35:00 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x0, 0x9, 0x7}, {}, {0x6}]}) 08:35:00 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {}]}) 08:35:00 executing program 4: socketpair(0x1, 0x0, 0xd9010000, &(0x7f0000000040)) 08:35:00 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x6}]}) 08:35:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x6c000000, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:00 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {}]}) 08:35:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x74000000, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:00 executing program 4: socketpair(0x1, 0x0, 0xda000000, &(0x7f0000000040)) 08:35:00 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {}]}) 08:35:00 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x6}]}) 08:35:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x7a000000, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:00 executing program 4: socketpair(0x1, 0x0, 0xda010000, &(0x7f0000000040)) 08:35:01 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x0, 0x0, 0x7}, {}, {0x6}]}) 08:35:01 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x6}]}) 08:35:01 executing program 4: socketpair(0x1, 0x0, 0xdb000000, &(0x7f0000000040)) 08:35:01 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x0, 0x1, 0x9, 0x7}, {}, {0x6}]}) 08:35:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0xff0f0000, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:01 executing program 4: socketpair(0x1, 0x0, 0xdb010000, &(0x7f0000000040)) [ 3000.238286][ T34] kauditd_printk_skb: 9 callbacks suppressed [ 3000.238332][ T34] audit: type=1326 audit(1609662901.595:191): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24546 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:35:01 executing program 4: socketpair(0x1, 0x0, 0xdc000000, &(0x7f0000000040)) 08:35:01 executing program 4: socketpair(0x1, 0x0, 0xdc010000, &(0x7f0000000040)) 08:35:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0xffffff00, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) [ 3000.329110][ T34] audit: type=1326 audit(1609662901.655:192): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24549 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 [ 3000.384044][ T34] audit: type=1326 audit(1609662901.735:193): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24555 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:35:01 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x0, 0x1, 0x9, 0x7}, {}, {0x6}]}) 08:35:01 executing program 4: socketpair(0x1, 0x0, 0xdd000000, &(0x7f0000000040)) 08:35:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0xa}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) [ 3000.519436][ T34] audit: type=1326 audit(1609662901.875:194): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24564 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:35:02 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4}, {}, {0x6}]}) 08:35:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x3fe}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:02 executing program 4: socketpair(0x1, 0x0, 0xdd010000, &(0x7f0000000040)) 08:35:02 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x0, 0x1, 0x9, 0x7}, {}, {0x6}]}) 08:35:02 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x6}]}) 08:35:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:02 executing program 4: socketpair(0x1, 0x0, 0xde000000, &(0x7f0000000040)) [ 3001.214758][ T34] audit: type=1326 audit(1609662902.575:195): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24571 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:35:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) [ 3001.298421][ T34] audit: type=1326 audit(1609662902.625:196): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24577 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:35:02 executing program 4: socketpair(0x1, 0x0, 0xde010000, &(0x7f0000000040)) 08:35:02 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x0, 0x1, 0x9, 0x7}, {}, {0x6}]}) [ 3001.330905][ T34] audit: type=1326 audit(1609662902.655:197): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24582 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:35:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x3}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:02 executing program 4: socketpair(0x1, 0x0, 0xdf000000, &(0x7f0000000040)) [ 3001.467495][ T34] audit: type=1326 audit(1609662902.825:198): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24590 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:35:03 executing program 4: socketpair(0x1, 0x0, 0xdf010000, &(0x7f0000000040)) 08:35:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x4}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:03 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x6}]}) 08:35:03 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x0, 0x1, 0x9, 0x7}, {}, {0x6}]}) 08:35:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x5}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:03 executing program 4: socketpair(0x1, 0x0, 0xe0000000, &(0x7f0000000040)) 08:35:03 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x6}]}) [ 3002.156132][ T34] audit: type=1326 audit(1609662903.515:199): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24599 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 [ 3002.223181][ T34] audit: type=1326 audit(1609662903.575:200): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24602 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:35:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x6}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:03 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x0, 0x1, 0x9, 0x7}, {}, {0x6}]}) 08:35:03 executing program 4: socketpair(0x1, 0x0, 0xe0010000, &(0x7f0000000040)) 08:35:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x7}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:03 executing program 4: socketpair(0x1, 0x0, 0xe1000000, &(0x7f0000000040)) 08:35:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x8}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:03 executing program 4: socketpair(0x1, 0x0, 0xe1010000, &(0x7f0000000040)) 08:35:04 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x6}]}) 08:35:04 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x0, 0x9, 0x7}, {}, {0x6}]}) 08:35:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0xa}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:04 executing program 4: socketpair(0x1, 0x0, 0xe2000000, &(0x7f0000000040)) 08:35:04 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x0, 0x6, 0x81}, {0x6}]}) 08:35:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x10}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:04 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x0, 0x9, 0x7}, {}, {0x6}]}) 08:35:04 executing program 4: socketpair(0x1, 0x0, 0xe2010000, &(0x7f0000000040)) 08:35:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x12}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:04 executing program 4: socketpair(0x1, 0x0, 0xe3000000, &(0x7f0000000040)) 08:35:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x48}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:04 executing program 4: socketpair(0x1, 0x0, 0xe3010000, &(0x7f0000000040)) 08:35:05 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x6}]}) 08:35:05 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x0, 0x0, 0x7}, {}, {0x6}]}) 08:35:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x4c}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:05 executing program 4: socketpair(0x1, 0x0, 0xe4000000, &(0x7f0000000040)) 08:35:05 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x0, 0x0, 0x81}, {0x6}]}) 08:35:05 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x0, 0x0, 0x7}, {}, {0x6}]}) 08:35:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x68}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:05 executing program 4: socketpair(0x1, 0x0, 0xe4010000, &(0x7f0000000040)) 08:35:05 executing program 4: socketpair(0x1, 0x0, 0xe5000000, &(0x7f0000000040)) 08:35:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x6c}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:05 executing program 4: socketpair(0x1, 0x0, 0xe5010000, &(0x7f0000000040)) 08:35:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x74}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:06 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:35:06 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4}, {}, {0x6}]}) 08:35:06 executing program 4: socketpair(0x1, 0x0, 0xe6000000, &(0x7f0000000040)) 08:35:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x7a}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:06 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:35:06 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4}, {}, {0x6}]}) 08:35:06 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {}, {0x6}]}) 08:35:06 executing program 4: socketpair(0x1, 0x0, 0xe6010000, &(0x7f0000000040)) 08:35:06 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 08:35:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:06 executing program 4: socketpair(0x1, 0x0, 0xe7000000, &(0x7f0000000040)) 08:35:06 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 08:35:07 executing program 4: socketpair(0x1, 0x0, 0xe7010000, &(0x7f0000000040)) 08:35:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x3}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:07 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 08:35:07 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4}, {}, {0x6}]}) 08:35:07 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x6}]}) 08:35:07 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {}, {0x6}]}) 08:35:07 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 08:35:07 executing program 4: socketpair(0x1, 0x0, 0xe8000000, &(0x7f0000000040)) 08:35:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x4}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) [ 3005.980188][ T34] kauditd_printk_skb: 13 callbacks suppressed [ 3005.980205][ T34] audit: type=1326 audit(1609662907.345:214): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24712 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:35:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x5}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) [ 3006.071880][ T34] audit: type=1326 audit(1609662907.415:215): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24714 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:35:07 executing program 4: socketpair(0x1, 0x0, 0xe8010000, &(0x7f0000000040)) 08:35:07 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) 08:35:07 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) [ 3006.150440][ T34] audit: type=1326 audit(1609662907.425:216): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24715 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:35:07 executing program 4: socketpair(0x1, 0x0, 0xe9000000, &(0x7f0000000040)) 08:35:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x6}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:08 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4}, {}, {0x6}]}) [ 3006.833034][ T34] audit: type=1326 audit(1609662908.195:217): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24738 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:35:08 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x6}]}) 08:35:08 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) 08:35:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x7}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:08 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x0, 0x0, 0x81}, {0x6}]}) 08:35:08 executing program 4: socketpair(0x1, 0x0, 0xe9010000, &(0x7f0000000040)) 08:35:08 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {}]}) 08:35:08 executing program 4: socketpair(0x1, 0x0, 0xea000000, &(0x7f0000000040)) [ 3006.980161][ T34] audit: type=1326 audit(1609662908.345:218): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24743 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:35:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x8}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) [ 3007.026482][ T34] audit: type=1326 audit(1609662908.375:219): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24744 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:35:08 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {}]}) 08:35:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0xa}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:08 executing program 4: socketpair(0x1, 0x0, 0xea010000, &(0x7f0000000040)) 08:35:09 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x0, 0x9, 0x7}, {}, {0x6}]}) [ 3007.690821][ T34] audit: type=1326 audit(1609662909.055:220): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24764 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:35:09 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x6}]}) 08:35:09 executing program 4: socketpair(0x1, 0x0, 0xeb000000, &(0x7f0000000040)) 08:35:09 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {}]}) 08:35:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x10}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:09 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x0, 0x1, 0x9, 0x7}, {}, {0x6}]}) 08:35:09 executing program 4: socketpair(0x1, 0x0, 0xeb010000, &(0x7f0000000040)) 08:35:09 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) [ 3007.899098][ T34] audit: type=1326 audit(1609662909.255:221): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24770 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:35:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x12}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) [ 3007.962339][ T34] audit: type=1326 audit(1609662909.305:222): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24772 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:35:09 executing program 4: socketpair(0x1, 0x0, 0xec000000, &(0x7f0000000040)) [ 3007.996843][ T34] audit: type=1326 audit(1609662909.355:223): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24777 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:35:09 executing program 4: socketpair(0x1, 0x0, 0xec010000, &(0x7f0000000040)) 08:35:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x48}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:09 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x0, 0x1, 0x9, 0x7}, {}, {0x6}]}) 08:35:10 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x0, 0x1, 0x9, 0x7}, {}, {0x6}]}) 08:35:10 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x4c}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:10 executing program 4: socketpair(0x1, 0x0, 0xed000000, &(0x7f0000000040)) 08:35:10 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x68}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x4c000000, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:10 executing program 4: socketpair(0x1, 0x0, 0xed010000, &(0x7f0000000040)) 08:35:10 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) 08:35:10 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x6c}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:10 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) 08:35:10 executing program 4: socketpair(0x1, 0x0, 0xee000000, &(0x7f0000000040)) 08:35:10 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x74}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:10 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x0, 0x1, 0x9, 0x7}, {}, {0x6}]}) 08:35:11 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x0, 0x1, 0x9, 0x7}, {}, {0x6}]}) 08:35:11 executing program 4: socketpair(0x1, 0x0, 0xee010000, &(0x7f0000000040)) 08:35:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x7a}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:11 executing program 4: socketpair(0x1, 0x0, 0xef000000, &(0x7f0000000040)) 08:35:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x300}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:11 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) 08:35:11 executing program 4: socketpair(0x1, 0x0, 0xef010000, &(0x7f0000000040)) 08:35:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0xa000000, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x500}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:11 executing program 4: socketpair(0x1, 0x0, 0xf0000000, &(0x7f0000000040)) 08:35:11 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {}, {0x6}]}) 08:35:11 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x0, 0x0, 0x81}, {0x6}]}) 08:35:11 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x0, 0x1, 0x9, 0x7}, {}, {0x6}]}) 08:35:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x600}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:11 executing program 4: socketpair(0x1, 0x0, 0xf0010000, &(0x7f0000000040)) 08:35:11 executing program 4: socketpair(0x1, 0x0, 0xf1000000, &(0x7f0000000040)) 08:35:12 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x700}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:12 executing program 4: socketpair(0x1, 0x0, 0xf1010000, &(0x7f0000000040)) 08:35:12 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0xa00}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:12 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x0, 0x1, 0x9, 0x7}, {}, {0x6}]}) 08:35:12 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x1200}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:12 executing program 4: socketpair(0x1, 0x0, 0xf2000000, &(0x7f0000000040)) 08:35:12 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x6}]}) 08:35:12 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x0, 0x6, 0x81}, {0x6}]}) [ 3011.138449][ T34] kauditd_printk_skb: 12 callbacks suppressed [ 3011.138464][ T34] audit: type=1326 audit(1609662912.495:236): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24868 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:35:12 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x0, 0x9, 0x7}, {}, {0x6}]}) 08:35:12 executing program 4: socketpair(0x1, 0x0, 0xf2010000, &(0x7f0000000040)) 08:35:12 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x4800}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:12 executing program 4: socketpair(0x1, 0x0, 0xf3000000, &(0x7f0000000040)) 08:35:12 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x4c00}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:12 executing program 4: socketpair(0x1, 0x0, 0xf3010000, &(0x7f0000000040)) [ 3011.590029][ T34] audit: type=1326 audit(1609662912.945:237): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24874 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:35:13 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x6800}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:13 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x6}]}) 08:35:13 executing program 4: socketpair(0x1, 0x0, 0xf4000000, &(0x7f0000000040)) 08:35:13 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x6}]}) 08:35:13 executing program 4: socketpair(0x1, 0x0, 0xf4010000, &(0x7f0000000040)) [ 3011.714980][ T34] audit: type=1326 audit(1609662913.075:238): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24885 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 [ 3011.796416][ T34] audit: type=1326 audit(1609662913.155:239): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24891 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:35:13 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x6}]}) [ 3011.997284][ T34] audit: type=1326 audit(1609662913.355:240): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24894 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:35:13 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x0, 0x0, 0x7}, {}, {0x6}]}) 08:35:13 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x6c00}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:13 executing program 4: socketpair(0x1, 0x0, 0xf5000000, &(0x7f0000000040)) 08:35:13 executing program 4: socketpair(0x1, 0x0, 0xf5010000, &(0x7f0000000040)) 08:35:13 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x7400}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:13 executing program 4: socketpair(0x1, 0x0, 0xf6000000, &(0x7f0000000040)) [ 3012.461377][ T34] audit: type=1326 audit(1609662913.825:241): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24901 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:35:13 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x7a00}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:13 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x6}]}) 08:35:13 executing program 4: socketpair(0x1, 0x0, 0xf6010000, &(0x7f0000000040)) 08:35:14 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x0, 0x6, 0x81}, {0x6}]}) 08:35:14 executing program 4: socketpair(0x1, 0x0, 0xf7000000, &(0x7f0000000040)) [ 3012.655216][ T34] audit: type=1326 audit(1609662914.015:242): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24912 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 [ 3012.695473][ T34] audit: type=1326 audit(1609662914.055:243): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24916 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:35:14 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0x0, 0x80, 0x6}]}) [ 3012.863115][ T34] audit: type=1326 audit(1609662914.225:244): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24920 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:35:14 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4}, {}, {0x6}]}) 08:35:14 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0xff0f}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:14 executing program 4: socketpair(0x1, 0x0, 0xf7010000, &(0x7f0000000040)) 08:35:14 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0xffffff}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:14 executing program 4: socketpair(0x1, 0x0, 0xf8000000, &(0x7f0000000040)) 08:35:14 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x1000000}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) [ 3013.368738][ T34] audit: type=1326 audit(1609662914.725:245): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=24926 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x0 08:35:14 executing program 4: socketpair(0x1, 0x0, 0xf8010000, &(0x7f0000000040)) 08:35:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0xff0f}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:14 executing program 4: socketpair(0x1, 0x0, 0xf9000000, &(0x7f0000000040)) 08:35:14 executing program 3: socketpair(0x1, 0x0, 0xc2010000, &(0x7f0000000040)) 08:35:14 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x2000000}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:15 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0xeb, 0x80, 0x6}]}) socket$phonet_pipe(0x23, 0x5, 0x2) 08:35:15 executing program 3: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/3\x00') bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000300)={&(0x7f0000000000)="6b9e0cf71225768579cea67525e038ea2399899d04a0ba621c895d09c947b6f8dd1af23d6f76c8f31707a3de209e68d4877415d77c740077697ed0819480e6d9ec10b374a2b84a3991384bfb978dfa0413e515926d72d8b3df0129ae5ec6aabf36722dd3200485e19f2ca83b701cdde05d7e427f09231e512d0dc048f0b30daa46f38ee89758b730b31a5070db8ebdbb25b64cadb299d27130026fd2d4822ea66a2081585c", &(0x7f0000000140)=""/175, &(0x7f0000001840)="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", &(0x7f0000000200)="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", 0x7ff, r0}, 0x38) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000340)=0x4) 08:35:15 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x3000000}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:15 executing program 4: socketpair(0x1, 0x0, 0xf9010000, &(0x7f0000000040)) 08:35:15 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0x0, 0x0, 0x6}]}) 08:35:15 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0xeb, 0x80, 0x6}]}) r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, 0x0, &(0x7f0000000040)) clock_gettime(0xefbd8aa34c4cd931, 0x0) 08:35:15 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0xeb, 0x80, 0x6}]}) r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, 0x0, &(0x7f0000000040)) clock_gettime(0xefbd8aa34c4cd931, 0x0) 08:35:15 executing program 4: socketpair(0x1, 0x0, 0xfa000000, &(0x7f0000000040)) 08:35:15 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x4000000}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:15 executing program 4: socketpair(0x1, 0x0, 0xfa010000, &(0x7f0000000040)) 08:35:15 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x5000000}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:15 executing program 4: socketpair(0x1, 0x0, 0xfb000000, &(0x7f0000000040)) 08:35:15 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0xeb, 0x80, 0x6}]}) 08:35:15 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x6000000}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:15 executing program 4: socketpair(0x1, 0x0, 0xfb010000, &(0x7f0000000040)) 08:35:15 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x7000000}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:16 executing program 5: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000180)={&(0x7f0000000000), 0x10, &(0x7f0000000140)={&(0x7f0000000080)={0x3, 0x6c4, 0x7f, {0x0, 0xea60}, {r1, r2/1000+60000}, {0x2, 0x0, 0x1}, 0x1, @canfd={{0x3, 0x0, 0x1}, 0x8, 0x0, 0x0, 0x0, "162474130b206783980481d55d15784e1075762928df6dd151d59c6e37d675da08a364383a58d1637ee3998b9dea6d5f2835fdc0559c367485bae23482073279"}}, 0x80}, 0x1, 0x0, 0x0, 0x10}, 0x4080) 08:35:16 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0xeb, 0x80, 0x6}]}) r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, 0x0, &(0x7f0000000040)) 08:35:16 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) r1 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000480)={0x0, 0x1, r1, 0x7a, 0x80000}) ioctl$sock_ifreq(0xffffffffffffffff, 0x891a, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000007100)={&(0x7f0000005f40)="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", &(0x7f0000006f40)=""/112, &(0x7f0000006fc0)="19", &(0x7f0000007000)="f46a40fb399ef84354662cc497cab5765ccbbd3424a7d51a030699b16c2e30900c3a7e4bb98653f036d75b6f1e8a5982c7cd71f4d48d0cf937b0d97531baa9fab1e14364942202832eda158f1ec4fb01208c1e39e813317faaac211da8693d985478e417e91f4dde2c1eae9bb3bf06768664858c37c77045bdeb0d29bacc0a3e9ac63037261adaedb80c33c70520256bec9f29da6a23bcdf89d2ded0dc23e34cea1c3c235b249293b61bc770dbb3f2cead46de2f9ad6209f2c871a8d34ce0862420e57fef2d95f017e32038f6b2d62c543bbb838a79cc3f6c3", 0xadf, 0xffffffffffffffff, 0x4}, 0x38) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000005ec0)={r0, 0xc0, &(0x7f0000005e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000005b00)=0xfffffffffffffff7, 0x0, 0x0, 0x0, &(0x7f0000005b40)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000005b80)={0x3, 0xf, 0xfffffff9, 0x9}, &(0x7f0000005dc0)=0x20, 0x0, 0x0, 0x0, 0x0, &(0x7f0000007140)=0x3c}}, 0x10) syz_read_part_table(0x0, 0x7, &(0x7f0000000380)=[{&(0x7f0000000000)="7e18004b88b7b0c549b681d745dddf60543fc90d32b4558f7597fa601a023cb24f38f5b9488bd4b496dc13dbe8accffcf0614339213051cfb3b20d492d6167cc107219e32ef4b7ba5d7927996d039f822237535780fa7f5b32d5c7a41307ec47ace4fea9cca5a27a839cb02637a760ce450ac7031ab9f12655f021c8e5cca860d3c6b4e6", 0x84, 0x9}, {&(0x7f0000000140)="db2c12dfaa254089e517fe74db8a5e3f75783d8adeaf6384d65e11a1ef8322a3f028cc021bc0c3c69f95410a9faf87653cc6e183f1fb182e23e24f83056eba17e44946b360363220d064679f78b767b2b8a689", 0x53, 0x3}, {&(0x7f0000000500)="e5676e41198e4b6977dae8307daa1273e7a20970531fb5077f1ef7d21c17cbf38a7118611f73", 0x26, 0x69}, {&(0x7f00000001c0)="1f305ae2b5f12b6fbec8e8f7f9f3916912aa03883f964e67c7a6a6761e44f3acc761a5a1484484a4382f27507831bfcbf1861fa77b1680e1b46e0d840c74a440fd258b430f", 0x45, 0x3}, {&(0x7f0000000240)="8926cef9a2db75fad30b88d2eb97af054d819850fd5e775f7a9339068b49ec161381af3145552c65189ef9a509c4cb7484520bc1e6200dcc3716551b6fab7effaa2f082e6bc9c9a32c00b51d5f1fc54078518886bdafb3981fd3cc0bfb05ec9fcca69a18b20dbb23f99a", 