fs$namespace(0xffffffffffffffff, &(0x7f00000022c0)='ns/cgroup\x00') 16:04:28 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdc3}]}) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000380)) 16:04:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@RTM_DELMDB={0x58, 0x55, 0x1, 0x0, 0x0, {}, [@MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x0, 0x0, 0x0, {@ip4=@loopback}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x0, 0x0, 0x0, {@in6_addr=@private2}}}]}, 0x58}}, 0x0) 16:04:28 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) semget$private(0x0, 0x4, 0x100) socketpair(0x11, 0xa, 0x200, &(0x7f0000000140)) 16:04:28 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x11, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', r1}, 0x48) 16:04:28 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x83, &(0x7f0000000240)={r1}, &(0x7f0000000280)=0x8) 16:04:28 executing program 2: bpf$BPF_PROG_QUERY(0x8, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0}, 0x20) 16:04:28 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x14, 0xb, 0x6, 0x203}, 0x14}}, 0x0) 16:04:28 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000480), 0x0, 0x1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, 0x0) [ 1047.873449] PF_BRIDGE: br_mdb_parse() with invalid ifindex 16:04:28 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000c40)={0x2020}, 0x2020) 16:04:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=@newnexthop={0x20, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_ID={0x8}]}, 0x20}}, 0x0) 16:04:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000005100), &(0x7f0000000000)='./bus\x00', 0x80, &(0x7f00000000c0)=ANY=[@ANYBLOB="757365725f737562766f6c5f726d5f616c6c6f7765642c6e6f696e6f64655f63616368652c696e6f64655f63616368652c636f6d6d69743d3078303030303030303032353133393062362c636f6d70726573732d666f7263652c6e6f61636c2c747265656c6f672c00a05a4926bbcd3204c710a23cf01a1fc178d0b3478aea8720314f940f80786138b6e30addbddbdc6dd5826709125621f95ba5f64f7085b9642cca4487c650c6fead084fd50644388b7323f5b44d13efc811aed7ad"], 0x1, 0x50ef, &(0x7f000000a2c0)="$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") r0 = open(&(0x7f0000000180)='./bus\x00', 0x14d27e, 0x0) sync() fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r1, &(0x7f0000003780)=ANY=[], 0x5) 16:04:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000003300)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r0, 0x0, 0x0) 16:04:28 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000140)=@req3={0x0, 0x6}, 0x1c) 16:04:28 executing program 3: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000002380), 0x0, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:04:28 executing program 0: syz_open_procfs(0x0, &(0x7f0000000200)='maps\x00') 16:04:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x200040, &(0x7f0000000000)=ANY=[], 0x1, 0x5cc, &(0x7f0000000600)="$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") r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000140)='./bus\x00', 0x5) 16:04:28 executing program 3: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002100)='ns/pid\x00') 16:04:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x204040, &(0x7f0000000000)=ANY=[], 0x1, 0x5dc, &(0x7f0000000c00)="$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") 16:04:28 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x13, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x6}, [@NFTA_OBJ_TABLE={0xfffffcf5, 0x1, 'syz0\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_OBJ_TYPE={0x8}, @NFTA_OBJ_HANDLE={0xc}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x4c}}, 0x0) 16:04:28 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000600)={'ip6gre0\x00', &(0x7f0000000580)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @empty}}) 16:04:28 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) bpf$MAP_DELETE_ELEM(0x6, 0x0, 0x0) 16:04:28 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x0, 0x80}, 0x48) [ 1048.145323] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1048.172198] EXT4-fs error (device loop2): ext4_ext_check_inode:498: inode #3: comm syz-executor.2: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 2, max 4(4), depth 0(0) [ 1048.215217] EXT4-fs error (device loop2): ext4_quota_enable:5846: comm syz-executor.2: Bad quota inode # 3 [ 1048.236884] EXT4-fs warning (device loop2): ext4_enable_quotas:5883: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1048.276513] EXT4-fs (loop2): mount failed [ 1048.391588] BTRFS info (device loop5): enabling inode map caching [ 1048.408548] BTRFS warning (device loop5): excessive commit interval 622039222 [ 1048.415861] BTRFS info (device loop5): force zlib compression, level 3 [ 1048.433372] BTRFS info (device loop5): using free space tree [ 1048.452226] BTRFS info (device loop5): has skinny extents [ 1048.547554] audit: type=1800 audit(1671552268.810:211): pid=11489 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="loop5" ino=263 res=0 16:04:28 executing program 5: bpf$BPF_PROG_QUERY(0x8, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x15, 0x0, 0x0}, 0x20) 16:04:28 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) read$eventfd(r0, 0x0, 0x0) 16:04:28 executing program 4: request_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000400)='logon\x00', 0x0) 16:04:28 executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x25dfdbfc, 0x80100020}, 0xc) 16:04:28 executing program 3: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000002380), 0x0, 0x0) connect$unix(r0, 0x0, 0x0) 16:04:28 executing program 2: keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f0000000900)='-.^', 0x0) 16:04:28 executing program 4: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f00000001c0), 0xc0, 0x0) 16:04:28 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x1c, 0x3, 0x1, 0x201, 0x0, 0x0, {0x1}, [@CTA_MARK_MASK={0x8}]}, 0x1c}}, 0x0) 16:04:28 executing program 3: bpf$BPF_PROG_QUERY(0x8, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x18, 0x0, 0x0}, 0x20) 16:04:28 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000b00)='netpci0\x00', 0x10) 16:04:29 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8914, &(0x7f00000000c0)={'ip6tnl0\x00', 0x0}) 16:04:29 executing program 4: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000004200), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST(r0, 0x541b, 0x0) 16:04:29 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x20, 0x13, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) 16:04:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="6a6f75726e616c5f706174683d2e2f66696c65302c6e6f626172726165722c6175746f5f64615f616c6c6f632c646174615f657201000000010000002c6d61785f62617463685f74696d653d3078303030303030303030303030303030372c6e6f6d6263616368652c00"], 0x0, 0x421, &(0x7f0000000480)="$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") 16:04:29 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffffdc3}]}) removexattr(0x0, 0x0) 16:04:29 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0xc020660b, 0x0) 16:04:29 executing program 2: openat$cuse(0xffffffffffffff9c, &(0x7f0000006bc0), 0x2, 0x0) 16:04:29 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffff81) 16:04:29 executing program 5: bpf$BPF_PROG_QUERY(0x8, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x22, 0x0, 0x0}, 0x20) 16:04:29 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x1, &(0x7f0000000200)=@raw=[@kfunc], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:04:29 executing program 3: syz_open_procfs(0x0, &(0x7f0000000180)='attr/current\x00') 16:04:29 executing program 2: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x5000) 16:04:29 executing program 1: bpf$BPF_PROG_QUERY(0x8, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x300, 0x0, 0x0}, 0x20) 16:04:29 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000017c0)=[{&(0x7f00000007c0)="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", 0x41d}], 0x1) 16:04:29 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x1, &(0x7f0000000200)=@raw=[@kfunc], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:04:29 executing program 5: bpf$BPF_PROG_QUERY(0x8, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0xd, 0x0, 0x0}, 0x20) 16:04:29 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000400)={'ip6_vti0\x00', &(0x7f0000000300)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local}}) 16:04:29 executing program 2: add_key$keyring(&(0x7f0000000740), 0x0, 0x0, 0x0, 0xfffffffffffffffa) 16:04:29 executing program 1: socketpair(0x2c, 0x3, 0x5, &(0x7f0000000080)) 16:04:29 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/cgroups\x00', 0x0, 0x0) 16:04:29 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f0000000200)={0x0, "8892072796c0c2a736c8847deddede1b7646b747c80e93803982817894a7a3669ffa6f6232f8a8be948f3f8260772940f615348ee57246a5ae1142d2cf5284f8"}, 0x48, 0xfffffffffffffffc) keyctl$describe(0x6, r0, 0x0, 0x0) 16:04:29 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x8, 0x0, 0x0, 0x0, 0x4, 0x1}, 0x48) 16:04:29 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x5421, 0x0) 16:04:29 executing program 0: move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0xa) 16:04:29 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x108f}, 0x48) 16:04:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000003300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000003300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000100)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f00000000c0)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18}, 0x0) 16:04:29 executing program 5: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000004200), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST(r0, 0xc01047d0, &(0x7f0000004240)) 16:04:29 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x84, 0xffffffffffffffff, 0x7fff}, 0x48) 16:04:29 executing program 0: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000004200), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST(r0, 0xc01047d0, 0x0) 16:04:29 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "96cf7274eb949bbcec4204701528b06d79d1a89d408f4b3272185ad144b6edf75a5b7a824d903bffe19295e0e689f17c47f1d72e27c37813ae834d636732947b"}, 0x48, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000600), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f00000006c0), &(0x7f0000000700)={'fscrypt:', @desc3}, &(0x7f0000000740)={0x0, "e2f266e28b659f4d6d9228af9fb523c412513639548fa85f100d14dd03de2096ae18f83fed22de03a45dec0b5aa6eeefb55494482a0bca88c8b5e4b5e759391c"}, 0x48, r1) keyctl$get_security(0x11, r0, 0x0, 0x0) 16:04:29 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x4020940d, &(0x7f00000000c0)={'ip6tnl0\x00', 0x0}) 16:04:30 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "96cf7274eb949bbcec4204701528b06d79d1a89d408f4b3272185ad144b6edf75a5b7a824d903bffe19295e0e689f17c47f1d72e27c37813ae834d636732947b"}, 0x48, 0xfffffffffffffffb) 16:04:30 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @dev, 0x3}]}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000240)={r1}, &(0x7f0000000280)=0x8) 16:04:30 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.current\x00', 0x275a, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f00000000c0)={@desc={0x1, 0x0, @desc3}, 0x21, 0x0, '\x00', @c}) 16:04:30 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='maps\x00') ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, 0x0) 16:04:30 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f0000003100)={0x2020}, 0x2020) 16:04:30 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0xb, 0x0, &(0x7f00000014c0)) 16:04:30 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xfffffffffffffe5e, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, {}, [@IEEE802154_ATTR_SHORT_ADDR={0x6}, @IEEE802154_ATTR_SHORT_ADDR={0x6}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_SHORT_ADDR={0x6}]}, 0x38}}, 0x0) 16:04:30 executing program 4: bpf$BPF_PROG_QUERY(0x8, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x24, 0x0, 0x0}, 0x20) 16:04:30 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$FUSE(r0, &(0x7f00000061c0)={0x2020}, 0x2020) 16:04:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x5460, 0x0) 16:04:30 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw\x00') read$FUSE(r0, &(0x7f00000032c0)={0x2020}, 0x2020) 16:04:30 executing program 0: mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 16:04:30 executing program 5: syz_genetlink_get_family_id$team(&(0x7f0000000000), 0xffffffffffffffff) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000022c0), 0x2, 0x0) syz_clone(0x0, &(0x7f0000002380), 0x0, &(0x7f0000002400), 0x0, 0x0) geteuid() accept$unix(0xffffffffffffffff, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000003540), &(0x7f00000035c0)=0x6e) getgid() geteuid() socket$nl_generic(0x10, 0x3, 0x10) 16:04:30 executing program 4: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan1\x00'}) 16:04:30 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdc3}]}) mbind(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x4) 16:04:30 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_int(r0, 0x1, 0x2b, 0x0, &(0x7f0000000040)) 16:04:30 executing program 1: socketpair(0x3c, 0x0, 0x0, &(0x7f0000000000)) 16:04:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000008c80)=ANY=[@ANYBLOB="24000000120005ff"], 0x2c}}, 0x0) recvmmsg(r0, &(0x7f0000007700)=[{{0x0, 0x0, &(0x7f0000003b40)=[{&(0x7f00000018c0)=""/223, 0x64}, {0x0}, {&(0x7f0000002a80)=""/4090, 0xe24}], 0x3}}], 0x2f3, 0x10000, 0x0) 16:04:30 executing program 4: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0xc0480, 0x0) 16:04:30 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000000580)=[{&(0x7f0000000040)="ad11180b1b44", 0x6}], 0x1) 16:04:30 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffffdc3}]}) umount2(0x0, 0x0) 16:04:30 executing program 3: add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "0dbdf5be50e8c28f1cc5e0600f02e8b8ede578d82146bcbc3af649a6864708db4d273371a6039a0b63eae55ea9a48f8ccc71356cd4931c75ff01b69db837d347"}, 0x48, 0xfffffffffffffffe) 16:04:30 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{}]}) 16:04:30 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw\x00') read$FUSE(r0, &(0x7f00000032c0)={0x2020}, 0x2020) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.current\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) fdatasync(r1) gettid() geteuid() read$FUSE(r0, &(0x7f0000005300)={0x2020}, 0x2020) [ 1050.032504] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1050.070467] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 16:04:30 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0xfff, 0x4) 16:04:30 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, 0x0}, 0x20) 16:04:30 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8946, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @ipv4={'\x00', '\xff\xff', @multicast2}}}) 16:04:30 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x1c, 0x3, 0x1, 0x201, 0x0, 0x0, {}, [@CTA_MARK={0x8}]}, 0x1c}}, 0x0) 16:04:30 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdc3}]}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffe000/0x2000)=nil, 0x0) 16:04:30 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000006bc0), 0x2, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) 16:04:30 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000003300)) [ 1050.090470] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1050.090626] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1050.090760] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1050.090887] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1050.091016] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 16:04:30 executing program 5: openat$procfs(0xffffffffffffff9c, &(0x7f00000007c0)='/proc/key-users\x00', 0x0, 0x0) 16:04:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x89a1, 0x0) 16:04:30 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0xc0189436, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @ipv4={'\x00', '\xff\xff', @multicast2}}}) 16:04:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_delroute={0x1c, 0x19, 0x1}, 0x1c}}, 0x0) [ 1050.091149] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1050.091387] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 16:04:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x8940, 0x0) 16:04:30 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$PTP_EXTTS_REQUEST(r0, 0x40103d02, &(0x7f00000005c0)) 16:04:30 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000002840), 0x0, 0x0) ioctl$VFIO_IOMMU_GET_INFO(r0, 0x3b70, 0x0) 16:04:30 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000002c0)={'ip6tnl0\x00', &(0x7f0000000240)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x10}, @private2={0xfc, 0x2, '\x00', 0x1}}}) 16:04:30 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_LBT_MODE(r0, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000e40)={&(0x7f0000000e00)={0x14}, 0x14}}, 0x40) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r0, &(0x7f0000000fc0)={0x0, 0x0, &(0x7f0000000f80)={&(0x7f0000000f40)={0x14}, 0x14}}, 0x0) 16:04:30 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000180)={'ip6gre0\x00', 0x0, 0x2f, 0x1f, 0x0, 0x3, 0x4, @private0, @remote, 0x7800, 0x10, 0xfff, 0x1}}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000003c0)={'ip6gre0\x00', &(0x7f0000000100)={'ip6_vti0\x00', 0x0, 0x0, 0x1f, 0xb, 0xfffff000, 0x2a, @private0={0xfc, 0x0, '\x00', 0x1}, @dev={0xfe, 0x80, '\x00', 0x29}, 0x80, 0x0, 0x2, 0x9}}) 16:04:31 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) bpf$MAP_DELETE_ELEM(0x6, 0x0, 0x700) 16:04:31 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8943, &(0x7f00000000c0)={'ip6tnl0\x00', 0x0}) 16:04:31 executing program 3: r0 = memfd_create(&(0x7f0000000880)='C\x13\xfc2\x95WD\xaa\xba^\x90\xfd\x8d\xc2\xb1[\x81\xda\xda\xd6\x8c\xc99\xec\x0e*||\xe4\xb3\xc4\xb6\v\xaa\x15\x86,\xac\x8d\x89cu\x10\xdc\x93\x9b\xb4\x93\xafE*:\xe4\xdd\xa5\xa75\xb8\x1e;7\xb7.V\xdcrw[\r\x98\x93j\x9c\xf6\xf8\x99\xefF_\xcd\xdf!b\xc5\xec\ntb\xff\b\xaaF?!\x9f\a\x1a\x03\f\xe94\x1deU\x06zS\xc9\xb4\xa7@\xa1\\B\xc2@\r_b\x9a\xeb\b\xa4(V\xd6/N\xc5\xc6f\xb1\x95Z\xe5w^\xd8\xe7J\x80\xf7\xae\xafuv\x84\x9eG\xd1\xe7\x9b\xf0_9\xc2\x9b\xfd\xc3\xf3\xe4\x95P\xf1m\xcf\xc2\xe1\xe6\xa6\x8c\x11\xfb\xb8S\x8b\x92\\\asW-Ee\x02\x00\x00\x00\xd0;Q\xc1~\x89\xec\xc8\x9b\x88\a\xf2\x93\x82(\x8b\x00\xd8\xb4T\x80\x95\x93i|\xc0\x00\x04\x00\x00\x00\x00\x00\x00v\xef\xee+\xab\x9c\x00^R\xb2n?i=\xbe\x16\x8a\xbf\xe3\xcdB\xed\xe14\xe8\xd0\xb7\xff\xfeQ\x1c\x85n8\x1b\xc1\b\x00\x00\x00\x00\x00\x00\x00\x17\x94\xdfW\x92z\xbe\xb2R)\xf1K\xd7\xaf\x99\xf6d\xe8\xec\xb7\xbd+T3\xa6\xa9\xfaY-1qs\x82\xefn*\x96\xc9\x1e\xf4\xd1\x02Dt\xc0\x19\xf7\x89\x96.D [F\xeeYW\x95\x13\xc7;\xb5\x13^\x13\xcb\xf0C\x9c\xabf\x1daCS2\x02\xb0\xef\xc7\x8c\x9e\xed\a\n0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x1, 0x0, 0x0) 16:04:31 executing program 5: keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f00000009c0), &(0x7f0000000a00)={'enc=', 'raw', ' hash=', {'nhpoly1305-generic\x00'}}, 0x0, 0x0) 16:04:31 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x0, 0x80, 0x7fff, 0x11, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5}, 0x48) 16:04:31 executing program 2: pipe(&(0x7f0000000d00)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) dup3(r1, r0, 0x0) getpeername$packet(r0, &(0x7f0000002940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002980)=0x14) 16:04:31 executing program 3: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x5e000, 0x0) 16:04:31 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) userfaultfd(0x0) 16:04:31 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8990, &(0x7f00000000c0)={'ip6tnl0\x00', 0x0}) 16:04:31 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdc3}]}) prctl$PR_SET_MM_MAP_SIZE(0x27, 0xf, 0x0) 16:04:31 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdc3}]}) prctl$PR_SET_MM_MAP_SIZE(0x34, 0xf, &(0x7f0000000380)) 16:04:31 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x24, 0x3, 0x1, 0x201, 0x0, 0x0, {0x1}, [@CTA_MARK={0x8}, @CTA_MARK_MASK={0x8}]}, 0x24}}, 0x0) 16:04:31 executing program 1: timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000080)={{0x77359400}}, 0x0) 16:04:31 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x64, 0x0, &(0x7f00000014c0)) 16:04:31 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) 16:04:31 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @private1}}) 16:04:31 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8946, &(0x7f00000000c0)={'ip6tnl0\x00', 0x0}) 16:04:31 executing program 3: bpf$BPF_PROG_QUERY(0x9, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x24, 0x0, 0x0}, 0x20) 16:04:31 executing program 4: bpf$BPF_PROG_QUERY(0x8, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1e, 0x0, 0x0}, 0x20) 16:04:31 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8992, &(0x7f00000000c0)={'ip6tnl0\x00', 0x0}) 16:04:31 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_int(r0, 0x1, 0x2a, 0x0, &(0x7f0000000040)) 16:04:31 executing program 0: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000002380), 0x80001, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) 16:04:31 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'ip6_vti0\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @mcast1, @remote}}) 16:04:31 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) ioctl$LOOP_CONFIGURE(r0, 0x1269, &(0x7f00000009c0)={0xffffffffffffffff, 0x0, {0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4013befc87a68736f0b7f930878557fd31684c5581dba73080e38f8cad0652ee26757fa2560a7ef72102cadf85fbe62e5c12feb106aafa93a1203d16025af7e1", "ba3b2a9e77b97c6f5960014b2922dc03e3a72664b0e6ccd0518f5139a7b240e19e9d0b672469934587339e87b051c35fe701bc0e604f74ddfbe797b849dc7625", "dddccfee6d63b9c0986df7344668387c8a713211ece441526e2c71ffc79dba99"}}) 16:04:31 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x68, 0x0, &(0x7f00000014c0)) 16:04:31 executing program 1: recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001b00)) 16:04:31 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffffdc3}]}) fanotify_mark(0xffffffffffffffff, 0x20000, 0x0, 0xffffffffffffffff, 0x0) 16:04:31 executing program 0: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x3938700}, &(0x7f00000001c0)={&(0x7f0000000180)={[0xdf35]}, 0x8}) 16:04:31 executing program 4: socketpair(0x1, 0x0, 0x230, &(0x7f0000000000)) 16:04:31 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x1827, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x48) 16:04:31 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='uid_map\x00') 16:04:31 executing program 3: io_setup(0x6, &(0x7f0000000080)=0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040), 0x0, 0x0) io_submit(r0, 0x1, &(0x7f00000004c0)=[&(0x7f0000000380)={0x0, 0x0, 0x2, 0x0, 0x0, r1, 0x0}]) 16:04:31 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x7d0440, 0x0) 16:04:31 executing program 5: syz_clone(0x0, &(0x7f0000002380)='\"', 0x1, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000003200)="d8") 16:04:31 executing program 4: add_key$keyring(&(0x7f0000000580), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000600), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) 16:04:31 executing program 2: r0 = timerfd_create(0x7, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x0, 0x3938700}}, 0x0) 16:04:31 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x1827, 0xffffffffffffffff, 0x19dc}, 0x48) 16:04:31 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdc3}]}) prctl$PR_SET_MM_MAP_SIZE(0x3, 0xf, 0x0) 16:04:31 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) userfaultfd(0x268a63ce78166c91) 16:04:31 executing program 1: syz_extract_tcp_res$synack(&(0x7f0000000000)={0x41424344}, 0x1, 0x0) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, r0, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) syz_extract_tcp_res(&(0x7f0000000000)={0x41424344, 0x41424344}, 0x2, 0x4) syz_emit_ethernet(0x139, &(0x7f0000000100)={@multicast, @multicast, @void, {@ipv4={0x800, @tcp={{0x1a, 0x4, 0x3, 0x25, 0x12b, 0x66, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0xc, 0xf, 0x3, 0x7, [{@private=0x1, 0x3}]}, @end, @end, @rr={0x7, 0x7, 0x0, [@multicast1]}, @timestamp_prespec={0x44, 0x14, 0xb0, 0x3, 0x8, [{@loopback}, {@private=0xa010102}]}, @timestamp_addr={0x44, 0x24, 0x60, 0x1, 0xe, [{@dev={0xac, 0x14, 0x14, 0x17}}, {@rand_addr=0x64010102, 0x1}, {@local}, {@multicast1, 0x2}]}, @noop]}}, {{0x4e22, 0x4e20, r0, r1, 0x0, 0x0, 0xa, 0xd7, 0x0, 0x0, 0x50, {[@md5sig={0x13, 0x12, "24813e6bd0a6b99b0132668fdf462c4b"}, @nop]}}, {"de64e079c88f53befccd9c236b89b395b103e2b5307261ca9ca06c0c79b6a3a79ded09c85d89b648097073f412b0c015a822a25e7bf3b8d0204ab07f7f2cb0574dd45f52fe546b8965f9ed4c63fe3e3790f104f53a792ec922ddcfa84bfd546749b42c1015a09eae9783a50cde1786d413664db24ab3baee964f49eaaab51a02549bcbaecc79c782028045459a60e3d58699a34b79c0c4317ae14f"}}}}}}, 0x0) 16:04:31 executing program 5: bpf$BPF_PROG_QUERY(0x8, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1c, 0x0, 0x0}, 0x20) 16:04:31 executing program 0: shmdt(0x0) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x7000) 16:04:31 executing program 2: bpf$BPF_PROG_QUERY(0x8, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0xf, 0x0, 0x0}, 0x20) 16:04:31 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x0, 0xf0, 0x8, 0x20, 0x15, @private0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1, 0x80, 0x4, 0xfffffff7}}) 16:04:31 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/vmallocinfo\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000140)={0x2020}, 0x2020) 16:04:31 executing program 5: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000004cc0)="6dcc") syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 16:04:31 executing program 0: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000004200), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST(r0, 0x5452, &(0x7f0000004240)) 16:04:31 executing program 1: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @local}, 0x10) 16:04:31 executing program 2: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST2(r0, 0x40383d0c, 0x0) 16:04:31 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x77359400}, {0x0, 0x989680}}, 0x0) 16:04:31 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffffdc3}]}) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:04:31 executing program 4: bpf$BPF_PROG_QUERY(0x13, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) 16:04:32 executing program 2: pipe2$9p(0x0, 0x20080) 16:04:32 executing program 3: socket(0x11, 0x3, 0x2a) 16:04:32 executing program 0: shmget$private(0x0, 0xd000, 0x1000, &(0x7f0000ff1000/0xd000)=nil) 16:04:32 executing program 5: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000002380), 0x0, 0x0) accept$packet(r0, 0x0, 0x0) 16:04:32 executing program 1: bpf$BPF_PROG_QUERY(0x8, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x7d1, 0x0, 0x0}, 0x20) 16:04:32 executing program 2: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000002380), 0x0, 0x0) read$FUSE(r0, &(0x7f00000061c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_open_procfs(r1, 0x0) 16:04:32 executing program 4: ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000000)="86") r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETLED(r0, 0x4b46, &(0x7f00000010c0)) 16:04:32 executing program 0: r0 = add_key$keyring(&(0x7f0000000600), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000080)='\x00', 0x0) 16:04:32 executing program 3: openat$vcsu(0xffffffffffffff9c, &(0x7f0000002380), 0x80001, 0x0) 16:04:32 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdc3}]}) prctl$PR_SET_MM_MAP_SIZE(0x24, 0xf, 0x0) 16:04:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x34, 0x13, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_OBJ_TYPE={0x8}]}, 0x34}}, 0x0) 16:04:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x200040, &(0x7f0000000000)=ANY=[], 0x1, 0x5cc, &(0x7f0000000600)="$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") r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000140)='./bus\x00', 0x4) 16:04:32 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000380), 0x101bf) 16:04:32 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000100)=0x5, 0x4) 16:04:32 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000003300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, 0x0, 0x0) 16:04:32 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x2}, 0x48) 16:04:32 executing program 1: pipe2(&(0x7f0000000c00)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000100)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, 0x78) 16:04:32 executing program 2: move_pages(0x0, 0x2, &(0x7f00000002c0)=[&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil], &(0x7f0000000380), &(0x7f0000000340), 0x0) [ 1051.983353] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:04:32 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x65, 0x0, &(0x7f00000014c0)) [ 1052.181856] EXT4-fs error (device loop4): ext4_find_dest_de:1853: inode #2: block 16: comm syz-executor.4: bad entry in directory: inode out of bounds - offset=76, inode=196624, rec_len=16, name_len=5, size=1024 16:04:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'veth1\x00', {0x2, 0x0, @empty}}) 16:04:32 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8911, &(0x7f00000000c0)={'ip6tnl0\x00', 0x0}) 16:04:32 executing program 2: socketpair(0x10, 0x3, 0x5345, &(0x7f0000000780)) 16:04:32 executing program 1: bpf$BPF_PROG_QUERY(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x18, 0x0, 0x0}, 0x20) 16:04:32 executing program 3: openat$vcs(0xffffffffffffff9c, &(0x7f0000000140), 0x576901, 0x0) 16:04:33 executing program 0: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@newqdisc={0x70, 0x24, 0xf0b, 0x0, 0x0, {0x60, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x7, 0x1, 0x1f, 0x0, 0x2, 0x6, 0x7ff, 0x2}}, {0x8, 0x2, [0x80, 0x0]}}]}, @TCA_RATE={0x6, 0x5, {0x3f, 0x18}}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0xfffff656}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x4}]}, 0x70}}, 0x0) 16:04:33 executing program 2: openat$ptp0(0xffffffffffffff9c, 0x0, 0x400083, 0x0) 16:04:33 executing program 4: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000340)='logon\x00', 0x0, 0x0, 0x0, r0) 16:04:33 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdc3}]}) prctl$PR_SET_MM_MAP_SIZE(0x10, 0xf, 0x0) 16:04:33 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) llistxattr(0x0, 0x0, 0x0) 16:04:33 executing program 5: ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) 16:04:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000003300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000380)={'wlan0\x00'}) syz_open_procfs$userns(0x0, &(0x7f0000000100)) 16:04:33 executing program 4: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000002380), 0x0, 0x0) read$FUSE(r0, &(0x7f00000061c0)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 16:04:33 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdc3}]}) prctl$PR_SET_MM_MAP_SIZE(0x38, 0xf, 0x0) 16:04:33 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000000c0)=ANY=[@ANYBLOB="440000001000390400"/20, @ANYRES32=r2, @ANYBLOB="00000000000000001c0016801800018214000b0000000081000000000000000000000000080004"], 0x44}}, 0x0) 16:04:33 executing program 5: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000002380), 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r0) 16:04:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000040)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000000c0)="04", 0x10002, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 16:04:33 executing program 4: syz_genetlink_get_family_id$netlbl_unlabel(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$netlbl_unlabel(0x0, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 16:04:33 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) write$eventfd(r0, &(0x7f0000000000), 0x8) 16:04:33 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)) 16:04:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=@deltclass={0x24}, 0x24}}, 0x0) 16:04:33 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x80045430, 0x0) [ 1052.997241] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 16:04:33 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x5452, 0x0) 16:04:33 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x11, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:04:33 executing program 3: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000004c80)="1d2a") 16:04:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='mounts\x00') read$char_usb(r0, &(0x7f0000000080)=""/174, 0xae) 16:04:33 executing program 0: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@newqdisc={0xd8, 0x24, 0xf0b, 0x0, 0x0, {0x60, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x2c, 0x2, [@TCA_TBF_PARMS={0x28}]}}, @qdisc_kind_options=@q_clsact={0xb}, @TCA_STAB={0x74, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0xbc, 0x1f, 0x1ff, 0xffffffff, 0x2, 0x1, 0x7}}, {0x4}}, {{0x1c, 0x1, {0xff, 0x8, 0x80, 0x1, 0x2, 0x400, 0x6, 0x5}}, {0xe, 0x2, [0x7, 0x0, 0x1f, 0x3, 0x3ff]}}, {{0x1c, 0x1, {0x7, 0x1, 0x1f, 0x6, 0x2, 0x6, 0x7ff, 0x2}}, {0x8, 0x2, [0x0, 0x0]}}]}]}, 0xd8}}, 0x0) 16:04:33 executing program 1: r0 = add_key$keyring(&(0x7f0000000600), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f00000006c0), &(0x7f0000000700)={'fscrypt:', @desc3}, &(0x7f0000000740)={0x0, "e2f266e28b659f4d6d9228af9fb523c412513639548fa85f100d14dd03de2096ae18f83fed22de03a45dec0b5aa6eeefb55494482a0bca88c8b5e4b5e759391c"}, 0x48, r0) add_key$fscrypt_v1(&(0x7f0000000800), &(0x7f0000000840)={'fscrypt:', @desc2}, &(0x7f0000000880)={0x0, "dfd6ffe561b6649bd075a51af0aae69d5a043b5ad0835c2498614caee2ec83024ad7ea375566693ce3ab3bad5b8bc08b53f0bd2009ff387b0b870a0d8f102b56"}, 0x48, r0) 16:04:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x8954, 0x0) 16:04:33 executing program 5: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000001e00), 0x1, 0x0) 16:04:33 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r0, &(0x7f0000000fc0)={&(0x7f0000000ec0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000f80)={&(0x7f0000000f40)={0x14}, 0x14}}, 0x0) 16:04:33 executing program 1: bpf$BPF_PROG_QUERY(0x8, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x9, 0x0, 0x0}, 0x20) 16:04:33 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x0, 0x1, &(0x7f00000000c0)=@raw=[@generic], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:04:33 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, 0x48) 16:04:33 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a01010000000000000000020000000900010073797a300000000008000240000000032c000000030a01030000000000000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000001c40)={0x0, 0x0, &(0x7f0000001c00)={&(0x7f0000001440)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x30, 0x16, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_HOOK={0x4}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}], {0x14}}, 0x58}}, 0x0) 16:04:33 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/slabinfo\x00', 0x0, 0x0) 16:04:33 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x1, &(0x7f0000000200)=@raw=[@kfunc], &(0x7f0000000040)='syzkaller\x00', 0x2, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xa, 0x1b31, 0xe8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 16:04:33 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8948, &(0x7f00000000c0)={'ip6tnl0\x00', 0x0}) 16:04:33 executing program 0: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x193900, 0x0) 16:04:33 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000034c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000004780)={{0x1, 0x1, 0x18}, './file0\x00'}) 16:04:33 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='auxv\x00') 16:04:33 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_timeval(r0, 0x1, 0x42, 0x0, &(0x7f0000000080)) 16:04:33 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8922, &(0x7f00000000c0)={'ip6tnl0\x00', 0x0}) 16:04:33 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdc3}]}) prctl$PR_SET_MM_MAP_SIZE(0x29, 0xf, &(0x7f0000000380)) 16:04:33 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000003300)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, 0x0) 16:04:33 executing program 2: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x8}, 0x0, 0x0) 16:04:33 executing program 5: bpf$BPF_PROG_QUERY(0x9, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1d, 0x0, 0x0}, 0x20) 16:04:33 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000540)='ns/ipc\x00') 16:04:33 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000004200), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST(r0, 0x40383d03, &(0x7f0000004240)) 16:04:33 executing program 2: r0 = add_key$keyring(&(0x7f0000000600), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000800), &(0x7f0000000840)={'fscrypt:', @desc2}, &(0x7f0000000880)={0x0, "dfd6ffe561b6649bd075a51af0aae69d5a043b5ad0835c2498614caee2ec83024ad7ea375566693ce3ab3bad5b8bc08b53f0bd2009ff387b0b870a0d8f102b56"}, 0x48, r0) [ 1053.533207] ip6tnl0: mtu less than device minimum 16:04:33 executing program 0: bpf$MAP_CREATE(0xa, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 16:04:33 executing program 3: bpf$BPF_PROG_QUERY(0x8, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x2b, 0x0, 0x0}, 0x20) 16:04:33 executing program 4: syz_open_dev$loop(&(0x7f0000000000), 0xffffffffffffffff, 0x40) 