0x6a, 0x6}, {&(0x7f0000001840)="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", 0x1000, 0x80000000}, {&(0x7f00000002c0)="bb86fa416c89554f06e4f31c56b7a737b110fbbb511db6fd0e1e1473139060d9d4cdbd148f51184a4254c514c77f5fdd40d0ac2ce4e1db9823404e6955daac6357f7381c086099ef9ddd19e0a9e153ebf82f3ff5de4a29b2d974c63ba3229e89a762410f384c211b33faecd71b95a91d60bb236aaea85b4c8fef67c286963f403ca40c1c8176d19f0cb2aedd20b5a95577a38ce375ec854f5cdc14", 0x9b, 0xff}]) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x800, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) accept4$vsock_stream(r0, &(0x7f00000004c0)={0x28, 0x0, 0xffffffff, @local}, 0x10, 0x400) bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000840)=""/4096, 0x0, 0x1000}, 0x20) io_setup(0x5, &(0x7f0000000440)) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r0, 0x110, 0x3) recvmsg$kcm(r0, &(0x7f0000005a80)={&(0x7f0000000540)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000004a00)=[{&(0x7f0000007240)=""/4109, 0x100d}, {&(0x7f00000005c0)=""/118, 0x76}, {&(0x7f0000000640)=""/196, 0xc4}, {&(0x7f0000000740)=""/173, 0xad}, {&(0x7f0000003840)=""/163, 0xa3}, {&(0x7f0000003900)=""/90, 0x5a}, {&(0x7f0000007180)=""/137, 0x89}, {&(0x7f0000003a00)=""/4096, 0x1000}], 0x8, &(0x7f0000004a80)=""/4096, 0x1000}, 0x40002062) connect$can_bcm(r3, &(0x7f0000005ac0), 0x10) io_setup(0x8001, &(0x7f0000000000)=0x0) io_destroy(r4) io_pgetevents(r4, 0xffffffffffffffaa, 0x8, &(0x7f0000005c80)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000005bc0), &(0x7f0000005c40)={&(0x7f0000005c00)={[0x80000001]}, 0x8}) ioctl$SOUND_MIXER_WRITE_RECSRC(r0, 0xc0044dff, &(0x7f0000005f00)=0x1f) 08:35:16 executing program 4: socketpair(0x1, 0x0, 0xfc000000, &(0x7f0000000040)) 08:35:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x8000000}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:16 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x4, 0x1, 0x9, 0x7}, {0x0, 0x7f, 0x6, 0x81}, {0x4, 0xff, 0x1f, 0x2}, {0x6, 0xeb, 0x80, 0x6}]}) r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, 0x0, &(0x7f0000000040)) clock_gettime(0xefbd8aa34c4cd931, 0x0) 08:35:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0xa000000}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:16 executing program 4: socketpair(0x1, 0x0, 0xfc010000, &(0x7f0000000040)) 08:35:16 executing program 2: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f00000001c0)={0x4, 0x2, 0x4, 0x100, 0x1, {0x77359400}, {0x1, 0x2, 0x7a, 0x1c, 0x7, 0x2, "b0a2f232"}, 0x10001, 0x2, @planes=&(0x7f0000000180)={0xa00, 0x200, @userptr=0xfffffffffffffffe, 0x3}, 0x7}) 08:35:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x10000000}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:16 executing program 4: socketpair(0x1, 0x0, 0xfd000000, &(0x7f0000000040)) 08:35:16 executing program 3: socketpair(0x1, 0x0, 0xfc000000, &(0x7f0000000040)) 08:35:16 executing program 4: socketpair(0x1, 0x0, 0xfd010000, &(0x7f0000000040)) 08:35:17 executing program 0: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x800, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x40}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x4040000}, 0x2000000) clock_gettime(0xefbd8aa30000000b, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x40000, 0x0) ioctl$vim2m_VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000240)={0x1, 0x2, 0x4, 0x100, 0x6, {0x77359400}, {0x3, 0xc, 0x7f, 0x2, 0x6, 0x3f, "8b35f473"}, 0x1, 0x1, @userptr=0x100000000, 0x80000000, 0x0, r0}) ioctl$sock_ifreq(r0, 0x891a, 0x0) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$vim2m_VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f00000003c0)={0x5, 0x0, 0x4, 0x70000, 0x3, {r2, r3/1000+10000}, {0x1, 0x0, 0x1, 0x1, 0x2, 0xb7, "61025cc4"}, 0x4, 0x4, @planes=&(0x7f0000000380)={0x80000000, 0x0, @fd=r0, 0xffffffff}, 0x5, 0x0, r0}) r5 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000440)='/proc/capi/capi20ncci\x00', 0x200080, 0x0) ioctl$vim2m_VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000480)={0x6, 0x3, 0x4, 0x0, 0xfffffff9, {}, {0x2, 0x2, 0x24, 0x9, 0x0, 0x1f, "40c10fc5"}, 0x0, 0x0, @fd=r4, 0xffffa5ce, 0x0, r5}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r6, 0x891a, 0x0) ioctl$SIOCPNENABLEPIPE(r6, 0x89ed, 0x0) select(0x40, &(0x7f0000000100)={0x80000001, 0x44, 0x7c00000000000, 0x8, 0x9, 0x40, 0x1, 0x8001}, &(0x7f0000000140)={0x1000, 0x7fffffff, 0x1, 0x5, 0x7, 0x2, 0x1ff, 0x4}, &(0x7f0000000180)={0x6, 0xa8, 0x4, 0x7fffffff, 0x6, 0x23, 0xfffffffffffffffc, 0x7}, &(0x7f00000001c0)) 08:35:17 executing program 2: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f00000001c0)={0x4, 0x2, 0x4, 0x100, 0x1, {0x77359400}, {0x1, 0x2, 0x7a, 0x1c, 0x7, 0x2, "b0a2f232"}, 0x10001, 0x2, @planes=&(0x7f0000000180)={0xa00, 0x200, @userptr=0xfffffffffffffffe, 0x3}, 0x7}) 08:35:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x12000000}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:17 executing program 3: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f00000001c0)={0x4, 0x2, 0x4, 0x100, 0x1, {0x77359400}, {0x1, 0x2, 0x7a, 0x1c, 0x7, 0x2, "b0a2f232"}, 0x10001, 0x2, @planes=&(0x7f0000000180)={0xa00, 0x200, @userptr=0xfffffffffffffffe, 0x3}, 0x7}) 08:35:17 executing program 5: clock_gettime(0xefbd8aa34c4cd931, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap$qrtrtun(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000001, 0x110, 0xffffffffffffffff, 0x2000e5) io_setup(0x63d, &(0x7f0000000000)=0x0) io_pgetevents(r0, 0x7fffffff, 0x4, &(0x7f0000000180)=[{}, {}, {}, {}], &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={&(0x7f0000000100), 0x1}) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200004}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x84}, 0x40000) 08:35:17 executing program 4: socketpair(0x1, 0x0, 0xfe000000, &(0x7f0000000040)) 08:35:17 executing program 3: clock_gettime(0xefbd8aa34c4cd931, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap$qrtrtun(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000001, 0x110, 0xffffffffffffffff, 0x2000e5) io_setup(0x63d, &(0x7f0000000000)=0x0) io_pgetevents(r0, 0x7fffffff, 0x4, &(0x7f0000000180)=[{}, {}, {}, {}], &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={&(0x7f0000000100), 0x1}) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200004}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x84}, 0x40000) 08:35:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x48000000}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:17 executing program 2: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f00000001c0)={0x4, 0x2, 0x4, 0x100, 0x1, {0x77359400}, {0x1, 0x2, 0x7a, 0x1c, 0x7, 0x2, "b0a2f232"}, 0x10001, 0x2, @planes=&(0x7f0000000180)={0xa00, 0x200, @userptr=0xfffffffffffffffe, 0x3}, 0x7}) 08:35:17 executing program 0: clock_gettime(0xefbd8aa30000000b, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000000)='mptcp_pm\x00') 08:35:17 executing program 4: socketpair(0x1, 0x0, 0xfe010000, &(0x7f0000000040)) 08:35:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x4c000000}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:17 executing program 2: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) socket$can_bcm(0x1d, 0x2, 0x2) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vim2m\x00', 0x2, 0x0) 08:35:17 executing program 3: io_pgetevents(0x0, 0x6, 0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)={&(0x7f0000000080)={[0x2]}, 0x8}) clock_gettime(0xefbd8aa34c4cd931, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qrtr-tun\x00', 0x200) mmap$qrtrtun(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xbad81e634337545c, r0, 0x0) 08:35:17 executing program 5: clock_gettime(0x1cb40f7d22393b9f, 0x0) io_setup(0xfff, &(0x7f0000000000)=0x0) io_getevents(r0, 0x7fff, 0x8, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000140)={0x77359400}) 08:35:17 executing program 0: socketpair(0x1, 0x0, 0x82010000, &(0x7f0000000040)) 08:35:17 executing program 4: socketpair(0x1, 0x0, 0xfeffffff, &(0x7f0000000040)) 08:35:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x68000000}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:17 executing program 3: io_pgetevents(0x0, 0x6, 0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)={&(0x7f0000000080)={[0x2]}, 0x8}) clock_gettime(0xefbd8aa34c4cd931, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qrtr-tun\x00', 0x200) mmap$qrtrtun(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xbad81e634337545c, r0, 0x0) 08:35:17 executing program 2: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) socket$can_bcm(0x1d, 0x2, 0x2) 08:35:17 executing program 0: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) socket$can_bcm(0x1d, 0x2, 0x2) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vim2m\x00', 0x2, 0x0) 08:35:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x6c000000}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:17 executing program 5: setreuid(0xffffffffffffffff, 0xffffffffffffffff) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x42000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) prctl$PR_SET_ENDIAN(0x14, 0x2) mmap$qrtrtun(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000001, 0x10, 0xffffffffffffffff, 0x5f37) clock_gettime(0xefbd8aa30000000b, 0x0) 08:35:17 executing program 3: io_pgetevents(0x0, 0x6, 0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)={&(0x7f0000000080)={[0x2]}, 0x8}) clock_gettime(0xefbd8aa34c4cd931, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qrtr-tun\x00', 0x200) mmap$qrtrtun(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xbad81e634337545c, r0, 0x0) 08:35:17 executing program 4: socketpair(0x1, 0x0, 0xff000000, &(0x7f0000000040)) 08:35:17 executing program 2: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:18 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x74000000}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:18 executing program 0: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) socket$can_bcm(0x1d, 0x2, 0x2) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vim2m\x00', 0x2, 0x0) 08:35:18 executing program 3: io_pgetevents(0x0, 0x6, 0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)={&(0x7f0000000080)={[0x2]}, 0x8}) clock_gettime(0xefbd8aa34c4cd931, 0x0) mmap$qrtrtun(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xbad81e634337545c, 0xffffffffffffffff, 0x0) 08:35:18 executing program 5: setreuid(0xffffffffffffffff, 0xffffffffffffffff) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x42000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) prctl$PR_SET_ENDIAN(0x14, 0x2) mmap$qrtrtun(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000001, 0x10, 0xffffffffffffffff, 0x5f37) clock_gettime(0xefbd8aa30000000b, 0x0) 08:35:18 executing program 2: clock_gettime(0x0, 0x0) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:18 executing program 4: socketpair(0x1, 0x0, 0xff010000, &(0x7f0000000040)) 08:35:18 executing program 2: clock_gettime(0x0, 0x0) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:18 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x7a000000}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:18 executing program 5: setreuid(0xffffffffffffffff, 0xffffffffffffffff) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x42000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) prctl$PR_SET_ENDIAN(0x14, 0x2) mmap$qrtrtun(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000001, 0x10, 0xffffffffffffffff, 0x5f37) clock_gettime(0xefbd8aa30000000b, 0x0) 08:35:18 executing program 4: socketpair(0x1, 0x0, 0xfffffffe, &(0x7f0000000040)) 08:35:18 executing program 3: io_pgetevents(0x0, 0x6, 0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)={&(0x7f0000000080)={[0x2]}, 0x8}) clock_gettime(0xefbd8aa34c4cd931, 0x0) mmap$qrtrtun(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xbad81e634337545c, 0xffffffffffffffff, 0x0) 08:35:18 executing program 0: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) socket$can_bcm(0x1d, 0x2, 0x2) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vim2m\x00', 0x2, 0x0) 08:35:18 executing program 2: clock_gettime(0x0, 0x0) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:18 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:18 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0xff0f0000}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:18 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)=0x5) 08:35:18 executing program 3: io_pgetevents(0x0, 0x6, 0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)={&(0x7f0000000080)={[0x2]}, 0x8}) clock_gettime(0xefbd8aa34c4cd931, 0x0) mmap$qrtrtun(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xbad81e634337545c, 0xffffffffffffffff, 0x0) 08:35:18 executing program 0: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) socket$can_bcm(0x1d, 0x2, 0x2) 08:35:18 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:18 executing program 3: io_pgetevents(0x0, 0x6, 0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)={&(0x7f0000000080)={[0x2]}, 0x8}) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qrtr-tun\x00', 0x200) mmap$qrtrtun(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xbad81e634337545c, r0, 0x0) 08:35:18 executing program 4: syz_genetlink_get_family_id$smc(&(0x7f0000000000)='SMC_PNETID\x00') socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) 08:35:18 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0xffffff00}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:18 executing program 0: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:18 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:18 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qrtr-tun\x00', 0x200) mmap$qrtrtun(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xbad81e634337545c, r0, 0x0) 08:35:18 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000000)={0xffffffffffffffff, r0}, 0xc) 08:35:18 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, 0x0, 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:18 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:18 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:18 executing program 0: clock_gettime(0x0, 0x0) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:18 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, 0x0, 0x200) mmap$qrtrtun(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xbad81e634337545c, r0, 0x0) 08:35:18 executing program 4: syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x7ff, 0x200000) 08:35:18 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, 0x0, 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:18 executing program 5: clock_gettime(0x0, 0x0) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:18 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:18 executing program 0: clock_gettime(0x0, 0x0) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:18 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, 0x0, 0x200) mmap$qrtrtun(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xbad81e634337545c, r0, 0x0) 08:35:18 executing program 4: socketpair(0x18, 0x804, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept4(r0, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000100)=0x80, 0x800) r2 = accept4(r1, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000001c0)=0x80, 0x80800) accept4(r0, 0x0, &(0x7f0000000040), 0x80800) bind$l2tp6(r2, &(0x7f0000000200)={0xa, 0x0, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1}, 0x20) getrusage(0xffffffffffffffff, &(0x7f0000000240)) 08:35:18 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, 0x0, 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:18 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0x3}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:19 executing program 5: clock_gettime(0x0, 0x0) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:19 executing program 0: clock_gettime(0x0, 0x0) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:19 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, 0x0, 0x200) mmap$qrtrtun(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xbad81e634337545c, r0, 0x0) 08:35:19 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x0) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:19 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0x4}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:19 executing program 5: clock_gettime(0x0, 0x0) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:19 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x408000, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) ioctl$SOUND_MIXER_WRITE_RECSRC(r0, 0xc0044dff, &(0x7f0000000000)=0xfed4) tkill(0x0, 0x36) 08:35:19 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:19 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qrtr-tun\x00', 0x0) mmap$qrtrtun(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xbad81e634337545c, r0, 0x0) 08:35:19 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x0) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:19 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:19 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0x5}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:19 executing program 4: ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000040)={0x2f, 0x1}) socketpair(0x1, 0x0, 0x0, &(0x7f0000000000)) 08:35:19 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qrtr-tun\x00', 0x0) mmap$qrtrtun(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) 08:35:19 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, 0x0, 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:19 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x0) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:19 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0x6}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:19 executing program 4: socketpair(0x2a, 0x2, 0x0, &(0x7f0000000040)) 08:35:19 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:19 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qrtr-tun\x00', 0x0) mmap$qrtrtun(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) 08:35:19 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, 0x0, 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:19 executing program 2: openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:19 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0x7}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:19 executing program 4: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000040)={0x5}, 0x8) socketpair(0x1, 0xf, 0xffffffff, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000000)=0xffffffffeaf19d92, 0x8) 08:35:19 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qrtr-tun\x00', 0x0) mmap$qrtrtun(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) 08:35:19 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:19 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, 0x0, 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:19 executing program 2: openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:19 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0x8}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:19 executing program 3: openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qrtr-tun\x00', 0x0) mmap$qrtrtun(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xbad81e634337545c, 0xffffffffffffffff, 0x0) 08:35:19 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000000)='#\x00', 0x2) 08:35:19 executing program 2: openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:19 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, 0x0, 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:19 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x0) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:19 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r1, &(0x7f0000000080)=@ax25={{}, [@netrom, @bcast, @rose, @remote, @null, @default, @remote, @bcast]}, &(0x7f0000000140)=0xfffffffffffffea9, 0x80000) r2 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000100)) 08:35:19 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0xa}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:19 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, 0x0, 0x0) 08:35:19 executing program 3: openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qrtr-tun\x00', 0x0) mmap$qrtrtun(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xbad81e634337545c, 0xffffffffffffffff, 0x0) 08:35:19 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, 0x0, 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:19 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='personality\x00') socketpair(0x26, 0x800, 0xfffff001, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$can_bcm(r1, &(0x7f00000001c0), 0x10) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000080)='mptcp_pm\x00') sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="00000000f5a8f38d618e0bd28c4a8fd9251a771345472a8c86d048dade26a9c0c04ccf4c97647b0f8f66d8acc696d42e073fdb8d13f0cc4be86d9fb8584515796d8b8d59c20a7f540a65df021d617bb3b88537a4b880cc8a", @ANYRES16=r2, @ANYBLOB="08002dbd7000fddbdf2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 08:35:19 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0x10}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:19 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x0) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:20 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, 0x0, 0x0) 08:35:20 executing program 3: openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qrtr-tun\x00', 0x0) mmap$qrtrtun(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xbad81e634337545c, 0xffffffffffffffff, 0x0) 08:35:20 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) socketpair(0x2c, 0x6a7354a8b64c5310, 0x2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x6c, r1, 0x8, 0x70bd2b, 0x25dfdbff, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast2}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @loopback}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x20}, @L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e24}]}, 0x6c}, 0x1, 0x0, 0x0, 0x1}, 0xc001) 08:35:20 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, 0x0, 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:20 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0x12}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:20 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x0) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:20 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, 0x0, 0x0) 08:35:20 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, 0x0, 0x0) 08:35:20 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x0) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:20 executing program 4: socketpair(0x2, 0x3, 0x8, &(0x7f0000000040)) 08:35:20 executing program 0: openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:20 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0x48}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:20 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) 08:35:20 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x0) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:20 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x0) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:20 executing program 0: openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:20 executing program 4: socketpair(0xa, 0x0, 0x0, &(0x7f0000000000)) 08:35:20 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0x4c}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:20 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) 08:35:20 executing program 0: openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:20 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, 0x0, 0x0) 08:35:20 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x0) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:20 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0x68}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:20 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, 0x0, 0x0) 08:35:20 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) 08:35:20 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, 0x0, 0x0) 08:35:20 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0x6c}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:20 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) 08:35:20 executing program 5: clock_gettime(0x0, 0x0) openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:20 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, 0x0, 0x0) 08:35:20 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, 0x0, 0x0) 08:35:20 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0x74}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:20 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:20 executing program 5: clock_gettime(0x0, 0x0) openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:20 executing program 3: write$qrtrtun(0xffffffffffffffff, 0x0, 0x0) 08:35:20 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0x7a}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) [ 3019.537117][T25322] qrtr: Invalid version 236 08:35:20 executing program 4: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) sendmsg$SMC_PNETID_ADD(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000125bd7000fedbdf250200000005000400010000000900030073797a310000000014000200726f7365300000000000000000000000050004000100000014000200626f6e643000000000000000000000000500040002000000060e841c2ba56b485f35874d075aec0a8883e28fe49b074aefc9d2dc03c5afcd1866c29b64ebf830ece7d66bbacb515297bea1bbb3a896d9aacf6f2c4b63c175973e7b80c9629c9322a1acc04f6de51c2abe8aa51561e80262a6805f5aad3fe69a56f985ec19d649620748fcdcf34c45444f97847d986500bb90e50a6eed4357ffb3d0efcce7e72a15b2b04aacb5699938f57236b2c5185181a84f65031f0fc0b4ebea55c3626ffabd490f2aab7bf9635472c006c247ba54ae03c6f8d3a60e490b0992cf5673e47a27670ab9c540145c1be4c0bb39e6aa20277fa859da6658833d2143f539b322d910617de4cbb10d"], 0x60}, 0x1, 0x0, 0x0, 0x4004000}, 0x8004) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl2\x00', 0x0, 0x4, 0x6f, 0x20, 0x9, 0x30, @local, @dev={0xfe, 0x80, [], 0x3a}, 0x8, 0x20, 0x80000001, 0x4}}) ioctl$sock_ifreq(r0, 0x8944, &(0x7f0000004f80)={'\x00', @ifru_addrs=@xdp={0x2c, 0x0, 0x0}}) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000005100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000050c0)={&(0x7f0000004fc0)={0xdc, 0x0, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x8}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r2}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @ipv4={[], [], @loopback}}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_ADDR={0x60, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x6}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast1}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x20}]}, @MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x20044040}, 0x2400c081) socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) 08:35:20 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, 0x0, 0x0) 08:35:20 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:21 executing program 3: write$qrtrtun(0xffffffffffffffff, 0x0, 0x0) 08:35:21 executing program 5: clock_gettime(0x0, 0x0) openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f99659de74f0c", 0xdf) 08:35:21 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000000)='@)\x00', 0x3) ioctl$PPPIOCATTCHAN(r0, 0x40047438, &(0x7f0000000080)=0x4) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f00000000c0)) [ 3019.709196][T25338] qrtr: Invalid version 236 08:35:21 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0x300}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:21 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) 08:35:21 executing program 3: write$qrtrtun(0xffffffffffffffff, 0x0, 0x0) 08:35:21 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:21 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, 0x0, 0x0) 08:35:21 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0x500}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) [ 3019.869556][T25350] qrtr: Invalid version 236 08:35:21 executing program 4: socketpair(0x8, 0x0, 0x6, &(0x7f0000000040)={0xffffffffffffffff}) socketpair(0x23, 0x2, 0x0, &(0x7f0000002340)) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r1, 0x891a, 0x0) getpeername$l2tp6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @private1}, &(0x7f0000000140)=0xfffffdd1) recvfrom$rxrpc(r0, &(0x7f0000000080)=""/140, 0x8c, 0x40002061, 0x0, 0x0) 08:35:21 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) 08:35:21 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, 0x0, 0x1) write$qrtrtun(r0, 0x0, 0x0) 08:35:21 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a31", 0xa8) 08:35:21 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, 0x0, 0x0) 08:35:21 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0x600}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:21 executing program 4: socket$kcm(0x29, 0x7, 0x0) socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) [ 3020.060052][T25367] qrtr: Invalid version 236 08:35:21 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) 08:35:21 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, 0x0, 0x1) write$qrtrtun(r0, 0x0, 0x0) 08:35:21 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, 0x0, 0x0) 08:35:21 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a31", 0xa8) 08:35:21 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0x700}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:21 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r1, 0x891a, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000080)={0x5, 0x1, 0x4, 0x2000, 0x9, {0x0, 0xea60}, {0x3, 0x8, 0x5, 0xff, 0x9, 0x9, "cc84bed8"}, 0x2, 0x4, @fd=r1, 0x6}) 08:35:21 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) [ 3020.241862][T25381] qrtr: Invalid version 236 08:35:21 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:21 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, 0x0, 0x1) write$qrtrtun(r0, 0x0, 0x0) 08:35:21 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a31", 0xa8) 08:35:21 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0xa00}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) [ 3020.334477][T25388] qrtr: Invalid version 236 08:35:21 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) 08:35:21 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = inotify_init1(0x800) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x4000000) 08:35:21 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x0) write$qrtrtun(r0, 0x0, 0x0) 08:35:21 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) [ 3020.448484][T25397] qrtr: Invalid version 236 08:35:21 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0x1200}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:21 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbb", 0xc4) 08:35:21 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) 08:35:21 executing program 4: socketpair(0x6, 0x0, 0x0, &(0x7f0000000040)) [ 3020.536408][T25407] qrtr: Invalid version 236 08:35:21 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x0) write$qrtrtun(r0, 0x0, 0x0) 08:35:21 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) [ 3020.593431][T25412] qrtr: Invalid version 236 08:35:22 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0x4800}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:22 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) accept4$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0x10, 0x0) 08:35:22 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:22 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbb", 0xc4) 08:35:22 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x0) write$qrtrtun(r0, 0x0, 0x0) [ 3020.699745][T25421] qrtr: Invalid version 236 08:35:22 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a31", 0xa8) 08:35:22 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0x4c00}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) [ 3020.770315][T25427] qrtr: Invalid version 236 08:35:22 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$l2tp6(r0, &(0x7f0000000000)="6a2b717481900847", 0x8, 0x80, &(0x7f0000000080)={0xa, 0x0, 0x1, @loopback, 0x2, 0x2}, 0x20) [ 3020.805258][T25429] qrtr: Invalid version 236 08:35:22 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:22 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbb", 0xc4) [ 3020.859865][T25433] qrtr: Invalid version 236 08:35:22 executing program 3: openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(0xffffffffffffffff, 0x0, 0x0) 08:35:22 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a31", 0xa8) [ 3020.913965][T25439] qrtr: Invalid version 236 08:35:22 executing program 4: ioctl$vim2m_VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000080)={0x7, 0x2, 0x4, 0x10, 0x2, {}, {0x3, 0x0, 0x2, 0x3, 0xbd, 0x6, "c32eb363"}, 0x7, 0x1, @userptr=0x8001, 0x0, 0x0, 0xffffffffffffffff}) ioctl$vim2m_VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000100)={0x6, 0x2, 0x4, 0x2000, 0x0, {}, {0x4, 0x1, 0x7, 0x8, 0x3f, 0xb9, "a2819bc6"}, 0x6, 0x1, @offset=0x6, 0x2, 0x0, r0}) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r1, 0x891a, 0x0) ioctl$PPPIOCSMRRU(r1, 0x4004743b, &(0x7f0000000000)) socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) iopl(0x0) 08:35:22 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0x6800}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:22 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) [ 3020.983907][T25444] qrtr: Invalid version 236 [ 3020.993103][T25445] qrtr: Invalid version 236 08:35:22 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f", 0xd2) 08:35:22 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a31", 0xa8) 08:35:22 executing program 3: openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(0xffffffffffffffff, 0x0, 0x0) [ 3021.089624][T25452] qrtr: Invalid version 236 08:35:22 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0x6c00}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:22 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getpeername$l2tp6(r0, &(0x7f0000000000), &(0x7f0000000080)=0x20) 08:35:22 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a31", 0xa8) [ 3021.171262][T25459] qrtr: Invalid version 236 08:35:22 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcf", 0xc5) 08:35:22 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbb", 0xc4) 08:35:22 executing program 3: openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(0xffffffffffffffff, 0x0, 0x0) 08:35:22 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$rxrpc(0x21, 0x2, 0x14) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000840)='!):\\@{\x00', 0x7) [ 3021.290457][T25466] qrtr: Invalid version 236 08:35:22 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0x7400}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) [ 3021.334608][T25471] qrtr: Invalid version 236 08:35:22 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc", 0xb8) 08:35:22 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a31", 0xa8) 08:35:22 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbb", 0xc4) 08:35:22 executing program 3: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:22 executing program 4: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0x6) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r1, 0x891a, 0x0) openat$cgroup_type(r1, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) 08:35:22 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0x7a00}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) [ 3021.467113][T25482] qrtr: Invalid version 236 [ 3021.473643][T25484] qrtr: Invalid version 236 [ 3021.489843][T25485] qrtr: Invalid version 236 [ 3021.515188][T25488] qrtr: Invalid version 236 08:35:22 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc", 0xb8) 08:35:22 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a31", 0xa8) 08:35:22 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbb", 0xc4) 08:35:22 executing program 3: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a31", 0xa8) 08:35:23 executing program 4: sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080029bd7000fcdbdf2501000000080002000600000024000180e1ff080003000000000008000600050000141800018014000400fc020000000000000000000000000000040001800800030003000000"], 0x64}, 0x1, 0x0, 0x0, 0x4804}, 0x4) socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) socketpair(0x8, 0x6, 0x1, &(0x7f00000001c0)) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) io_destroy(0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/ip6_mr_cache\x00') setsockopt$PNPIPE_HANDLE(r0, 0x113, 0x3, &(0x7f0000000180)=0x8000, 0x4) 08:35:23 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0xff0f}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) [ 3021.655788][T25495] qrtr: Invalid version 236 [ 3021.665481][T25498] qrtr: Invalid version 236 [ 3021.683843][T25499] qrtr: Invalid version 236 08:35:23 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc", 0xb8) [ 3021.710046][T25500] qrtr: Invalid version 236 08:35:23 executing program 3: socketpair(0x8, 0x0, 0x6, &(0x7f0000000040)={0xffffffffffffffff}) socketpair(0x23, 0x2, 0x0, &(0x7f0000002340)) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r1, 0x891a, 0x0) getpeername$l2tp6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @private1}, &(0x7f0000000140)=0xfffffdd1) recvfrom$rxrpc(r0, &(0x7f0000000080)=""/140, 0x8c, 0x40002061, 0x0, 0x0) 08:35:23 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbb", 0xc4) 08:35:23 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f", 0xd2) 08:35:23 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0xffffff}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) [ 3021.817348][T25509] qrtr: Invalid version 236 08:35:23 executing program 4: syz_genetlink_get_family_id$l2tp(&(0x7f0000000000)='l2tp\x00') socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) 08:35:23 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2", 0xbf) [ 3021.879388][T25513] qrtr: Invalid version 236 08:35:23 executing program 3: socketpair(0x8, 0x0, 0x6, &(0x7f0000000040)={0xffffffffffffffff}) socketpair(0x23, 0x2, 0x0, &(0x7f0000002340)) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r1, 0x891a, 0x0) getpeername$l2tp6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @private1}, &(0x7f0000000140)=0xfffffdd1) recvfrom$rxrpc(r0, &(0x7f0000000080)=""/140, 0x8c, 0x40002061, 0x0, 0x0) 08:35:23 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0x1000000}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:23 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbb", 0xc4) 08:35:23 executing program 4: socketpair(0x26, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000080)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r1, 0x400, 0x170bd26, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_DOI={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x40c4}, 0x4000094) 08:35:23 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcf", 0xc5) 08:35:23 executing program 3: socketpair(0x8, 0x0, 0x6, &(0x7f0000000040)={0xffffffffffffffff}) socketpair(0x23, 0x2, 0x0, &(0x7f0000002340)) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r1, 0x891a, 0x0) getpeername$l2tp6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @private1}, &(0x7f0000000140)=0xfffffdd1) recvfrom$rxrpc(r0, &(0x7f0000000080)=""/140, 0x8c, 0x40002061, 0x0, 0x0) [ 3022.066680][T25528] qrtr: Invalid version 236 08:35:23 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51", 0xb9) 08:35:23 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0x2000000}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:23 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbb", 0xc4) 08:35:23 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc", 0xb8) 08:35:23 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) bind$bt_sco(r0, &(0x7f0000000000)={0x1f, @fixed={[], 0x11}}, 0x8) 08:35:23 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0x3000000}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:23 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c43", 0xb3) [ 3022.236309][T25541] qrtr: Invalid version 236 08:35:23 executing program 3: socketpair(0x8, 0x0, 0x6, &(0x7f0000000040)) socketpair(0x23, 0x2, 0x0, &(0x7f0000002340)) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) getpeername$l2tp6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @private1}, &(0x7f0000000140)=0xfffffdd1) 08:35:23 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f", 0xd2) [ 3022.300936][T25545] qrtr: Invalid version 236 08:35:23 executing program 4: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000080)=@in6={0x21, 0x0, 0x2, 0x0, {0xa, 0x0, 0x0, @loopback}}, 0x24) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) socketpair(0x23, 0x4, 0x2, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs_stats\x00') sendto$rxrpc(r1, &(0x7f00000000c0)="4f7f067d4fa2efb22c8ba499f67d3076c9f0467138d350de5e81bfbdf13c4b63e7c01d70e4504d232f7bbff9c2c038b8cb204379242b3b4fe99522871b0422b997", 0x41, 0x10, &(0x7f0000000140)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x6, @empty}}, 0x24) 08:35:23 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0x4000000}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:23 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc", 0xb8) 08:35:23 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61", 0xad) 08:35:23 executing program 3: socketpair(0x8, 0x0, 0x6, &(0x7f0000000040)) socketpair(0x23, 0x2, 0x0, &(0x7f0000002340)) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) 08:35:23 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f", 0xd2) [ 3022.474981][T25560] qrtr: Invalid version 236 08:35:23 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0x5000000}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:23 executing program 4: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) accept$phonet_pipe(r0, &(0x7f00000000c0), &(0x7f0000000100)=0xfffffdbc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/vlan/vlan0\x00') accept$phonet_pipe(r1, 0x0, &(0x7f0000000140)=0x47) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) r3 = geteuid() r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCSMRU1(r4, 0x40047452, &(0x7f00000001c0)=0x6) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r0, 0xc0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0xfffffffffffffeb6, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x1, 0x2}, 0x0, 0x0, &(0x7f0000000280)={0x3, 0x2, 0x6, 0xfffff854}, &(0x7f00000002c0)=0x401, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)}}, 0x10) setreuid(0x0, r3) ioctl$sock_ifreq(r2, 0x891a, 0x0) ioctl$vim2m_VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000440)={0x1, 0x4, 0x6, 0x84000}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r2, 0xc01064b3, &(0x7f0000000080)) socketpair(0x32a96bb1be74ecc, 0x0, 0x3, &(0x7f0000000040)) 08:35:23 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a", 0xa7) 08:35:23 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc", 0xb8) 08:35:24 executing program 3: socketpair(0x8, 0x0, 0x6, &(0x7f0000000040)) socketpair(0x23, 0x2, 0x0, &(0x7f0000002340)) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) 08:35:24 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f", 0xd2) 08:35:24 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0x6000000}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) [ 3022.674783][T25575] qrtr: Invalid version 236 08:35:24 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x64, r0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_VLAN_ID={0x6}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x400}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e20}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x23}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x9}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0xdc}]}, 0x64}}, 0x20040080) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x14, r0, 0x200, 0x70bd2c, 0x25dfdbfd}, 0x14}}, 0x4c800) socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000000)={&(0x7f0000000080)="bf064e232abc938bc1d6986dea81f2eaa8117be0af4eda662662fd3dd5b3e567a9ca02839e8688189b179436543138baafdf0e4d09d48e7076e6097679b4cf7660a576b14b7738ace8ff1cc9afdd6e8a74c6b55eda5d3cc47214ea6bf672254dd3c9e60b17845579b6636637d8a572f70c617245021db6b085c5babc391ce4821502ec637b2ec9f9649aef3e295c1c1c91ec8c1f14e0263db4e3a0c793d2e2a61775668a0306bfb905294503469b91a49756cea2fa1b0d44c1843bb1a46c5bfba53a1401ae5a", &(0x7f0000000180)=""/93, &(0x7f0000000200)="5d57f2dbbfe119c264398eb5d97d67e36dcd7f4a5540090f7b9c9674b9e45f2b02b019ed6a0461f17424d19bea4d5a4c9fd1f80c6a4581f6b2e1dcb828adff5e81c8f6c072aedc6bfdb395c21b952c24b967b7eeaed5d16006cdca692aa5ce32ede610fcb0698565893d61961273336147467c0502c11b6183d62ee54b", &(0x7f0000000280)="637f2e6574be249f72c13c38f1ff3b576782d1b44de4e97924d3608b0bc99600bda37a783e2b7ee23e9d76a24d0dc6559b08984a46ddc42239228e41b0da2c5ef37428b254ce0be4cb9f46114375b1c0b7e95d826b3e269b1710eef54570bed776c301662c24fccec9b7936b190ba31248ccb123d0338f82985217285c5f0c38f8b905512b097cef2122987402048ff3a461c4e9a5c6c159891e8065c78f559843fddcfc004b2ea907876d4c377869f18e53491bbac312d2eb76a449854cb3feb5f94596be78e8bc124bc2b936c95af32cd7387e1455f3d3364b61bae3c5df", 0x2, 0x1}, 0x38) socket$rxrpc(0x21, 0x2, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=0x3ff, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x6, 0x4}, 0x0, 0x0, &(0x7f0000000480)={0x4, 0xf, 0x6, 0x2}, &(0x7f00000004c0)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=0x1ff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640)=r2, 0x4) r3 = accept4(r1, 0x0, &(0x7f0000000380), 0x80800) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f00000003c0)=0x2, 0x4) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f00000007c0)=""/64) 08:35:24 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb1", 0xa1) 08:35:24 executing program 3: socketpair(0x8, 0x0, 0x6, &(0x7f0000000040)) socketpair(0x23, 0x2, 0x0, &(0x7f0000002340)) 08:35:24 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2", 0xbf) 08:35:24 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64ee5b1c669d5f", 0xd9) 08:35:24 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0x7000000}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:24 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51", 0xb9) 08:35:24 executing program 4: ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000140)={0x18, 0x0, {0x2, @random="d4f4df2214c2", 'veth1_to_batadv\x00'}}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) socketpair(0x1, 0x0, 0x6, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f00000000c0)=0x2, 0x8) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x101081, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r2, 0x110, 0x4, &(0x7f0000000080), 0x4) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp1\x00', 0x4200, 0x0) 08:35:24 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730", 0x9b) 08:35:24 executing program 3: socketpair(0x23, 0x2, 0x0, &(0x7f0000002340)) 08:35:24 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64", 0xd3) 08:35:24 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0x8000000}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:24 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077", 0x95) 08:35:24 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c43", 0xb3) 08:35:24 executing program 3: socketpair(0x0, 0x2, 0x0, &(0x7f0000002340)) 08:35:24 executing program 4: openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x80200, 0x0) socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000000080)=0x1, 0x4) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[], 0xa4}, 0x1, 0x0, 0x0, 0x200008d4}, 0x8000) socketpair(0x1d, 0x5, 0x5, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f00000001c0)={0x18, 0x0, {0x1, @broadcast, 'virt_wifi0\x00'}}) 08:35:24 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64", 0xd3) 08:35:24 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d", 0x8f) 08:35:24 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0xa000000}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) [ 3023.203906][T25620] can: request_module (can-proto-5) failed. [ 3023.243849][T25624] can: request_module (can-proto-5) failed. 08:35:24 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61", 0xad) 08:35:24 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778cf1d117606f64", 0xd3) 08:35:24 executing program 3: socketpair(0x0, 0x2, 0x0, &(0x7f0000002340)) 08:35:24 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd", 0x89) 08:35:24 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp6\x00') ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000080)=0x5) socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) 08:35:24 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0x10000000}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:24 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a", 0xa7) 08:35:24 executing program 4: socketpair(0x25, 0x800, 0x2, &(0x7f0000000040)) ioctl$SOUND_OLD_MIXER_INFO(0xffffffffffffffff, 0x80304d65, &(0x7f0000000000)) 08:35:24 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a816d06caf778c", 0xcd) 08:35:24 executing program 3: socketpair(0x0, 0x2, 0x0, &(0x7f0000002340)) 08:35:24 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e", 0x83) 08:35:24 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0x12000000}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:24 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x40800, 0x0) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200100}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x4000041) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) 08:35:24 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb1", 0xa1) 08:35:25 executing program 3: socketpair(0x23, 0x0, 0x0, &(0x7f0000002340)) 08:35:25 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a8", 0xc7) 08:35:25 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd92", 0x7d) 08:35:25 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0x48000000}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:25 executing program 3: socketpair(0x23, 0x0, 0x0, &(0x7f0000002340)) 08:35:25 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) accept4(0xffffffffffffffff, &(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @remote}}, &(0x7f0000000000)=0x80, 0x81800) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x64, r1, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_VLAN_ID={0x6}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x400}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e20}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x23}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x9}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0xdc}]}, 0x64}}, 0x20040080) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r2, 0x891a, 0x0) ioctl$sock_ifreq(r2, 0x89b0, &(0x7f0000000300)={'veth0_to_bond\x00', @ifru_addrs=@rc={0x1f, @fixed}}) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, r1, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @loopback}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x20010000}, 0x44850) ioctl$vim2m_VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000080)={0x20af, 0x1, 0x4, 0x4000, 0x7fff, {0x0, 0x2710}, {0x5, 0x8, 0x0, 0x9, 0xf7, 0x7, "f0daed0c"}, 0x1, 0x2, @offset=0x9, 0x3}) 08:35:25 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730", 0x9b) 08:35:25 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982", 0x77) 08:35:25 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0x4c000000}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:25 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbbcff5a8", 0xc7) 08:35:25 executing program 4: socketpair(0x1d, 0x0, 0x1, &(0x7f0000000080)) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0xa00, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000140)=""/96, 0x60}, {&(0x7f00000001c0)=""/143, 0x8f}, {&(0x7f0000000280)=""/253, 0xfd}, {&(0x7f0000000040)=""/50, 0x32}], 0x4, &(0x7f00000003c0)=""/65, 0x41}, 0x40002120) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000004c0)=@buf={0x3a, &(0x7f0000000480)="198136414b87e2b8abe9d0d92b9602a9dea8e4d42acbdffe814f2aae2b971fa270248347100819efb0a19d854dfb337e098055edf9aced8d988c"}) ioctl$sock_ifreq(r0, 0x891a, 0x0) ioctl$EVIOCGABS0(r0, 0x80184540, &(0x7f0000000000)=""/7) 08:35:25 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077", 0x95) 08:35:25 executing program 3: socketpair(0x23, 0x0, 0x0, &(0x7f0000002340)) 08:35:25 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6ef", 0xc1) 08:35:25 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0x68000000}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:25 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61", 0x71) 08:35:25 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000000)={0xc023, 0x1}) bind$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e21, @rand_addr=0x64010101}}, 0x24) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x20700, 0x0) accept4$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0x2711, @host}, 0x10, 0x80000) 08:35:25 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d", 0x8f) 08:35:25 executing program 3: socketpair(0x23, 0x2, 0x0, 0x0) 08:35:25 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f", 0xbb) 08:35:25 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0x6c000000}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:25 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf", 0x6b) 08:35:25 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd", 0x89) 08:35:25 executing program 4: socketpair(0xddaee032834f4fda, 0x0, 0x7, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='ns\x00') syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x2, 0x10000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000140)={0x0, 0x0, r0, 0x3, 0x80000}) getpgrp(0xffffffffffffffff) ioctl$vim2m_VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f00000000c0)={0x1, 0x9, 0x80000001, 0x4000, r2}) 08:35:25 executing program 3: socketpair(0x23, 0x2, 0x0, 0x0) 08:35:25 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0x74000000}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:25 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f", 0xbb) 08:35:25 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b", 0x65) 08:35:25 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e", 0x83) 08:35:25 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000000)=0x4) 08:35:25 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0x7a000000}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:25 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b", 0x5f) 08:35:25 executing program 3: socketpair(0x23, 0x2, 0x0, 0x0) 08:35:25 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1", 0xb5) 08:35:25 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd92", 0x7d) 08:35:25 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0xff0f0000}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:25 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) prctl$PR_SET_ENDIAN(0x14, 0x0) 08:35:25 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a6387", 0x59) 08:35:25 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf", 0x6b) 08:35:26 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf614307", 0xaf) 08:35:26 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0xffffff00}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:26 executing program 4: openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) socketpair(0x27, 0x0, 0x0, &(0x7f0000000040)) 08:35:26 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982", 0x77) 08:35:26 executing program 3: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) accept4(0xffffffffffffffff, &(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @remote}}, &(0x7f0000000000)=0x80, 