16:04:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x8916, 0x0) 16:04:33 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x24, 0x3, 0x1, 0x201, 0x0, 0x0, {}, [@CTA_STATUS_MASK={0x8}, @CTA_MARK={0x8}]}, 0x24}}, 0x0) 16:04:33 executing program 1: r0 = eventfd2(0x80, 0x0) read$eventfd(r0, &(0x7f0000000240), 0x4a) 16:04:33 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x7, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 16:04:33 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8995, &(0x7f00000000c0)={'ip6tnl0\x00', 0x0}) 16:04:34 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 16:04:34 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/mnt\x00') 16:04:34 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000004200), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST(r0, 0xc0189436, &(0x7f0000004240)) 16:04:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x5451, 0x0) 16:04:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x200040, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYRES16], 0x1, 0x5cc, &(0x7f0000000600)="$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") openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x565201, 0x0) 16:04:34 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdc3}]}) mbind(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) 16:04:34 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x7fff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5}, 0x48) 16:04:34 executing program 0: syz_clone(0x14010080, 0x0, 0x0, 0x0, 0x0, 0x0) 16:04:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x200040, &(0x7f0000000000)=ANY=[], 0x1, 0x5cc, &(0x7f0000000600)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.current\x00', 0x275a, 0x0) 16:04:34 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89a0, &(0x7f00000000c0)={'ip6tnl0\x00', 0x0}) 16:04:34 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdc3}]}) mbind(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x2, 0x0, 0x0, 0x0) 16:04:34 executing program 2: add_key$keyring(&(0x7f0000000580), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000600), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f00000006c0), &(0x7f0000000700)={'fscrypt:', @desc3}, &(0x7f0000000740)={0x0, "e2f266e28b659f4d6d9228af9fb523c412513639548fa85f100d14dd03de2096ae18f83fed22de03a45dec0b5aa6eeefb55494482a0bca88c8b5e4b5e759391c"}, 0x48, r0) [ 1053.900096] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 16:04:34 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000840)={0x28, 0x13, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_OBJ_TYPE={0x8}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x28}}, 0x0) 16:04:34 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0xf0ff7f00000000) 16:04:34 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000017c0)=[{&(0x7f00000007c0)="f471846ed99caf9147ff1e8a1be95ebda9dbdab30bda79c92a66af99985f8678665c80db2ed43e2c2fbf4de170be0b6895f6bc6b41f5cc21e31b6e3c0e1b61472dafa37f825f83f966a7b09c80dc876fdf6f4814b2ce772571660f15f0446d09ff", 0x61}], 0x1) 16:04:34 executing program 2: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid_for_children\x00') ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) 16:04:34 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0xc0045878, 0x0) 16:04:34 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000200)={0x1}) 16:04:34 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0xb, &(0x7f0000000140)=0x7, 0x4) 16:04:34 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:04:34 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000040), 0x0, 0x48142) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) 16:04:34 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0xf, 0x0, 0x0, 0xc3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1}, 0x48) 16:04:34 executing program 5: pipe2(&(0x7f0000000c00)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) 16:04:34 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000000)={'\x00', {0x2, 0x0, @multicast2}}) 16:04:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'macvtap0\x00', {0x2, 0x0, @loopback}}) 16:04:34 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdc3}]}) remap_file_pages(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) 16:04:34 executing program 2: read$FUSE(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) 16:04:34 executing program 4: socketpair(0x10, 0x3, 0x0, &(0x7f0000000780)) 16:04:34 executing program 5: bpf$BPF_PROG_QUERY(0x8, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0}, 0x20) 16:04:34 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000004200), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST(r0, 0x40603d07, &(0x7f0000004240)) 16:04:34 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sysvipc/msg\x00', 0x0, 0x0) accept4$packet(r0, 0x0, 0x0, 0x0) 16:04:34 executing program 4: r0 = add_key$keyring(&(0x7f0000000600), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f00000006c0), 0x0, 0x0, 0x0, r0) 16:04:34 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sysvipc/shm\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x2) 16:04:34 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_udp_int(r0, 0x88, 0x1, 0x0, &(0x7f00000014c0)) 16:04:34 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8982, &(0x7f0000001700)={0x8, 'macvtap0\x00', {'syzkaller0\x00'}}) 16:04:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000003300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000100)=@abs={0x1}, 0x6e) 16:04:34 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89a3, &(0x7f00000000c0)={'ip6tnl0\x00', 0x0}) 16:04:34 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) read$watch_queue(r0, &(0x7f0000000080)=""/199, 0xc7) 16:04:34 executing program 2: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffff9) 16:04:34 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x28, r1, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_TYPE={0x5}]}, 0x28}}, 0x0) 16:04:34 executing program 5: socket$inet_sctp(0x2, 0xc3d625ad1cb03aa9, 0x84) 16:04:34 executing program 1: keyctl$link(0x8, 0x0, 0xfffffffffffffffe) request_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000340)='(\x00', 0x0) 16:04:34 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f00000034c0), 0x0, 0x0) 16:04:34 executing program 4: bpf$BPF_PROG_QUERY(0x4, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) 16:04:34 executing program 2: syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x7000) 16:04:34 executing program 3: bpf$BPF_PROG_QUERY(0x8, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x13, 0x0, 0x0}, 0x20) 16:04:34 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffffdc3}]}) fanotify_mark(0xffffffffffffffff, 0x2, 0x1011, 0xffffffffffffffff, 0x0) 16:04:34 executing program 5: r0 = timerfd_create(0x8, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x3938700}}, 0x0) 16:04:34 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='net/sctp\x00') 16:04:34 executing program 4: syz_open_dev$loop(&(0x7f0000000000), 0x9, 0x40) 16:04:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x8953, 0x0) 16:04:34 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000040)=0x3, 0x4) 16:04:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x200040, &(0x7f0000000000)=ANY=[], 0x1, 0x5cc, &(0x7f0000000600)="$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") r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000c00)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) 16:04:34 executing program 5: setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000000), 0xffffffffffffff3e) 16:04:34 executing program 4: keyctl$restrict_keyring(0x1d, 0xfffffffffffffffd, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)='\x1d^:)\x00') 16:04:34 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sysvipc/msg\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) 16:04:34 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, 0x0, 0x0) 16:04:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x200040, &(0x7f0000000000)=ANY=[], 0x1, 0x5cc, &(0x7f0000000600)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.current\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.current\x00', 0x275a, 0x0) 16:04:35 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8930, &(0x7f00000000c0)={'ip6tnl0\x00', 0x0}) 16:04:35 executing program 1: r0 = add_key$keyring(&(0x7f0000000600), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f00000006c0), &(0x7f0000000700)={'fscrypt:', @desc3}, &(0x7f0000000740)={0x0, "e2f266e28b659f4d6d9228af9fb523c412513639548fa85f100d14dd03de2096ae18f83fed22de03a45dec0b5aa6eeefb55494482a0bca88c8b5e4b5e759391c"}, 0x48, r0) 16:04:35 executing program 5: bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000180)=0xffffffffffffffff, 0x4) 16:04:35 executing program 4: bpf$BPF_PROG_QUERY(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0}, 0x20) 16:04:35 executing program 2: r0 = shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x5000) shmdt(r0) 16:04:35 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8982, &(0x7f00000000c0)={0x8, 'pim6reg1\x00', {'pimreg\x00'}}) 16:04:35 executing program 3: bpf$BPF_PROG_QUERY(0x6, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x18, 0x0, 0x0}, 0x20) 16:04:35 executing program 5: pipe2(&(0x7f0000000c00)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) read$FUSE(r0, 0x0, 0x0) 16:04:35 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x541b, &(0x7f00000000c0)={'ip6tnl0\x00', 0x0}) 16:04:35 executing program 4: shmat(0xffffffffffffffff, &(0x7f0000ffa000/0x1000)=nil, 0x0) 16:04:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYBLOB="c80100000301010200000000000000000500000608000340400064060c0018"], 0x1c8}}, 0x0) 16:04:35 executing program 0: request_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0) 16:04:35 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000000580)=[{&(0x7f0000000040)="ad11180b1b48", 0x6}], 0x1) 16:04:35 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_buf(r0, 0x107, 0x16, 0x0, 0x0) 16:04:35 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x2}, 0x48) 16:04:35 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000004200), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST(r0, 0x40103d0b, &(0x7f0000004240)) [ 1055.000423] nla_parse: 24 callbacks suppressed [ 1055.000432] netlink: 416 bytes leftover after parsing attributes in process `syz-executor.2'. 16:04:35 executing program 0: request_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0) 16:04:35 executing program 4: bpf$BPF_PROG_QUERY(0x8, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1d, 0x0, 0x0}, 0x20) 16:04:35 executing program 3: socketpair(0x2c, 0x3, 0x0, &(0x7f0000000080)) 16:04:35 executing program 5: syz_emit_ethernet(0x7ffff000, &(0x7f0000000080)={@multicast, @multicast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty, @empty}}}}}, 0x0) 16:04:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000000)=0x1ff, 0x4) 16:04:35 executing program 0: request_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0) 16:04:35 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000001500)=[{&(0x7f0000001240)="940c05f5a109fe", 0x7}], 0x1) 16:04:35 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x40049409, 0x0) 16:04:35 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) 16:04:35 executing program 5: socketpair(0x11, 0x0, 0x2, &(0x7f0000000080)) 16:04:35 executing program 0: request_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0) 16:04:35 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@base={0x0, 0x0, 0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 16:04:35 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0xc0189436, 0x0) 16:04:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000003580)={0x0, &(0x7f0000003540)=""/29, 0x0, 0x1d}, 0x20) 16:04:35 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000040), 0x0, 0x48142) readv(r0, &(0x7f0000002380)=[{&(0x7f0000000100)=""/1, 0x1}], 0x1) 16:04:35 executing program 0: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000002380), 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) 16:04:35 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8937, &(0x7f00000000c0)={'ip6tnl0\x00', 0x0}) 16:04:35 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x891f, &(0x7f00000000c0)={'ip6tnl0\x00', 0x0}) 16:04:35 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8971, &(0x7f00000000c0)={'ip6tnl0\x00', 0x0}) 16:04:35 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) sendto$unix(r0, 0x0, 0x0, 0xcd6be402be5f6b68, &(0x7f0000000240)=@abs={0x1}, 0x6e) 16:04:35 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}) 16:04:35 executing program 1: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) clock_gettime(0x6, &(0x7f0000002b80)) 16:04:35 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000280)={'ip6_vti0\x00', &(0x7f0000000200)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @private2}}) 16:04:35 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x201, 0x0) write$vga_arbiter(r0, &(0x7f0000000100)=@other={'decodes', ' ', 'io+mem'}, 0xf) 16:04:35 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89b0, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @ipv4={'\x00', '\xff\xff', @multicast2}}}) 16:04:35 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8931, &(0x7f00000000c0)={'ip6tnl0\x00', 0x0}) 16:04:35 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 16:04:35 executing program 1: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380), 0xffffffffffffffff) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x7000) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x5000) 16:04:35 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "0dbdf5be50e8c28f1cc5e0600f02e8b8ede578d82146bcbc3af649a6864708db4d273371a6039a0b63eae55ea9a48f8ccc71356cd4931c75ff01b69db837d347"}, 0x48, 0xfffffffffffffffe) syz_genetlink_get_family_id$nl80211(&(0x7f0000000580), 0xffffffffffffffff) add_key$keyring(&(0x7f0000001080), 0x0, 0x0, 0x0, r0) [ 1055.566269] pci 0000:00:05.0: vgaarb: changed VGA decodes: olddecodes=io+mem,decodes=io+mem:owns=io+mem [ 1055.579658] ieee802154 phy0 wpan0: encryption failed: -22 [ 1055.585250] ieee802154 phy1 wpan1: encryption failed: -22 16:04:35 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @remote, @ipv4={'\x00', '\xff\xff', @multicast2}}}) 16:04:35 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000140)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000100)=0x10) 16:04:36 executing program 3: bpf$BPF_PROG_QUERY(0x8, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1b, 0x0, 0x0}, 0x20) 16:04:36 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x0, 0x40000) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) read$watch_queue(r0, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040), 0x75f, 0x103382) sendfile(r1, r1, 0x0, 0x24002de8) 16:04:36 executing program 5: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000004200), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST(r0, 0x80503d0a, &(0x7f0000004240)) 16:04:36 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8921, &(0x7f00000000c0)={'ip6tnl0\x00', 0x0}) 16:04:36 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdc3}]}) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xd) 16:04:36 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000100)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @private1, 0x1}}) 16:04:36 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x1d18}, 0x48) 16:04:36 executing program 1: mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f000000c380)='./file0/../file0\x00', 0x0, 0x0, 0x0) 16:04:36 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000840)={0x20, 0x13, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_OBJ_TABLE={0x5, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) 16:04:36 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdc3}]}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) splice(r0, &(0x7f00000000c0), r1, 0x0, 0x108, 0x0) 16:04:36 executing program 4: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000180)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x4}, @exit, @initr0, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @exit], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x0, 0x0}, 0x10) 16:04:36 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x18, 0x1}, 0x48) 16:04:36 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0xbecb3b14def4839a, 0x2, &(0x7f0000000040)=@raw=[@cb_func], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:04:36 executing program 5: bpf$BPF_PROG_QUERY(0x8, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0xc, 0x0, 0x0}, 0x20) 16:04:36 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f0000000100)={0x3, 'vlan0\x00'}) 16:04:36 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdc3}]}) prctl$PR_SET_MM_MAP_SIZE(0x1e, 0xf, 0x0) [ 1056.629614] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 16:04:36 executing program 0: socketpair(0x2c, 0x0, 0x0, &(0x7f0000000080)) 16:04:37 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000040)={0x2d, &(0x7f0000000000)=[{}]}) 16:04:37 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x75f, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}) 16:04:37 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001340)={0x9, 0x3, &(0x7f0000001200)=@framed, &(0x7f0000001240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:04:37 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000000280)=[{&(0x7f00000005c0)="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", 0x52e}], 0x1) 16:04:37 executing program 0: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@newqdisc={0x54, 0x24, 0xf0b, 0x0, 0x0, {0x60, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0xff}}, {0x4}}]}]}, 0x54}}, 0x0) 16:04:37 executing program 2: semctl$SEM_STAT_ANY(0x0, 0x0, 0x14, &(0x7f0000003540)=""/247) 16:04:37 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000003300)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x6140, 0x0, 0x6141c1c1ab2366a) 16:04:37 executing program 1: add_key$keyring(&(0x7f0000000580), &(0x7f00000005c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000600), 0x0, 0x0, 0x0, 0xfffffffffffffffd) 16:04:37 executing program 5: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000002380), 0x0, 0x0) sendmmsg$unix(r0, 0x0, 0x0, 0x0) 16:04:37 executing program 2: bpf$BPF_PROG_QUERY(0x13, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x2f, 0x9, 0x1, 0x7, 0x21, @private0, @mcast1, 0x6, 0x7848, 0x8, 0x80}}) 16:04:37 executing program 0: keyctl$search(0xa, 0x0, &(0x7f0000000000)='.request_key_auth\x00', 0x0, 0xfffffffffffffff9) 16:04:37 executing program 3: syz_open_dev$loop(&(0x7f0000000040), 0x75f, 0x103382) 16:04:37 executing program 1: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000000), 0x0) 16:04:37 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x0, 0x40000) accept4$alg(r0, 0x0, 0x0, 0x80800) read$watch_queue(r0, 0x0, 0x0) memfd_create(&(0x7f0000000180)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3', 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040), 0x75f, 0x103382) r2 = memfd_create(&(0x7f0000000880)='C\x13\xfc2\x95WD\xaa\xba^\x90\xfd\x8d\xc2\xb1[\x81\xda\xda\xd6\x8c\xc99\xec\x0e*||\xe4\xb3\xc4\xb6\v\xaa\x15\x86,\xac\x8d\x89cu\x10\xdc\x93\x9b\xb4\x93\xafE*:\xe4\xdd\xa5\xa75\xb8\x1e;7\xb7.V\xdcrw[\r\x98\x93j\x9c\xf6\xf8\x99\xefF_\xcd\xdf!b\xc5\xec\ntb\xff\b\xaaF?!