0x81800) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x64, r1, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_VLAN_ID={0x6}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x400}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e20}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x23}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x9}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0xdc}]}, 0x64}}, 0x20040080) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r2, 0x891a, 0x0) ioctl$sock_ifreq(r2, 0x89b0, &(0x7f0000000300)={'veth0_to_bond\x00', @ifru_addrs=@rc={0x1f, @fixed}}) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, r1, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @loopback}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x20010000}, 0x44850) ioctl$vim2m_VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000080)={0x20af, 0x1, 0x4, 0x4000, 0x7fff, {0x0, 0x2710}, {0x5, 0x8, 0x0, 0x9, 0xf7, 0x7, "f0daed0c"}, 0x1, 0x2, @offset=0x9, 0x3}) 08:35:26 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364", 0x53) 08:35:26 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:26 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313a", 0xa9) 08:35:26 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61", 0x71) 08:35:26 executing program 4: socketpair(0x1, 0x80000, 0x57, &(0x7f0000000040)) 08:35:26 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e", 0xa3) 08:35:26 executing program 3: ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000140)={0x18, 0x0, {0x2, @random="d4f4df2214c2", 'veth1_to_batadv\x00'}}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) socketpair(0x1, 0x0, 0x6, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f00000000c0)=0x2, 0x8) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x101081, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r2, 0x110, 0x4, &(0x7f0000000080), 0x4) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp1\x00', 0x4200, 0x0) 08:35:26 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9ea", 0x4d) 08:35:26 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}, {0x2}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:26 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109", 0x9d) 08:35:26 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf", 0x6b) 08:35:26 executing program 4: connect$can_bcm(0xffffffffffffffff, &(0x7f0000000180), 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000001140)={'ip6tnl0\x00', &(0x7f00000010c0)={'ip6tnl0\x00', 0x0, 0x4, 0x7, 0x2, 0x6, 0x48, @loopback, @remote, 0x20, 0x7, 0x4, 0x5}}) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f00000012c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001280)={&(0x7f0000000080)=ANY=[@ANYBLOB="d4000000", @ANYRES16=0x0, @ANYBLOB="010229bd7000fddbdf250100000008000300060000001c00018008000700", @ANYRES32=r0, @ANYBLOB="060005c50100000000000000", @ANYRES32=0x0, @ANYBLOB="080003000700000030000180080006000200000008000700", @ANYRES32=0x0, @ANYBLOB="14000400ff010000000000000000000000000001060005004e22000008000300f6ff00000800030001f617a7730ce684744eb52800000008000300060000004c000180060005004e2000000800060003000000140004002001000000000000000000000000000014000400fe800034060005004e20000005000200"/139], 0xd4}, 0x1, 0x0, 0x0, 0x82}, 0x20000804) socketpair(0x1f, 0x0, 0x0, &(0x7f0000000040)) 08:35:26 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d1", 0x47) 08:35:26 executing program 3: ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000140)={0x18, 0x0, {0x2, @random="d4f4df2214c2", 'veth1_to_batadv\x00'}}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) socketpair(0x1, 0x0, 0x6, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f00000000c0)=0x2, 0x8) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x101081, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r2, 0x110, 0x4, &(0x7f0000000080), 0x4) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp1\x00', 0x4200, 0x0) 08:35:26 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}, {0x3}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:26 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df0776737", 0x97) 08:35:26 executing program 4: pselect6(0x40, &(0x7f0000000000)={0xffffffff, 0x8, 0x0, 0x3, 0x6, 0x9, 0x1}, &(0x7f0000000080)={0x0, 0x0, 0x1, 0x8, 0x4, 0x8, 0x2, 0x8}, &(0x7f00000000c0)={0x3f, 0x543e, 0x7f, 0x40, 0x6, 0x401, 0x1000, 0x1}, &(0x7f0000000100)={0x0, 0x989680}, &(0x7f0000000180)={&(0x7f0000000140)={[0xfffffffffffffffa]}, 0x8}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000200)={0x5, &(0x7f00000001c0)=[{0x5, 0x7c, 0x0, 0x6}, {0x3, 0x2, 0x6, 0xfffffffe}, {0x8, 0x1, 0x0, 0x1}, {0x81, 0x7, 0x29, 0x4}, {0x1041, 0x0, 0x7f, 0x80000000}]}) socketpair(0x1, 0x80000, 0x0, &(0x7f0000000040)) 08:35:26 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b", 0x65) 08:35:26 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0", 0x41) 08:35:26 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}, {0x4}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:26 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2b", 0x91) 08:35:26 executing program 3: ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000140)={0x18, 0x0, {0x2, @random="d4f4df2214c2", 'veth1_to_batadv\x00'}}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) socketpair(0x1, 0x0, 0x6, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f00000000c0)=0x2, 0x8) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x101081, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r2, 0x110, 0x4, &(0x7f0000000080), 0x4) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp1\x00', 0x4200, 0x0) 08:35:26 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6f", 0x3b) 08:35:26 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000000)={0x18, 0x0, {0x1, @random="f6145f14a813", 'ip6erspan0\x00'}}) 08:35:26 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}, {0x5}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:26 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c8", 0x8b) 08:35:26 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b", 0x5f) 08:35:26 executing program 3: ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000140)={0x18, 0x0, {0x2, @random="d4f4df2214c2", 'veth1_to_batadv\x00'}}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) socketpair(0x1, 0x0, 0x6, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f00000000c0)=0x2, 0x8) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x101081, 0x0) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp1\x00', 0x4200, 0x0) 08:35:26 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e20", 0x35) 08:35:26 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$phonet_pipe(0x23, 0x5, 0x2) accept4$phonet_pipe(r0, &(0x7f0000000000), &(0x7f0000000080)=0x10, 0x80000) 08:35:26 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}, {0x6}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:26 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a6387", 0x59) 08:35:26 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c8", 0x8b) 08:35:27 executing program 3: ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000140)={0x18, 0x0, {0x2, @random="d4f4df2214c2", 'veth1_to_batadv\x00'}}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) socketpair(0x1, 0x0, 0x6, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f00000000c0)=0x2, 0x8) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp1\x00', 0x4200, 0x0) 08:35:27 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0", 0x2f) 08:35:27 executing program 4: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x212800, 0x0) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000080)) socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) 08:35:27 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e0", 0x85) 08:35:27 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364", 0x53) 08:35:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}, {0x7}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:27 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a", 0x29) 08:35:27 executing program 3: ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000140)={0x18, 0x0, {0x2, @random="d4f4df2214c2", 'veth1_to_batadv\x00'}}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) socketpair(0x1, 0x0, 0x6, &(0x7f0000000040)) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp1\x00', 0x4200, 0x0) 08:35:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}, {0x8}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:27 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000ffe0"], &(0x7f00000001c0)=""/159, 0x150, 0x9f, 0x1}, 0x20) sendmsg$MPTCP_PM_CMD_GET_ADDR(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="c0000000", @ANYRES16=0x0, @ANYBLOB="00439aa7a518a4012cdf250300000040000180080007000b9b50a6af23b327442751f403374dc6a4910000000000", @ANYRES32=0x0, @ANYRESHEX=r0, @ANYRES32=0x0, @ANYBLOB="14000400fc01000000000000000000000000000108000300ac1414bb080002000300000008000200050000001c00018008000700", @ANYRES32=0x0, @ANYBLOB="060005004e20000006000100020000000400018008000200020000003400018008000700", @ANYRES32=0x0, @ANYBLOB="08000600060000000500020009000000050002004000000008000600000000000500020001000000"], 0xc0}, 0x1, 0x0, 0x0, 0x884}, 0x60004010) getrandom(&(0x7f00000002c0)=""/251, 0xfb, 0x2) socket$l2tp6(0xa, 0x2, 0x73) 08:35:27 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd926130", 0x7f) 08:35:27 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9ea", 0x4d) 08:35:27 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d6", 0x23) 08:35:27 executing program 4: socketpair(0x6, 0x0, 0x8000000, &(0x7f0000000040)) openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x800) 08:35:27 executing program 3: ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000140)={0x18, 0x0, {0x2, @random="d4f4df2214c2", 'veth1_to_batadv\x00'}}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp1\x00', 0x4200, 0x0) 08:35:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}, {0xa}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:27 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d19827173", 0x79) 08:35:27 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d1", 0x47) 08:35:27 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cd", 0x1d) 08:35:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}, {0x10}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:27 executing program 4: r0 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@phonet, &(0x7f00000000c0)=0x80, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, 0x0, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @rand_addr=0x64010101}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @local}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x11}, 0x4008081) socketpair(0x1, 0x0, 0x0, &(0x7f0000000000)) 08:35:27 executing program 3: ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000140)={0x18, 0x0, {0x2, @random="d4f4df2214c2", 'veth1_to_batadv\x00'}}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000040)) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp1\x00', 0x4200, 0x0) 08:35:27 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a", 0x73) 08:35:27 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0", 0x41) 08:35:27 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158", 0x17) 08:35:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}, {0x12}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:27 executing program 4: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) recvmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/11, 0xb}, {&(0x7f0000000080)=""/27, 0x1b}], 0x2, &(0x7f0000000100)=""/92, 0x5c}, 0x22) socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) 08:35:27 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e163", 0x11) 08:35:27 executing program 3: ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000140)={0x18, 0x0, {0x2, @random="d4f4df2214c2", 'veth1_to_batadv\x00'}}) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp1\x00', 0x4200, 0x0) 08:35:27 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6f", 0x3b) 08:35:27 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f7", 0x6d) 08:35:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}, {0x48}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:27 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/rt_acct\x00') ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'team0\x00', @ifru_mtu}}) 08:35:27 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbf", 0xb) 08:35:27 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7", 0x67) 08:35:27 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e20", 0x35) 08:35:27 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e2", 0x5) 08:35:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}, {0x4c}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:28 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) select(0x40, &(0x7f0000000100)={0x6, 0xdbf, 0x1, 0x8001, 0x9, 0xfffffffffffff5e7, 0x1, 0xfffffffffffffffd}, &(0x7f0000000140)={0x3, 0x7f, 0x9, 0x16, 0x100000001, 0x2, 0x3, 0x6}, &(0x7f0000000180)={0x2, 0x2, 0x2, 0x4, 0x0, 0x7ff, 0x7, 0x8}, &(0x7f00000001c0)={0x77359400}) getpriority(0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x8402) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000080)=""/124) recvmsg$kcm(r0, &(0x7f0000000c80)={&(0x7f0000000940)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f00000009c0)=""/154, 0x9a}, {&(0x7f0000000480)=""/191, 0xbf}], 0x2, &(0x7f0000000b80)=""/185, 0xb9}, 0x20) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000d00)='l2tp\x00') r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r4, 0x891a, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000e00)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000dc0)={&(0x7f0000000200)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01002abd7000fbdbdf250400000008000900000000000c001000010000000000000006001d00b205000006001d00000000000500070003000000050012000600000014001f00fe8000000000000000000000000000aa08001700", @ANYRES32=r4, @ANYBLOB="7e4c0a50f39e3394425bde977f4aa74560bb0212d5483c3617cf00b9279fe600feb0435e084cfe2f9f4304d33138d9b5a7c0154a2cb8813a941771684dff308d45f096a797f10394536824ce9955788c0bba4642bfd91b1229d2475c61b006d18818e698091fb9b47f8d52271129aafaf8004e6504ca3c546f5e4053547b68d67a55e11b3c583aec6baca22dcfda070000004a31b790b45f2c8263947caa1e1180e056502aac1bf257effc9e2ce1df2c2af916096c38987d88804dee4c08ea4fc085c72abe6821c646d2a89a07a95f34e9c32c8b1f1975a668d651afd02124082cca8ef3c55dae45a740f94c7de7459cc73eee348492631bf7351d1abec51ccce6da7f7f4057195e8018a852ac32c971d2ab77b778fe3b295c397791c4cecb752bbb3411b42dd29c2324d236149cbdd62daa16e51d9c1eefaf4f3393d7598a1b9a0c13f0fdb6986dfecaa4fda12606cfc39e6411b067c7ae19835b29b33bf5ac7f8509e57eb51048a7e96245c454e4cdf30bb52f2bf4b3b1b7d910a43d370b70fc61209ffab87b8613b492201b334b1600a93e0fbca0498836dad2717c6224c7a37276887f27cd20caac380c832bbc0351692771903afecd500cb1f2af04a7222046657a4911527fe0615cb351a1f80198672a54ed0a1be779416d4e225840aeae637813e18d7a9d6e2d0b9cf9a1b662ebc4445ba7e718bf37f19a43406e0d5cf9b00e41b816fe8bfe5ecca9796455be0712ad0000000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x26000801}, 0x4000) 08:35:28 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0", 0x2f) 08:35:28 executing program 3: openat$dsp1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp1\x00', 0x4200, 0x0) 08:35:28 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31", 0x61) 08:35:28 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd", 0x2) 08:35:28 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a", 0x29) 08:35:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}, {0x68}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:28 executing program 4: socketpair(0x1, 0x0, 0x100000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000080), 0x8) socket$pppoe(0x18, 0x1, 0x0) 08:35:28 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd", 0x5b) 08:35:28 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d6", 0x23) 08:35:28 executing program 3: openat$dsp1(0xffffffffffffff9c, 0x0, 0x4200, 0x0) 08:35:28 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ec", 0x1) 08:35:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}, {0x6c}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:28 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a", 0x55) 08:35:28 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cd", 0x1d) 08:35:28 executing program 3: openat$dsp1(0xffffffffffffff9c, 0x0, 0x4200, 0x0) 08:35:28 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) inotify_init() 08:35:28 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) 08:35:28 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a", 0x55) 08:35:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}, {0x74}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:28 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) ptrace$setregs(0xd, 0x0, 0x10000, &(0x7f0000000080)="fe956699d2967e381c43e16c20ed955b56edcabb2311a90fb2893aa3a62f53224dab25049c35df0e683c3666c12e063a7b096b4e7cad7b0b83c0dd59b718f63f1d5473182bf1b86acd7eebf92737150c65ca7b692d048e04616bfd89505b19f0c89f764d7ab6d53f5d5c3e445741456717dc97ad510a08a4dcde52407ef0528b63d0d9a6bb2b3a3c3da53bac2bd149114ea82e0a64aa1b7dd4857fc547add41997c05ebfe721f935987dca6570e8ffb89368dc3a52a503efbe8c49741b49b8c3a076401dcf6e6dd8494e16af99cb5a6f67cfaad42c6261a5a85946dce418533f216db6cbd5ccc1c29478813c419aff333f7548a2e574") 08:35:28 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) 08:35:28 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158", 0x17) 08:35:28 executing program 3: openat$dsp1(0xffffffffffffff9c, 0x0, 0x4200, 0x0) 08:35:28 executing program 4: r0 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f00000000c0)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_ADD(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r0, 0x1, 0x70bd25, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}]}, 0x1c}}, 0x1) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f00000036c0)={'syztnl0\x00', &(0x7f0000003640)={'ip6gre0\x00', 0x0, 0x4, 0x2, 0x7f, 0x3, 0x25, @private0, @local, 0x8, 0x7, 0x7, 0x5}}) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f00000037c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000003780)={&(0x7f0000003700)={0x44, 0x0, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x14, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x1}, 0x0) socketpair(0x1, 0xa, 0xfffffffc, &(0x7f0000000040)) socket$inet6_udp(0xa, 0x2, 0x0) 08:35:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}, {0x7a}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:28 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a", 0x4f) 08:35:28 executing program 3: openat$dsp1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp1\x00', 0x0, 0x0) 08:35:28 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e163", 0x11) 08:35:28 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) 08:35:28 executing program 4: socketpair(0xb, 0x1, 0x0, &(0x7f0000000040)) 08:35:28 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2", 0x49) 08:35:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:28 executing program 2: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) select(0x40, &(0x7f0000000100)={0x6, 0xdbf, 0x1, 0x8001, 0x9, 0xfffffffffffff5e7, 0x1, 0xfffffffffffffffd}, &(0x7f0000000140)={0x3, 0x7f, 0x9, 0x16, 0x100000001, 0x2, 0x3, 0x6}, &(0x7f0000000180)={0x2, 0x2, 0x2, 0x4, 0x0, 0x7ff, 0x7, 0x8}, &(0x7f00000001c0)={0x77359400}) getpriority(0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x8402) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000080)=""/124) recvmsg$kcm(r0, &(0x7f0000000c80)={&(0x7f0000000940)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f00000009c0)=""/154, 0x9a}, {&(0x7f0000000480)=""/191, 0xbf}], 0x2, &(0x7f0000000b80)=""/185, 0xb9}, 0x20) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000d00)='l2tp\x00') r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r4, 0x891a, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000e00)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000dc0)={&(0x7f0000000200)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01002abd7000fbdbdf250400000008000900000000000c001000010000000000000006001d00b205000006001d00000000000500070003000000050012000600000014001f00fe8000000000000000000000000000aa08001700", @ANYRES32=r4, @ANYBLOB="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"], 0x64}, 0x1, 0x0, 0x0, 0x26000801}, 0x4000) 08:35:28 executing program 3: openat$dsp1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp1\x00', 0x0, 0x0) 08:35:28 executing program 4: sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="4c00000042ede2db7d5bcffc6ae640750b180d104c23a1236d73b80444131573", @ANYRES16, @ANYRES16], 0x4c}, 0x1, 0x0, 0x0, 0x20048880}, 0x4000014) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) connect$vsock_stream(r0, &(0x7f0000000180)={0x28, 0x0, 0xffffffff, @host}, 0x10) 08:35:28 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbf", 0xb) 08:35:28 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb08828", 0x43) 08:35:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}, {0x0, [], 0x2}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:29 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e2", 0x5) 08:35:29 executing program 3: openat$dsp1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp1\x00', 0x0, 0x0) 08:35:29 executing program 2: ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000140)={0x18, 0x0, {0x2, @random="d4f4df2214c2", 'veth1_to_batadv\x00'}}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000040)) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp1\x00', 0x4200, 0x0) 08:35:29 executing program 4: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xf1142d614da73e1a}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x100, 0x70bd29, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x44000) socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) 08:35:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}, {0x0, [], 0x3}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:29 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b", 0x3d) 08:35:29 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf", 0x6b) 08:35:29 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd", 0x2) 08:35:29 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000080)=@in6={0x21, 0x0, 0x2, 0x0, {0xa, 0x0, 0x0, @loopback}}, 0x24) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) socketpair(0x23, 0x4, 0x2, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs_stats\x00') sendto$rxrpc(r1, &(0x7f00000000c0)="4f7f067d4fa2efb22c8ba499f67d3076c9f0467138d350de5e81bfbdf13c4b63e7c01d70e4504d232f7bbff9c2c038b8cb204379242b3b4fe99522871b0422b997", 0x41, 0x10, &(0x7f0000000140)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x6, @empty}}, 0x24) 08:35:29 executing program 4: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000080)='mptcp_pm\x00') bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={0x1, &(0x7f00000001c0)="55bf5909822d4a90c7fbff4a75587c49820541a3d1614b116fc0131580054361304dd00158fe49f6626e759d0ac52709becc67e4d15912db9966bb0840418cc71ede5d1c697ce32aa53a189e441e1acb1bbfadcfac3b075fde45f7ccd35c6e03bc2ffc757766016ab371505265e5713ce8af1f44ae6b46722f6f62a89f855a31eb774b60d466cf4906373f7b5f49aba46b12bbaf2db7274e0ec278962dbd544ffcec7f03cdfd63b69e88809b29cf1262c32de1ae7cc348b701e2250027acd800c021652267d54d0a5384cf4c08d97882c85d618c5c50e0d832b58653", &(0x7f0000000840)=""/4096, 0x4}, 0x20) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000128bd70c1fcdbdf2503000000280001801400040000000000000000000000ffffe0000002060005004e20000008000600040000000c00018008000700", @ANYRES32=0x0, @ANYBLOB="08000300020000001400018005000200fd000000080003006401010208000200020000000800030006000000"], 0x74}, 0x1, 0x0, 0x0, 0x8080}, 0x8040) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r2, 0x891a, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000400)={&(0x7f0000000300), 0x10, &(0x7f00000003c0)={&(0x7f0000000340)={0x6, 0x8, 0x5, {0x77359400}, {0x0, 0x2710}, {0x3, 0x1, 0x0, 0x1}, 0x1, @canfd={{0x3, 0x0, 0x1}, 0x31, 0x0, 0x0, 0x0, "e84a0f3465f918882c068f3c56fc672471f50fcfaa8e097effe6b7d7ba98c701767298c9f91be87a7c4946d7e753f580068c80840d21f3d054d75e5600ed3d1b"}}, 0x80}, 0x1, 0x0, 0x0, 0x24040080}, 0x40) socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) 08:35:29 executing program 2: ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000140)={0x18, 0x0, {0x2, @random="d4f4df2214c2", 'veth1_to_batadv\x00'}}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000040)) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp1\x00', 0x4200, 0x0) 08:35:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}, {0x0, [], 0x4}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:29 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e", 0x37) 08:35:29 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ec", 0x1) 08:35:29 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000080)=@in6={0x21, 0x0, 0x2, 0x0, {0xa, 0x0, 0x0, @loopback}}, 0x24) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) socketpair(0x23, 0x4, 0x2, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs_stats\x00') sendto$rxrpc(r1, &(0x7f00000000c0)="4f7f067d4fa2efb22c8ba499f67d3076c9f0467138d350de5e81bfbdf13c4b63e7c01d70e4504d232f7bbff9c2c038b8cb204379242b3b4fe99522871b0422b997", 0x41, 0x10, &(0x7f0000000140)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x6, @empty}}, 0x24) 08:35:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}, {0x0, [], 0x5}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:29 executing program 4: socketpair(0x2b, 0x3, 0x0, &(0x7f0000000000)) 08:35:29 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d09337", 0x31) 08:35:29 executing program 2: ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000140)={0x18, 0x0, {0x2, @random="d4f4df2214c2", 'veth1_to_batadv\x00'}}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000040)) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp1\x00', 0x4200, 0x0) 08:35:29 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) 08:35:29 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000080)=@in6={0x21, 0x0, 0x2, 0x0, {0xa, 0x0, 0x0, @loopback}}, 0x24) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) socketpair(0x23, 0x4, 0x2, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs_stats\x00') sendto$rxrpc(r1, &(0x7f00000000c0)="4f7f067d4fa2efb22c8ba499f67d3076c9f0467138d350de5e81bfbdf13c4b63e7c01d70e4504d232f7bbff9c2c038b8cb204379242b3b4fe99522871b0422b997", 0x41, 0x10, &(0x7f0000000140)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x6, @empty}}, 0x24) 08:35:29 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={0xffffffffffffffff}, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/nfsfs\x00') ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28, &(0x7f0000000080)}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000140)=0xdc9, 0x8) 08:35:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}, {0x0, [], 0x6}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:29 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607c", 0x2b) 08:35:29 executing program 2: ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000140)={0x18, 0x0, {0x2, @random="d4f4df2214c2", 'veth1_to_batadv\x00'}}) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp1\x00', 0x4200, 0x0) 08:35:29 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) 08:35:29 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000080)=@in6={0x21, 0x0, 0x2, 0x0, {0xa, 0x0, 0x0, @loopback}}, 0x24) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) socketpair(0x23, 0x4, 0x2, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs_stats\x00') 08:35:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}, {0x0, [], 0x7}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:29 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x82, 0x0) recvfrom$rxrpc(r0, &(0x7f0000000080)=""/7, 0x7, 0x2021, &(0x7f00000000c0)=@in6={0x21, 0x1, 0x2, 0xa1, {0xa, 0x4e23, 0x9, @empty, 0x6}}, 0x24) 08:35:29 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15", 0x25) 08:35:29 