\x9f\a\x1a\x03\f\xe94\x1deU\x06zS\xc9\xb4\xa7@\xa1\\B\xc2@\r_b\x9a\xeb\b\xa4(V\xd6/N\xc5\xc6f\xb1\x95Z\xe5w^\xd8\xe7J\x80\xf7\xae\xafuv\x84\x9eG\xd1\xe7\x9b\xf0_9\xc2\x9b\xfd\xc3\xf3\xe4\x95P\xf1m\xcf\xc2\xe1\xe6\xa6\x8c\x11\xfb\xb8S\x8b\x92\\\asW-Ee\x02\x00\x00\x00\xd0;Q\xc1~\x89\xec\xc8\x9b\x88\a\xf2\x93\x82(\x8b\x00\xd8\xb4T\x80\x95\x93i|\xc0\x00\x04\x00\x00\x00\x00\x00\x00v\xef\xee+\xab\x9c\x00^R\xb2n?i=\xbe\x16\x8a\xbf\xe3\xcdB\xed\xe14\xe8\xd0\xb7\xff\xfeQ\x1c\x85n8\x1b\xc1\b\x00\x00\x00\x00\x00\x00\x00\x17\x94\xdfW\x92z\xbe\xb2R)\xf1K\xd7\xaf\x99\xf6d\xe8\xec\xb7\xbd+T3\xa6\xa9\xfaY-1qs\x82\xefn*\x96\xc9\x1e\xf4\xd1\x02Dt\xc0\x19\xf7\x89\x96.D [F\xeeYW\x95\x13\xc7;\xb5\x13^\x13\xcb\xf0C\x9c\xabf\x1daCS2\x02\xb0\xef\xc7\x8c\x9e\xed\a\n0xffffffffffffffff}, 0x0) write$FUSE_POLL(r0, &(0x7f0000000080)={0x18}, 0x18) 16:04:38 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdc3}]}) mbind(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x8) 16:04:38 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x18, 0x3, &(0x7f0000000380)=@framed, &(0x7f00000003c0)='syzkaller\x00', 0x7ff, 0xc2, &(0x7f0000000400)=""/194, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:04:38 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdc3}]}) prctl$PR_SET_MM_MAP_SIZE(0x36, 0xf, 0x0) 16:04:38 executing program 2: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000004200), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST(r0, 0x2, &(0x7f0000004240)) 16:04:38 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x19, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 16:04:38 executing program 4: keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f00000009c0), 0x0, 0x0, 0x0) 16:04:38 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sysvipc/msg\x00', 0x0, 0x0) accept4$packet(r0, 0x0, 0x0, 0x7) 16:04:38 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newqdisc={0x88, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mqprio={{0xb}, {0x58, 0x2, {{0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}}]}, 0x88}}, 0x0) 16:04:38 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000040)=0x3f, 0x4) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), r0) 16:04:38 executing program 1: syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) pipe2$watch_queue(0x0, 0x80) pipe2(0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 16:04:38 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000040)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private1, @empty}}) 16:04:38 executing program 0: add_key(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="18", 0x1, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000600), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f00000006c0), &(0x7f0000000700)={'fscrypt:', @desc3}, &(0x7f0000000740)={0x0, "e2f266e28b659f4d6d9228af9fb523c412513639548fa85f100d14dd03de2096ae18f83fed22de03a45dec0b5aa6eeefb55494482a0bca88c8b5e4b5e759391c"}, 0x48, r0) 16:04:38 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x40000000, 0x0, 0x0) 16:04:38 executing program 5: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000540)={'ip6gre0\x00', &(0x7f00000004c0)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}, @mcast1}}) 16:04:38 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x54, 0x12, 0xc09, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x4}, @INET_DIAG_REQ_BYTECODE={0x4}]}, 0x54}}, 0x0) 16:04:38 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000000040)=@framed={{}, [@generic={0x1f, 0x0, 0x0, 0x0, 0x1003}]}, &(0x7f0000000000)='syzkaller\x00', 0x6, 0xb3, &(0x7f0000000100)=""/179, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:04:38 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newqdisc={0x88, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mqprio={{0xb}, {0x58, 0x2, {{0x2, [], 0x0, [0x4], [0x0, 0x10]}}}}]}, 0x88}}, 0x0) 16:04:38 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0xd, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:04:38 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x5421, &(0x7f0000000340)={'ip6gre0\x00', 0x0}) 16:04:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000000)={@in6={{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}}, 0x0, 0x0, 0x28, 0x0, "5aede5619db78605d2659d56f356888d44b1977a29c660070998683cee18234c3d5a14b65368f2d102add39a609da7442ca2380a58bc1750ae02f4caa3b52809fdf0823d0e7156fff6b50fafb697ab63"}, 0xd8) 16:04:38 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xb, 0x0, 0x0, 0x3ff}, 0x48) 16:04:38 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) recvmsg$unix(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000001c40)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x40010141) 16:04:38 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x3e8, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:04:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1a, 0x0, &(0x7f0000000040)) 16:04:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, 0x0) 16:04:38 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000e80)={0x18, 0x2, &(0x7f0000000bc0)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0x8}], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:04:38 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x0, 0x0, &(0x7f0000000080)) 16:04:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r1, &(0x7f00000023c0)={0x0, 0x0, &(0x7f0000002340)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1}, 0x20) 16:04:38 executing program 1: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, 0x0) 16:04:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, 0x0, 0x0) 16:04:38 executing program 4: r0 = socket(0x11, 0x2, 0x0) recvmsg$unix(r0, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x40000000) 16:04:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @random="19fbf2a8efdb"}, 0x14) sendmmsg$inet(r1, &(0x7f0000000ac0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000180)="4ebfa8322544beb65b8598a686dd", 0x36}], 0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="a00000000000000000000000070000002c12750d804d6024376679cad56254a731ec8204df7889072de00000018645000000030602000d5a5820a17fbc287b312f6406124e94527f5dc407df7d400b9395f6d77a0212ccb7c527bd24deb1e41a1a3ffb287e7e060cbbe320d28c0c71629ae6072bac640101000000000064010101ac14140f7f000001ac1414bbac141418ac1414bb64010102ac1e0101010000110000000000000000000000010000000500000000000000110000000000000000000000010000000500000000000000140000000000000000000000020000003f00000000000000bc000000000000000000000007000000441c81117f00000100000002ac1414aa000000046401010100000003863a00000000060a512a9ea7d3309833011032126e382e6b02d1ac2f25bdbd4d07084072357a2ea30007dec7195d0c050720bffe78700204b933070bc2000000006401010283171364010100ac1414aaffffffff64010102640101020144044e11442c3841ac1e010100000080000000000000000400000000ffffffff7f00000100000003ac1e0101000000000000000000000020010000000000000000000007000000440ca433ffffffff00000009940401004408f670000000018627000000010512d37b4d24056b939199223cf13987cdfa070d11a88876e6ee0b9f2879370302890f29ac1414aaac1414bbac1e0101863600000000040e122153231aafe2d917e6f320d0067d0c44aa0210a4b789e48c120da5f8c4c16e927a02089f905d0199ca00048d4b94040000891390ac1414bb0000000064010102ffffffff86500000000205068722e135010c9788317b5394eeef7b5c00065901f20d051214695cdf7cc1dc744daf3eca863037de01020612af37120c1f6d8ee9eaa488e7ef76e64d03048cf70708deffcb8b1a0d862400000003070bd346f5e88e260a0d5a050ab05fb8a335266c450207c3091bd22e0502001400000000000000000000000100000007000000000000001c000000000000000000000008000000", @ANYRES32, @ANYBLOB="ac1e0001e0000002000000001c"], 0x320}}], 0x1, 0x0) 16:04:38 executing program 2: bpf$PROG_LOAD_XDP(0x12, &(0x7f0000000280)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:04:38 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, 0x0, 0x0) 16:04:38 executing program 5: bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000380), 0x10) 16:04:38 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10) sendmmsg$inet(r1, &(0x7f0000002000)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000c00)=[{&(0x7f0000000900)="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", 0x157}, {&(0x7f0000000580)="1ca8a7ecccfacbd09a417daeea468402007bd7780d51ca7a1f860e50450b0756744b8d275ffe881b731e7b2d8260ff01755ec368d354e0384af55fc69e127eef817306ced71ca82ee45738b2b341ea076ebf194b00c5fdb38d825985392422880deac964c4954146313a276e22fd51cddd1759828a9e1f97be989f0e318f45810098b39ebeee4d092d60cce61526daeb341a09d798d70cea169d07b6e19f244e4a9be06ec360045d8c619d014e355c65016b7433e90a7f0258efab4b0f71e1cca23ba22a686bf114e93ca13c24a0f3242598b89205e9d6b7bf97961a18766b7c1911286ae6c732ade93561ae90906d78f65f6a690ed38259d6567199f74c1b276e2ed41479480b5b6cf676436062076224f4a5624610a4a85e45be105cdca75a2d4ccbe5b8be601ae9ba0193979eb1862b8c8e6a53a28b1138d34ab7b18410d98a4ff10627437b", 0x147}, {&(0x7f0000000500)="43919d047f18ae91587c44e627199f9eca04c4047563bbcd72dfd1bcdfda0e75643d0bb0edf01bf63be92852fc85adf1abc07b320f8ec09171faea0000000000000000", 0x43}, {&(0x7f0000000380)="54df521edda4a27f13a31472784bce8b277d533cfb520a9e371fa7b2decaf040a02d12e084c23173cfadda7d0df03fa198ae5df6aef915027b54758966bd328b5a79146d71a39727db0bb873bc69872b4b88fbd194ab7a66a4c98df6e7962e8f022595111aed7672f17e4cb15392a33c54d621f2130fb4983f69fbe9d4aab62a84a213b1778aa9e841016f5c0b7c7689b98c060ecb0c2b6a8e131cc8901c917ae717b8f951069607e2f50fa1a78919198bb4dbc8b1798c8f6acc2052b65de10e4da5f11f6c8535afa97bf0fab70b6d35de54db90fe60aafed754f9b812230e1ee2587151c6e424586ae7b8ca05247b73ea2398db", 0xf4}, {&(0x7f0000000f00)="1171764b718802348f91e4204b0519f9d84fba627f25a8cb00395ce6e94b3d2867e54512c5f2f78acc4d4fb349f13be058ee7ab10fefbd270a1639d60f26ee2d91f46af99935c34033c8b27b5d1e42019c877123ea51f892a4523b73ff02f77d8f7903e85f13becddcb5527ef1eca7629e02f664d91b83d729031aa66d82667ce3edf8a112bd373101e2a2497ce21546fc301d4063648f80925856483ff17da7720bae3cad24754d3a6bda5be2ec654c743e2d9452350688dc4c24f0cc5a99902ecadb8c2f7812485b3a8fffdf0d2d1ee279c11ba3aacc7941edb79006df7974a7fb29a140423b72dc837d92a2f027f51c", 0xf1}], 0x5}}, {{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000140)="d4e9cb8df8ef56e8633f6483612f19b858352cf29aa2948f352e2aa8c4f7ce3f7850ac3d6c8b0e8c8160daf7128ef57e650e9f46a940f27442bad1f489460a4513247395f4e0b70c1275719bc87c99f46966c144b686be4a7613413a4ba0fdc3e432e0ebc265a9cd5383e2c1f24cf4011e8cb3a19f544fd0e8e8c93920215207040264cbff54fa9e1d651d3bc07a6c10b9b5441875319a1c03cf33608ee82a6496aa84d3758b1bdd0403ee6e29cb8d6999acf8d1ac32711d4d02855b0f85a87ba27fc0", 0xc3}, {&(0x7f0000000280)="23d18df0b6863c7f014247e510d2d2abbc4af12a08abefe9618a3b0a91eefa566cf424ca64c098e8bd02a18ea50bbc514004b56a3239603859", 0x39}], 0x2}}], 0x2, 0x2000c044) sendto$inet(r1, &(0x7f0000000c80)="e8", 0x5c7, 0x0, 0x0, 0x0) 16:04:38 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000040)=@deltclass={0x24, 0x29, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xfff3}}}, 0x24}}, 0x0) 16:04:38 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8930, &(0x7f0000000340)={'ip6gre0\x00', 0x0}) 16:04:39 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_timeval(r0, 0x1, 0x15, 0x0, &(0x7f00000006c0)) 16:04:39 executing program 3: r0 = socket(0x11, 0x2, 0x0) accept4$vsock_stream(r0, 0x0, 0x0, 0x100800) 16:04:39 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r0, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x100, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xffffffc2}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x43c}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x7}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x20}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x8001}}, {@nsim={{}, {0x0, 0x2, {'netdevsim', 0x0}}}, {0x0, 0xb, 0x5aaa}}, {@nsim={{}, {0x0, 0x2, {'netdevsim', 0x0}}}}]}, 0x100}, 0x1, 0x0, 0x0, 0x10}, 0x800) 16:04:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0xe, &(0x7f0000000180), 0x4) 16:04:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x12, &(0x7f0000000180), 0x4) 16:04:39 executing program 2: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000540)={'ip6gre0\x00', 0x0}) 16:04:39 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r0, &(0x7f00000004c0)="b1", 0x1, 0x20008041, &(0x7f0000000540)={0xa, 0x0, 0x0, @private2}, 0x1c) 16:04:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_CHANNELS_SET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @random="19fbf2a8efdb"}, 0x14) sendmmsg$inet(r1, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000080)='9', 0x500}, {&(0x7f0000000140)="8307a27dcd08b5e02b", 0x9}], 0x2}}], 0x2, 0x0) 16:04:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = gettid() sendmsg$netlink(r0, &(0x7f0000000180)={&(0x7f0000000000)=@proc, 0xc, &(0x7f0000000100)=[{&(0x7f00000000c0)={0x10}, 0x10}], 0x1, &(0x7f0000000040)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee01}}}], 0x20}, 0x0) 16:04:39 executing program 4: r0 = socket(0x11, 0x2, 0x0) connect$vsock_stream(r0, 0x0, 0x0) [ 1058.913782] netlink: 236 bytes leftover after parsing attributes in process `syz-executor.5'. 16:04:39 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f2, &(0x7f0000000340)={'ip6gre0\x00', 0x0}) 16:04:39 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000004b40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 16:04:39 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000200)) 16:04:39 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8991, &(0x7f0000000340)={'ip6gre0\x00', 0x0}) 16:04:39 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000004a80)=[{{&(0x7f0000001900)={0xa, 0x0, 0x0, @private2}, 0x1c, &(0x7f0000001cc0)=[{&(0x7f0000001940)="1c", 0x1}], 0x1}}], 0x1, 0x0) 16:04:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x6bf, &(0x7f0000000180)=0xffffffffffffffff, 0x4) 16:04:39 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x16, 0x9, 0x0, 0x8, 0x0, 0x1}, 0x48) 16:04:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x8, &(0x7f0000000180)=0xffffffffffffffff, 0x4) 16:04:39 executing program 3: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000d40)) 16:04:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x78, 0x30, 0x17b, 0x0, 0x0, {}, [{0x64, 0x1, [@m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8}, {0x38, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x2}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x14, 0x4, [{0x42}, {}]}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x78}}, 0x0) 16:04:39 executing program 4: syz_emit_ethernet(0x76, &(0x7f0000000680)={@broadcast, @link_local={0x17, 0x80, 0xc2, 0x0, 0x5}, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "38eefd", 0x40, 0x3a, 0x0, @dev, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "767dd0", 0x0, 0x0, 0x0, @empty, @loopback, [@srh={0x33}, @hopopts]}}}}}}}, 0x0) 16:04:39 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8929, &(0x7f0000000340)={'ip6gre0\x00', 0x0}) 16:04:39 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000009c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 16:04:39 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 16:04:39 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) connect$netlink(r0, &(0x7f0000000000)=@proc, 0xc) sendmsg$NL80211_CMD_SET_CQM(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) 16:04:39 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f1, &(0x7f0000000340)={'ip6gre0\x00', 0x0}) 16:04:40 executing program 0: r0 = socket(0x11, 0x2, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000340), r0) 16:04:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x6, &(0x7f0000000180)=0x7, 0x4) 16:04:40 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00', 0x0}) sendto$packet(r0, &(0x7f0000000000)="50abf0ec7ef2ab892a695edf0dd9", 0xe, 0x0, &(0x7f0000000080)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) 16:04:40 executing program 1: r0 = socket(0x2, 0x1, 0x0) setsockopt$MRT_TABLE(r0, 0x0, 0xcf, 0x0, 0x0) 16:04:40 executing program 3: bpf$PROG_LOAD_XDP(0x15, &(0x7f0000000280)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:04:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x1b, &(0x7f0000000180)=0xffffffffffffffff, 0x4) 16:04:40 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x18, 0x7, &(0x7f0000000600)=@framed={{}, [@cb_func, @map_idx_val]}, &(0x7f0000000680)='GPL\x00', 0x5, 0xc6, &(0x7f00000006c0)=""/198, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:04:40 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xb}, 0x48) 16:04:40 executing program 2: bpf$PROG_LOAD_XDP(0x6, 0x0, 0x0) 16:04:40 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x891e, &(0x7f0000000340)={'ip6gre0\x00', 0x0}) 16:04:40 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f00000002c0)="90f5", 0x2}], 0x1}}], 0x1, 0x4000c800) sendto$inet6(r0, &(0x7f0000000300), 0x16, 0x0, 0x0, 0xfffffffffffffdfd) 16:04:40 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f00000013c0)={&(0x7f0000000040)={0xa, 0x4e22, 0x0, @mcast1, 0x3}, 0x1c, 0x0, 0x0, &(0x7f0000000340)=[@pktinfo={{0x24, 0x29, 0x32, {@loopback}}}], 0x28}, 0x0) 16:04:40 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x1, 0x0, 0x0, 0x0, 0x1485, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5}, 0x48) 16:04:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x6cf, &(0x7f0000000180)=0xffffffffffffffff, 0x4) 16:04:40 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000005c0)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000108f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f736530000000000000000000000000000000000000000000000000000000000000e4ff08000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c0000000000000000210000000000000000000000000000000000000000000000fcffffffffffffff00000000000000000000000003000000070000000000000000000000000000004800435400000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000009000000000000000000000000000000200000000000000000000000000400000000000000000000000000000070009000000000094100000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000004000000000000000000000000000000000000000000000feffffff"], 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x31, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 16:04:40 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x65, &(0x7f0000000040), 0x4) 16:04:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x12, &(0x7f0000000180)=0xffffffffffffffff, 0x4) 16:04:40 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newqdisc={0x88, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mqprio={{0xb}, {0x58, 0x2, {{0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}}]}, 0x88}}, 0x0) 16:04:40 executing program 1: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'tunl0\x00', &(0x7f0000000b80)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @empty}}}}) 16:04:40 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) r1 = gettid() sendmmsg$unix(r0, &(0x7f0000000080)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002340)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x38}}], 0x1, 0x0) 16:04:40 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x100, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xffffffc2}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {@pci={{0x8}, {0x11}}, {0x8}}, {@nsim={{}, {0x0, 0x2, {'netdevsim', 0x0}}}}, {@nsim={{}, {0x0, 0x2, {'netdevsim', 0x0}}}}]}, 0x100}}, 0x0) [ 1060.406552] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables 16:04:40 executing program 4: syz_emit_ethernet(0x66, &(0x7f0000000680)={@broadcast, @link_local={0x17, 0x80, 0xc2, 0x0, 0x5}, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "38eefd", 0x30, 0x3a, 0x0, @dev, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "767dd0", 0x0, 0x3b, 0x0, @empty, @loopback}}}}}}}, 0x0) 16:04:40 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newqdisc={0x88, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mqprio={{0xb}, {0x58, 0x2, {{0x2, [], 0x0, [], [0x10]}}}}]}, 0x88}}, 0x0) 16:04:40 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x16, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:04:40 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x891f, &(0x7f0000000340)={'ip6gre0\x00', 0x0}) 16:04:40 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff}) bind$xdp(r0, 0x0, 0x0) [ 1060.586398] netlink: 236 bytes leftover after parsing attributes in process `syz-executor.0'. 