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000080)=@in6={0x21, 0x0, 0x2, 0x0, {0xa, 0x0, 0x0, @loopback}}, 0x24) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) socketpair(0x23, 0x4, 0x2, &(0x7f0000000040)) 08:35:29 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) 08:35:29 executing program 2: openat$dsp1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp1\x00', 0x4200, 0x0) 08:35:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}, {0x0, [], 0x8}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:30 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NLBL_CALIPSO_C_LISTALL(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x4, 0x70bd2a, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) 08:35:30 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000080)=@in6={0x21, 0x0, 0x2, 0x0, {0xa, 0x0, 0x0, @loopback}}, 0x24) socketpair(0x23, 0x4, 0x2, &(0x7f0000000040)) 08:35:30 executing program 2: openat$dsp1(0xffffffffffffff9c, 0x0, 0x4200, 0x0) 08:35:30 executing program 0: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607c", 0x2b) 08:35:30 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda051", 0x1f) 08:35:30 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}, {0x0, [], 0xa}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:30 executing program 2: openat$dsp1(0xffffffffffffff9c, 0x0, 0x4200, 0x0) 08:35:30 executing program 4: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x200040, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000180)={0x0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r1, &(0x7f0000000200)="8db1bfe789e8f360405d9a855c267ea9f952825a4259ed312beb78a9c02fb505fdf07c6709b5fed31ddf48dce33a58e59e39c0a201b1942bd58fa7131238c6ea8ab70f0e12ceb2723dd2c6f587257cc2ba746cfde3afd7c2df5a08ae77ef24a5bf04f2675a576545d87fd88dfcd530b243864fc6991265c0d1f307746ec49475beacfae9dc36c2e7c9cc9fc61395a568e31f1cb287f4f8c3a309fa54419fd1609e62ef2b6453f70faa894f1caa1001100325aadebcb62b46daf52c8ae424ce276cc68e033085c3"}, 0x20) r3 = accept4$tipc(0xffffffffffffffff, &(0x7f0000000080)=@name, &(0x7f00000000c0)=0x10, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r2, 0x0, r3, 0x100}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x4, 0x2, 0x8d, 0xe557, 0xa27, r1, 0x7, [], 0x0, r0, 0x1, 0x3, 0x4}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r4, &(0x7f0000000300)="5104a4ac", &(0x7f0000000340)=""/238}, 0x20) 08:35:30 executing program 3: socket$rxrpc(0x21, 0x2, 0x2) socketpair(0x23, 0x4, 0x2, &(0x7f0000000040)) 08:35:30 executing program 0: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbb", 0xc4) 08:35:30 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe38", 0x19) 08:35:30 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}, {0x0, [], 0x10}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:30 executing program 2: openat$dsp1(0xffffffffffffff9c, 0x0, 0x4200, 0x0) 08:35:30 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x4) [ 3028.957602][T26108] qrtr: Invalid version 236 08:35:30 executing program 3: socketpair(0x23, 0x4, 0x2, &(0x7f0000000040)) 08:35:30 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}, {0x0, [], 0x12}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:30 executing program 0: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbb", 0xc4) 08:35:30 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4", 0x13) 08:35:30 executing program 2: openat$dsp1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp1\x00', 0x0, 0x0) 08:35:30 executing program 4: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x40883, 0x0) socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000080)='/dev/udmabuf\x00', 0x2) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x8991, 0x0) ioctl$UDMABUF_CREATE_LIST(r1, 0x40087543, &(0x7f00000000c0)={0x1, 0x1, [{r2, 0x0, 0x1000, 0x1000}]}) 08:35:30 executing program 3: socketpair(0x0, 0x4, 0x2, &(0x7f0000000040)) [ 3029.115928][T26122] qrtr: Invalid version 236 08:35:30 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4", 0x13) 08:35:30 executing program 0: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbb", 0xc4) 08:35:30 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}, {0x0, [], 0x48}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:30 executing program 3: socketpair(0x0, 0x4, 0x2, &(0x7f0000000040)) 08:35:30 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$NLBL_CALIPSO_C_LISTALL(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, 0x0, 0x20, 0x70bd2b, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004001}, 0x4028890) 08:35:30 executing program 2: openat$dsp1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp1\x00', 0x0, 0x0) [ 3029.278341][T26135] qrtr: Invalid version 236 08:35:30 executing program 0: clock_gettime(0x0, 0x0) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbb", 0xc4) 08:35:30 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36a", 0xd) 08:35:30 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}, {0x0, [], 0x4c}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:30 executing program 2: openat$dsp1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp1\x00', 0x0, 0x0) 08:35:30 executing program 3: socketpair(0x0, 0x4, 0x2, &(0x7f0000000040)) 08:35:30 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = accept$phonet_pipe(r0, 0x0, &(0x7f0000000000)) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x202001, 0x0) ioctl$PPPIOCSACTIVE(r2, 0x40107446, &(0x7f00000002c0)={0x8, &(0x7f0000000280)=[{0x800, 0x20, 0x6, 0xef}, {0x0, 0x3, 0x9, 0x8}, {0xff, 0x3, 0x2, 0x8001}, {0x7, 0x1, 0x5, 0xfffffff9}, {0x3, 0x1, 0x6, 0x2}, {0x7fff, 0x1, 0x3b, 0xfc00000}, {0x8, 0xfe, 0x6, 0xde76}, {0x0, 0x81, 0xea, 0x69b}]}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) r3 = accept4(r0, 0x0, &(0x7f0000000200), 0x80000) ioctl$sock_ifreq(r3, 0x891d, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='gid_map\x00') r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r4, 0x891a, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x4000, 0x0) r5 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) getpeername$l2tp6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000380)=0x20) ioctl$sock_ifreq(r5, 0x891a, 0x0) ioctl$SOUND_MIXER_READ_STEREODEVS(r5, 0x80044dfb, &(0x7f0000000300)) ioctl$SOUND_MIXER_READ_VOLUME(r4, 0x80044d05, &(0x7f0000000180)) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f00000001c0)={0x18, 0x0, {0x1, @broadcast, 'vlan1\x00'}}) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$PNPIPE_INITSTATE(r1, 0x113, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) socket$can_bcm(0x1d, 0x2, 0x2) 08:35:30 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506", 0x7) 08:35:30 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}, {0x0, [], 0x68}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:30 executing program 0: clock_gettime(0x0, 0x0) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbb", 0xc4) 08:35:31 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f0000000000)) 08:35:31 executing program 2: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$NLBL_CALIPSO_C_LISTALL(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, 0x0, 0x20, 0x70bd2b, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004001}, 0x4028890) 08:35:31 executing program 3: socketpair(0x23, 0x0, 0x2, &(0x7f0000000040)) 08:35:31 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ec", 0x1) 08:35:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}, {0x0, [], 0x6c}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:31 executing program 0: clock_gettime(0x0, 0x0) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbb", 0xc4) 08:35:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}, {0x0, [], 0x74}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:31 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbb", 0xc4) 08:35:31 executing program 4: recvmsg$can_bcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private1}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000100)=""/243, 0xf3}, {&(0x7f0000000000)=""/64, 0x40}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/3, 0x3}, {&(0x7f0000000280)=""/9, 0x9}, {&(0x7f00000002c0)=""/45, 0x2d}], 0x6, &(0x7f0000000380)}, 0x20) accept$phonet_pipe(r0, 0x0, &(0x7f0000000400)) recvfrom$l2tp6(0xffffffffffffffff, &(0x7f0000000440)=""/226, 0xe2, 0x40, &(0x7f0000000380)={0xa, 0x0, 0x0, @mcast1}, 0x20) r1 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000540)='/dev/dsp1\x00', 0x40000, 0x0) ioctl$SOUND_MIXER_READ_RECSRC(r1, 0x80044dff, &(0x7f0000000580)) socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) 08:35:31 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) 08:35:31 executing program 3: socketpair(0x23, 0x0, 0x0, &(0x7f0000000040)) 08:35:31 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbb", 0xc4) [ 3029.908496][T26188] qrtr: Invalid version 236 08:35:31 executing program 4: socketpair(0x21, 0x0, 0x0, &(0x7f0000000000)) 08:35:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}, {0x0, [], 0x7a}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:31 executing program 3: socketpair(0x23, 0x0, 0x0, &(0x7f0000000040)) 08:35:31 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) 08:35:31 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) [ 3030.019597][T26195] qrtr: Invalid version 236 08:35:31 executing program 4: socketpair(0x29, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp(0xa, 0x2, 0x3a) r1 = accept4$vsock_stream(r0, &(0x7f0000000100)={0x28, 0x0, 0x2711}, 0x10, 0x80000) accept4(r1, &(0x7f0000000080)=@hci, &(0x7f0000000140)=0x80, 0x0) 08:35:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x7, 0x1000, 0x1}, 0x20) 08:35:31 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, 0x0, 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbb", 0xc4) [ 3030.115904][T26205] qrtr: Invalid version 236 08:35:31 executing program 5: clock_gettime(0x0, 0x0) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) 08:35:31 executing program 3: socketpair(0x23, 0x0, 0x0, &(0x7f0000000040)) 08:35:31 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x9, 0x1000, 0x1}, 0x20) 08:35:31 executing program 4: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r0, 0x1, 0x8}, 0xc) socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)=ANY=[@ANYBLOB="9f0027000000050000000d000000000000020000000006000000017d000f030000000300000000000000050000004e22a00040302e0000"], &(0x7f0000000180)=""/213, 0x45, 0xd5, 0x1}, 0x20) 08:35:31 executing program 3: socketpair(0x23, 0x0, 0x2, 0x0) 08:35:31 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, 0x0, 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbb", 0xc4) [ 3030.296651][T26220] qrtr: Invalid version 236 08:35:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x7, 0x1000, 0x1}, 0x20) 08:35:31 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:31 executing program 3: socketpair(0x23, 0x0, 0x2, 0x0) 08:35:31 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x80000, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x402802, 0x0) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000080)=0x4) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000140)) 08:35:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0xa, 0x1000, 0x1}, 0x20) 08:35:31 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, 0x0, 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbb", 0xc4) [ 3030.454809][T26231] qrtr: Invalid version 236 08:35:31 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:31 executing program 2: write$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:31 executing program 3: socketpair(0x23, 0x0, 0x2, 0x0) 08:35:31 executing program 4: socketpair(0x29, 0x2, 0x1000005, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) accept4(r0, &(0x7f0000000080)=@rc={0x1f, @fixed}, &(0x7f0000000000)=0x80, 0x0) 08:35:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x18, 0x1000, 0x1}, 0x20) 08:35:32 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x0) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbb", 0xc4) 08:35:32 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) [ 3030.647852][T26247] qrtr: Invalid version 236 08:35:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x63, 0x1000, 0x1}, 0x20) 08:35:32 executing program 2: write$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:32 executing program 4: r0 = getpgrp(0xffffffffffffffff) r1 = syz_open_procfs(r0, 0x0) getpriority(0x2, r0) socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000014) 08:35:32 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) [ 3030.763618][T26258] qrtr: Invalid version 236 08:35:32 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x0) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbb", 0xc4) 08:35:32 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x1000000, 0x1000, 0x1}, 0x20) 08:35:32 executing program 2: write$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) [ 3030.873517][T26266] qrtr: Invalid version 236 08:35:32 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) inotify_init1(0x80800) socket$vsock_stream(0x28, 0x1, 0x0) 08:35:32 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) [ 3030.945418][T26272] qrtr: Invalid version 236 08:35:32 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:32 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x0) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbb", 0xc4) 08:35:32 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x6, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x8, 0x4}, 0x0, 0x0, &(0x7f0000000100)={0x4, 0x1, 0x401, 0x8f}, &(0x7f0000000140)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x6}}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) socketpair(0x25, 0x6, 0x800, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000300)={0x18, 0x0, {0x2, @broadcast, 'veth0_to_batadv\x00'}}) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 08:35:32 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, 0x0, 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) [ 3031.070709][T26281] qrtr: Invalid version 236 [ 3031.086316][T26283] qrtr: Invalid version 236 08:35:32 executing program 5: write$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:32 executing program 3: write$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:32 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, 0x0, 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:32 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r1, 0x891a, 0x0) sendto$l2tp6(r1, &(0x7f0000000480)="305e5ff29479233b81d05262f2edf3c8d694a4a1c60a9c05bb308537678cf7df4beeadc36eb76e035787ad4248bcd4c96baec5090067830faa5ef14cce68b6a47d2ea8f0ec3cd9c4e361e414ad9b6db18c5847908e2cdc675a6c895de0ca7db72c17a9a3e4abacc1cc81ab36e6509f488239cb5e9ad7999e82ae7e589851de390c9fd788ffea30a6bb298d53554e2d316e8bc91cc2dcdc0321e55c5ede85f701de9368228c2545dd59d78083ff601f81d9bf8a1e3b050f4ec2ee21326b53f7ecd19bc5077baeaaa275ecaedf815c294f9f58579db3aacb1a8d5f032fa0525d0886a09ccf70840e2a11a753c7c4de", 0xee, 0x8000, &(0x7f0000000440)={0xa, 0x0, 0x9, @dev={0xfe, 0x80, [], 0x39}, 0x7f, 0x1f}, 0x20) recvmsg$can_bcm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/230, 0xe6}, {&(0x7f0000000180)=""/217, 0xd9}], 0x2, &(0x7f0000000280)=""/81, 0x51}, 0x2121) 08:35:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x5f5e0ff, 0x1000, 0x1}, 0x20) 08:35:32 executing program 0: openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbb", 0xc4) 08:35:32 executing program 5: write$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:32 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, 0x0, 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:32 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) getsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000000), &(0x7f0000000080)=0x4) 08:35:32 executing program 3: write$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:32 executing program 0: openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbb", 0xc4) 08:35:32 executing program 5: write$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2000042a, 0x1000, 0x1}, 0x20) 08:35:32 executing program 4: getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f0000000240)=""/4096, &(0x7f0000001240)=0x1000) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/igmp6\x00') recvfrom$rxrpc(r0, &(0x7f0000000140)=""/49, 0x31, 0x20, &(0x7f0000000180)=@in4={0x21, 0x7f, 0x2, 0x10, {0x2, 0xc7, @rand_addr=0x64010102}}, 0x24) sysfs$2(0x2, 0x7ff, &(0x7f0000000080)=""/74) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f00000022c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002280)={&(0x7f0000000200)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00e927bc0100fedbdf250200000008000200010000000800020004beba00"], 0x24}, 0x1, 0x0, 0x0, 0x5}, 0x80) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r2, 0x891a, 0x0) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000003300)=@buf={0x1000, &(0x7f0000002300)="b66a42dba5313a9021a409ea390c22b06fcb8bdfbf443a50702994db7ba7c5cf7d1a1ee2e85eba353b89134d12bfbb8f8b56bf9763f5327c57c43b2fd1b5ce269634198900ac95f409cec443b96d9155b4acc88ed30bde56ac699e082e1c779c69ea612168429b52889cdc2697c6dcd11e57dc4c58297a6134ed44307f9a0827e61fb9eb3f1bca294d19b3505e1a977b080d245115b854d4461a03eadf1381bfffd1a59bcb8067537a572e6547e09e75bab39fe9895c6e0df3c414c52dd4eb0c82565fead85d9b015bdc02117c5d7529dbe1a710261690d46ddb29e1cefbe6b8445664d783075cded3e0327972a53eda98448adb624dab3915224cf7cffe939328c5d572b3c491167a77724dfc6cd2d9859aa15d21be6f39ce857e78859fa357c1f96fdb8221a9062dcae3c81ea360c588bdae29018d626204dedce514c28e5cc55e8af4ead8c02fc5ff5d0a51df40a685812fbc6bcef9ece525372119923dc32e93f30a2cfad6147584605cb25b1271c6be9b19b4851791ceacd257f33c60ba479f9711e99adbcc5f5e8cba27ff9f3661ba20da19a1e48d2af70169eb7561385d7c07d3f9143712e91198adb3a19bad9db277a4ad3cc360763f94c54c18e26b53fb18701adbad0dec99108afa224e9b6ae1fc28a23ccfbbba8394364423c5c148dfbc9505809ae81d81e38ba1a94f8f8d58622d661315e286d9d5114d55313cf07ab5477f0ac0753480ea91e25bf6bc99f7257eeda4f0341c2dfddd41f2304c16bd691a5ae1c371558f6aa1270cdff974e65794166fa970ac8883cb8c6e6506254b32057d06c7266ea313b62d9692deebd82dda7578b65ba99c5ab9e8dfe2f610c75cd4eda65f1a90ee0f702e3b43ad8fb972b24e664b473d0a5fdc04772a908ce5a084776eba531ae1f9e417aeccec110637fa071b1732919b8d5e70f525356b7a432087ae96ee5bef3bbad67dcb16e4260adbded86ae37b8719c6c92a3e0598ffd4e0e7498e4bfc52662c8b29ea01c33048709a953de2fb30ca8f25024a34bb24cd3c436d661dd56dd4f351dc9ecece6c31d24e5a54e103216bc29f22684e6133f42eaecd66903ab53e1cf1ebcbebf08f633fa4ee17b43949451865ce687913f8e2fddb89a64c111e3e7a3ab61c0c2ebdce8f31eab6304d7f71389c0ec5244fd8bddb9c724e7c50de02f570ca49fd4baf279552293fdd48bb9be2b4c129bba3c14ae09e078f31d21bea5626bbb96891b2247e935cdf2da00f679410d29304a6ff95f5d4f86d791220d37e80643db24d3b0ea112dad0be32f6c70ea6a50b914b9cfb21d3c74bdd31eea6de3db19caab69a37afef809a7b139310544c1341faaad83136d6b5ece067dce4cb21db9c04c334188865ffda5cf8cfa95969ece331a05a42320b76619d4087ebf18ec438abeedbfee6de27fa9114d6d6c069b314fc4bd6402ae6856c3ef29bce1f643ad00600d8d7a16b712edccfcf7a8b35d4571ee708007e1b52fb044d49d43f3ab369d35a0f208439ab4460d0a654829d007864ebea53d410cbd3d3b2310b12e2eb9d527db20624eeb155d55525ef4f4ba1073a7800f7a69f139e745e334c7d3eab7dc2b3c83f38858f3cab5ed0f82b495608cf26facd7e5f56ce35bc0ab08fa1efcc07eafe93ab657d68190195ec60ede56a62fe80418ba8da003f6146adf4a43983f6697876709a8923f4798ca78fbe20a8ad71136f24564e9b2b6a22033f908fc0d0b41d8b809d21fc29ebc7b8e8434b6b29e964b98ff61f53f53df1b3c00836d9f538d854494d22a8f239cee65ce7b3f9a32632fc8694741655804f90ac3e35caf82255b21e025068e8c60b619849a23f6905d4b8beeaf9bd2a2f36fb06b41fd51a4e30789b145834f63517d9f94285e825f7284b63f1a0c81acda499a65e3ccf46d11cbca12e65add6f51ef4aa354a3aff8571e1b4f155428f8b9442e13b168df7cadc409c94b7c7d8bea34bb24ba72490bb95c61ac12bdb4dc99c4a33e26562368cf48aff6916871cb52e434d9d66141ce0a8d9301eb4f9b9f8048b5c2a37e3b612251593b4e8b749fafd2861b5cef527b7b459157729baf61063e3cd4a7788395f96910281357b3c3ad2b71412239367cf49125f780a9a0f4abf46384c80feb964f806cb69c7de86ec05005a6614c7249133f9271198ffdae0dfad240d835db03e5de1eb072ff029e991a4ddc07f2f74d1538c88d3ee31d0c4aad78373e6a7029d1d5d1dbec456b5fad88f65f3985176759163831175f5757e200967bd7a31d600f60e298bec32dcf0a365035972381a1d1247a3269ba39f71c43d58e506513bd75d124c251f32125e051f77b5933575ffcb5a5bee90bb152292e38666b57a7e9fdb1a00c5068cacf31e1ee8335aca4e21dfc89bca3cea3a4dc04125383bb891cee6ccc8e273894fdfe853d6fe32725bb70accb5a6535c157c477a670c3390a9f0f7eddfa4b3d418c7098f2c245246ae342c15f1594f6b3847eb615804de2b7e6563f478dce0239ca4361f341eb7e2fd39a684aea56a0640cc99f9a494ea0b319d08a494b1348d7966886e6b44b631cfc4ad823839a35b5a4cecd1346d8150e3915cd429a9d0181c987d921acfdf10916657ad543d11ba94a7ad99989bcc8d894ec9dab0a6ba682e44647df01bb71e5708fc7da39da242b22c8150a338236b5b70cf304af48f8369abd35c87fa256f560f901cfc46e24a61485a0cd4978bae84a678666fb32386f02dfb8c260b4eda72a7eb3f0ca08e2159508cc47c2403a19c6add80f7007713df58416b7670723a3e02b09abe1d240314e321c98fec8b293c37f7a6616c6e2b1bb9c7fac60e30c34b3eb611af0b80019eb5113c71918788d2a3bf2b7e07e16b20668a38febe18fa0b263f93122cd69a1ca02f934a6b016df5224f3939965db3013df5faaf728a11c2e6f61d1cbd6c2b9edc4955b9e2cdef906556b0036db4df962c0301e35800e91f2ca4bb4c3343df62dbdeb6df9acd9975896d22171b1c97a699a708ffac63f01ebd48f1eb49a594490ef1898a7478685db5eae784d38dcb2b44d05e112267973caffc570439256047138256cf6ea1280d746daedac19d98443ad8c0ff6ce801231509fc78e5a998041136624aa13c25db68b614cbf8d26a12fdb5901def5d1dbeaeb181a792a31784a3959a517dc1ad129b14fcc0dd4f36611a03997f2221012908925394f127834dae9d4d617c89af632758b6d6b6972cf4bcd3fa70cc5cd5aab26b5af6baf11bb9e1a7b0713a77a9c9f1f2087586b6257904f405917cde5d24ffef05e08cf3732f49b85c07e2033302b9d3d6c1d09285f2a76b75790b297c23bd7b480a52d9ed27818e5b05c1837e4f82211c982d57e08498fb12d4967dcad21b0e1bc881225d643f934b9de9b7948d2761dca320d71efad17c5dcd40a5482d0b372321282fe817171505cb92724b2999832501d55142f8c5a69d26af7e328f6422c1eceb7c313ff2d3705bcbf9724fedefb9a2324dd7dd698e277d01c0942ed7e55ab26d3a8597934e59c8415ab98d8edefc7537150dc258001c9476ec18bda2b81143a328b17ebc27d7310ad1a6a7a26e0106b77817b0483ac359b057fb574e67645764d7f17d8181501e736df8408832635a6eced174fa4d1e21e374b5ab798cb0259989cb089bce83f21da61b951ca550714eb80e2cf7437f6b38a54f71b8cb82e142d1313a04e4dd070194fb1fe3e9f94febbef953b1ba8c191dbc8fa48e1634496ec77380b32c457ed60472ed225547b22635239a593a42be27fb7a7a84447d9a0f4c75fb442736409b3036ae83bb3a90d608c5151b19f85ecc7c9278cd54cf5944b5b41ed67b8638f448f3bcfc8739dc088322cbe6fbd21dbebc182f97dfdb0348c797e5cef2199bf66a1d4919bf6a2e403965c968f25f7b30d997688ae5e3359a975d2145afcf8b369efa8c2b5192d3e03b6deb577c2643190cf4bbb09ee7e7b0507d29e6ab846495d532640d63325d2acfe9ee33119e3f7c912ca6f209daf5fe86527509959e9be3918651c0764c8e75cfebe50b344ea6141ed023276f394299d206bcca45a4fbf5e80976ca6ea238786fc5ee0dfe55a963d63fad8b3de0b4410777dbfb622bc791c7858197968bbaff93407874b9bdc15d332971dc2735d4a599646d53b64224c15bfd344e5a064d2d943e1d67baa142691754f329cbc58d6ac32f47a3761ebae14bcb159ae9edfdb124394d19e9501cb6bf1b0eca1750bbfe65e7625e3298bcd4534a40917482fcda67c268622cc05a413e9728803ce0925d28517dde6ebef2ee7c0230ecafe6b986dd9022c7e3d57f09692d5eaeec3d7e4f127b60bec7d8f23d8b5be2ab6a411a34872de7b70e2886242a03094a6715a097af677c3d8cdadf9a351eba85ee7e120a0b48ab7526291488fb4f2909d2b9f0b7274ea70de3655977bac672922976f1bbb1824ff78e9e5552f13f58de2fc6071069ec466f5e1dc9175b16c7e0ee984f82137b722819840f3b4673ff0d47bc2544ca9cdb46f7acda6778c946172d99848db4c65cb0d2217aca10cdb5ffd13c481e5ece430144c1a2d7653737dc231bb14b6317e1012f903c7771f0592bce335bc425a5ed795e68262128ac3e6312c976f02200409da0f1c0b74fcdcf840e0e92484f620690986c5b8a77ed1be4bbcdb79b223d6c96d7cc8a6e80f4cf85bc092b6e3afb679d4d1bc9c7fc2629e6e8c8460172de625b91e596af56bbf3c1866e89e2cc6dfcd9d0a91ff042731dc9b49555d9fc79cf6f9d070ab8329ea9a0682319aa682c8e5a45b160b382887a7a9ca59a2b2412a52334277f656c7677117910264138da69fa7bf2342a84554dbb108cf0d6f9581f580d9e995a430209d0bbe396d5d5888407c6b467a0c29833755ad532f52fb0a810959ec0f9379bf0b550703256937090a155ce1663d3879724a109b4b7e44cdc4157ee25781612c275bdd75db8c33e12432cf62103fcf287f0b78932ef059d19a73620c55a4a9a896599e66f0f558f54f6dfc5b31bb5831b2a8a5c3b27866dcac131dad573de6a17e7a948377aca6ae0e2b592aed639958eb972b9ba50a7881550ed6ad189e30bf04136a3c7abe9d43d94f44eb9e9f9964c67448249f0a435cf299a2aea5e876af459aa47f37e2a79583d2d90f686bb628a588722aaf63a8af47130c4bbcae1e13766b81af5aca685d16dfb27640bc04f21e2529445ae6f1f91772301175e2e8e9fb5d1b124a03e7696ab32ed38cf79fe87f74ecdeea21d80feab31db3c62f0eca2052e4b8c5944d6bd8b76ee167bbfaa2d1a2c422be3d9e3681e3faa2007a22c65c7eaa91a1ea42abb3a5f2005818fddf3b10e0c59713336662bc73b326877fb00ceadddcdfd8be1e4115311883d2390b2b7ff1e7323d6b14026185a8fc4e86a83ec66d37b9af5ca6e0f82d3b13baa16473a035b949b91ab6b1073f1091fc693c15decce7ee0f5950174b9148cfa35216f030bac93eaac2a72de86b50609b7c81b5b75d7ca9953abc56895f6b4624ba34faf2661e215bb96102f0ab8ff767b8ae84762b390e5f2a128428cfa8cb7f00bc71f2ffe1c678b09e1635292d6bbc6b310a850dc76121b6cf9612142f159d14b58544a278a20190ee533b33ca66b6d229ff01a677756cfabdb435d928ebfeb6b673eabc877b16ceafaf2b2f65383f137bca72b538463be42dee31174d5a55defe87653db801376c383c9d9f87b488398adaf95a5e12ff9b83e2de02edcf500aa705ba4e0d2fcad33f179af140abfd81446"}) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000001280)=""/4096) socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000003340)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 08:35:32 executing program 3: write$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:32 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x0) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:32 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, 0x0, 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x4, 0x1}, 0x20) 08:35:32 executing program 0: openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf61430781209c4341b1ee3ecc51729f8ca758b2f6efed1dbb", 0xc4) 08:35:33 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, 0x0, 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:33 executing program 4: io_setup(0x4, &(0x7f0000000000)=0x0) io_getevents(r0, 0x100, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f00000000c0)) socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) 08:35:33 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x900, 0x1}, 0x20) 08:35:33 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x0) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:33 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, 0x0, 0x0) 08:35:33 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, 0x0, 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:33 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, 0x0, 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:33 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0xa00, 0x1}, 0x20) 08:35:33 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000800}, 0xc0) 08:35:33 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x0) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:33 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, 0x0, 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:33 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, 0x0, 0x0) 08:35:33 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, 0x0, 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:33 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, 0x0, 0x0) 08:35:33 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0xb00, 0x1}, 0x20) 08:35:33 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x0) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:33 executing program 2: openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:33 executing program 4: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x400, 0x0) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000140)='mptcp_pm\x00') sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r1, 0x400, 0x70bd27, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40d1}, 0x80) socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPOEIOCSFWD(r2, 0x4008b100, &(0x7f0000000000)={0x18, 0x0, {0x3, @dev={[], 0x34}, 'macvlan0\x00'}}) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='fd/4\x00') accept$phonet_pipe(r3, &(0x7f0000000280), &(0x7f00000002c0)=0x10) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x424cc0, 0x0) 08:35:33 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x0) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:33 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) 08:35:33 executing program 2: openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:33 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1002, 0x1}, 0x20) 08:35:33 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x0) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:33 executing program 4: socketpair(0x26, 0xa, 0x0, &(0x7f0000000040)) ioctl$PPPIOCSNPMODE(0xffffffffffffffff, 0x4008744b, &(0x7f0000000000)={0x80fd, 0x1}) 08:35:33 executing program 2: openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:33 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x0) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:33 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1003, 0x1}, 0x20) 08:35:33 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) 08:35:33 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x0) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:33 executing program 4: socketpair(0xb, 0x4, 0x800000, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000080)='NLBL_CALIPSO\x00') ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000180)={0x0, 0x0}) tkill(r3, 0x4) openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vim2m\x00', 0x2, 0x0) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r4, 0x891a, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000200)={r2, 0x0, r4, 0x8}) sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="4265e6cd", @ANYRES16=r1, @ANYBLOB="000225bd7000fbdbdf25020000000800020002000000080001000200000008000100010000000800010003000000"], 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x8004) r5 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20ncci\x00', 0x80440, 0x0) ioctl$SOUND_MIXER_READ_RECSRC(r5, 0x80044dff, &(0x7f0000000280)) 08:35:33 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, 0x0, 0x0) 08:35:33 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x0) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:33 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) 08:35:33 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1004, 0x1}, 0x20) 08:35:33 executing program 5: openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:33 executing program 4: socketpair(0x1, 0x0, 0xfffffffc, &(0x7f0000000040)) socket$vsock_stream(0x28, 0x1, 0x0) io_setup(0x2, &(0x7f0000000000)=0x0) socketpair(0x1f, 0x0, 0x0, &(0x7f0000000140)) io_pgetevents(r0, 0x7, 0x3, &(0x7f0000000080)=[{}, {}, {}], &(0x7f0000000100), &(0x7f0000000180)={&(0x7f0000000140)={[0x100000001]}, 0x8}) 08:35:33 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, 0x0, 0x0) 08:35:33 executing program 3: openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1005, 0x1}, 0x20) 08:35:34 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac", 0x62) 08:35:34 executing program 5: openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:34 executing program 3: openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:34 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, 0x0, 0x0) 08:35:34 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x101000, 0x0) ioctl$sock_ifreq(r1, 0x8924, &(0x7f0000000000)={'team_slave_1\x00', @ifru_mtu}) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000080)=0x2) 08:35:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1006, 0x1}, 0x20) 08:35:34 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac", 0x62) 08:35:34 executing program 5: openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:34 executing program 3: openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1007, 0x1}, 0x20) 08:35:34 executing program 4: prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000140)) socketpair(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/228) socket$can_bcm(0x1d, 0x2, 0x2) 08:35:34 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) 08:35:34 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac", 0x62) 08:35:34 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, 0x0, 0x0) 08:35:34 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000000000), 0x4) 08:35:34 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, 0x0, 0x0) 08:35:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1008, 0x1}, 0x20) 08:35:34 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, 0x0, 0x0) 08:35:34 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) 08:35:34 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11d", 0x93) 08:35:34 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, 0x0, 0x0) 08:35:34 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x24802, 0x0) socketpair(0x5, 0x6, 0xc0000000, &(0x7f0000000000)) 08:35:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x100a, 0x1}, 0x20) 08:35:34 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) 08:35:34 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11d", 0x93) 08:35:34 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, 0x0, 0x0) 08:35:34 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, 0x0, 0x0) 08:35:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1010, 0x1}, 0x20) 08:35:34 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11d", 0x93) 08:35:34 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e", 0x38) 08:35:34 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) 08:35:34 executing program 4: openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb", 0x70) 08:35:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1012, 0x1}, 0x20) 08:35:34 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) [ 3033.558431][T26493] qrtr: Invalid version 236 08:35:34 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) 08:35:35 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df077673773f9b730a109d2ebbcb14a3e1e91f02a313ad2cddf", 0xac) 08:35:35 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) 08:35:35 executing program 4: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, 0x0, 0x0) 08:35:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1048, 0x1}, 0x20) 08:35:35 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) [ 3033.719544][T26506] qrtr: Invalid version 236 08:35:35 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x1000000, 0x1000, 0x1}, 0x20) 08:35:35 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) 08:35:35 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) 08:35:35 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df0", 0x94) 08:35:35 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e", 0x38) 08:35:35 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) [ 3033.937435][T26520] qrtr: Invalid version 236 08:35:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x104c, 0x1}, 0x20) 08:35:35 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) 08:35:35 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd", 0x7c) [ 3034.014847][T26524] qrtr: Invalid version 236 08:35:35 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e", 0x38) 08:35:35 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) 08:35:35 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6", 0x1c) [ 3034.131941][T26532] qrtr: Invalid version 236 08:35:35 executing program 4: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd9261303acb686e45e008129cdd26c88196240d8d2bb11df0", 0x94) 08:35:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1068, 0x1}, 0x20) [ 3034.157211][T26535] qrtr: Invalid version 236 [ 3034.201328][T26537] qrtr: Invalid version 236 08:35:35 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) 08:35:35 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac79607b15f7033dfedf57f72177bb61652a594d1982717316c6cd", 0x7c) 08:35:35 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) 08:35:35 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) [ 3034.267554][T26542] qrtr: Invalid version 236 08:35:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x106c, 0x1}, 0x20) 08:35:35 executing program 4: socketpair(0x29, 0x2, 0x1000005, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) accept4(r0, &(0x7f0000000080)=@rc={0x1f, @fixed}, &(0x7f0000000000)=0x80, 0x0) [ 3034.321682][T26545] qrtr: Invalid version 236 08:35:35 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) 08:35:35 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac7960", 0x64) 08:35:35 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) 08:35:35 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) 08:35:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1074, 0x1}, 0x20) 08:35:35 executing program 4: socketpair(0x29, 0x2, 0x1000005, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) accept4(r0, &(0x7f0000000080)=@rc={0x1f, @fixed}, &(0x7f0000000000)=0x80, 0x0) 08:35:35 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) [ 3034.517884][T26561] qrtr: Invalid version 236 08:35:35 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9eac60a79cd7364065a3f2a63872bbd1640423b4b31ac7960", 0x64) 08:35:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x107a, 0x1}, 0x20) 08:35:36 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6", 0x1c) 08:35:36 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) 08:35:36 executing program 4: socketpair(0x29, 0x2, 0x1000005, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) accept4(r0, &(0x7f0000000080)=@rc={0x1f, @fixed}, &(0x7f0000000000)=0x80, 0x0) 08:35:36 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6", 0x1c) 08:35:36 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7", 0xe) [ 3034.732554][T26580] qrtr: Invalid version 236 [ 3034.747368][T26578] qrtr: Invalid version 236 08:35:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1200, 0x1}, 0x20) 08:35:36 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e201a2e1e8e2e6fdd2b97d7beb0882823ccf9d11bb2c10dc9", 0x4c) 08:35:36 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) [ 3034.835249][T26583] qrtr: Invalid version 236 08:35:36 executing program 4: socketpair(0x29, 0x2, 0x1000005, &(0x7f0000000040)) 08:35:36 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) 08:35:36 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7", 0xe) [ 3034.914740][T26592] qrtr: Invalid version 236 08:35:36 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) 08:35:36 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6cda0513bc5e8d68a15c76ea23a607cf71576d0933789f71e", 0x34) 08:35:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x2f00, 0x1}, 0x20) 08:35:36 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) 08:35:36 executing program 4: socketpair(0x0, 0x2, 0x1000005, &(0x7f0000000040)) 08:35:36 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7", 0xe) 08:35:36 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) [ 3035.084017][T26604] qrtr: Invalid version 236 08:35:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x6300, 0x1}, 0x20) 08:35:36 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6", 0x1c) 08:35:36 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040), 0x0) 08:35:36 executing program 4: socketpair(0x0, 0x2, 0x1000005, &(0x7f0000000040)) 08:35:36 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be09", 0x15) 08:35:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x9feb, 0x1}, 0x20) 08:35:36 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7", 0xe) [ 3035.284656][T26622] qrtr: Invalid version 236 08:35:36 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7", 0xe) 08:35:36 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120", 0x4) 08:35:36 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be09", 0x15) 08:35:36 executing program 4: socketpair(0x0, 0x2, 0x1000005, &(0x7f0000000040)) [ 3035.426239][T26633] qrtr: Invalid version 236 08:35:36 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ec", 0x1) 08:35:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x2}, 0x20) 08:35:36 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7", 0xe) 08:35:36 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7", 0xe) 08:35:36 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be09", 0x15) 08:35:36 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7", 0xe) 08:35:36 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7", 0xe) 08:35:37 executing program 4: socketpair(0x29, 0x0, 0x1000005, &(0x7f0000000040)) 08:35:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x8}, 0x20) 08:35:37 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ec", 0x1) 08:35:37 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be09", 0x15) [ 3035.698803][T26657] BPF:[1] VAR (anon) [ 3035.717281][T26657] BPF:type_id=0 linkage=0 [ 3035.731510][T26657] BPF: [ 3035.736758][T26657] BPF:vlen != 0 08:35:37 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe38", 0x19) 08:35:37 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be09", 0x15) [ 3035.753012][T26657] BPF: [ 3035.753012][T26657] 08:35:37 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ec", 0x1) 08:35:37 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be09", 0x15) 08:35:37 executing program 4: socketpair(0x29, 0x0, 0x1000005, &(0x7f0000000040)) [ 3035.791819][T26657] BPF:[1] VAR (anon) [ 3035.809400][T26657] BPF:type_id=0 linkage=0 08:35:37 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be09", 0x15) [ 3035.859590][T26657] BPF: [ 3035.863989][T26657] BPF:vlen != 0 [ 3035.877950][T26657] BPF: [ 3035.877950][T26657] 08:35:37 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe38", 0x19) 08:35:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0xa}, 0x20) 08:35:37 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be09", 0x15) 08:35:37 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd51", 0x3) 08:35:37 executing program 4: socketpair(0x29, 0x0, 0x1000005, &(0x7f0000000040)) 08:35:37 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be09", 0x15) 08:35:37 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe38", 0x19) 08:35:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x3ee}, 0x20) 08:35:37 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe38", 0x19) 08:35:37 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd51", 0x3) 08:35:37 executing program 4: socketpair(0x29, 0x2, 0x0, &(0x7f0000000040)) 08:35:37 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe38", 0x19) 08:35:37 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48", 0x1b) 08:35:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x3f3}, 0x20) 08:35:37 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd51", 0x3) 08:35:37 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe38", 0x19) 08:35:37 executing program 4: socketpair(0x29, 0x2, 0x0, &(0x7f0000000040)) 08:35:37 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe38", 0x19) 08:35:37 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48", 0x1b) 08:35:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x3f4}, 0x20) 08:35:37 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48", 0x1b) 08:35:37 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) 08:35:37 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe38", 0x19) 08:35:37 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe38", 0x19) 08:35:37 executing program 4: socketpair(0x29, 0x2, 0x0, &(0x7f0000000040)) 08:35:37 executing program 2: socketpair(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)=0x5) 08:35:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x3f5}, 0x20) 08:35:38 executing program 0: clock_gettime(0xafe75f6ffb4dba53, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_DEL(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x78, 0x0, 0x100, 0x70bd2b, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1_to_bond\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'geneve1\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}]}, 0x78}}, 0x200000c0) 08:35:38 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48", 0x1b) 08:35:38 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48", 0x1b) 08:35:38 executing program 4: socketpair(0x29, 0x2, 0x1000005, 0x0) 08:35:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x3f6}, 0x20) 08:35:38 executing program 0: clock_gettime(0xafe75f6ffb4dba53, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_DEL(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x78, 0x0, 0x100, 0x70bd2b, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1_to_bond\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'geneve1\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}]}, 0x78}}, 0x200000c0) 08:35:38 executing program 2: clock_gettime(0x2, 0x0) io_setup(0x8001, &(0x7f0000000000)=0x0) io_destroy(r0) io_pgetevents(r0, 0xf53c, 0x3, &(0x7f0000000000)=[{}, {}, {}], &(0x7f0000000080)={0x0, 0x989680}, &(0x7f0000000100)={&(0x7f00000000c0)={[0x4]}, 0x8}) 08:35:38 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48", 0x1b) 08:35:38 executing program 4: socketpair(0x29, 0x2, 0x1000005, 0x0) 08:35:38 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48", 0x1b) 08:35:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x3f9}, 0x20) 08:35:38 executing program 0: clock_gettime(0xafe75f6ffb4dba53, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_DEL(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x78, 0x0, 0x100, 0x70bd2b, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1_to_bond\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'geneve1\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}]}, 0x78}}, 0x200000c0) 08:35:38 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48", 0x1b) 08:35:38 executing program 4: socketpair(0x29, 0x2, 0x1000005, 0x0) 08:35:38 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48", 0x1b) 08:35:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x3fe}, 0x20) 08:35:38 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48", 0x1b) 08:35:38 executing program 5: tkill(0xffffffffffffffff, 0x2a) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0x10, &(0x7f00000000c0)={&(0x7f0000000040)={0x4, 0xd44ffbb9e33c7a82, 0x2, {0x77359400}, {0x77359400}, {0x0, 0x0, 0x1, 0x1}, 0x1, @can={{0x2}, 0x8, 0x2, 0x0, 0x0, "97115e9f2c6277a3"}}, 0x48}, 0x1, 0x0, 0x0, 0x8800}, 0x20008805) getpriority(0x2, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x80401, 0x0) ioctl$SOUND_MIXER_READ_CAPS(r0, 0x80044dfc, &(0x7f0000000180)) 08:35:38 executing program 0: clock_gettime(0xafe75f6ffb4dba53, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 08:35:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000002000000000048ff57bc30ac865f0000000000000000000000000000019e1955e95323d4aa2d00000d0000000000000000010000000000"], &(0x7f0000000840)=""/4096, 0x42, 0x1000, 0x1}, 0x20) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x7, 0x1, 0x9, 0x800, 0xffffffffffffffff, 0x2000, [], 0x0, r0, 0x4, 0x4, 0x1}, 0x40) connect$bt_sco(r0, &(0x7f0000000040), 0x8) 08:35:38 executing program 4 (fault-call:0 fault-nth:0): socketpair(0x29, 0x2, 0x1000005, &(0x7f0000000040)) 08:35:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0xffffff}, 0x20) 08:35:38 executing program 2 (fault-call:1 fault-nth:0): r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6", 0x1c) 08:35:38 executing program 5: tkill(0xffffffffffffffff, 0x2a) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0x10, &(0x7f00000000c0)={&(0x7f0000000040)={0x4, 0xd44ffbb9e33c7a82, 0x2, {0x77359400}, {0x77359400}, {0x0, 0x0, 0x1, 0x1}, 0x1, @can={{0x2}, 0x8, 0x2, 0x0, 0x0, "97115e9f2c6277a3"}}, 0x48}, 0x1, 0x0, 0x0, 0x8800}, 0x20008805) getpriority(0x2, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x80401, 0x0) ioctl$SOUND_MIXER_READ_CAPS(r0, 0x80044dfc, &(0x7f0000000180)) 08:35:38 executing program 0: clock_gettime(0xafe75f6ffb4dba53, 0x0) 08:35:38 executing program 3 (fault-call:1 fault-nth:0): r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6", 0x1c) [ 3037.270310][T26781] FAULT_INJECTION: forcing a failure. [ 3037.270310][T26781] name failslab, interval 1, probability 0, space 0, times 0 [ 3037.288766][T26782] FAULT_INJECTION: forcing a failure. [ 3037.288766][T26782] name failslab, interval 1, probability 0, space 0, times 0 08:35:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0xffffff1f}, 0x20) [ 3037.336420][T26781] CPU: 1 PID: 26781 Comm: syz-executor.4 Not tainted 5.11.0-rc1-syzkaller #0 [ 3037.345239][T26781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3037.355295][T26781] Call Trace: [ 3037.358573][T26781] dump_stack+0x107/0x163 [ 3037.362914][T26781] should_fail.cold+0x5/0xa [ 3037.367426][T26781] ? __anon_vma_prepare+0x5d/0x560 [ 3037.372545][T26781] should_failslab+0x5/0x10 [ 3037.377226][T26781] kmem_cache_alloc+0x5b/0x440 [ 3037.381996][T26781] __anon_vma_prepare+0x5d/0x560 [ 3037.386936][T26781] ? count_memcg_event_mm.part.0+0x151/0x280 [ 3037.392953][T26781] do_huge_pmd_anonymous_page+0xe03/0x2390 [ 3037.398771][T26781] handle_mm_fault+0x3391/0x5640 [ 3037.403719][T26781] ? vm_iomap_memory+0x190/0x190 [ 3037.408676][T26781] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 3037.415109][T26781] ? vmacache_update+0xce/0x140 [ 3037.419975][T26781] do_user_addr_fault+0x570/0xc50 [ 3037.425013][T26781] exc_page_fault+0x9e/0x180 [ 3037.429610][T26781] asm_exc_page_fault+0x1e/0x30 08:35:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x25) 08:35:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x2f) [ 3037.434466][T26781] RIP: 0010:__put_user_nocheck_4+0x3/0x11 [ 3037.440731][T26781] Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca c3 0f 1f 44 00 00 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca c3 66 0f 1f 44 00 00 48 bb f9 ef ff ff ff 7f [ 3037.460346][T26781] RSP: 0018:ffffc90009967e48 EFLAGS: 00050293 [ 3037.466676][T26781] RAX: 0000000000000004 RBX: 00007fffffffeffd RCX: 0000000020000040 [ 3037.474657][T26781] RDX: 0000000000040000 RSI: ffffffff86ea30eb RDI: 0000000000000000 [ 3037.482637][T26781] RBP: 0000000000000002 R08: 0000000000000000 R09: 0000000000000000 [ 3037.490615][T26781] R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000004 [ 3037.498687][T26781] R13: 0000000000000005 R14: 0000000000000000 R15: dffffc0000000000 [ 3037.506764][T26781] ? __sys_socketpair+0xfb/0x570 [ 3037.511804][T26781] __sys_socketpair+0x107/0x570 [ 3037.516677][T26781] ? __ia32_sys_socket+0xb0/0xb0 [ 3037.521619][T26781] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 3037.528053][T26781] ? fput+0x2a/0x50 [ 3037.532331][T26781] __x64_sys_socketpair+0x93/0xf0 08:35:38 executing program 5: tkill(0xffffffffffffffff, 0x2a) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0x10, &(0x7f00000000c0)={&(0x7f0000000040)={0x4, 0xd44ffbb9e33c7a82, 0x2, {0x77359400}, {0x77359400}, {0x0, 0x0, 0x1, 0x1}, 0x1, @can={{0x2}, 0x8, 0x2, 0x0, 0x0, "97115e9f2c6277a3"}}, 0x48}, 0x1, 0x0, 0x0, 0x8800}, 0x20008805) getpriority(0x2, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x80401, 0x0) ioctl$SOUND_MIXER_READ_CAPS(r0, 0x80044dfc, &(0x7f0000000180)) 08:35:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x78) [ 3037.537376][T26781] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3037.543379][T26781] do_syscall_64+0x2d/0x70 [ 3037.547803][T26781] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3037.553708][T26781] RIP: 0033:0x45e219 [ 3037.557698][T26781] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3037.577402][T26781] RSP: 002b:00007f2639d62c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 3037.585844][T26781] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 [ 3037.593814][T26781] RDX: 0000000001000005 RSI: 0000000000000002 RDI: 0000000000000029 [ 3037.601999][T26781] RBP: 00007f2639d62ca0 R08: 0000000000000000 R09: 0000000000000000 [ 3037.609970][T26781] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000000 [ 3037.617941][T26781] R13: 00007fffeeedcd5f R14: 00007f2639d639c0 R15: 000000000119bf8c 08:35:39 executing program 5: tkill(0xffffffffffffffff, 0x2a) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0x10, &(0x7f00000000c0)={&(0x7f0000000040)={0x4, 0xd44ffbb9e33c7a82, 0x2, {0x77359400}, {0x77359400}, {0x0, 0x0, 0x1, 0x1}, 0x1, @can={{0x2}, 0x8, 0x2, 0x0, 0x0, "97115e9f2c6277a3"}}, 0x48}, 0x1, 0x0, 0x0, 0x8800}, 0x20008805) getpriority(0x2, 0x0) ioctl$SOUND_MIXER_READ_CAPS(0xffffffffffffffff, 0x80044dfc, &(0x7f0000000180)) [ 3037.643315][T26801] FAULT_INJECTION: forcing a failure. [ 3037.643315][T26801] name failslab, interval 1, probability 0, space 0, times 0 [ 3037.658210][T26801] CPU: 1 PID: 26801 Comm: syz-executor.3 Not tainted 5.11.0-rc1-syzkaller #0 [ 3037.666981][T26801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3037.677211][T26801] Call Trace: [ 3037.680670][T26801] dump_stack+0x107/0x163 [ 3037.685014][T26801] should_fail.cold+0x5/0xa [ 3037.689523][T26801] ? qrtr_tun_write_iter+0x8a/0x180 [ 3037.694728][T26801] ? qrtr_tun_write_iter+0x8a/0x180 [ 3037.700520][T26801] should_failslab+0x5/0x10 [ 3037.705030][T26801] __kmalloc+0x72/0x3e0 [ 3037.710028][T26801] ? aa_path_link+0x2f0/0x2f0 [ 3037.714806][T26801] qrtr_tun_write_iter+0x8a/0x180 [ 3037.719862][T26801] new_sync_write+0x426/0x650 [ 3037.724562][T26801] ? new_sync_read+0x6e0/0x6e0 [ 3037.729333][T26801] ? lock_downgrade+0x6d0/0x6d0 [ 3037.734214][T26801] ? apparmor_file_permission+0x26e/0x4e0 [ 3037.740951][T26801] vfs_write+0x791/0xa30 [ 3037.745868][T26801] ksys_write+0x12d/0x250 [ 3037.750559][T26801] ? __ia32_sys_read+0xb0/0xb0 [ 3037.755332][T26801] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3037.761323][T26801] do_syscall_64+0x2d/0x70 [ 3037.765845][T26801] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3037.772606][T26801] RIP: 0033:0x45e219 [ 3037.776515][T26801] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3037.796471][T26801] RSP: 002b:00007fbd3e18dc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3037.805233][T26801] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045e219 [ 3037.813202][T26801] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000003 [ 3037.821759][T26801] RBP: 00007fbd3e18dca0 R08: 0000000000000000 R09: 0000000000000000 [ 3037.830751][T26801] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 3037.839514][T26801] R13: 00007ffe8200ad9f R14: 00007fbd3e18e9c0 R15: 000000000119bf8c [ 3037.848626][T26782] CPU: 0 PID: 26782 Comm: syz-executor.2 Not tainted 5.11.0-rc1-syzkaller #0 [ 3037.857493][T26782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3037.867546][T26782] Call Trace: [ 3037.870833][T26782] dump_stack+0x107/0x163 [ 3037.875173][T26782] should_fail.cold+0x5/0xa [ 3037.879682][T26782] ? qrtr_tun_write_iter+0x8a/0x180 [ 3037.884884][T26782] ? qrtr_tun_write_iter+0x8a/0x180 [ 3037.890083][T26782] should_failslab+0x5/0x10 [ 3037.895245][T26782] __kmalloc+0x72/0x3e0 [ 3037.901587][T26782] ? aa_path_link+0x2f0/0x2f0 [ 3037.906694][T26782] qrtr_tun_write_iter+0x8a/0x180 [ 3037.911916][T26782] new_sync_write+0x426/0x650 [ 3037.917037][T26782] ? new_sync_read+0x6e0/0x6e0 [ 3037.922195][T26782] ? lock_downgrade+0x6d0/0x6d0 [ 3037.927306][T26782] ? apparmor_file_permission+0x26e/0x4e0 [ 3037.933777][T26782] vfs_write+0x791/0xa30 [ 3037.940253][T26782] ksys_write+0x12d/0x250 [ 3037.944588][T26782] ? __ia32_sys_read+0xb0/0xb0 [ 3037.949808][T26782] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3037.956102][T26782] do_syscall_64+0x2d/0x70 [ 3037.960517][T26782] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3037.967041][T26782] RIP: 0033:0x45e219 [ 3037.970937][T26782] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3037.991201][T26782] RSP: 002b:00007f69d25d6c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3038.000165][T26782] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045e219 [ 3038.009003][T26782] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000003 [ 3038.018025][T26782] RBP: 00007f69d25d6ca0 R08: 0000000000000000 R09: 0000000000000000 [ 3038.027233][T26782] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 3038.036261][T26782] R13: 00007ffde27f50bf R14: 00007f69d25d79c0 R15: 000000000119bf8c 08:35:39 executing program 4 (fault-call:0 fault-nth:1): socketpair(0x29, 0x2, 0x1000005, &(0x7f0000000040)) 08:35:39 executing program 0: clock_gettime(0x0, 