16:04:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$inet6(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x24000110) 16:04:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x20000184, &(0x7f0000000180), 0x4) 16:04:41 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x5, 0x0, 0x58) 16:04:41 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x8, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 16:04:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @random="19fbf2a8efdb"}, 0x14) sendmmsg$inet(r1, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000080)="5599379780fe8fe208f7cc590800", 0xe}], 0x1}}], 0x1, 0x0) 16:04:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f00000036c0)={0x0, 0x0, &(0x7f0000003640)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000580)=[@cred={{0x1c}}, @rights={{0x10}}], 0x5000}, 0x0) 16:04:41 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000680)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}, 0x300}, 0x0) 16:04:41 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000004a80)=[{{&(0x7f0000001900)={0xa, 0x0, 0x0, @private2}, 0x1c, &(0x7f0000001cc0)=[{&(0x7f0000001940)="1c", 0x1}], 0x1}}, {{&(0x7f0000001d00)={0xa, 0x0, 0x0, @private0}, 0x1c, &(0x7f0000003100)=[{&(0x7f0000002d40)="80", 0x1}], 0x1, &(0x7f0000001740)=ANY=[@ANYBLOB="14"], 0x18}}, {{&(0x7f00000031c0)={0xa, 0x0, 0x0, @private2}, 0x1c, &(0x7f0000003380)=[{&(0x7f0000003200)="04", 0x1}], 0x1, &(0x7f00000014c0)=ANY=[@ANYBLOB="1400000000000000290000000800000008000000000000002400000000000000290000003200"/56, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00X'], 0x98}}], 0x3, 0x0) 16:04:41 executing program 1: bpf$PROG_LOAD_XDP(0x8, &(0x7f0000000280)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:04:41 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00', 0x0}) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000200)={r1, 0x1, 0x6, @random="3558c1e259fe"}, 0x10) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000100)={0x0, 0x1, 0x6, @dev}, 0x10) 16:04:41 executing program 2: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000280)={'sit0\x00', &(0x7f00000001c0)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}) 16:04:41 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x5452, &(0x7f0000000340)={'ip6gre0\x00', 0x0}) 16:04:41 executing program 1: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000940)={'nicvf0\x00', {0x2, 0x0, @loopback}}) 16:04:41 executing program 4: r0 = socket(0x11, 0x2, 0x0) accept4$unix(r0, 0x0, 0x0, 0x0) 16:04:41 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f00000013c0)={&(0x7f0000000040)={0xa, 0x4e22, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000000340)=[@pktinfo={{0x24, 0x29, 0x32, {@loopback}}}, @hopopts={{0x18}}], 0x40}, 0x0) 16:04:41 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000200)={r1, 0x2, 0x6, @link_local}, 0x10) [ 1061.511062] device batadv_slave_1 entered promiscuous mode 16:04:41 executing program 5: bpf$PROG_LOAD_XDP(0x12, 0x0, 0x0) [ 1061.571073] device batadv_slave_1 left promiscuous mode 16:04:41 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x100, r1, 0x1, 0x70bd28, 0x25dfdbfc, {}, [{@nsim={{0xffffffc2}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x43c}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x1ff}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x7}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {@pci={{0x8}, {0x11}}, {0x8}}, {@nsim={{}, {0x0, 0x2, {'netdevsim', 0x0}}}}, {@nsim={{}, {0x0, 0x2, {'netdevsim', 0x0}}}}]}, 0x100}, 0x1, 0x0, 0x0, 0x10}, 0x800) 16:04:41 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0x3, 0x0, &(0x7f00000001c0)=0x4) [ 1061.736534] netlink: 236 bytes leftover after parsing attributes in process `syz-executor.1'. 16:04:42 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev}, 0x10) sendmmsg$inet(r1, &(0x7f0000000cc0)=[{{&(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000c00)=[{&(0x7f0000000580)="1ca8a7ecccfacbd09a417daeea468402007bd7780d51ca7a1f860e50450b0756744bcd275ffe881b731e7b2d8260ff01755ec368d354e0384af55fc69e127eef817306ced71ca82ee45738b2b341ea076ebf194b00c5fdb38d825985392422880deac964c4954146313a276e22fd51cddd1759828a9e1f97be989f0e318f45810098b39ebeee4d092d60cce61526daeb341a09d798d70cea16", 0x99}], 0x1}}], 0x1, 0x2000c044) sendto$inet(r1, &(0x7f0000000c80)="e8", 0x5c7, 0x0, 0x0, 0x0) 16:04:42 executing program 4: r0 = socket$unix(0x1, 0x3, 0x0) sendmmsg$unix(r0, &(0x7f0000000440)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={{0x10}}], 0x10}}], 0x1, 0x0) 16:04:42 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1a, 0x0, 0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 16:04:42 executing program 5: bpf$PROG_LOAD_XDP(0x2, &(0x7f0000000280)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xd1) 16:04:42 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x8, &(0x7f0000001680)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x1a3, 0xe, 0x0, &(0x7f0000000280)="5f39868de2639b12c1a2ff010602", 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 16:04:42 executing program 2: pipe(&(0x7f0000001940)={0xffffffffffffffff}) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) 16:04:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x4}) 16:04:42 executing program 3: dup(0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x3, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) 16:04:42 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001d00)={&(0x7f0000000080)={0xa, 0x4e24, 0x0, @remote, 0x7}, 0x1c, 0x0, 0x0, &(0x7f0000001900)=[@dstopts_2292={{0x18}}], 0x18}, 0x0) 16:04:42 executing program 4: sched_setscheduler(0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000002540)=ANY=[@ANYBLOB="b70200000f0e1709bfa300000000000024020000fffeff7f7a03f0fff8ffffff79a4f0ff00000000b7060000d0b68af1de640200000000007502faff07cd02020404000001007d60b70300000d1000006a0a00fe0000000d8500000026000000b70000000004002995000000000000001da5ad3548ebb63d18db6a1c72821c9b767ac8308fbcd5c5e4a5ad1059b5725ac60c2ceaea4c0ec908abb6e7325ec1956bd8660bf3664148a2c96752fe2bb328dff1aa503b8de7ab9a780001000000000000d4bf20c2bd152d814f01f2cd539e030b0000000000007f4182f32333b08e6e497640000000aea5cac0ceafdb9a2eeb02a1f5104d16ddb64960d84d91004cd5817e0b7f005e6ee7a39e2f0b5a18ed786b783ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb9f35e4f41a62d79b4c03e53466fa4f22d8c19f958e8b34de3535e7dacf1b13f7e851ec843c2288a2e7ff949a7a48ce18799ee53de177a81ea67a8f84538a9a311c754e5ab59a43f56d2085786e7ec07d78917f7169f006f3f5c95177fbd0b14b36259e2905ef911785c88a16aae46084d676d8ef8aa6ecc2d34a442bc098f4fcc96623b7c373b0ef04d55b846b094b0d6c7a75a76d445e0dcdf72c7ef97e08512ef5987b6e09a6a7caffff0000141f65e7d9ebe3be70c4364333af9a9d91c3e41ac37a63f85ad8254479c12f7c84fa5df32b70a80cce69cf30d3d67d84ccf3f9db9b2ff72f3ce0d7ce76fd967d0736690111de2ddc4b153c989ef100bbf76063d3f6ffffb73d70e9c3d7b90aecf48eb19767e00b75041739952fe87fde27ce01893f54ec0ea8e792414f639bc9ce1fea3f6ac0d7025759d4b45577c205c70631e8ad585951950e851250540593e61860b69a521f4e210b6494e3c52d927195737945cc03d5668483151710de246420a1b6c55b73876a6ed7f58bde38b44ab13d980c894ed90d9338923789a1edcd8043fe87919088383268324a25df14010c8e1b49b0400e4f6f767ee30ea3aad2c6d6b8c97c00eaa00ff9bc46e1cfecbdc0e4ffac53e8f76c8b556306b409d04544d3a7edd4d447d2fb431e226ae182b8dcc86fe09b404a0b7c723d3b19c3dc382fa91fb0fb8f9f3f13296bb1758b24aad0922091d49e2bc408a5a37d2fe7a60b903d2d9fe9c151cafcc8dc389671c2d08b6e2641500568445b00cee4585af04fa69e0380be0d66649dcf3bf8a9066e596119109ea8b308ff070000aab1c95bb22cedd913b22dcaa197ccc34586dc50bd9f4628ebe757bae30b356521df06f995cb57f97052fc4158250ccecfb47ea8faf509593fadc7eafb613313b052397af1ede94d87590ce90a0a7579766f7ec4fcd3cb0b1a8c531724d5ef6b334803cedaa9cedf16dc3af6c9eb0dcca5303eed6689ea910900785f61278dde47e6672e93a314a5f60e7b682bf0cacde21f6090f4fb311afd7f8b48f3f0d8c66449d8687dcf2d0f76668b2b9bf8b32b518e01ffb985f8054d37959c529e99b7daf32acfed749d516d014cef5f98126324e202badc1e5c20d69e576a770000000000005addc0103756b894418e4591c624a9b2ccabbfb888d413d923b0c901973cd7c9d197d6d8e64787c4d397f57a15b6e0b4212b6cb55b9c207bbe84f483b15f45b9a1d3af087047c568aef1d8559c20d138f376c8769cbb5ec10b6290dc757a4903a88fb2c035f9349b59085cf91b8b775152786118a1020000fc19928ccb713ff09e179c308fbe9bc543dcf43f731074d96ef2447a2a4af5ca0c39e7ca2e801e57560a55e9cfa095cf3f74398219ad10e5e9d26631c2f1db3a2882f6e130a79517a88de7596429a20793e12616aa32b3e720c6521fbe933321adde8ca7dd99c0a0125ff8c18119a6926083f4a2c008a9f2a29e30823bf0ec3639cadaf9be9608358e1e5ab17eea477b1754f78f45468c9568471647f8bc03d11811ac6eec1741ceb39a3ecd9e3c325fcabbab3d12f6a759f7ce11dafa387a8077db8a2230d2014a57bc8dd47741270000008000000000b2eebd5e1626cab98499328ff024a240199993433ceb5be20427a32df7047d63010dfc6a461517ad48ff64042e84c85c899fd11c6320a8d8fc0e78c1aaa152d567f91dd943f62d167fed1b605965a5c2b32d094a461a990000000000000000000000000000000000000000000200000000000000000000b385c644a4a170e6dc9e9e546bfa049d025b319abd87fd85482b43db5d6c2cb6a204d45f88dd4140c8edb598a36e21ad132bf6b88c99c56633b01813fc5cd7d048469a966bbfb300fd772cbadf0cf26899bfd15e7d9408026a92f13f11d1c9832259b2f97227f84a3bb96253717a177ac091d0f4632f638b09a0307ff31729857f6fb7dac17ed09e6fe9f19e481a3f77cead663f42456e080952636515c758f5047b2148944133a492ef20a1778088c42094903d6ece2497b99fc745c420b035ff7961484a0f62a2d957ae2e47ff1ea8a059f2d03bf9c3e8d2b16ab409de762522f6008de48bb70b698c5c9867437ac3127fad4bd699acaad78a5f66c7fc7d46e048082a0af61e6b052e473ed26b032a070ea10e985703b292c7336112b1f35c3b069363869dce725d8da75dcec76dc591c052feecee18c64c4600a0bc3d4945d4b918865bbf52f732a500689cbd9a84d07846417796f2a85e7a41d27d64b10f8e970469cf495b4a1b4ea8b5322f78e9f3048351b550c59a634b47981420081ea4da18b9d318fa001ce660b28bbcf3c1a8893d130b26d25e491f478ae4f95f71ea8897b34c55f1678b8453f08a5ae1b3b4d8c83053c57637a98ef57e5fa51971eba5e287e9910cba734336703defc13fe1659b157e5d9de7bfb929e715ed1a9a505a04a8d8474482295afbb9de90de2e918522cac2d5b5ac09d1fdc4fd7c6393a684ad7234ecb65d0008000000000000560ad146e8b9e9cd9b0d0edb1f6735c90a76b1ba4dbdee34d0b6750f25ba7251944ada77665573460056351d009a568c782f4438ecba9bee47f25286300e83bd1853076ad52eac84029335b86e7f21e39a1af3d070abef94bc0827db0046dcb7d63bf64bf801f33e3196b522c836a40b0100d0961533737c57e9b7337b981a99f63f600f90647703f0640f6594dd9f26436024a1f90f174769bad5a283271e6d7f49dec90a05bd771dd0502dc2170ccf98ade27e858eb5686ac900000000ae1bc4246ae316c6af10bf02088b4bb2ac89c96e58578dc50eddbf01ece3cb8a363ecbeb8198997115d7151f691a2a755d8233e006dd38ed5ba350bd6aad3059fd157543f6d30a043be53bf6f5108083f0100f8a20666e92ec7254ce7284159057be455d16134d65ce69c4b906b76427224b69750b779d81eb6e37e1db62b1788ff918433787f8026ef5c518113d4841b5ca4dbe8d4afff527513a2efc8403be48e494b3bfeede33b1deefd9d902e8dc868f30161c2cd13621b0a20362181186ff8cf4c8d58d74822f92554287ee157e9f1597c3e2e238f382a91bf48b4de88363c841bd7a8cddae334429ccf45bd3d434d9ecf74634ffc9539010f0d36e672b9d668cc6762c0b25e4a527fb4d184ba84498b105004b31faf75f1b3dcecfd80c57015d8cd16171507add30833865fc1a42780e9d57bb14a6ebea4018d26e18747546fc7a4a619753fd9bea132058eb90f9b80549473eea2fb9bc43d38d8719a1cca094bd933ceef87a3ec0c2ac70d5f843425100950000009e000000000008000018779600b1f2ae5ed34f5b7e77278f7ded9f030000002e050000009f95a59418f612dfa87c654043da1a59c3c43c7884ab65d4b34984afe30c67179c4f5a3ba0e491f2b942b754a3c0d5b878c4ad63591c3fc7d3a4d4296d4bab0a88e55ff9c2536654bb2f83e8015fac21611968ce582698938c9a331a97c087b71ffb4c3a599e08fa0607e50300f7ff00d03bf057b408c86a1165bd9a1bdbf3dff88c9b2173a75d5fc82dce6d8a3f297231e33588d7cf183109c1118d94a41d48f8efcf193ff26908accba23f1ec1cff64a1b912ededeb080f9a241e07709e6dd6a3a7e18200c9e80b9634e6f0c4d000000000000000000000000000000005e50e77d04fcf8931ad07b38a39957e6b3a3c909000000e9d694e483e848fe0d00ee7c7d6cc30932a9575aa8808d10a4963560250bb4e60e88c726f63662cb143daf4b9ebd0774998a59fbb42dc35f12452cca456a12b7d15cf3ce7ea350e9510e96527cde622998683e65b235c284543ca32436f9e705dff00f08df1115175628a327876dea291480c2dde8a59d1856eed2b502965038af0d56e49e0e2e9cb06b2927b2eec3f42fa0e4d0f2e25104805f386d460e212c27ac7bafe6a0078f8648ff9f1e0257338ae58457fb27b29430cc9ac6a33ea11b88ae8bc95dffa293aa69d6d47f89b28a25a7ec2fce6691549990f93d1f02e1b619813699303b6b1260d5537e85315551adabe00c98bd7aa06e7f00c89f11a410518d181cbfb9bdb9160af19f1fc456b5fc4f099814631024b734c0cd8843c5cb124a21092e6cdd8aa2f4d3f93e92c6d850898890d9449e3f499af92be74ba8ba7928feabbd99d6288dece7513c50b973bab87214415078857d18032ab5adb8d4bf32405cc5f63eba7e60bcd0098fd7957943b3c4cf13de4e049e06ad7ebc236d1088c99d35f40555364ff86cab4542261999bccd3269e51d10900a1c05696b47ff33a159abce6bb1d69193bd01f59f1d3f431b4e0868db623cb8375baa50785b8fcd37ce4c52abe43c1e3368735022e7cc7a9b397b19b32adc91444f519ad33f7f2680e3cf7ecd3cfc67816eb66b1faa78dd8e3f7e233b6048c53813e6b508dfc713583d8ef8f9cfff5cdae59aa7aca654b1740c90eb71ca000000000000000000000000000000000000000000faa53c07b5f590ee4c8bfbd828972bb7bbc8ed7ae23bf3bca7eb378ba0e912b150dde95dafe80ee043a1d640bd60fdfbe4a2d2aa0607b026f78417471e6ea0d1e86b309b29d0dae2d2c9c730ac21cc2a6213596a784a09775f86a9e6d5b6c7b3c5d10177a873edb630fdf9b1e11005a1ce41d04a2ad3f5d25a1595e7609849033d2e86ac682f2f0cde376f50a88a3ab5e83f56e43a07641b82c077fa1479b79e85c71a9c00000000000000078ce7c4ab383dac0325fa7f4ffb201c479265272febf3d529aa3d9ffb08e4dbc8842fbda4d38c4cf584ccf207e5373231fdb1f7888049370800845004e16a26b06b635f740492c303da988ab41b2ac3d9e9074590475678260f205532235444e991d7d63e52aa28964fb727db39091e5efee76e3d61b34d191895b7d49600a3536c7506df587256999d8094e6346eb781c0e212020d89242ac467aa803fa4140093fe17c4d15e3b4dd931b0db633e0162786e43da18a722aed9a3781d6d373598ae96ab34909981681c75d1f823647fed2bd858a86ecf4b5c32d2f63ca6268ed97eb79ff8d3ccb24f111cf6f9179a8cbedaebe04172b3bc54dffa34e065facf9eafdbff22bddc89faff0f9ed96221bcab5a06391cca36a09c92e8704751190cff32be999a410993554fdae0e7cb6540763ef7c2c84c53b5608bbbb806248a2aedc22c7282bf7c0c40de0aadf6e49758cb7e293ed96c111dcefb0e46"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) 16:04:42 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x80ffff}) 16:04:42 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) 16:04:42 executing program 5: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000000)) 16:04:42 executing program 0: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000004c0)={0x14, 0x0, &(0x7f0000000300)=[@acquire_done], 0x0, 0x0, 0x0}) 16:04:42 executing program 2: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000100), 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0xc0505405, 0x0) 16:04:42 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000100)={0x2, 0x0, 0x0, @mcast2}, 0x1c) [ 1062.559433] netlink: 'syz-executor.3': attribute type 27 has an invalid length. 