0x0) [ 3038.147885][T26809] FAULT_INJECTION: forcing a failure. [ 3038.147885][T26809] name failslab, interval 1, probability 0, space 0, times 0 [ 3038.178572][T26809] CPU: 0 PID: 26809 Comm: syz-executor.4 Not tainted 5.11.0-rc1-syzkaller #0 [ 3038.187387][T26809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3038.198470][T26809] Call Trace: [ 3038.201749][T26809] dump_stack+0x107/0x163 [ 3038.206333][T26809] should_fail.cold+0x5/0xa [ 3038.211463][T26809] ? __anon_vma_prepare+0x2d6/0x560 [ 3038.216672][T26809] should_failslab+0x5/0x10 [ 3038.221181][T26809] kmem_cache_alloc+0x5b/0x440 [ 3038.226129][T26809] __anon_vma_prepare+0x2d6/0x560 [ 3038.231496][T26809] ? count_memcg_event_mm.part.0+0x151/0x280 [ 3038.239323][T26809] do_huge_pmd_anonymous_page+0xe03/0x2390 [ 3038.245256][T26809] handle_mm_fault+0x3391/0x5640 [ 3038.250294][T26809] ? vm_iomap_memory+0x190/0x190 [ 3038.255330][T26809] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 3038.261575][T26809] ? vmacache_update+0xce/0x140 [ 3038.267554][T26809] do_user_addr_fault+0x570/0xc50 [ 3038.274829][T26809] exc_page_fault+0x9e/0x180 [ 3038.279869][T26809] asm_exc_page_fault+0x1e/0x30 [ 3038.285150][T26809] RIP: 0010:__put_user_nocheck_4+0x3/0x11 [ 3038.292336][T26809] Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca c3 0f 1f 44 00 00 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca c3 66 0f 1f 44 00 00 48 bb f9 ef ff ff ff 7f [ 3038.312034][T26809] RSP: 0018:ffffc900090e7e48 EFLAGS: 00050293 [ 3038.318109][T26809] RAX: 0000000000000004 RBX: 00007fffffffeffd RCX: 0000000020000040 [ 3038.326085][T26809] RDX: 0000000000040000 RSI: ffffffff86ea30eb RDI: 0000000000000000 [ 3038.334058][T26809] RBP: 0000000000000002 R08: 0000000000000000 R09: 0000000000000000 [ 3038.342115][T26809] R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000004 [ 3038.351010][T26809] R13: 0000000000000005 R14: 0000000000000000 R15: dffffc0000000000 [ 3038.360087][T26809] ? __sys_socketpair+0xfb/0x570 [ 3038.365017][T26809] __sys_socketpair+0x107/0x570 [ 3038.370058][T26809] ? __ia32_sys_socket+0xb0/0xb0 [ 3038.375237][T26809] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 3038.381551][T26809] ? fput+0x2a/0x50 [ 3038.385940][T26809] __x64_sys_socketpair+0x93/0xf0 [ 3038.391094][T26809] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3038.396988][T26809] do_syscall_64+0x2d/0x70 [ 3038.401490][T26809] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3038.407365][T26809] RIP: 0033:0x45e219 [ 3038.411257][T26809] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3038.430853][T26809] RSP: 002b:00007f2639d62c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 3038.439274][T26809] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 08:35:39 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6", 0x1c) 08:35:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20000120) 08:35:39 executing program 3 (fault-call:1 fault-nth:1): r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6", 0x1c) 08:35:39 executing program 5: tkill(0xffffffffffffffff, 0x2a) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0x10, &(0x7f00000000c0)={&(0x7f0000000040)={0x4, 0xd44ffbb9e33c7a82, 0x2, {0x77359400}, {0x77359400}, {0x0, 0x0, 0x1, 0x1}, 0x1, @can={{0x2}, 0x8, 0x2, 0x0, 0x0, "97115e9f2c6277a3"}}, 0x48}, 0x1, 0x0, 0x0, 0x8800}, 0x20008805) getpriority(0x2, 0x0) ioctl$SOUND_MIXER_READ_CAPS(0xffffffffffffffff, 0x80044dfc, &(0x7f0000000180)) 08:35:39 executing program 0: clock_gettime(0x0, 0x0) [ 3038.447224][T26809] RDX: 0000000001000005 RSI: 0000000000000002 RDI: 0000000000000029 [ 3038.455176][T26809] RBP: 00007f2639d62ca0 R08: 0000000000000000 R09: 0000000000000000 [ 3038.463127][T26809] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000001 [ 3038.471269][T26809] R13: 00007fffeeedcd5f R14: 00007f2639d639c0 R15: 000000000119bf8c [ 3038.555555][T26819] FAULT_INJECTION: forcing a failure. [ 3038.555555][T26819] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3038.573045][T26819] CPU: 0 PID: 26819 Comm: syz-executor.3 Not tainted 5.11.0-rc1-syzkaller #0 [ 3038.581847][T26819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3038.591921][T26819] Call Trace: [ 3038.595383][T26819] dump_stack+0x107/0x163 [ 3038.599821][T26819] should_fail.cold+0x5/0xa 08:35:39 executing program 0: clock_gettime(0x0, 0x0) [ 3038.604724][T26819] _copy_from_iter_full+0x1fa/0x850 [ 3038.609949][T26819] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 3038.616654][T26819] ? __phys_addr_symbol+0x2c/0x70 [ 3038.621696][T26819] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 3038.627428][T26819] ? __check_object_size+0x171/0x3f0 [ 3038.632815][T26819] qrtr_tun_write_iter+0xd1/0x180 [ 3038.637995][T26819] new_sync_write+0x426/0x650 [ 3038.642771][T26819] ? new_sync_read+0x6e0/0x6e0 [ 3038.647543][T26819] ? lock_downgrade+0x6d0/0x6d0 [ 3038.652476][T26819] ? apparmor_file_permission+0x26e/0x4e0 [ 3038.658505][T26819] vfs_write+0x791/0xa30 [ 3038.662763][T26819] ksys_write+0x12d/0x250 [ 3038.667099][T26819] ? __ia32_sys_read+0xb0/0xb0 [ 3038.672073][T26819] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3038.677984][T26819] do_syscall_64+0x2d/0x70 [ 3038.682404][T26819] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3038.688808][T26819] RIP: 0033:0x45e219 [ 3038.692710][T26819] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3038.712414][T26819] RSP: 002b:00007fbd3e18dc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3038.720844][T26819] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045e219 [ 3038.728823][T26819] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000003 [ 3038.736798][T26819] RBP: 00007fbd3e18dca0 R08: 0000000000000000 R09: 0000000000000000 [ 3038.744853][T26819] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 08:35:40 executing program 4 (fault-call:0 fault-nth:2): socketpair(0x29, 0x2, 0x1000005, &(0x7f0000000040)) 08:35:40 executing program 1: socketpair(0x11, 0x80000, 0x6, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SMC_PNETID_DEL(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x5c, 0x0, 0x100, 0x70bd2d, 0x25dfdbfb, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'tunl0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'xfrm0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip_vti0\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x44011}, 0x4004044) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000001c0)={0x0, 0x0}) r2 = getpgrp(r1) syz_open_procfs(r2, 0x0) syz_open_procfs(r2, &(0x7f0000000180)='net/ptype\x00') [ 3038.752891][T26819] R13: 00007ffe8200ad9f R14: 00007fbd3e18e9c0 R15: 000000000119bf8c 08:35:40 executing program 5: tkill(0xffffffffffffffff, 0x2a) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0x10, &(0x7f00000000c0)={&(0x7f0000000040)={0x4, 0xd44ffbb9e33c7a82, 0x2, {0x77359400}, {0x77359400}, {0x0, 0x0, 0x1, 0x1}, 0x1, @can={{0x2}, 0x8, 0x2, 0x0, 0x0, "97115e9f2c6277a3"}}, 0x48}, 0x1, 0x0, 0x0, 0x8800}, 0x20008805) getpriority(0x2, 0x0) ioctl$SOUND_MIXER_READ_CAPS(0xffffffffffffffff, 0x80044dfc, &(0x7f0000000180)) 08:35:40 executing program 2: ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, &(0x7f0000000080)) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6", 0x1c) 08:35:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0xffffff1f}, 0x20) [ 3038.874484][T26831] FAULT_INJECTION: forcing a failure. [ 3038.874484][T26831] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3038.911120][T26831] CPU: 0 PID: 26831 Comm: syz-executor.4 Not tainted 5.11.0-rc1-syzkaller #0 [ 3038.919951][T26831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3038.930022][T26831] Call Trace: [ 3038.933303][T26831] dump_stack+0x107/0x163 [ 3038.937656][T26831] should_fail.cold+0x5/0xa [ 3038.942170][T26831] __alloc_pages_nodemask+0x189/0x730 [ 3038.943538][T26835] qrtr: Invalid version 236 [ 3038.947560][T26831] ? __alloc_pages_slowpath.constprop.0+0x2240/0x2240 [ 3038.947594][T26831] ? up_write+0x191/0x560 [ 3038.964042][T26831] ? rwlock_bug.part.0+0x90/0x90 [ 3038.968997][T26831] ? rcu_read_lock_sched_held+0x3a/0x70 [ 3038.974551][T26831] ? anon_vma_interval_tree_insert+0x2d4/0x4c0 [ 3038.980727][T26831] alloc_pages_vma+0x56e/0x730 [ 3038.985511][T26831] do_huge_pmd_anonymous_page+0x3e8/0x2390 [ 3038.991160][T26837] qrtr: Invalid version 236 [ 3038.991329][T26831] handle_mm_fault+0x3391/0x5640 [ 3039.000858][T26831] ? vm_iomap_memory+0x190/0x190 [ 3039.007047][T26831] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 3039.013301][T26831] ? vmacache_update+0xce/0x140 [ 3039.018173][T26831] do_user_addr_fault+0x570/0xc50 08:35:40 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6", 0x1c) sched_yield() [ 3039.024441][T26831] exc_page_fault+0x9e/0x180 [ 3039.029081][T26831] asm_exc_page_fault+0x1e/0x30 [ 3039.035025][T26831] RIP: 0010:__put_user_nocheck_4+0x3/0x11 [ 3039.040783][T26831] Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca c3 0f 1f 44 00 00 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca c3 66 0f 1f 44 00 00 48 bb f9 ef ff ff ff 7f [ 3039.060407][T26831] RSP: 0018:ffffc90009c37e48 EFLAGS: 00050293 [ 3039.066487][T26831] RAX: 0000000000000004 RBX: 00007fffffffeffd RCX: 0000000020000040 [ 3039.074472][T26831] RDX: 0000000000040000 RSI: ffffffff86ea30eb RDI: 0000000000000000 [ 3039.083089][T26831] RBP: 0000000000000002 R08: 0000000000000000 R09: 0000000000000000 [ 3039.091062][T26831] R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000004 [ 3039.100045][T26831] R13: 0000000000000005 R14: 0000000000000000 R15: dffffc0000000000 [ 3039.108892][T26831] ? __sys_socketpair+0xfb/0x570 [ 3039.114636][T26831] __sys_socketpair+0x107/0x570 [ 3039.120139][T26831] ? __ia32_sys_socket+0xb0/0xb0 [ 3039.126119][T26831] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 3039.133296][T26831] ? fput+0x2a/0x50 [ 3039.137469][T26831] __x64_sys_socketpair+0x93/0xf0 [ 3039.142508][T26831] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3039.148469][T26831] do_syscall_64+0x2d/0x70 [ 3039.153075][T26831] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3039.159196][T26831] RIP: 0033:0x45e219 [ 3039.163674][T26831] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3039.183960][T26831] RSP: 002b:00007f2639d62c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 3039.192391][T26831] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 [ 3039.200375][T26831] RDX: 0000000001000005 RSI: 0000000000000002 RDI: 0000000000000029 [ 3039.208843][T26831] RBP: 00007f2639d62ca0 R08: 0000000000000000 R09: 0000000000000000 [ 3039.217503][T26831] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000002 08:35:40 executing program 1: ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000000)={0x29, 0x3}) io_setup(0x800, &(0x7f0000000080)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb01001800000000000000100000001000000002000000008000000200000e000000000000000000004159e4f952a2909648032fbcb9846018c432af369bcf0f2754a8b86e13f9146bb1883eba418d5ba954fc79de1bdcc6b871003ea6de4d30aff1b865a77e31f2f7"], &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) ioctl$SOUND_MIXER_WRITE_VOLUME(0xffffffffffffffff, 0xc0044d19, &(0x7f0000000040)=0x62) [ 3039.225889][T26831] R13: 00007fffeeedcd5f R14: 00007f2639d639c0 R15: 000000000119bf8c 08:35:40 executing program 5: tkill(0xffffffffffffffff, 0x2a) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0x10, &(0x7f00000000c0)={&(0x7f0000000040)={0x4, 0xd44ffbb9e33c7a82, 0x2, {0x77359400}, {0x77359400}, {0x0, 0x0, 0x1, 0x1}, 0x1, @can={{0x2}, 0x8, 0x2, 0x0, 0x0, "97115e9f2c6277a3"}}, 0x48}, 0x1, 0x0, 0x0, 0x8800}, 0x20008805) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x80401, 0x0) ioctl$SOUND_MIXER_READ_CAPS(r0, 0x80044dfc, &(0x7f0000000180)) [ 3039.304633][T26843] qrtr: Invalid version 236 [ 3039.357231][T26843] qrtr: Invalid version 236 08:35:40 executing program 3 (fault-call:1 fault-nth:2): r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6", 0x1c) 08:35:40 executing program 0 (fault-call:0 fault-nth:0): clock_gettime(0xafe75f6ffb4dba53, 0x0) 08:35:40 executing program 4 (fault-call:0 fault-nth:3): socketpair(0x29, 0x2, 0x1000005, &(0x7f0000000040)) 08:35:40 executing program 1: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) ioctl$SOUND_MIXER_WRITE_VOLUME(r0, 0xc0044d10, &(0x7f0000000000)=0x30) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:40 executing program 5: tkill(0xffffffffffffffff, 0x2a) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x80401, 0x0) ioctl$SOUND_MIXER_READ_CAPS(r0, 0x80044dfc, &(0x7f0000000180)) 08:35:40 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6", 0x1c) socket$inet6_udp(0xa, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$vim2m_VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000100)={0x4a, 0x0, 0x4, 0x4, 0x0, {r1, r2/1000+60000}, {0x3, 0x0, 0x9e, 0x20, 0x20, 0x20, "e8df0497"}, 0x6, 0x3, @planes=&(0x7f00000000c0)={0x9, 0x7, @userptr=0x8ac4, 0x6}, 0x1}) [ 3039.490439][T26852] FAULT_INJECTION: forcing a failure. [ 3039.490439][T26852] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3039.504074][T26854] FAULT_INJECTION: forcing a failure. [ 3039.504074][T26854] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3039.529101][T26858] FAULT_INJECTION: forcing a failure. [ 3039.529101][T26858] name failslab, interval 1, probability 0, space 0, times 0 [ 3039.534759][T26860] qrtr: Invalid version 236 [ 3039.566899][T26852] CPU: 0 PID: 26852 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 3039.568305][T26860] qrtr: Invalid version 236 [ 3039.575715][T26852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 08:35:40 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x80401, 0x0) ioctl$SOUND_MIXER_READ_CAPS(r0, 0x80044dfc, &(0x7f0000000180)) [ 3039.575732][T26852] Call Trace: [ 3039.575741][T26852] dump_stack+0x107/0x163 [ 3039.575773][T26852] should_fail.cold+0x5/0xa [ 3039.575797][T26852] _copy_to_user+0x2c/0x150 [ 3039.575820][T26852] simple_read_from_buffer+0xcc/0x160 [ 3039.575850][T26852] proc_fail_nth_read+0x187/0x220 [ 3039.575873][T26852] ? proc_exe_link+0x1d0/0x1d0 [ 3039.575892][T26852] ? security_file_permission+0x248/0x560 [ 3039.575925][T26852] ? proc_exe_link+0x1d0/0x1d0 [ 3039.575949][T26852] vfs_read+0x1b5/0x570 [ 3039.575974][T26852] ksys_read+0x12d/0x250 [ 3039.575993][T26852] ? vfs_write+0xa30/0xa30 [ 3039.648215][T26852] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3039.654131][T26852] do_syscall_64+0x2d/0x70 [ 3039.659116][T26852] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3039.665429][T26852] RIP: 0033:0x417b11 [ 3039.669325][T26852] Code: 75 14 b8 00 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 6a fc ff ff 48 89 04 24 b8 00 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 08:35:41 executing program 5: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x80401, 0x0) ioctl$SOUND_MIXER_READ_CAPS(r0, 0x80044dfc, &(0x7f0000000180)) [ 3039.689135][T26852] RSP: 002b:00007fea660dec70 EFLAGS: 00000293 ORIG_RAX: 0000000000000000 [ 3039.697648][T26852] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 0000000000417b11 [ 3039.705642][T26852] RDX: 000000000000000f RSI: 00007fea660decb0 RDI: 0000000000000003 [ 3039.713711][T26852] RBP: 00007fea660deca0 R08: 0000000000000000 R09: 0000000000000000 [ 3039.722045][T26852] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 3039.730013][T26852] R13: 00007ffd39a9296f R14: 00007fea660df9c0 R15: 000000000119bf8c [ 3039.742285][T26854] CPU: 1 PID: 26854 Comm: syz-executor.4 Not tainted 5.11.0-rc1-syzkaller #0 [ 3039.751333][T26854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3039.761744][T26854] Call Trace: [ 3039.768149][T26854] dump_stack+0x107/0x163 [ 3039.772498][T26854] should_fail.cold+0x5/0xa [ 3039.777096][T26854] __alloc_pages_nodemask+0x189/0x730 [ 3039.782479][T26854] ? find_held_lock+0x2d/0x110 [ 3039.787249][T26854] ? __alloc_pages_slowpath.constprop.0+0x2240/0x2240 [ 3039.794033][T26854] ? mark_held_locks+0x9f/0xe0 [ 3039.798858][T26854] alloc_pages_current+0x18c/0x2a0 [ 3039.803976][T26854] pte_alloc_one+0x16/0x1e0 [ 3039.808487][T26854] do_huge_pmd_anonymous_page+0x58c/0x2390 [ 3039.814302][T26854] handle_mm_fault+0x3391/0x5640 [ 3039.819247][T26854] ? vm_iomap_memory+0x190/0x190 [ 3039.824197][T26854] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 3039.830456][T26854] ? vmacache_update+0xce/0x140 [ 3039.835330][T26854] do_user_addr_fault+0x570/0xc50 [ 3039.840369][T26854] exc_page_fault+0x9e/0x180 [ 3039.844963][T26854] asm_exc_page_fault+0x1e/0x30 [ 3039.849812][T26854] RIP: 0010:__put_user_nocheck_4+0x3/0x11 [ 3039.855533][T26854] Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca c3 0f 1f 44 00 00 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca c3 66 0f 1f 44 00 00 48 bb f9 ef ff ff ff 7f [ 3039.875148][T26854] RSP: 0018:ffffc90009b5fe48 EFLAGS: 00050293 [ 3039.881216][T26854] RAX: 0000000000000004 RBX: 00007fffffffeffd RCX: 0000000020000040 [ 3039.889178][T26854] RDX: 0000000000040000 RSI: ffffffff86ea30eb RDI: 0000000000000000 [ 3039.897143][T26854] RBP: 0000000000000002 R08: 0000000000000000 R09: 0000000000000000 [ 3039.905106][T26854] R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000004 [ 3039.913068][T26854] R13: 0000000000000005 R14: 0000000000000000 R15: dffffc0000000000 [ 3039.921037][T26854] ? __sys_socketpair+0xfb/0x570 [ 3039.925979][T26854] __sys_socketpair+0x107/0x570 [ 3039.930833][T26854] ? __ia32_sys_socket+0xb0/0xb0 [ 3039.935790][T26854] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 3039.942029][T26854] ? fput+0x2a/0x50 [ 3039.945960][T26854] __x64_sys_socketpair+0x93/0xf0 [ 3039.950981][T26854] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3039.956870][T26854] do_syscall_64+0x2d/0x70 [ 3039.961279][T26854] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3039.967185][T26854] RIP: 0033:0x45e219 [ 3039.971073][T26854] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3039.990678][T26854] RSP: 002b:00007f2639d62c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 3039.999090][T26854] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 [ 3040.007054][T26854] RDX: 0000000001000005 RSI: 0000000000000002 RDI: 0000000000000029 [ 3040.015019][T26854] RBP: 00007f2639d62ca0 R08: 0000000000000000 R09: 0000000000000000 [ 3040.023075][T26854] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000003 [ 3040.031037][T26854] R13: 00007fffeeedcd5f R14: 00007f2639d639c0 R15: 000000000119bf8c 08:35:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x8, 0x2, 0x0, 0xe, 0x0, 0xffffffff}]}}, &(0x7f0000001840)=""/4086, 0x2a, 0xff6, 0x1}, 0x20) 08:35:41 executing program 2: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x10, &(0x7f0000000100)={&(0x7f0000000080)=""/99, 0x63}}, 0x10) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r1, 0x891a, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x400, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) read$qrtrtun(r0, &(0x7f0000000180)=""/62, 0x3e) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6", 0xffffffffffffffee) 08:35:41 executing program 0: clock_gettime(0xafe75f6ffb4dba53, 0x0) [ 3040.039014][T26858] CPU: 0 PID: 26858 Comm: syz-executor.3 Not tainted 5.11.0-rc1-syzkaller #0 [ 3040.047788][T26858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3040.057844][T26858] Call Trace: [ 3040.061123][T26858] dump_stack+0x107/0x163 [ 3040.065467][T26858] should_fail.cold+0x5/0xa [ 3040.069977][T26858] ? __build_skb+0x21/0x60 [ 3040.075043][T26858] should_failslab+0x5/0x10 [ 3040.079552][T26858] kmem_cache_alloc+0x5b/0x440 [ 3040.084325][T26858] __build_skb+0x21/0x60 [ 3040.089303][T26858] __netdev_alloc_skb+0x20d/0x3f0 [ 3040.094489][T26858] qrtr_endpoint_post+0x84/0x11b0 [ 3040.100149][T26858] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 3040.105873][T26858] ? __check_object_size+0x171/0x3f0 [ 3040.111166][T26858] qrtr_tun_write_iter+0xf5/0x180 [ 3040.116226][T26858] new_sync_write+0x426/0x650 [ 3040.120905][T26858] ? new_sync_read+0x6e0/0x6e0 [ 3040.125674][T26858] ? lock_downgrade+0x6d0/0x6d0 [ 3040.131065][T26858] ? apparmor_file_permission+0x26e/0x4e0 [ 3040.137088][T26858] vfs_write+0x791/0xa30 [ 3040.141351][T26858] ksys_write+0x12d/0x250 [ 3040.146662][T26858] ? __ia32_sys_read+0xb0/0xb0 [ 3040.151435][T26858] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3040.158022][T26858] do_syscall_64+0x2d/0x70 [ 3040.162442][T26858] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3040.168343][T26858] RIP: 0033:0x45e219 [ 3040.173285][T26858] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3040.193015][T26858] RSP: 002b:00007fbd3e18dc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3040.201864][T26858] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045e219 [ 3040.210008][T26858] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000003 [ 3040.219040][T26858] RBP: 00007fbd3e18dca0 R08: 0000000000000000 R09: 0000000000000000 [ 3040.227011][T26858] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3040.234982][T26858] R13: 00007ffe8200ad9f R14: 00007fbd3e18e9c0 R15: 000000000119bf8c 08:35:41 executing program 3 (fault-call:1 fault-nth:3): r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6", 0x1c) 08:35:41 executing program 4 (fault-call:0 fault-nth:4): socketpair(0x29, 0x2, 0x1000005, &(0x7f0000000040)) 08:35:41 executing program 5: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x80401, 0x0) ioctl$SOUND_MIXER_READ_CAPS(r0, 0x80044dfc, &(0x7f0000000180)) 08:35:41 executing program 0: get_robust_list(0x0, &(0x7f0000000140)=&(0x7f0000000040)={&(0x7f00000001c0)={&(0x7f0000000000)}, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)}}, &(0x7f0000000180)=0x18) clock_gettime(0x3, 0x0) [ 3040.394514][T26885] qrtr: Invalid version 236 08:35:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func={0xb, 0x0, 0x0, 0xc, 0x1}]}}, &(0x7f0000000840)=""/4074, 0x26, 0xfea, 0x1}, 0x20) [ 3040.418687][T26885] FAULT_INJECTION: forcing a failure. [ 3040.418687][T26885] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3040.452002][T26889] FAULT_INJECTION: forcing a failure. [ 3040.452002][T26889] name failslab, interval 1, probability 0, space 0, times 0 08:35:41 executing program 5: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x80401, 0x0) ioctl$SOUND_MIXER_READ_CAPS(r0, 0x80044dfc, &(0x7f0000000180)) [ 3040.488808][T26885] CPU: 0 PID: 26885 Comm: syz-executor.3 Not tainted 5.11.0-rc1-syzkaller #0 [ 3040.497722][T26885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3040.507794][T26885] Call Trace: [ 3040.511089][T26885] dump_stack+0x107/0x163 [ 3040.515443][T26885] should_fail.cold+0x5/0xa [ 3040.519966][T26885] _copy_to_user+0x2c/0x150 [ 3040.524566][T26885] simple_read_from_buffer+0xcc/0x160 [ 3040.529948][T26885] proc_fail_nth_read+0x187/0x220 [ 3040.534993][T26885] ? proc_exe_link+0x1d0/0x1d0 [ 3040.539781][T26885] ? security_file_permission+0x248/0x560 [ 3040.545526][T26885] ? proc_exe_link+0x1d0/0x1d0 [ 3040.550388][T26885] vfs_read+0x1b5/0x570 [ 3040.554558][T26885] ksys_read+0x12d/0x250 [ 3040.558805][T26885] ? vfs_write+0xa30/0xa30 [ 3040.563228][T26885] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3040.569130][T26885] do_syscall_64+0x2d/0x70 [ 3040.573775][T26885] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3040.579771][T26885] RIP: 0033:0x417b11 08:35:41 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_CAPS(r0, 0x80044dfc, &(0x7f0000000180)) [ 3040.583683][T26885] Code: 75 14 b8 00 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 6a fc ff ff 48 89 04 24 b8 00 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 3040.603394][T26885] RSP: 002b:00007fbd3e18dc70 EFLAGS: 00000293 ORIG_RAX: 0000000000000000 [ 3040.611994][T26885] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 0000000000417b11 [ 3040.619983][T26885] RDX: 000000000000000f RSI: 00007fbd3e18dcb0 RDI: 0000000000000004 [ 3040.627967][T26885] RBP: 00007fbd3e18dca0 R08: 0000000000000000 R09: 0000000000000000 08:35:42 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) clock_gettime(0xafe75f6ffb4dba53, 0x0) getsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 3040.635939][T26885] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003 [ 3040.643913][T26885] R13: 00007ffe8200ad9f R14: 00007fbd3e18e9c0 R15: 000000000119bf8c [ 3040.664798][T26889] CPU: 1 PID: 26889 Comm: syz-executor.4 Not tainted 5.11.0-rc1-syzkaller #0 [ 3040.673623][T26889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3040.683689][T26889] Call Trace: [ 3040.686973][T26889] dump_stack+0x107/0x163 [ 3040.691744][T26889] should_fail.cold+0x5/0xa [ 3040.696281][T26889] ? ptlock_alloc+0x1d/0x70 [ 3040.701972][T26889] should_failslab+0x5/0x10 [ 3040.706981][T26889] kmem_cache_alloc+0x5b/0x440 [ 3040.712594][T26889] ptlock_alloc+0x1d/0x70 [ 3040.716933][T26889] pte_alloc_one+0x68/0x1e0 [ 3040.722445][T26889] do_huge_pmd_anonymous_page+0x58c/0x2390 [ 3040.728267][T26889] handle_mm_fault+0x3391/0x5640 [ 3040.733693][T26889] ? vm_iomap_memory+0x190/0x190 [ 3040.739570][T26889] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 3040.745820][T26889] ? vmacache_update+0xce/0x140 [ 3040.750683][T26889] do_user_addr_fault+0x570/0xc50 [ 3040.757580][T26889] exc_page_fault+0x9e/0x180 [ 3040.763310][T26889] asm_exc_page_fault+0x1e/0x30 [ 3040.768999][T26889] RIP: 0010:__put_user_nocheck_4+0x3/0x11 [ 3040.774733][T26889] Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca c3 0f 1f 44 00 00 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca c3 66 0f 1f 44 00 00 48 bb f9 ef ff ff ff 7f [ 3040.794715][T26889] RSP: 0018:ffffc9000c5e7e48 EFLAGS: 00050293 [ 3040.800793][T26889] RAX: 0000000000000004 RBX: 00007fffffffeffd RCX: 0000000020000040 [ 3040.809060][T26889] RDX: 0000000000040000 RSI: ffffffff86ea30eb RDI: 0000000000000000 [ 3040.817693][T26889] RBP: 0000000000000002 R08: 0000000000000000 R09: 0000000000000000 [ 3040.826285][T26889] R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000004 [ 3040.834870][T26889] R13: 0000000000000005 R14: 0000000000000000 R15: dffffc0000000000 [ 3040.843741][T26889] ? __sys_socketpair+0xfb/0x570 [ 3040.849460][T26889] __sys_socketpair+0x107/0x570 [ 3040.855228][T26889] ? __ia32_sys_socket+0xb0/0xb0 [ 3040.861218][T26889] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 3040.867478][T26889] ? fput+0x2a/0x50 [ 3040.871388][T26889] __x64_sys_socketpair+0x93/0xf0 [ 3040.877506][T26889] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3040.883423][T26889] do_syscall_64+0x2d/0x70 08:35:42 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6", 0x1c) [ 3040.888297][T26889] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3040.894196][T26889] RIP: 0033:0x45e219 [ 3040.898113][T26889] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3040.917820][T26889] RSP: 002b:00007f2639d62c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 3040.922970][T26906] qrtr: Invalid version 236 [ 3040.926332][T26889] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 08:35:42 executing program 0: syz_genetlink_get_family_id$mptcp(&(0x7f0000000000)='mptcp_pm\x00') r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000040)='&{-*/.