16:04:42 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000001140)={'batadv_slave_0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, r2}, 0x14) 16:04:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4010ae67, 0x0) [ 1062.624322] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1062.654765] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 16:04:42 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) [ 1062.786271] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1062.805228] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1062.822838] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1062.846071] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1062.870769] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1062.885009] 8021q: adding VLAN 0 to HW filter on device team0 16:04:43 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000040), 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f0000000180)={&(0x7f0000000080), 0x0}) 16:04:43 executing program 0: prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x3a, &(0x7f0000000240)=0x2) sched_setscheduler(r0, 0x0, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000017c0)={0x2020}, 0x2020) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sync() [ 1063.136853] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 16:04:43 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x18) 16:04:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4068aea3, &(0x7f00000000c0)={0x0, 0x0}) 16:04:43 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x17, 0x1, 0x0, 0x2}, 0x48) 16:04:43 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x1, 0x0, 0x0) 16:04:43 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000100), 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000000)={{0x1, 0x0, 0x0, 0x3}, 0x0, 0x0, 'id0\x00', 'timer1\x00'}) 16:04:43 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 16:04:43 executing program 4: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000280)={0x14, 0x0, &(0x7f0000000100)=[@acquire_done], 0x0, 0x0, 0x0}) 16:04:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_newaddrlabel={0x1c, 0x48, 0x1}, 0x1c}}, 0x0) 16:04:43 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CAP_MANUAL_DIRTY_LOG_PROTECT2(r1, 0x4068aea3, &(0x7f0000000000)) 16:04:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)=@dellink={0x28, 0x11, 0x1, 0x0, 0x0, {}, [@IFLA_TARGET_NETNSID={0x8}]}, 0x28}}, 0x0) 16:04:43 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000000c0)={0x0, 0x0, 0x2000}) 16:04:43 executing program 1: openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder1\x00', 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder0\x00', 0x0, 0x0) 16:04:43 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000100), 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000000)={{0x1, 0x0, 0x0, 0x3, 0x10001}, 0x0, 0x0, 'id0\x00', 'timer1\x00'}) 16:04:43 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0xc00caee0, &(0x7f00000000c0)={0x0, 0x0}) 16:04:43 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0xc048ae65, 0x0) 16:04:43 executing program 2: socketpair(0x1d, 0x0, 0x2, &(0x7f0000000040)) 16:04:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000080)={r2, 0x0, 0x3}) 16:04:43 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000380)=@v1={0x0, @adiantum, 0x0, @desc4}) chdir(&(0x7f0000000040)='./file0\x00') open(&(0x7f0000000040)='./file2\x00', 0x0, 0x0) 16:04:43 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, 0x0, 0x8) 16:04:43 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4010ae42, 0x0) 16:04:43 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0xae41, 0x0) 16:04:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000080)) 16:04:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CAP_X86_USER_SPACE_MSR(r1, 0x4068aea3, &(0x7f0000000000)) 16:04:43 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000140)=@v2={0x2, @aes256, 0x10, '\x00', @b}) 16:04:43 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000140)) 16:04:44 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000100), 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x40345410, 0x0) 16:04:44 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) 16:04:44 executing program 1: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x440, 0x0) 16:04:44 executing program 2: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0x4018620d, 0x0) 16:04:44 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000d00)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c234664c0af9360a1f7a5e6b607130c89f18c0c1089d8b853289d01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf23bf9412b394f2e3d887cb411fbf1f75e664149215108333719acd97cfa107d40224edc5465a93df8513a32ec450bebc6099ad2300000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c89112f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb076719237c8d0e60b0eea24492a660583eecdbf5bcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c95c25a573dc2edcaea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa0900000000000000916f89c6dad7603f2ba2a790d62d6faec2fed44da4929330142ba11de6c5d50b83bae613402216b5054d1e7c13b1355d6f4a8245ffa4997da8c77af4c0eb97fca585ec6bf58351d564beb6d952aab9c70764b0a8a7583c90b3433b809bdb9fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000dd11e6e8861c46495ba585a4b2d02edc3e28dd271c896249ed85b980680b00002b435ac15f2a169cdcacc413b48dafb7a2c8cb482bac0ac502d9ba96ffffff7f0000100000000000007d5ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff729433282830689da6b53b263339863297771429d120000003341b74abacac95900fca0493cf29b33dcc9ffffffffffffffd39fec2271ff01589646efd1cf870cd7bb232bbdb9dc33cbd7643866fde41f94290c2a5ff870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d10a64c1083d5e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78100788f11f761038b75d4fe32b561d46ea3abe0fa4d30dc94ef241875f3b4ce0232fcea69c271d7fa29822aea68a660e717a04becff0f719197724f4fce1093b62d7e8c7123d8ec571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c7df8be5877050c91301bb997316dbf178d82d182c8bb38c0ace7020e22d8b66fb84d4173731efe895ff2e1c5560926e90109b598502d2e959efc71f665c4d75cf2458e3322c9062ece84c99a061997a20639b41c8c12ee86c50804042b3eac1f879b136345cf67ca3fb5aac518a75f9e7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af40326993947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f54c2d3335457acf37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f4df90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd4500f8ff0700000000cc9d8046c216c1f895778cb25122a2a998de44aeadea2a40da8daccf080842a4867217373934bbd42dcb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcd62981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99b355b72d538ba495aea8e4aa37094191e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250df98674152f94e32409e2a3bce109b60000000000000000d6d5210d7560eb92d6a97a27602b81f76386f1535b1fad6ec9a31137abf9a404abde7750898b1bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294059323e7a45319f18101288d139bd3da20fed05a8fe64680b0a3fc22dd704e4214de5946912d6c98cd1a9fbe1e7d58c08acaf30235b918a31d2eca55f74a23641f61f2d5b308cf0d031f5f76015e6009756237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854356cb4900000000000000000000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c6641d2a182068e1e3a0e2505bc7f41019645466ac96e0d4b3bc19faa5449209b083dbd334b47f067bbab40743b2a428f1da1f68df75cf43f8ecc8d3726602111b40e761fd21081920382f14d12ca3c3431ee97471c7868dcda7eaa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1785eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945e20fa26b8471d42645288d7226bbd9c9e9e1cc9eb3d541e407cc2dae5e690cd628ab84875f2c50ba891cea599b079b4b4ba686fcdf240430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7daac4be290159f6bcd75f0dda9de5532e71ae9e48b0ed1254a83100000000f6fbb869604d51a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47d6b70ebc660309e1e245b0fd78f9743af932cd6db49a47613808bad959719c0000000000378a921c7f7f6933c2e24c7e800003c9e8095e02985f28de0bbc76d58dd92606b1ef6486c85fa3e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205a800b6d713acebc5b014e61a543a09000000daca80f08f0e3b1a569e7397f6cafa86966d7ba19e720413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e112645d1cdfa9fa410632f95a5f622f851c66ee7e30393cd7a4d67ff2a49c4f93c0984b5c2d4523497e4d64f95f08493564a1df87111c9bf3194fef97dcecc467ace45feeb685c5870d05f88a0f463db88d377442e1349acaf766218b54a9d624778e1c4cba6e6390a9f302c6eb2df7766411bef0ebb5000000000006065d6735eb7a00e127c000000000000000000000000000000a1c3da144589dcaddb71cf9374843e23f992a237a9040747e0434a8a643990b4059a98411ce867d1af7e8ea89f49e6f564d4dce8a7d6939a92144e43a7f39e83bd247e03a09dba0000000000000000000000e3e23a5f0285a000aaf033d47249c8444bc13844cbf1be617d82b269e5ea0c0d525603c0ec543ea581f63893ae414a6683e941fdbd6ea6cfc5f8744583c0aa766a65321f907927a59d75b47f06895e8471ebc2840ce5bd054df223fb09b9c739ad64cfcfd2d498b0f11056f6c40874cb977c99b6bc1a8732198a17e610082b7ce0365f271b11d4b4a3d4c7d0bb273f406ecd4b26c93151c30f5a2600"/2761], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000cc0), 0xfffffffffffffd93) 16:04:44 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4010ae42, &(0x7f00000000c0)={0x0, 0x0}) 16:04:44 executing program 4: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000001340)={0x4c, 0x0, &(0x7f0000001200)=[@acquire={0x40046305, 0x1}, @reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 16:04:44 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f0000000180)=ANY=[@ANYBLOB="88dc"], 0x8) 16:04:44 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000100), 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000000)={0x2}) 16:04:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=@ipmr_delroute={0x1c, 0x19, 0x1}, 0x1c}}, 0x0) 16:04:44 executing program 3: socket$netlink(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x3, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x0) 16:04:44 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2={0xff, 0x3}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, 0x1c) 16:04:44 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x2, 0x1, 0x7c, 0x8, 0x4, 0x0, 0x70bd2d, 0x0, [@sadb_ident={0x2, 0x4}]}, 0x20}}, 0x0) 16:04:44 executing program 5: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0x40046208, 0x0) 16:04:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) 16:04:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000002580)={0x0, 0x0, &(0x7f0000002540)={&(0x7f00000024c0)=@ipv4_delroute={0x24, 0x19, 0x1, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6}]}, 0x24}}, 0x0) 16:04:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x8010aebc, 0x0) 16:04:44 executing program 5: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000b28000)=0x3) fcntl$setsig(r1, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r2, 0x0, 0x2}], 0x2c, 0xffffffffffbffff8) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x16) [ 1063.917330] netlink: 'syz-executor.3': attribute type 27 has an invalid length. 16:04:44 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000100)={0x2, 0x0, 0x0, @local}, 0xfffffffffffffe74) 16:04:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4008ae48, 0x0) [ 1063.982320] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 16:04:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0xae03, &(0x7f00000000c0)={0x0, 0x0}) 16:04:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000000)=@dellink={0x34, 0x11, 0x1, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8}]}, @IFLA_GSO_MAX_SIZE={0x8}]}, 0x34}}, 0x0) [ 1064.029331] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1064.079518] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 16:04:44 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x81) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000000d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c, &(0x7f0000000780)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000000840)=[@rthdr={{0x28, 0x29, 0x39, {0x0, 0x2, 0x0, 0x0, 0x0, [@remote]}}}], 0x28}}], 0x2, 0x0) 16:04:44 executing program 2: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xc018620b, 0x0) 16:04:44 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000080)={{}, 0x0, 0x0, 'id1\x00', 'timer1\x00'}) 16:04:44 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040), 0x4) 16:04:44 executing program 5: dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(0x0, 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r3, &(0x7f0000006440)={0x0, 0x11, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x40, 0x10, 0x1, 0x3, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x29, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x40}], 0x1}, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) 16:04:44 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000021c0)=@base={0x5, 0x42, 0xbb7, 0x7, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x48) 16:04:44 executing program 0: r0 = socket(0xa, 0x2, 0x0) bind$bt_sco(r0, &(0x7f0000000000)={0x1f, @fixed}, 0x8) 16:04:44 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) pipe(&(0x7f0000001380)={0xffffffffffffffff}) dup2(r1, r0) 16:04:44 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 16:04:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x29, 0x0, 0x18, 0x18, 0x2, [@array]}}, &(0x7f00000000c0)=""/243, 0x32, 0xf3, 0x1}, 0x20) 16:04:44 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8914, &(0x7f0000000040)={'tunl0\x00', 0x0}) 16:04:44 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) pwritev2(r0, &(0x7f0000002340)=[{&(0x7f0000000080)='B', 0x1}], 0x1, 0x0, 0x0, 0x8) 16:04:44 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x20801, 0x0) pwrite64(r0, &(0x7f00000000c0)="82acbc", 0x3, 0x3) 16:04:44 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@alu]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1064.272989] netlink: 'syz-executor.5': attribute type 27 has an invalid length. 16:04:44 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) mmap$KVM_VCPU(&(0x7f0000ff1000/0xe000)=nil, 0x930, 0x2000001, 0x12, r0, 0x0) 16:04:44 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1064.353916] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1064.388076] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1064.412002] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 16:04:45 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x0, 0x96, &(0x7f0000000080)=""/150, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:04:45 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x81) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000000600)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@hoplimit={{0x18, 0x29, 0x3}}, @hoplimit_2292={{0x14}}, @hoplimit={{0x14}}], 0x48}}], 0x1, 0x0) 16:04:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd, 0xd, 0x2, [@datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "02"}]}}, &(0x7f0000000440)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 16:04:45 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) pipe(&(0x7f0000001380)) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) pipe(&(0x7f0000001380)) clock_gettime(0x0, &(0x7f0000000580)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000280), &(0x7f00000002c0)={0x3}, 0x0, &(0x7f0000000380)={0x0, r0+60000000}, 0x0) 16:04:45 executing program 2: setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, 0x0, 0x8f040000) 16:04:45 executing program 3: getresgid(&(0x7f0000000180), &(0x7f0000000200), &(0x7f0000002380)) 16:04:45 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$BTRFS_IOC_DEFRAG_RANGE(0xffffffffffffffff, 0x40309410, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1}) r1 = dup2(r0, r0) preadv2(r1, &(0x7f0000000080), 0x46, 0x0, 0x0, 0x0) 16:04:45 executing program 3: socketpair(0x2b, 0x0, 0x0, &(0x7f00000001c0)) 16:04:45 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$F2FS_IOC_GET_FEATURES(r1, 0x8004f50c, 0x0) 16:04:45 executing program 2: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0xfffffffffffffffd, 0x0) 16:04:45 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'gre0\x00', &(0x7f0000000000)={'tunl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev}}}}) 16:04:45 executing program 4: r0 = socket(0x2, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x88, 0x0, 0x0, 0x0) 16:04:45 executing program 3: pipe(&(0x7f0000001380)={0xffffffffffffffff}) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000000)=0x7) 16:04:45 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) select(0x40, &(0x7f0000000080), &(0x7f00000000c0)={0x9}, 0x0, 0x0) 16:04:45 executing program 1: bpf$BPF_BTF_LOAD(0xb, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 16:04:45 executing program 2: epoll_create1(0x0) select(0x40, &(0x7f0000000080), &(0x7f00000000c0)={0x9}, 0x0, &(0x7f0000000180)) 16:04:45 executing program 5: r0 = socket(0xa, 0x1, 0x0) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)={&(0x7f0000000080)={0x14}, 0x14}}, 0x24048411) 16:04:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002e40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x1e84, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0xf0, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x31, 0x5, "1b951634b3c40d2e458a62f8ce4f06b00b38d2bfdf6514dfc581e8d8ee5eb9bff20449c8494e0f1b91a273c0ce"}, @ETHTOOL_A_BITSET_VALUE={0x11, 0x4, "5e171edfb6d3d8bacf47559da5"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x60, 0x3, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '$\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '/'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '(+$(\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}, @ETHTOOL_A_BITSET_VALUE={0x3d, 0x4, "f52726553cdc435516cda9e35ae1a6938a755198ddd6e7031867a82b7025c53f830d081b6939d8f251b7181ee42171e0cb88edd51ad0ec6542"}]}, @ETHTOOL_A_DEBUG_HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xd4, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0xbd, 0x4, "e6d2713a5fb961b77157ec306f752049e3fa1eda4c1bdd51e96be66f9c807520d4ffd9e7baa6910637903019183b74d3f660b1964411f2005b6e0d6ea75610c3eddb66bfdd9e3955f35d3e238c922e5e79534c76ff55bb8c3335840e3bed4f94ff92d701338846e290dccf5514bf89b548f38685caf32a82f087f3caf478040339ee216d0a3ad792852f9ab46accfcc80725ee5b8de876c89e720795ac02595464a11ae186eaa6df48a62600eb2dadcf89b2fa22bc8e0b137d"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x1358, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xd1, 0x4, "2110d0bbc36bb3ea4a2aefd77429552cdefcffa9b3f4c3422ca9fbc833d2807c63713bd37d8f01c1a9a1bc6a3d6872cbb7037ce4cbeda4a9544d0f598b7e20322b0c09a21bdc5a457106239ffc52be1a92850f79d3c642e4a4e3b985858842fa1dbc801997eb15a1cfbc542146037c8c109d519c21e4a64984115a3495838e7253654961fabbf9e32560523d3c88cd2800dcfcdc6729dac207e07ce0ef5e6d1a4e7ba7d656573769419c3fadc4f360eae4951e916db2c934179ef783f1261b5ff8741bcb7a56c109a6a8401e1d"}, @ETHTOOL_A_BITSET_VALUE={0xe9, 0x4, "592d89d841577d09c20cf70f6c1fccb32e1b546686c2db691341a0b07df349e4526c546d368c9f86db92430651bf1fe9b2744c83b88ba6d40c9f09ac9d04ae899212889ade85b784fa997c42d19320aacb13e4f4a42cdbe69f9106bca404f2a614809e4380a9b4bc93841674e4476a2f7118c47b48b30c27ed6cf5b88aeaf40c58352e986f1522695156065c7483543d048c25ad2487bd39a36527d5a86ea797c755ed31b71faa035d68ea15b26b681069ac0340f82da5d0e247d30bd7a14e2b2a6e036e434c5c16d4e90651c667c3d7c65b3727b47bbad71813ac55b23807706f73dd1592"}, @ETHTOOL_A_BITSET_BITS={0xa8, 0x3, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '*/]\'@\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '@(\xdd-+!{/}\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ')\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x17, 0x2, '\x18+@.&\xfe%(\\#$!\x13{])}-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, ':.k&-}(\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x1001, 0x5, "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"}, @ETHTOOL_A_BITSET_BITS={0x38, 0x3, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '*^]-\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '%/\xe3\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}, @ETHTOOL_A_BITSET_BITS={0x20, 0x3, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x89, 0x5, "df893292a0578d717fd9dc31aa07c1afbd90f2fd9c1384e13a20eb04031b268bc65dc7462def3b5be9b4076055522f35890dc68a931f061ce4096284febef9e58ee1c70cf1c6d3ac738c29c356897d7d35511f5d4c2b7969ea9a0f3dbe335872f6d75f9da8944dabec97a916f6b5571cd7a0752b083022bf1cd4a267f3dfbe04b37debe7b0"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x158, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x71, 0x5, "e8be378bba127a0c089230720454151b039ab0c2f9516607c7d48fae6de4d473e128c8bd807a5269aee071be227344353d1d3f4b74506b631950715cafc083c73712b2e480d43ca0871e15c9cc626ad5ad7d6591b1489a0c143380c764d678c7e28e85f31e18cdbf7d5d03067b"}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_BITS={0xd4, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '&\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'Q+\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '\xc6#))[/\\[+\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '(*/-}\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '!-\x00'}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_DEBUG_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp1\x00'}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x31c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xdd, 0x4, "b1eefd30a2dc2411f0783fd526184b41b9e85b5a697772112134de2b7ca62a020fc3c265014e1f41d18554d3ccf65894b08d830984e493b6f4af0c2337346599831308a3d94721dd4aea0d48db5e2404cbc744f0bf398d2b1c08a08ecd34191b7ac151b5d95369e7d1d3685b8bbeffa18374474d9e6f37b95248a98e6d57738bf6cd655dd69814660b61768f263e73e06b840425d7549dfcb085463eb2f11219a688574540d3035cecbbae0cbf67498c6e8d64d87433c2d722a14cc81d176e26e75ddf28041f0208b464b3204afd24a2bf1f9d39d3b7ad0ce0"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0xe9, 0x5, "e250af0c17efb4d8e085df829127efe7ef11c09957f6ba494935db4d38d4f74e03a2db0150bd07e9c6227df807b29dd9d307c4c84530180037455f60e48ef651f8f486af8c1ddb203cc5a82a51a2d88f260cb46bb37d3106697ac7a9476952d306e93ca6e7eec09ee465c1d6664d25d0702cbae7c53cbf784bffc04f61537dafd84cae6e0c5225fd4bdfdf4d3b9abca90348d142a195b0f3e2f16a3097d4f4c8d96d5912ccba9b90958b86f3ed86372d264d9959425433c407f10e7c7963de12ac32753ae96271e55da2b1c999c30fb856809a5fed5e930f65a25692f934ec2264e42bd2be"}, @ETHTOOL_A_BITSET_MASK={0xcd, 0x5, "745303e29bf7a3e83dd2ff90ed419abaf8c8bd2716c1feb67036437f95d9dddbb78db5fc4218314f18f58ce853f564363145e07e78816f1c44314a0741db508941d13510be8ca7ae3d0714d093eb6c462f7411a47388eaa8061efaff6b8740d152943329c1b99824f801e4108e62a60f96715bd79edbe3d6e95c4048ccede53936c0bf76497588b113c49faf9b14089dfb783d9d104652d33306f5a7d4a56937c27374b18e04c954980e61e9bfb0e02e6c7c6c42fdd714c79b36463d77eb754ec34ec9a3d5fca58e78"}, @ETHTOOL_A_BITSET_VALUE={0x69, 0x4, "cd15cbd0223b6f28f87d4620fb08f7b14709a480e7b23a00aa5305dc3337137b04338194e220b10c595e8fe10857b241c6cab28635cbf35183454969f9b4e2d7b9dddb5f64592b1ee25b1e3e83941219ee57f479426e5474efc889dccbd7db1ab1de137970"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x4ac, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4a5, 0x4, "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"}]}]}, 0x1e84}}, 0x0) 16:04:45 executing program 0: socketpair(0xa, 0x2, 0x0, &(0x7f00000002c0)) 16:04:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x3}, {0x6, 0x4}]}]}}, &(0x7f0000000280)=""/243, 0x36, 0xf3, 0x1}, 0x20) 16:04:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x26, 0x0, 0x0) 16:04:45 executing program 1: r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x500) 16:04:45 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000640), 0xffffffffffffffff) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)={0x20, r1, 0x1, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_CH_SWITCH_BLOCK_TX={0x4}, @NL80211_ATTR_CSA_IES={0x8, 0xb9, 0x0, 0x1, [@beacon_params=[@NL80211_ATTR_PROBE_RESP={0x4}]]}]}, 0x20}}, 0x0) 16:04:45 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000000)) 16:04:45 executing program 1: futex(0x0, 0x8a, 0x0, 0x0, 0x0, 0x0) 16:04:45 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x81) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000000d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x359}, 0x1c, 0x0, 0x0, &(0x7f0000000840)=[@rthdr={{0x38, 0x29, 0x39, {0x0, 0x4, 0x2, 0x0, 0x0, [@remote, @mcast2]}}}], 0x38}}], 0x2, 0x0) 16:04:45 executing program 4: r0 = socket(0x2, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x11, 0x0, 0x0, 0x0) 16:04:45 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$inet(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000740)="bd", 0x1}], 0x2}, 0x0) 16:04:45 executing program 3: r0 = socket(0x1e, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x11, 0x0, 0x0, 0x0) 16:04:45 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000100)) ioctl$PPPIOCGNPMODE(r0, 0x8004745a, 0x0) 16:04:45 executing program 1: r0 = socket(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote}, 0x1c) 16:04:45 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x12, 0x0, 0x0) 16:04:45 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x202001, 0x0) ppoll(&(0x7f0000000080)=[{r0}, {}], 0x2, 0x0, 0x0, 0x0) 16:04:45 executing program 2: pselect6(0x40, &(0x7f0000000000)={0x7}, 0x0, 0x0, &(0x7f0000000100), 0x0) 16:04:45 executing program 0: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r0, 0x6628) 16:04:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f0000000100)=""/173, 0x26, 0xad, 0x1}, 0x20) 16:04:45 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002e40)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0xe84, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}]}, @ETHTOOL_A_DEBUG_HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xd4, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0xbf, 0x4, "e6d2713a5fb961b77157ec306f752049e3fa1eda4c1bdd51e96be66f9c807520d4ffd9e7baa6910637903019183b74d3f660b1964411f2005b6e0d6ea75610c3eddb66bfdd9e3955f35d3e238c922e5e79534c76ff55bb8c3335840e3bed4f94ff92d701338846e290dccf5514bf89b548f38685caf32a82f087f3caf478040339ee216d0a3ad792852f9ab46accfcc80725ee5b8de876c89e720795ac02595464a11ae186eaa6df48a62600eb2dadcf89b2fa22bc8e0b137d5c64"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xd78, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xc2, 0x4, "2110d0bbc36bb3ea4a2aefd77429552cdefcffa9b3f4c3422ca9fbc833d2807c63713bd37d8f01c1a9a1bc6a3d6872cbb7037ce4cbeda4a9544d0f598b7e20322b0c09a21bdc5a457106239ffc52be1a92850f79d3c642e4a4e3b985858842fa1dbc801997eb15a1cfbc542146037c8c109d519c21e4a64984115a3495838e7253654961fabbf9e32560523d3c88cd2800dcfcdc6729dac207e07ce0ef5e6d1a4e7ba7d656573769419c3fadc4f360eae4951e916db2c934179ef783f126"}, @ETHTOOL_A_BITSET_VALUE={0xec, 0x4, "592d89d841577d09c20cf70f6c1fccb32e1b546686c2db691341a0b07df349e4526c546d368c9f86db92430651bf1fe9b2744c83b88ba6d40c9f09ac9d04ae899212889ade85b784fa997c42d19320aacb13e4f4a42cdbe69f9106bca404f2a614809e4380a9b4bc93841674e4476a2f7118c47b48b30c27ed6cf5b88aeaf40c58352e986f1522695156065c7483543d048c25ad2487bd39a36527d5a86ea797c755ed31b71faa035d68ea15b26b681069ac0340f82da5d0e247d30bd7a14e2b2a6e036e434c5c16d4e90651c667c3d7c65b3727b47bbad71813ac55b23807706f73dd15929f5e5b"}, @ETHTOOL_A_BITSET_BITS={0xa8, 0x3, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '*/]\'@\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '@(\xdd-+!{/}\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ')\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x17, 0x2, '\x18+@.&\xfe%(\\#$!\x13{])}-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, ':.k&-}(\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0xb19, 0x5, "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"}]}]}, 0xe84}, 0x1, 0x0, 0x0, 0x20008804}, 0x4080) 16:04:45 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000480)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c, 0x0}, 0x0) 16:04:45 executing program 4: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000880), 0x8, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000000000000000}) 16:04:45 executing program 0: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000300)={0x0, &(0x7f0000000200)=""/199, 0x0, 0xc7}, 0x20) 16:04:45 executing program 2: r0 = socket(0x2, 0x2, 0x0) bind$inet6(r0, 0x0, 0x0) 16:04:45 executing program 1: r0 = epoll_create(0x9) fremovexattr(r0, &(0x7f0000000080)=@known='trusted.overlay.upper\x00') 16:04:45 executing program 4: syz_open_dev$usbfs(&(0x7f0000000000), 0x0, 0x0) 16:04:45 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000040), 0x0, 0x81) read$msr(r0, 0x0, 0x0) 16:04:46 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x81) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) 16:04:46 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x81) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@tclass={{0x14, 0x29, 0x43, 0x180000}}], 0x18}}], 0x1, 0x0) 16:04:46 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x2000, 0x0) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) dup2(r1, r0) 16:04:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000013c0)={0x0, @initdev, @initdev}, &(0x7f00000001c0)=0xc) 16:04:46 executing program 2: pipe(&(0x7f0000001380)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000040)=[{0x0}, {0x0}, {&(0x7f0000002680)="ab", 0x1}], 0x3, 0x0) vmsplice(r1, &(0x7f00000024c0)=[{&(0x7f0000002540)="8f48", 0x2}], 0x1, 0x0) 16:04:46 executing program 4: pipe(0x0) r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0x0) 16:04:46 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, 0x0) 16:04:46 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = dup2(r0, r0) preadv2(r1, &(0x7f0000000080)=[{&(0x7f0000000000)=""/22, 0x16}], 0x1, 0x9, 0x0, 0x0) 16:04:46 executing program 1: r0 = inotify_init1(0x0) fcntl$lock(r0, 0x670c794e7eea5c0a, 0x0) 16:04:46 executing program 3: syz_open_dev$rtc(&(0x7f0000000040), 0x0, 0x12d8c0) 16:04:46 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x48) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) 16:04:46 executing program 2: pselect6(0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100), 0x0) 16:04:46 executing program 1: r0 = socket(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8936, &(0x7f0000000000)={'batadv_slave_0\x00'}) 16:04:46 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x0, 0x4}]}]}}, &(0x7f0000000280)=""/243, 0x36, 0xf3, 0x1}, 0x20) 16:04:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x2f, 0x0, 0x0) 16:04:46 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000100)) pselect6(0x40, &(0x7f0000000280)={0x8}, &(0x7f00000002c0)={0x9}, 0x0, 0x0, 0x0) 16:04:46 executing program 3: r0 = socket(0x2, 0x2, 0x0) sendmsg$NL80211_CMD_DISASSOCIATE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) connect$bt_sco(r0, &(0x7f0000000080)={0x1f, @none}, 0x8) 16:04:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xf) sendmsg$nl_route_sched(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000001180)=@deltclass={0x24}, 0x24}}, 0x0) 16:04:47 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) pipe(0x0) r1 = dup2(r0, r0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10) 16:04:47 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000037c0)=@base={0x17, 0x5c1, 0x0, 0x2}, 0x48) 16:04:47 executing program 0: clock_nanosleep(0x2, 0x0, &(0x7f0000000040), 0x0) clock_nanosleep(0x2, 0x0, &(0x7f0000000000), 0x0) 16:04:47 executing program 4: syz_open_dev$MSR(&(0x7f0000000000), 0xffffffffffffffff, 0x0) 16:04:47 executing program 3: r0 = socket(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x2, 0x4e23, 0x0, @empty}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000080)='!', 0x1}], 0x1}, 0x800) 16:04:47 executing program 2: r0 = timerfd_create(0x0, 0x0) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r0, 0x80286722, 0x0) 16:04:47 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x81) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000000d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x359}, 0x1c, &(0x7f0000000780)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000000840)=[@rthdr={{0x38, 0x29, 0x39, {0x0, 0x4, 0x2, 0x0, 0x0, [@remote, @mcast2]}}}], 0x38}}], 0x2, 0x0) 16:04:47 executing program 3: pipe(&(0x7f0000001380)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000001700)=[{&(0x7f00000011c0)="d9", 0x1}, {&(0x7f0000001240)="9e", 0x200011c1}], 0x2, 0x0) 16:04:47 executing program 4: r0 = socket(0xa, 0x3, 0x5) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 16:04:47 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, 0x0) 16:04:47 executing program 0: clock_gettime(0x0, &(0x7f0000000300)={0x0}) pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x2}, &(0x7f00000000c0)={r0}, 0x0) 16:04:47 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000001000), 0x0, 0x0) write$rfkill(r0, 0x0, 0x0) 16:04:47 executing program 1: syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x8040) 16:04:47 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x6, &(0x7f0000000000)=@framed={{}, [@call, @map_idx_val]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:04:47 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x81) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000001300)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000e40)={0xa, 0x0, 0x0, @empty, 0x1}, 0x1c, 0x0, 0x0, &(0x7f0000000fc0)=[@dstopts={{0x18}}, @rthdr_2292={{0x18}}], 0x30}}], 0x2, 0x0) 16:04:47 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x81) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}, 0x1c) sendmsg$inet6(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000000040)="99c8e9361195a1bd26c196b94165d5641e1aecea7db9f87aac4f85a4292f8532ac", 0x21}, {&(0x7f0000000080)="9efe1e4840f2822d9396fcc43ada7c560a1f52c2a1deba870487f436a0775a97b50912fb439c543aa4198de2334c9a38413fe1e873a87775461248195d449b2875782da3968999e3a37761b99b6882326a554c390c35acb9ee666118609087961287996a04b9b643634c8445515ed641", 0x70}, {&(0x7f0000000100)="f0075ac130b3e6cf9a24bede5863b4649597f3ce83848e3cab416a5ac4b9a953b0fb7edb5e3c01356c507a656c0b12dcbf55d0481e366ae0d2b704901b63ba9dec1cec152f386f2c5446d19649586c03d76b346a617f7969aab4577a9de098", 0x5f}, {&(0x7f0000000180)="f5ddef8485b91b8904fe56bf930c33ba5974be73aa731a31c8b4b1e033253566ceaad5796597c9bf01ef089b09a814219946654dee69c2e1999ab3f1aaeacda4c107ff482e36cdcae5d3a9fa427c2dfe95467748924fb10ea3a4d4895e87277cedd59087484f96716433b6579ed93fbcb1b33ee413c39d881cbfe28dc6b8e52cdb0440e512c92037ea69a2774094a08ff83f", 0x92}, {&(0x7f0000000240)="7cb4ded969c4170f7434662edb79011ea7e8efe12a7b33b01db3da59f4b49ae7a0ae03076e802d92289878da7053d52b4fe4017286521120cb50e47569", 0x3d}, {&(0x7f0000000340)="3fd7f4df0a975a31aa581c9c1d3eb0d817306a6790a1f78044ee214dd627ffef05ce8d6ac888cee6a5b43b2000afc108f6346381f05b0513e61c955a6f9a39e22292eaf2ab07", 0x46}, {&(0x7f0000000640)="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", 0x3b0}], 0x7}, 0x0) 16:04:47 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_POOL_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x9effffff}, 0x0) 16:04:47 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x81) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000380)="a9", 0x1}, {0x0}, {&(0x7f0000000640)="1f", 0x1}], 0x3}}], 0x1, 0x0) 16:04:47 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x1) 16:04:47 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x15, 0x0, 0x0) 16:04:47 executing program 3: inotify_init1(0x0) select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x4}, 0x0) 16:04:47 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) 16:04:48 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x81) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}}, 0x1c) sendmsg$inet6(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000000040)="99c8e9361195a1bd26c196b94165d5641e1aecea7db9f87aac4f85a4292f8532ac", 0x21}, {&(0x7f0000000080)="9efe1e4840f2822d9396fcc43ada7c560a1f52c2a1deba870487f436a0775a97b50912fb439c543aa4198de2334c9a38413fe1e873a87775461248195d449b2875782da3968999e3a37761b99b6882326a554c390c35acb9ee666118609087961287996a04b9b643634c8445515ed641", 0x70}, {&(0x7f0000000100)="f0075ac130b3e6cf9a24bede5863b4649597f3ce83848e3cab416a5ac4b9a953b0fb7edb5e3c01356c507a656c0b12dcbf55d0481e366ae0d2b704901b63ba9dec1cec152f386f2c5446d19649586c03d76b346a617f7969aab4577a9de098", 0x5f}, {&(0x7f0000000180)="f5ddef8485b91b8904fe56bf930c33ba5974be73aa731a31c8b4b1e033253566ceaad5796597c9bf01ef089b09a814219946654dee69c2e1999ab3f1aaeacda4c107ff482e36cdcae5d3a9fa427c2dfe95467748924fb10ea3a4d4895e87277cedd59087484f96716433b6579ed93fbcb1b33ee413c39d881cbfe28dc6b8e52cdb0440e512c92037ea69a2774094a08ff83f", 0x92}, {&(0x7f0000000340)="3fd7f4df0a975a31aa581c9c1d3eb0d817306a6790a1f78044ee214dd627ffef05ce8d6ac888cee6a5b43b2000afc108f6346381f05b0513e61c955a6f9a39e22292eaf2ab075277fea9709f945563ada5deb78e6d762f8ed1ac18a2bc3a35baa6341362f498843d0ebdac0cc97ee5b884b63863ebd61f74526ac50f1f048fcbaadbfec4e7024b98a26c9e57", 0x8c}, {&(0x7f0000000640)="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", 0x3a7}], 0x6}, 0x0) 16:04:48 executing program 1: socketpair(0x22, 0x0, 0x0, &(0x7f0000001500)) 16:04:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x42, 0x0, 0x0, 0x2}}, &(0x7f00000000c0)=""/243, 0x1a, 0xf3, 0x1}, 0x20) 16:04:48 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000001240)='/sys/block/loop0', 0x0, 0x0) 16:04:48 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000000c0)=""/243, 0x1a, 0xf3, 0x1}, 0x20) 16:04:48 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x6, 0x48f, 0x0, 0x4) 16:04:48 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002e40)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0xe84, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xe64, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}, @ETHTOOL_A_BITSET_MASK={0xe56, 