^(\x00', 0x9) [ 3040.926349][T26889] RDX: 0000000001000005 RSI: 0000000000000002 RDI: 0000000000000029 [ 3040.926363][T26889] RBP: 00007f2639d62ca0 R08: 0000000000000000 R09: 0000000000000000 [ 3040.926378][T26889] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000004 [ 3040.926393][T26889] R13: 00007fffeeedcd5f R14: 00007f2639d639c0 R15: 000000000119bf8c 08:35:42 executing program 2: openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) socketpair(0x25, 0x80000, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$SMC_PNETID_FLUSH(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="440000003a9d62abe009f8f20a1e16950824a9cf3b1f22131c5a003fdbb8bef7b56863a9de6892ce0a2e60671b501ebed496b853c66f627fd14171d744007b79e3789d7d72e6d61646df40868b3dbace82509ff3bde2a7c5a1680a7282", @ANYBLOB="12222b35356bc99b0c3422c61b3c1616dd0e352a447eb9d069871030a43cad80753eed7d", @ANYBLOB="000827bd7000fcdbdf250400000005000400020000000900030073797a310000000005000400020000001400020076657468305f746f5f62726964676500d9679e5150d65e35a2b7149b89b1c166d57476a95cb9471b8abc9d723ebb67c10b8616277ce7bae7d9"], 0x44}, 0x1, 0x0, 0x0, 0x4044005}, 0x20000000) 08:35:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x90, 0x90, 0xb, [@typedef={0x8, 0x0, 0x0, 0x8, 0x5}, @union={0x6, 0x6, 0x0, 0x5, 0x1, 0x2, [{0x10, 0x3}, {0x8, 0x1, 0x10000}, {0x1, 0x1, 0x4}, {0x0, 0x4, 0x9}, {0xa, 0x1, 0xed}, {0x0, 0x0, 0xfffffffa}]}, @volatile={0x4, 0x0, 0x0, 0x9, 0x5}, @struct={0x3, 0x2, 0x0, 0x4, 0x0, 0x200, [{0x5, 0x1, 0x6}, {0x2, 0x1}]}]}, {0x0, [0x61, 0x5f, 0x30, 0xe536a43c73ac7ddd, 0x0, 0x30, 0x30, 0x61, 0x61]}}, &(0x7f0000000140)=""/189, 0xb3, 0xbd}, 0x20) 08:35:42 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_CAPS(r0, 0x80044dfc, &(0x7f0000000180)) 08:35:42 executing program 4 (fault-call:0 fault-nth:5): socketpair(0x29, 0x2, 0x1000005, &(0x7f0000000040)) 08:35:42 executing program 0: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp1\x00', 0x101040, 0x0) clock_gettime(0xafe75f6ffb4dba53, 0x0) ioctl$SOUND_MIXER_READ_RECSRC(r0, 0x80044dff, &(0x7f0000000080)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0), 0x4) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x600, 0x0) ioctl$sock_ifreq(r1, 0x891a, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r1, 0x80045006, &(0x7f0000000040)) 08:35:42 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_CAPS(r0, 0x80044dfc, &(0x7f0000000180)) 08:35:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x100000000, 0x400) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000040)=""/185) [ 3041.125715][T26918] FAULT_INJECTION: forcing a failure. [ 3041.125715][T26918] name failslab, interval 1, probability 0, space 0, times 0 [ 3041.192767][T26918] CPU: 0 PID: 26918 Comm: syz-executor.4 Not tainted 5.11.0-rc1-syzkaller #0 [ 3041.203727][T26918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3041.214791][T26918] Call Trace: [ 3041.218069][T26918] dump_stack+0x107/0x163 [ 3041.222417][T26918] should_fail.cold+0x5/0xa [ 3041.227138][T26918] ? sock_alloc_inode+0x18/0x1c0 [ 3041.232108][T26918] should_failslab+0x5/0x10 [ 3041.236641][T26918] kmem_cache_alloc+0x5b/0x440 08:35:42 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r1, 0x891a, 0x0) bind$bt_sco(r1, &(0x7f0000000080), 0x8) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6", 0x1c) [ 3041.242492][T26918] ? sock_free_inode+0x20/0x20 [ 3041.247287][T26918] sock_alloc_inode+0x18/0x1c0 [ 3041.252075][T26918] ? sock_free_inode+0x20/0x20 [ 3041.256864][T26918] alloc_inode+0x61/0x230 [ 3041.261220][T26918] new_inode_pseudo+0x14/0xe0 [ 3041.265916][T26918] sock_alloc+0x3c/0x260 [ 3041.270182][T26918] __sock_create+0xb9/0x780 [ 3041.274714][T26918] __sys_socketpair+0x1be/0x570 [ 3041.280185][T26918] ? __ia32_sys_socket+0xb0/0xb0 [ 3041.285139][T26918] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 08:35:42 executing program 0: getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f0000000000)=""/132, &(0x7f00000000c0)=0x84) clock_gettime(0xafe75f6ffb4dba53, 0x0) 08:35:42 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="0abd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6", 0x1c) [ 3041.291573][T26918] ? fput+0x2a/0x50 [ 3041.295409][T26918] __x64_sys_socketpair+0x93/0xf0 [ 3041.300452][T26918] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3041.306366][T26918] do_syscall_64+0x2d/0x70 [ 3041.311831][T26918] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3041.318248][T26918] RIP: 0033:0x45e219 [ 3041.322416][T26918] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3041.342050][T26918] RSP: 002b:00007f2639d62c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 3041.350487][T26918] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 [ 3041.359020][T26918] RDX: 0000000001000005 RSI: 0000000000000002 RDI: 0000000000000029 [ 3041.367006][T26918] RBP: 00007f2639d62ca0 R08: 0000000000000000 R09: 0000000000000000 [ 3041.376162][T26918] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000005 [ 3041.388251][T26918] R13: 00007fffeeedcd5f R14: 00007f2639d639c0 R15: 000000000119bf8c 08:35:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x15, 0x100, 0x0, 0x12, 0x104, 0x1, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x1}, 0x40) 08:35:42 executing program 5: openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x80401, 0x0) ioctl$SOUND_MIXER_READ_CAPS(0xffffffffffffffff, 0x80044dfc, &(0x7f0000000180)) [ 3041.432281][T26931] qrtr: Invalid version 236 [ 3041.448616][T26933] qrtr: Invalid version 236 08:35:42 executing program 2: ioctl$vim2m_VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000100)={0x2, 0x3b65, 0x1, 0x80800}) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) r1 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qrtr-tun\x00', 0x24241) write$qrtrtun(r1, &(0x7f0000000180)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6", 0x1c) ioctl$vim2m_VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000080)={0x4, 0x0, 0x4, 0x100000, 0xe642, {0x0, 0x2710}, {0x3, 0x8, 0x20, 0x1, 0x2, 0x7, "4735836e"}, 0x3, 0x4, @userptr=0x3ff, 0x6, 0x0, r0}) openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qrtr-tun\x00', 0x408800) [ 3041.490044][T26935] qrtr: Invalid version 10 08:35:42 executing program 0: clock_gettime(0x2, 0x0) socketpair(0x29, 0x80000, 0x200, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)) sendto$rxrpc(r0, &(0x7f0000000280)="919b560ab79247db68931b2761628fdf7db2c0198ecfe4046f894535422b9c598ce39a414be8a6c88d7de28976913e2df66f81df8362cd91af0611223e52a273b1a6767fb70ca64e69293a5a3d2aad089045388cbb2d59c8d16ae343c1c20d7747490bcaa5a4d5bec6c81e7ed99d43ffa8e693369a8d45a1ebf64f6ee590a9a0c5588baf77a10b0e1500ec9f72897ebeaad52ce43efc8b1008522925946c692833c2e6a00a9ba6796ee80223faa3fd8b4f8683c3bd95182d4e9f92320b39f31357b5ad9ab612c70c627feed48b899b5e95e1f9910a4deb000000000000000000f98fcc585514ac230354c27a2eb4040e044b1bd07207eb5306464aaa3bd2213291a3e808f9c7ec9873a7daf6cb080c790dd6e35b5e2568b9e5611669f56946a1d832f4be53d444c32ef89941302ee241fa1893558415b24ccc38c4dd1af75f78b0b53bc6c658073bb80374799f42ee03f43815cd851c99b96f32b5045c1a5d1d4d27525c720eb0d431f8cd74dcd0851e4cf9008269313f6bcc74b35008224e5b20c6806cc592c72056a075072e321115199af811b38675dc8aad519a1d96ba8aa9ddcc8bc574d6", 0x1a7, 0x10, &(0x7f0000000240)=@in4={0x21, 0x11, 0x2, 0x10, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}}, 0x24) sysfs$2(0x2, 0x80000001, &(0x7f00000001c0)=""/118) 08:35:42 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="63bd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6", 0x1c) [ 3041.598581][T26944] qrtr: Invalid version 99 [ 3041.674269][T26918] socket: no more sockets 08:35:43 executing program 4 (fault-call:0 fault-nth:6): socketpair(0x29, 0x2, 0x1000005, &(0x7f0000000040)) 08:35:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func={0xa, 0x0, 0x0, 0xc, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x26, 0x1000, 0x1}, 0x20) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0)='mptcp_pm\x00') bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000380)={0x8af0}, 0x8) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r1, 0x89f9, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000080)={&(0x7f0000000000)="e557a971a3ded285817773465111838c00bc5bb185eea7284ae4d842a233701d9719ac26d9872b597f578cca230f4adffb5e0e5727da989f04dda8c86200ba7fae627591a5f4789c1bc9c9177663b212405e6049547a17b0c942c55dede43427d07c99d6ec719763f19c480f65403b11475cf9bc77ee1f5df8bc", &(0x7f0000000140)=""/155, &(0x7f0000000200)="dbfcad58ff58a120ec505a33e013d0d16aa8a05aab012462d02c4d98f7d3878ae06cfdcc3c737452b69bab42d8a7ceb5b0680cff415e626569adff740c1ad2a21189851b18c2259eb1db61b1e512b193ba6c4b6b23caadb2093ecabd10eed42e5380931f79df6533c570a4b99791f34986bb83ee24b204dacf52c4eee4dcf64d69d318877c73b5a89d582b0336a94adff2036800"/160, &(0x7f00000002c0)="94ee515338a95199f089b86f1fc933ea7d2e87818e87aee524118b259ea8fdcecd8ce27504252583cb4c530b365386194ad2e7efdc803e1dd3611ef406978a17549726445deebec57e6bbedb3a1c3aafdc853e79de4e602fb5c1b28ddbb7a6279414995d5f1eac23d5516e574a3b5c80f77a8f3d08aef0ce77e91809d27e273c79ff6d3d61a5cdd2b93a082ec77890d489933e8d7b7b6d110ff16e853790481c6defc83baf33d974", 0x6, r0, 0x4}, 0x38) 08:35:43 executing program 5: openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x80401, 0x0) ioctl$SOUND_MIXER_READ_CAPS(0xffffffffffffffff, 0x80044dfc, &(0x7f0000000180)) 08:35:43 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5125e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6", 0x1c) 08:35:43 executing program 0: clock_gettime(0xafe75f6ffb4dba53, 0x0) r0 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000001200), &(0x7f0000001240)=0x10, 0x0) io_pgetevents(0x0, 0x7fffffff, 0x1, &(0x7f00000001c0)=[{}], &(0x7f0000000200), &(0x7f0000000280)={&(0x7f0000000240)={[0x8]}, 0x8}) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f00000003c0)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000500)=ANY=[@ANYBLOB="ea7c6c38ef28b19f4047f06f0f53bf9940f1ba334554fdf748a0ef00000100"/54, @ANYBLOB="214ab495b67a438c12c232612c5e42433ed9d9f85ea22e337d12c9eebe652d3a983d97cb9cbf58c91573fd1975be6da50f7760794e75da933292acb8428992c214dd8095305b32411c90a47df1e6a77126f05c77a0c56e25b3b7689b633a9f4479d629084c31259b8f", @ANYBLOB="00022abd7000fcdbdf2502000000050005000000000005000d000100000008001800ac1414aa08001800ffffffff050014000100000008001700", @ANYRES32, @ANYRESOCT=r0], 0x6c}, 0x1, 0x0, 0x0, 0x4040000}, 0x48004) getsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, &(0x7f0000001280), &(0x7f00000012c0)=0x4) socketpair(0x6, 0xa, 0x8, &(0x7f0000000000)) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) restart_syscall() ioctl$sock_ifreq(r2, 0x891a, 0x0) sendmsg$NLBL_CALIPSO_C_REMOVE(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x4c, 0x0, 0x800, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4008004}, 0x10) ptrace$setregs(0xd, 0xffffffffffffffff, 0x4, &(0x7f0000000180)="56da1645640adaa034e56633ac1db698f494e032221f38baa3fb40944bf858c25977b9bc5513fe86bfa24389ef978a16810587d2bbc8ed53455a05d5") 08:35:43 executing program 2: ioctl$DRM_IOCTL_MODE_MAP_DUMB(0xffffffffffffffff, 0xc01064b3, &(0x7f0000000080)) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd0400000000000000bff362b7b7e16337f4fbffffffffffffffb6", 0x1c) [ 3041.761529][T26954] qrtr: Invalid version 236 [ 3041.788483][T26959] FAULT_INJECTION: forcing a failure. [ 3041.788483][T26959] name failslab, interval 1, probability 0, space 0, times 0 [ 3041.793444][T26958] qrtr: Invalid version 236 08:35:43 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7255dbff36aa7b7e16337f4be093158fe381a48b6", 0x1c) 08:35:43 executing program 0: clock_gettime(0xafe75f6ffb4dba53, 0x0) io_setup(0x101, &(0x7f0000000000)=0x0) io_getevents(r0, 0x1b, 0x3, &(0x7f0000000040)=[{}, {}, {}], &(0x7f00000000c0)) 08:35:43 executing program 5: openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x80401, 0x0) ioctl$SOUND_MIXER_READ_CAPS(0xffffffffffffffff, 0x80044dfc, &(0x7f0000000180)) [ 3041.835621][T26962] qrtr: Invalid version 236 08:35:43 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x8000, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x40047438, &(0x7f00000000c0)) socket$tipc(0x1e, 0x2, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20ncci\x00', 0x281, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000200)={0x5, 0x3, 0x4, 0x10, 0x2, {0x0, 0xea60}, {0x4, 0x8, 0x5, 0x6, 0x6, 0x80, '\x00\b\x00'}, 0x4, 0x1, @fd, 0x3}) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r1, 0x891a, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/fib_trie\x00') r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r2, 0x891a, 0x0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x101280, 0x0) ioctl$sock_ifreq(r3, 0x8929, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x741080, 0x0) ioctl$sock_ifreq(r4, 0x891a, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b80)='net/dev\x00') bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000140)={0x4}, 0x8) r5 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r5, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6", 0x1c) prctl$PR_SET_ENDIAN(0x14, 0x0) [ 3041.877437][T26959] CPU: 0 PID: 26959 Comm: syz-executor.4 Not tainted 5.11.0-rc1-syzkaller #0 [ 3041.886499][T26959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3041.897263][T26959] Call Trace: [ 3041.900624][T26959] dump_stack+0x107/0x163 [ 3041.904965][T26959] should_fail.cold+0x5/0xa [ 3041.909471][T26959] ? security_inode_alloc+0x34/0x160 [ 3041.914853][T26959] should_failslab+0x5/0x10 [ 3041.919457][T26959] kmem_cache_alloc+0x5b/0x440 [ 3041.924583][T26959] security_inode_alloc+0x34/0x160 [ 3041.930721][T26959] inode_init_always+0x5a9/0xdb0 [ 3041.935669][T26959] ? __init_waitqueue_head+0x97/0x110 [ 3041.941047][T26959] alloc_inode+0x82/0x230 [ 3041.946223][T26959] new_inode_pseudo+0x14/0xe0 [ 3041.951317][T26959] sock_alloc+0x3c/0x260 [ 3041.955564][T26959] __sock_create+0xb9/0x780 [ 3041.961167][T26959] __sys_socketpair+0x1be/0x570 [ 3041.966026][T26959] ? __ia32_sys_socket+0xb0/0xb0 08:35:43 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x80401, 0x0) ioctl$SOUND_MIXER_READ_CAPS(r0, 0x80044dfc, 0x0) [ 3041.972052][T26959] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 3041.978304][T26959] ? fput+0x2a/0x50 [ 3041.982124][T26959] __x64_sys_socketpair+0x93/0xf0 [ 3041.987151][T26959] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3041.993048][T26959] do_syscall_64+0x2d/0x70 [ 3041.998101][T26959] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3042.004420][T26959] RIP: 0033:0x45e219 [ 3042.008316][T26959] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:35:43 executing program 1: openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x404280, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) [ 3042.028186][T26959] RSP: 002b:00007f2639d62c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 3042.036603][T26959] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 [ 3042.045542][T26959] RDX: 0000000001000005 RSI: 0000000000000002 RDI: 0000000000000029 [ 3042.049130][T26973] qrtr: Invalid version 236 [ 3042.053596][T26959] RBP: 00007f2639d62ca0 R08: 0000000000000000 R09: 0000000000000000 [ 3042.053613][T26959] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000006 [ 3042.053627][T26959] R13: 00007fffeeedcd5f R14: 00007f2639d639c0 R15: 000000000119bf8c [ 3042.063420][T26959] socket: no more sockets 08:35:43 executing program 4 (fault-call:0 fault-nth:7): socketpair(0x29, 0x2, 0x1000005, &(0x7f0000000040)) 08:35:43 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000300)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback={0xfec0000000000000}}}, 0x24) socket$inet6_udp(0xa, 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb01001800000000000000100000f11000000002000000000000000200000e00"/42], &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 08:35:43 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6", 0x1d) 08:35:43 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x80401, 0x0) ioctl$SOUND_MIXER_READ_CAPS(r0, 0x80044dfc, 0x0) 08:35:43 executing program 0: clock_gettime(0xafe75f6ffb4dba53, 0x0) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0xf800, 0x7, 0x0, 0x100}, {0xa5, 0x4, 0x2, 0xc4fe}]}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x343, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r1, 0x891a, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000180)={0x0}) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r3, 0x891a, 0x0) ioctl$PPPIOCNEWUNIT(r3, 0xc004743e, &(0x7f0000000140)=0x1) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000100)={r2, 0x0, 0xffffffffffffffff, 0x5}) 08:35:43 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x101000) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r1, 0x891a, 0x0) inotify_add_watch(r1, &(0x7f0000000080)='\x00', 0x800) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6", 0x1c) [ 3042.236495][T26985] FAULT_INJECTION: forcing a failure. [ 3042.236495][T26985] name fail_usercopy, interval 1, probability 0, space 0, times 0 08:35:43 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x80401, 0x0) ioctl$SOUND_MIXER_READ_CAPS(r0, 0x80044dfc, 0x0) 08:35:43 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6", 0x2000005c) 08:35:43 executing program 0: clock_gettime(0xafe75f6ffb4dba53, 0x0) clock_gettime(0xf98e7935f840008b, &(0x7f0000000000)) [ 3042.288202][T26985] CPU: 0 PID: 26985 Comm: syz-executor.4 Not tainted 5.11.0-rc1-syzkaller #0 [ 3042.297178][T26985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3042.307312][T26985] Call Trace: [ 3042.310678][T26985] dump_stack+0x107/0x163 [ 3042.315018][T26985] should_fail.cold+0x5/0xa [ 3042.319530][T26985] _copy_to_user+0x2c/0x150 [ 3042.324214][T26985] simple_read_from_buffer+0xcc/0x160 [ 3042.329594][T26985] proc_fail_nth_read+0x187/0x220 [ 3042.334623][T26985] ? proc_exe_link+0x1d0/0x1d0 [ 3042.339562][T26985] ? security_file_permission+0x248/0x560 [ 3042.345267][T26985] ? proc_exe_link+0x1d0/0x1d0 [ 3042.350004][T26985] vfs_read+0x1b5/0x570 [ 3042.354327][T26985] ksys_read+0x12d/0x250 [ 3042.358546][T26985] ? vfs_write+0xa30/0xa30 [ 3042.363310][T26985] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3042.369376][T26985] do_syscall_64+0x2d/0x70 [ 3042.373779][T26985] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3042.379917][T26985] RIP: 0033:0x417b11 [ 3042.383790][T26985] Code: 75 14 b8 00 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 6a fc ff ff 48 89 04 24 b8 00 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 3042.403622][T26985] RSP: 002b:00007f2639d62c70 EFLAGS: 00000293 ORIG_RAX: 0000000000000000 [ 3042.412487][T26985] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 0000000000417b11 [ 3042.420985][T26985] RDX: 000000000000000f RSI: 00007f2639d62cb0 RDI: 0000000000000003 [ 3042.428986][T26985] RBP: 00007f2639d62ca0 R08: 0000000000000000 R09: 0000000000000000 08:35:43 executing program 1: write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x9) [ 3042.437050][T26985] R10: 0000000020000040 R11: 0000000000000293 R12: 0000000000000007 [ 3042.445409][T26985] R13: 00007fffeeedcd5f R14: 00007f2639d639c0 R15: 000000000119bf8c 08:35:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x0, 0x2, 0x0, 0xe, 0x0, 0x1}]}, {0x0, [0x2e, 0x30, 0x5f]}}, &(0x7f0000001840)=""/4100, 0x2d, 0x1004, 0x1}, 0x20) 08:35:43 executing program 4: socketpair(0x29, 0x2, 0x1000005, &(0x7f0000000040)) [ 3042.543843][T26998] ------------[ cut here ]------------ [ 3042.559982][T26998] WARNING: CPU: 0 PID: 26998 at mm/page_alloc.c:4976 __alloc_pages_nodemask+0x5f8/0x730 08:35:44 executing program 2: socketpair(0x9, 0x1, 0x2, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, &(0x7f0000000ac0)='oom_score_adj\x00') socket$vsock_stream(0x28, 0x1, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r2, 0x891a, 0x0) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000001680)=@buf={0x46, &(0x7f0000000100)="5648878e057ec52266a5e00065d2c1442f51d8db598e91aeb24d073e099b4f4e14cfa584806b230290d5d715d1d03e699ae33c0e24ba31942fdf770a7780cce350be99fcf48c"}) r3 = syz_genetlink_get_family_id$smc(&(0x7f0000001700)='SMC_PNETID\x00') sendmsg$SMC_PNETID_GET(r1, &(0x7f00000017c0)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000001780)={&(0x7f0000001880)={0x34, r3, 0x10, 0x70bd26, 0x25dfdbfe, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x20048854) setsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, &(0x7f00000000c0)=0x1, 0x4) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000001800)={0x2}, 0x4) r4 = accept4(r1, &(0x7f0000001600)=@l2tp6={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000180)=0x80, 0x800) socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r4, &(0x7f00000015c0)={0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f00000001c0)=""/209, 0xd1}, {&(0x7f00000002c0)=""/200, 0xc8}, {&(0x7f00000003c0)=""/234, 0xea}, {&(0x7f00000004c0)=""/4096, 0x1000}], 0x4, &(0x7f0000001500)=""/174, 0xae}, 0x20) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_tables_matches\x00') ioctl$PPPIOCGDEBUG(r5, 0x80047441, &(0x7f0000001840)) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000040)="ecbd5120e27506d7725dbff36aa7b7e16337f4be093158fe381a48b6", 0x1c) 08:35:44 executing program 5: clock_gettime(0xafe75f6ffb4dba53, 0x0) io_setup(0x101, &(0x7f0000000000)=0x0) io_getevents(r0, 0x1b, 0x3, &(0x7f0000000040)=[{}, {}, {}], &(0x7f00000000c0)) 08:35:44 executing program 0: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x21a240, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) r1 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x5000000) inotify_rm_watch(r0, r1) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r2, 0x891a, 0x0) bind$bt_sco(r2, &(0x7f0000000040)={0x1f, @none}, 0x8) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x480, 0x0) 08:35:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000840)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000000)='NLBL_CALIPSO\x00') [ 3042.592471][T26998] Modules linked in: [ 3042.606290][T26998] CPU: 0 PID: 26998 Comm: syz-executor.3 Not tainted 5.11.0-rc1-syzkaller #0 08:35:44 executing program 4: socketpair(0x2, 0x2, 0x1000005, &(0x7f0000000040)) [ 3042.647503][T26998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 08:35:44 executing program 0: clock_gettime(0xafe75f6ffb4dba53, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)={0x5}, 0x8) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000000)) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x600, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000040)) [ 3042.698121][T26998] RIP: 0010:__alloc_pages_nodemask+0x5f8/0x730 [ 3042.717285][T26998] Code: 00 00 0c 00 0f 85 a7 00 00 00 8b 3c 24 4c 89 f2 44 89 e6 c6 44 24 70 00 48 89 6c 24 58 e8 d0 d7 ff ff 49 89 c5 e9 ea fc ff ff <0f> 0b e9 b5 fd ff ff 89 74 24 14 4c 89 4c 24 08 4c 89 74 24 18 e8 08:35:44 executing program 2: openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x1) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r0, 0x891a, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/sockstat\x00') r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r1, 0x891a, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r2, 0x891a, 0x0) write$qrtrtun(r2, &(0x7f0000000080)="ecbe1e3158fe38e6e395b1ec4de910849b00000000000075971a4da80ff131c2f1bdd50e46a3ef39510f20fa1ae7ff0400007995d5d20e9146f4d4f200a25c92fb912eb8bdb09d", 0x47) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_ifreq(r3, 0x891a, 0x0) ioctl$PPPIOCATTACH(r3, 0x4004743d, &(0x7f0000000100)=0x3) [ 3042.787279][T26998] RSP: 0018:ffffc900164b7b70 EFLAGS: 00010246 [ 3042.816192][T26998] RAX: 0000000000000000 RBX: 1ffff92002c96f72 RCX: 0000000000000000 [ 3042.843878][T26998] RDX: 0000000000000000 RSI: dffffc0000000000 RDI: 0000000000040dc0 [ 3042.876585][T26998] RBP: 0000000000040dc0 R08: 0000000000000000 R09: 0000000000000000 [ 3042.886642][T26998] R10: ffffffff81b1f7e1 R11: 0000000000000000 R12: 0000000000000012 [ 3042.896633][T26998] R13: 0000000000000012 R14: 0000000000000000 R15: 000000002000005c [ 3042.911319][T26998] FS: 00007fbd3e18e700(0000) GS:ffff8880b9e00000(0000) knlGS:0000000000000000 [ 3042.922212][T26998] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3042.928901][T26998] CR2: 0000001b2eb22000 CR3: 0000000050d4a000 CR4: 0000000000350ef0 [ 3042.938444][T26998] Call Trace: [ 3042.943495][T26998] ? __alloc_pages_slowpath.constprop.0+0x2240/0x2240 [ 3042.959273][T26998] ? lock_downgrade+0x6d0/0x6d0 [ 3042.969251][T26998] alloc_pages_current+0x18c/0x2a0 [ 3042.981407][T26998] kmalloc_order+0x2e/0xb0 [ 3042.985830][T26998] kmalloc_order_trace+0x14/0x120 [ 3042.991696][T26998] qrtr_tun_write_iter+0x8a/0x180 [ 3042.996744][T26998] new_sync_write+0x426/0x650 [ 3043.002145][T26998] ? new_sync_read+0x6e0/0x6e0 [ 3043.007345][T26998] ? lock_downgrade+0x6d0/0x6d0 [ 3043.012295][T26998] ? apparmor_file_permission+0x26e/0x4e0 [ 3043.018026][T26998] vfs_write+0x791/0xa30 [ 3043.023489][T26998] ksys_write+0x12d/0x250 [ 3043.028589][T26998] ? __ia32_sys_read+0xb0/0xb0 [ 3043.036284][T26998] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3043.042316][T26998] do_syscall_64+0x2d/0x70 [ 3043.046736][T26998] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3043.052762][T26998] RIP: 0033:0x45e219 [ 3043.056897][T26998] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3043.077413][T26998] RSP: 002b:00007fbd3e18dc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3043.086314][T26998] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 [ 3043.095057][T26998] RDX: 000000002000005c RSI: 0000000020000040 RDI: 0000000000000003 [ 3043.103113][T26998] RBP: 000000000119bfc0 R08: 0000000000000000 R09: 0000000000000000 [ 3043.111360][T26998] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000119bf8c [ 3043.119804][T26998] R13: 00007ffe8200ad9f R14: 00007fbd3e18e9c0 R15: 000000000119bf8c [ 3043.128540][T26998] Kernel panic - not syncing: panic_on_warn set ... [ 3043.135354][T26998] CPU: 1 PID: 26998 Comm: syz-executor.3 Not tainted 5.11.0-rc1-syzkaller #0 [ 3043.144930][T26998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3043.155606][T26998] Call Trace: [ 3043.158877][T26998] dump_stack+0x107/0x163 [ 3043.163197][T26998] panic+0x306/0x73d [ 3043.167097][T26998] ? __warn_printk+0xf3/0xf3 [ 3043.171673][T26998] ? __warn.cold+0x1a/0x44 [ 3043.176091][T26998] ? __alloc_pages_nodemask+0x5f8/0x730 [ 3043.181715][T26998] __warn.cold+0x35/0x44 [ 3043.186128][T26998] ? __alloc_pages_nodemask+0x5f8/0x730 [ 3043.191679][T26998] report_bug+0x1bd/0x210 [ 3043.196006][T26998] handle_bug+0x3c/0x60 [ 3043.200149][T26998] exc_invalid_op+0x14/0x40 [ 3043.204638][T26998] asm_exc_invalid_op+0x12/0x20 [ 3043.209472][T26998] RIP: 0010:__alloc_pages_nodemask+0x5f8/0x730 [ 3043.215615][T26998] Code: 00 00 0c 00 0f 85 a7 00 00 00 8b 3c 24 4c 89 f2 44 89 e6 c6 44 24 70 00 48 89 6c 24 58 e8 d0 d7 ff ff 49 89 c5 e9 ea fc ff ff <0f> 0b e9 b5 fd ff ff 89 74 24 14 4c 89 4c 24 08 4c 89 74 24 18 e8 [ 3043.235229][T26998] RSP: 0018:ffffc900164b7b70 EFLAGS: 00010246 [ 3043.241292][T26998] RAX: 0000000000000000 RBX: 1ffff92002c96f72 RCX: 0000000000000000 [ 3043.249244][T26998] RDX: 0000000000000000 RSI: dffffc0000000000 RDI: 0000000000040dc0 [ 3043.257198][T26998] RBP: 0000000000040dc0 R08: 0000000000000000 R09: 0000000000000000 [ 3043.265172][T26998] R10: ffffffff81b1f7e1 R11: 0000000000000000 R12: 0000000000000012 [ 3043.273151][T26998] R13: 0000000000000012 R14: 0000000000000000 R15: 000000002000005c [ 3043.281109][T26998] ? policy_node+0xe1/0x140 [ 3043.285608][T26998] ? __alloc_pages_slowpath.constprop.0+0x2240/0x2240 [ 3043.292362][T26998] ? lock_downgrade+0x6d0/0x6d0 [ 3043.297304][T26998] alloc_pages_current+0x18c/0x2a0 [ 3043.302599][T26998] kmalloc_order+0x2e/0xb0 [ 3043.307010][T26998] kmalloc_order_trace+0x14/0x120 [ 3043.312039][T26998] qrtr_tun_write_iter+0x8a/0x180 [ 3043.317064][T26998] new_sync_write+0x426/0x650 [ 3043.321731][T26998] ? new_sync_read+0x6e0/0x6e0 [ 3043.326498][T26998] ? lock_downgrade+0x6d0/0x6d0 [ 3043.331349][T26998] ? apparmor_file_permission+0x26e/0x4e0 [ 3043.337061][T26998] vfs_write+0x791/0xa30 [ 3043.341289][T26998] ksys_write+0x12d/0x250 [ 3043.345605][T26998] ? __ia32_sys_read+0xb0/0xb0 [ 3043.350379][T26998] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3043.356262][T26998] do_syscall_64+0x2d/0x70 [ 3043.360670][T26998] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3043.366655][T26998] RIP: 0033:0x45e219 [ 3043.370650][T26998] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3043.390346][T26998] RSP: 002b:00007fbd3e18dc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3043.398757][T26998] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 [ 3043.406730][T26998] RDX: 000000002000005c RSI: 0000000020000040 RDI: 0000000000000003 [ 3043.414703][T26998] RBP: 000000000119bfc0 R08: 0000000000000000 R09: 0000000000000000 [ 3043.422660][T26998] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000119bf8c [ 3043.430617][T26998] R13: 00007ffe8200ad9f R14: 00007fbd3e18e9c0 R15: 000000000119bf8c [ 3043.442086][T26998] Kernel Offset: disabled [ 3043.446423][T26998] Rebooting in 86400 seconds..