0x5, "8012724526dd31a00f21567823571fe2af6233038109b48b435d1c38bcf2c9f752657cbbf92b27f9fec7319d998bc6fab0f7a0268a098ae4b7746da94b189c8ab40eb7b048f06968dc984bc96c898a85a106d81bddfa27b032a9cf10424abf332e73f86571bf6dad357c8963a602f4ac7b572ce83ceb5f477759c13a4043dd1a0c83e5bcf6361f00513fcc1c5449f07f25eb23bdd0cab7b1837734f77600bb1aca23d8e9bb7f3d3fa3266939111372259926d3432b6526da4d513ff9cfbbc37a679ccd1329f7b477534fb11ba2e58951ae64adc9257f3943c6a6ab9932f8c7dfc8a2ffd6de9f34e43c30aaf07137c2e3991fd73392e11863796b73a762f90c799b16e2eb72ff6fe751e1dcff44d25ec199e822dcf2291d2acdb4f238bff763f683fe8d5d718578f8d79f74f021c3438f5f153d43163053db75b89e4ab145e07933b7670f99671f1c8316cfa61b27fc8d1853ea10cf8ecbf53cc6494f8305d8f2fdaba4bc6f160048449d3dc1fd3dbfbc860faa1caceedd458065fbc6aff9dc95f56a78f4d6e1f50fc1c1baf541ac667e1ff397bd87688ec624ff4c5c32bf1e7c0080bf773c41df428efc7a95ec8cd2062bd6670f7e275c3dbf44c0741e516ffd9d5247693bec19a4327450e2276cd4fd7bd126aec5f3bc54bc9312b705d04c558bb9c12cfd1e760aa2b27da2a8afbe3b2d1e4bf6793fbca3c87ba94020c43dc80b11385764c8028ebcd3a829ae385bb59f9abe3b5c69a90bdcd9ffaa14b038583ff1f5dd9aec3db7ae7a7af64714d511e901a6fefae5ad863877baa55790d90e288d1af9ae552201167ab5708181724fc457d4794dc99956f525f1b7ee29557d9f8b9910ee012edb17923e6da7a2e7875530ae25c523a144a660d5fab3c635112203caa347d3e8dc0cb202955175f48d8c969002fd60c5ac832f6a050ddd371b8cd6a3e0aef1d16a5e6fc8b8e6bc44bf82d99b9c7264f212ec5e0dbce0acc0017a233cd9ceecd492ba49a7667712feeb54c93a84559b3491fef3ae90250486e181608d1de4e4f30e9389af6700f64f7141ae7792f7b4d0fa82d7aaf4a364ca885f06070675b77e60ca31b4bb5392e9d6efde5463bd8aa24fdffbcd78e572b3c3516cade83211e0fc5b8df4a1909e01e7bdecbb1a5cd42f045e5a14acef0ef39db4e8d8859d2ecaeab7e2672bdd1973722e00c0addac7b99b6c8a2217698dfb0e66a6424678bdb0eb38d12535894cebee65c2678b3a0c2cfc8f0acbfe640a996b86e38e1faa3e1b79e31b51f7bdf75594265f46e1d49baf5e94abfdb3da32ef2744f4a52a6a1d7d49c253d5852d0a6a4f6f77e7736e7ae60d30a8be4cbdbeaf416a26950ab373ac36af2a200bfa9f6947102440e9c8ac3155f7b60f565f54a8f455ccbd11664aaaf552b8e9ef3c8c83a6d4181e158572aa180de0e6e2261f7250f10026b3d3d6f75ff6fc6c9781766af55fc615852dd2f53ea48aa6d30dc38f872837479050d72ed5c32fdef4e4b96f2e94781b72dbef659d906d45fa71dcf48da07f19b938d3ded2b6dcfdbd5cad4a21bbffde52c45ad29265612387ef1ae27e8366582475dd55766e15b3d050c5429aa825e29eb022c88dc4377c3ae6c2a52be05b9f017877c4db7709001212391c826d2ce1880558c454f09ec1a88796067e214159f537f69cc5d84a1c7e354d82b37e186df3f30373736fb40bc3af82880adb0888d6759d55fe9f6e1666eea5460572194b5b2d54b753978524d3d12fb18b4adbc888bdb1883e08f94b61cc53e1348ae6cfbb722cf72e24bdbef7cd73a8107d78f9cc0656dd0988d698cc9e6adef42a8d9d9918c6e9e4bd04b94d434277e5189ca0e4710264af874cf11de60baee35063bc9d2b84682dc872c003f86b9bf08f2295ff57cffdf92640d445f0c14e353c1711106d09cd61aa61d1a0212635a928c205540a43bb9dc41a1c771ad9f0d25cd7ca15ae182c35713b8d984303899307560d14b0901e231ab9d80dd8e8aa62179b75fbd6a87b23358bb6ef2106d6d06a46b27fb7d0427c3757c99ec2fa09347fe1ee34bcf091094ffa61850b305ce85ac05fe6b1a4efab4594e995109b71eecd4294c3e3a19ae4086a6d7b718711cce80139f69949cd9b6ee87ce2cb27c3d8eb90bc9c236c0f1dea06ad2693bb7a2529301039d8ef75ba81f943eb0138c3178765eb6747ed640db24722568b4eac491abf98500cc5fc990ede0fb3ecac89870959856991a3585b6596a350728eff04b00e7522e7d57abbe5b162fc907c117009ad371b7202e80bd90c22fa656212403662cbe5e66568c45e16f852168c1b95703d473226ff815f286aed293aa960190aa4671becddedf0654f2f7152b2321e0b22c8e904162eaf905fb349e9cc754ae13154aecfb47b32ff3248129c6b2792cf499877d98a62a7dd5adfb9b9a5798c9bd70664111266001e03cbb24b4dcb050d3c5f10087931b3e2c1cfd057b5c651496c440d3ba77c11ee097d7fb58d097ef9ca8a3f4e5e9dbe392f900479d1a5e41a4486f493c032e7670684e274156ff83e9624043d4c63e46e8cbdf36e89429e1f103b60059ceb037cc8ad11fcd2531f62661ac5a5c418931e33b2e1e29e38d363d2e1421a19e16155b1f76fa353c38aeb7fc9e74ede049e78a4a82f70388c8ee8027a3d724f0b70e272d9c16543573cced3fce4abcf4926c817643c948e7134311022b9358baf08ac1988d435e98db17dc641929f550ab563255328dceda3c140a1221fb9010f55ef65a5a40b3802b162f341c2b79c162593d0d36a38d2145054d59ea2ba952727c2fad2f993a977d66365edb57c3d47d83bab9c0eb5d4e1d25b1b510fa1279d4c6dbbcea8b80118deedbe681ab6b7cbb19ca4f99e868b5e74c4ac49420f90dad41603ce52fe820625c6087943e525c982e2c98b9013d0fdc9b99e7dd5a92cf8a8795822cd8edf7810e0b4d41f019f81f46eea431e980d9e3b219c5cb30f735f877b9b157d08a6762364206e05ae2936cb6702d78b2b1d79ecbafcb8a2d7c3988598bb90aa68334f13f3d46ac12bd65dbeb704c9650f128d71fc662408a9a8685804d8cb50e81e167b8db679b35c8de7149f4f69fa6235ed3ebff2e829681910f067c521e4a4ee5dac6e78bd9421a10de96212600b071d7938142ed828281f60743c8c23eaf65368858d9c08c4a23cf45091af240ca3f3c3817acb80d992692ead286b1deec1e7f2edf524045525cfd62dac2104b8752d4cf90f426c37cf31eacae4e5b69509ae1e2ebe5d2323cc7238b82ff6bc87f7780ea1fccd6d8a554b25e885ad7bd7deded60b0519af854fdae0db6948287a835431c17c25c10fc77eb170feeb6af8aca28c9805acdbab12ac3199b70c9f8f4fae8b9068ea1402c5e1119ed1ece54ca09b16b883df00f5ef3aa8071255aeff34abd16f242f346f5e17dada866415c6376232f0d7162cc9cdc13b878bb6b9aeef20f1794d6ef994cc3eee3cc697bf0d4d25bfd8bd88d937086db8889510f5921d307d46afe9b62fe32d12ef5c3bd3c54e5e5a470c101284f87245298ca0c8b87867879995af563d505145a16a1a8459f531a54147bc5e202e9d1f91d27c93fadc64a8338f1744be573524c69352c50ff077dfafec500523d3e5577d9bb84fef681efe72035c00ddb8f499fab301f050316f4e7207e982e9c79d24609421bb30abc0b13127572850adec274d9638f0e07b9b331e7fe53f77c6922f4e14f78af0840a1751444feeea3bed81479c855f9e1156d35199e12df9278f63f3675d7cf91c9e64cf5700b4a922e7e2215f34233ddeacbbb224f84e360fe00b48c4ca83aed3d59e538c34ca3b3c2d48b723a134c25565445699bc73a8bd030a563f9e22eb2bc7117ad4752bb1fba1f2504425bb5dc56d44701a19abe10641ebc9f326a1e3d8dccf56ad3019bb2c61cb4a0158f1b1d68ee315500f63b2cb3766e4f0d314e68fe36f643430e5c73a3f8e8657f46138e83a1117ab4cab665f641f87d9f35dcc2d69b0f3dec5782d43345a940abea24542d1a38b0f0b21a31aad442baad70e9344f5f1c93e88c31552f64a4dcbb1107c189dada6562bac4e20841ad36e9af0650ec8954261ec1d0fa9b05c1433cb8d949ea239d5ae6772bb5d74a6b13e590d571620f8cf1e066c83454c77e9a0e2345ad7f3aa6ae80685048402c24c6987aea692106d38d7e50815b5c1500a342ec32f505f6ea40068dfdce86ec600c3c2308370e0f5ad41aebe3989cea2db4224eac386417f9559d56b1aeba3a805a6f324f00896dc69a04f890af8e01b722e09ecd8460acca76dd9fae67d67e85600bb07e0d2c807308449a330f1ba742c7cb0e1620c4fbc2cec0d67ee34f2c723974d867e696580c000617b8f9371537cc2acb9ac2a87b1bc03f04970a0895de735d2761aadca6a393b654871f45f4eae452e3104c5e93638859ca8f2b371881dca5fabece1c0d03cbd9aea0484444bad2533aae1dded7881926610f0f5012ef7cc82bbf6b29c153c31af452baff66e59b22ea93ec66493ffb9a1ef34216aac0b0a5c12e01a8925d1c1115633f0ab4f58855a682a41c52eed1d175dcfa7e50f6501be1e483a67b0b2f3ee521bca6ab66285226142da43328e8f6ea7e5c8ecc20939bf1d0661eb11d6950e7f8d01cec4073ac930039cc4490062ef8699ea0428df3db1b8c0aee45e59db37143613c61f0bf8347d5c46171ea1ecf7f16134fb10b3ca9e9c0c2a1ec991a218bf628f26430b4952aa4bebaed69bd9ac4281d07f3b47a2648f9188fade5eed1dac75d26bd35f4027834ca890dfba499f1813a95b443f825914c1e7354d6a696b63e33141f8df112b989427f2d87c8968004968a4cc24a18300d84b8de156470b9454254f9538b66ec8fec756282448535260d8f4221831c0c2ed33b72ed1887db6422a6bb878bd1bd92b7ec82f7bfd6e6076b70b7fbdf375bf77f3d6078fda3a26068004f942318e52bdeb733d5f1a66a9b08f701bf4bb92797763d2135195fbf2ed3140d563eb6e1af5fa0c56fadd1b120390c41a2e8fe970c2130afc20e66a053b5a3b0e5d0e01e0091f1c895ec1bb14fda4d9c6e3ce29b8ee3c3bc45f4faa317b30d6d753d8b462234da9b323660e32aa06372ceafe6d42b3e2c81776ea62b63b62ebf269518f3cd59c55a14b37e7"}, @ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0xe84}, 0x1, 0x0, 0x0, 0x20008804}, 0x4080) 16:04:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000280)=""/243, 0x36, 0xf3, 0x1}, 0x20) 16:04:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@typedef={0x3}]}, {0x0, [0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000000c0)=""/215, 0x2b, 0xd7, 0x1}, 0x20) 16:04:48 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x81) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000005400)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=[@hoplimit={{0x14}}, @tclass={{0x14, 0x29, 0x43, 0x3d68}}], 0x30}}], 0x1, 0x0) 16:04:48 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x81) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}, 0x1c) sendmsg$inet6(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000000040)="99c8e9361195a1bd26c196b94165d5641e1aecea7db9f87aac4f85a4292f8532ac", 0x21}, {&(0x7f0000000080)="9efe1e4840f2822d9396fcc43ada7c560a1f52c2a1deba870487f436a0775a97b50912fb439c543aa4198de2334c9a38413fe1e873a87775461248195d449b2875782da3968999e3a37761b99b6882326a554c390c35acb9ee666118609087961287996a04b9b643634c8445515ed641", 0x70}, {&(0x7f0000000100)="f0075ac130b3e6cf9a24bede5863b4649597f3ce83848e3cab416a5ac4b9a953b0fb7edb5e3c01356c507a656c0b12dcbf55d0481e366ae0d2b704901b63ba9dec1cec152f386f2c5446d19649586c03d76b346a617f7969aab4577a9de098", 0x5f}, {&(0x7f0000000180)="f5ddef8485b91b8904fe56bf930c33ba5974be73aa731a31c8b4b1e033253566ceaad5796597c9bf01ef089b09a814219946654dee69c2e1999ab3f1aaeacda4c107ff482e36cdcae5d3a9fa427c2dfe95467748924fb10ea3a4d4895e87277cedd59087484f96716433b6579ed93fbcb1b33ee413c39d881cbfe28dc6b8e52cdb0440e512c92037ea69a2774094a08ff83f", 0x92}, {&(0x7f0000000240)="7cb4ded969c4170f7434662edb79011ea7e8efe12a7b33b01db3da59f4b49ae7a0ae03076e802d92289878da7053d52b4fe4017286521120cb50e47569", 0x3d}, {&(0x7f0000000340)="3fd7f4df0a975a31aa581c9c1d3eb0d817306a6790a1f78044ee214dd627ffef05ce8d6ac888cee6a5b43b2000afc108f6346381f05b0513e61c955a6f9a39e22292eaf2ab075277fea9709f945563ada5deb78e6d762f8ed1ac18a2bc3a35baa6341362f498843d0ebdac0cc97ee5b884b63863ebd61f74526ac50f1f048fcbaadbfec4e7024b98a26c", 0x8a}, {&(0x7f0000000640)="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", 0x36c}], 0x7}, 0x0) 16:04:48 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x44, 0x44, 0x8, [@func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{0x0, 0x3}, {0xf}, {0x7}, {0xe}, {}, {}, {0x5, 0x4}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f00000001c0)=""/207, 0x64, 0xcf, 0x1}, 0x20) 16:04:48 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$NL80211_CMD_TDLS_OPER(r0, &(0x7f0000000400)={&(0x7f00000001c0), 0xc, &(0x7f00000003c0)={0x0}}, 0x0) 16:04:48 executing program 5: clock_gettime(0xb27e8ea36def2012, 0x0) 16:04:48 executing program 2: ppoll(0x0, 0x0, 0x0, 0x0, 0x0) io_setup(0x10000, &(0x7f0000000300)) 16:04:48 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000000c0), 0x0, 0x0, 0x3) 16:04:48 executing program 3: r0 = socket(0xa, 0x1, 0x0) connect$bt_sco(r0, &(0x7f0000000080), 0x8) 16:04:48 executing program 4: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/block/ram2', 0x40, 0x0) 16:04:48 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x81) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000380)="a9", 0x1}, {&(0x7f0000000480)="e8", 0x1}, {&(0x7f0000000640)="1f", 0x1}], 0x3}}, {{&(0x7f0000000e40)={0xa, 0x4e22, 0x0, @empty}, 0x1c, 0x0}}], 0x2, 0x0) 16:04:48 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = dup2(r1, r0) fsetxattr$system_posix_acl(r2, &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {}, [], {}, [{0x8, 0x9d9d1a1e406625c8, 0xee00}]}, 0x2c, 0x0) 16:04:48 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x20801, 0x0) pwrite64(r0, &(0x7f00000000c0)="82acbca134cb25", 0x7, 0x3) 16:04:48 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) pipe(&(0x7f0000001380)) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) pipe(&(0x7f0000001380)) pselect6(0x40, &(0x7f0000000280), 0x0, &(0x7f0000000300)={0x9}, &(0x7f0000000380), 0x0) 16:04:48 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0xc1088500, 0x0, 0xfffffffffffffd35, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$FUSE_POLL(0xffffffffffffffff, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002040)) 16:04:48 executing program 5: r0 = socket(0xa, 0x2, 0x0) connect$bt_sco(r0, &(0x7f0000000080), 0x8) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), r0) 16:04:48 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x81) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}, 0x1c) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@private1, 0x37, r1}) r2 = socket(0x11, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0xfffff409, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x31}, @local}}}}) r3 = socket(0x11, 0x2, 0x0) sendmsg$NL80211_CMD_NEW_KEY(r3, &(0x7f0000000300)={&(0x7f0000000200), 0xc, &(0x7f00000002c0)={0x0}}, 0x20000081) getsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000100)={'gretap0\x00', &(0x7f0000000080)={'tunl0\x00', r4, 0x8001, 0x80, 0x101, 0xffff8000, {{0x6, 0x4, 0x2, 0x1e, 0x18, 0x64, 0x0, 0x5, 0x29, 0x0, @remote, @multicast2, {[@noop]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000002740)={'batadv_slave_0\x00', 0x0}) sendmmsg$inet6(r0, &(0x7f0000004080)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@hoplimit={{0x14, 0x29, 0x3}}], 0x18}}, {{&(0x7f0000000140)={0xa, 0x4e21, 0xa5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x16}, 0x1c, &(0x7f00000004c0)=[{&(0x7f0000000180)}, {&(0x7f00000001c0)="d88a1e5e447e7f040c12b2fd061ad3d0bfc21d7ac41cebcceff932db60e257b17cd2fe6d70478972ce0abc4b223527cf92dee9cfd1ea6efb2e5a9bb96a0818fec31dde4e983e422fdbdaeb8c2edc8f98f3b5eca4f951b3c4f8c755a499b2e4b28c30863372cf44d442250723ac5c9189cbcba4807e", 0x75}, {&(0x7f0000000300)="7fbe13362335b7a1ff0c86687e25b8ae5e3bc7f5329ad086d0a9681f6a311d99bb1e9e34af2f3c0a0392ec22f036ff67b5d710780e6de8b93d9eea892379494151196ca53362bf9f5e0c5b7e9876bbc0d4389cf377c7143ec263152a4deb4d46a7d4f3c4d947ebb59860a69dca1f98294b21b44f88afb5c82e3d1f7f7aaba285b564fec121681976641b05950c0f4d9abdaf825cc49aa1f746d03ef113bc9ee8fcb771f1ebc323f41ca0e974483816e0", 0xb0}, {&(0x7f0000000640)="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", 0x1000}, {&(0x7f00000003c0)="5927967f9306ca8f519918c1ef85cf3d77f8fefac4a8a0a4dcb9883c7f33badb17f274dbaf283f96649043b591b6a5414318959cb85e27b7f910a5440b166dc38aaac6cf9eb85c3ad9f1f553209de60e5126f483c04a9b58d88e373db34034ef9093df96adca127c4d3537afe7dca962c05b80e9ba7eff32ede64ee7c741d00760b31a4097d64a7b9aa33bf5106a87d29d84cf3b21fc79e26b80455f183901e97492914255145bc35d148ed145b56646309925b79be34d935e89b0db3080458e59b655a2925e2900d44eb9c64924b6f715c9b55636", 0xd5}, {&(0x7f0000000240)="f3dc7e59d850e6753890497e4f7c9d0d3d3f0b12d811d5de0109be7c600de01da005eb15fe2a416abefa8908fe9c6f4acde79774fb2983", 0x37}, {&(0x7f0000001640)="bda315dd7f8d31f144ec39224da157fa3347f8217737530a039984fd28df23383f4f5cc53a4cd90f40b009a5e79b7c04bab278636bc48fb73c896e22699456e4637bd8ea2be57293dd7fed44400c99b8d7079cb60315e9c008198b90a873fba37ad37f3f6f72e25e0610f3a257e0363926f1dd6f42104cee9c956a5d8452b5d30d472d347933258042db4f0957f10150bc02442a04b8254652b34bf85f70bdadbf3ada17bea7e91c5dfff16ee34cc28e5e2e9d623ef809c82a35db5b240807530c1ecc01fad95002b1077b5798e1932ae55f29bd9e9e5f38e8bd0b861270624cdac03a1679481d45e81744f077b39b93da74445336dca7f487c5db6cc299b7ec29ec1e5ed9ef638a05e54396b4e4044bf0654c7ed2f2c4d034edc8a9ee5e0553cc379bc062eda0a5631ec17cb4824a07b2d047ae4cb0c2fdce582ee2d4ef92977142b7a63adc907110013015f8c3bced64f682a2797c7e8a54cc05bc82b80497b29caf3d5ae0cf72fd884d466bc065707f2afcbfd6d302251397c799e39bf9cbd5df5004263b20f232a8acd7200ffd7ca2acff896e52241ad362783518a817f6d37d4cdf83dc465c8406f37fe7f0039d446c05ed940cdd21cb44dc9ad1a4a7427819ac9c952bdf58b0f276ab6285bb2293a4f4177c947c8bf7c171022a36656365075ba39f0a1ea59801f60c6f8702f48f30d596d9d65cac172eccab37a84cc14b765891e6946657cfb84620fb1c4f0c8fbc4a475fad3d1d514e09fa8dc9adbaa1262cb5b5c6ce43290c3eaf1e27ef4ed21bb338cda02dacb83c2f975bb58c098312dd27ccedb6ae12cd836f4d92e91c9f70df27f007c327e60b2ab44604ff799179d30130ab6dc2778def525ddab238dfabbd2674aeead20c828575268ef8a5c0dbf0360bb0e343d61d3cae345fa0b47e4e42bbc9b5f35c7ba0cb166c77f360f77a962b6fe1e5029ac1a7b941b161effd703450f46d9d4f7610979bf3e3937d71c4ac745f776be332bfe6337b07ddce335588efade11a7cee1a4ffafd1759c969c0d86e4aa115bf6747cbc8f42c862265aa315f5bc5507158e4f9567c2d34c12e6948943ec3f3baab089db0f7fa37abefe9d99689f05d918caa136b29036f5b2b5bbd4420afb0ef24cca6a2db21f49319cbe4ca5315ffb6003593511f8174ca0f0c312c81ebe515c3fd2ca74bf749667ec765140473e13d74ee3a4508057f1308bdceb9165492c90d2aa1df994b4fefdeddf7a6f3f47ba1b03f36ddb1632d7e707a6b201414544df1cdff39f87196aa7507893ce6ceadb29c0400119ec7f611f636f47d975a27035eacb6c3d928645857791d10a7ed6b39ce9f7d29714649148badad8e30c3e09ad7c456035c585313a86d838248629d7e7af959cacf74d3b3ae8459ae2acdd44d249af26f0afb93fb75694a47c06fbbe822df7ce4700b225aa0b289b53ca222d4784c63e0467fcb792e3357dda11be5bfff87a26e549f3cafc49c866ec269480d83035575f1e52503ff207339d99d3ba8b196ced0d84184599a746e84d472bb98b8f74103d8227503fbe4a30a03de98fc4390a8644f97b894ddd6594ba86acbb1f5ba0f356257110ecf52052d665471e31716242fa84706f1150b93ad6dc237a5aeeeef5505a1b2009923b239c041c10c8921655aee847a1abd532f562a9c7cc07f20734da488e39681d65de5855b810e0e8961fdc7d8a2f5d12b7a4ebb15b0e2c7bef2db03247f28bf49d3223d1a96ec1d5c397d9254fd14ee98a38f332ca6739bb7a88d296f295101f03f23641d2a50eeefb05fe6fe5b8a760b94b928a57156a9c999be96d2fb20cbd4027e22d9f299e40fe856c4dafd3c3ddaa8b6550cfe177fe6bb1e76316e70044c8b3350dce53628d3fe538c4aae8ec4d88ebddaee5ca2ef7d5ec2fc5f63ea03cbd4ca4925e3147cb14dbe300de3a36c4479e1cef7994404e0409f5e8643a87eb66ce23c06fb575b08263838d1b33c6a8c9725dd174496afbeb9ff509cda1fbdf9d5e7c36d7938da413f0fd6796cc20dcb503424a657840ab6c9b05138ebf8e2226733c90cdaf0aeb9667b53239bec53508f743a17248e38af68fa4917c881d3c9d26e4236b66022fe9ba33f31a3efa22b69e837916888ba1c9632ee28ff731c78d58a5de0de43789bc8465520802088f66dd77d8b2188fca4b28a884b56b303941c3ba793df40f527f20b04dfe686cd796333420274c95d3b1244af17eda5aac15df119f28b7810d8b08b9249e41cf45efbb60024290ad11a42084e204623f70f204e2c96d77e826b62cfce1fba049c8d80116d6cfa5b60e092943dfc8612d7c3211afcb3b698cca74f943f9b36074504242e4c85137f5bb07e171d5dd5b25dddc670c318bff52c7d8e9241d5f674942c7daa597e0531301b4418314b7c67a7b0d55412bda39a15b21b19480acdc8ce3b6e109e94bdd0abbeefc8d364316a3f587ef6c8acfa3ca55cdf11424f09dd8c67763f307adc654e1154a145f2313d1355642a29f89ef2a91f7684b66943bcc64bceff27daa15e63ebe96dcf38b602f6e5dcf332ff9a2f115ea27a632a4027de7ee2d7505776a7fee703f6308408a5d0a19ba04dd8ee922697b8a499ad2cdb3e4e50901ebf66272fb865dafabb9be60d34825fd42b7417f9817a2906aaabbc2f8bc848f49eed81481b2af8a1c93f85d89f0ba3ea5f05df6b4837566e3b39c4ec7f7a7626faca357f87c5c5c6ad0c3a54d137740a31bc3b5259040b61cbeb9a8beb9ba15f20bbae738b408bf2a5bff94069f6c7d03d9281e27ed9752514efe9ab2091a44bab01a77b555279a08bb24b7f3b1eaa1699ec19d9d1f6279986a19bf6d67e5b0d0c42a9fa5e5c2fae1c6fc6d7624e39aca9b3b6a78e202a1ab1b43f08638989d0807da8a873cfc8bda26125de2e7e980c01ca5018c9673d906a240a528659160a578ed2df7a58eb912bab14f0b0ed250e07b898a69a8b4327d373aad13989d231b661a9aebcc9a7cd9821485413d8ad71fc02dec3f8ffbafa7bdb23dc7a0bffebf5b371bcac0c02745c5dae514bc670dcd4dee2a83b272ed888500dff3cd24da55f29631b7d8de66e5be1e3854a719369b173db0d3013580fabca00994f873899343b8d569462522ba7efe3a9ab3ac838369f3d1ad55a0fabaca95c87c17a6433cb99f36175121772ac26c6accd3a8e570244cd4fcbea9115d692f84fa3696a30291847c957e814856f39fe79bc474274cc026f2789f19d04a49104f2550ca8b8b2dbe3d2eca7517597195befdeb89c46731b925ac38c17d28a6a30604d3e1c2ccad2760e07913aa2c2d46463d17c22c20594332fbe8b9b3b9b08387b67ef1e9fea6c07aafa3bd135591087ff3564b3cad0a80bc8254180101054e79322130087125b66caad65cef3b17ed209b96d3eff8624c5cf5e266f2db5843b2d332317c7527cddcaac3157b3e02e20af9adc202694f150fad32226949a371f32d5db8f53cfd8a394730a0d14ab92d7351baf5c640e4c350fd0be69fcd6641e6e72f42f6625b7e75944cdfcd8eb3281fb926465c439aa043c98cb8053ab701345274461892238c3551491b13f2111e6c98718749cec656ba1cd6349e07109c4ea145da7622f7b75fa6815e342c49ed26ee91cdde54a33be61ac61cc666580c57b81820347471b97e8ad3d2ca285d5e96b7ff854b619e3ab47042f2bc1435ecb3ae12c8a2e05af8f928bee39b7aa61e09acaa09cc852a11395cb245683e99818eb88be35334778517e97edfe227136331512ba1f025262733032eaf63818bbd15863cf78958d580440284ab89ad9c975eb1b58311e7feb227756ef592a268bff5a386d0ed6883da00cc47af0beb5e28b320b834c8c56ad9c9b932e0589f0ce6f52401b9b51187f08e11bd332c55a85b56a35e2d004450860228073a68428f831bdcde00ac5ed9dc582c97f39dc348ff65eb7baad13fcfe45f4686ca05d0922aa3651c0b2a9d879bb0003208ef0cf54b27024dc95dd016d964a5477c08fec202593e94e50a87e3e953373c4d4798d2b2c93b60fda068c146a62d33f5202357d258dd5ea287ecf61ad032f19b59bfa42d7888224a1573074d6188329f3dd49af5435a772594ea33673ff3c1d9aed9c4588f7a32505a94fdad3140aafbf898da29781542fe7e9d4c8717bc16d8cb80d7c1ea2d585927d2ac088c2cbc38553a31145dcdb39f81c8b87961cb32724b23bad8a35beeb38de7e9305c54e448a01139d76ae450b0b5fe7bc7849016122b607c2d828c07e1a2176dd4f67088b00e74a95b3e88e4caa238022d20c53d72686b249a7cc9aee079fb73d9799a4f013d41453c2cb39460e7dec9f92b9fe76814befe057c6e5ad24c0f50e898cbe6d1d6555eec324645442bb95e8c6da185050acc26e1cb8f84e128a52827a2efef41780e9a17154d71898fd3e50697ff4847e74131b47ada6498614e43a027a6679f926a4bf2debe62986d0d2a66f3f2e666cb77c1b1d3e518458a482619720610984ff6d62c10979a76c4cc5e6c281523651445f760e1679a8e500cd801075abed2ed016d9b700ce5fb4982cb95313b0057b30b584ab0f7d78014bbd9f1c624109aa0e4b549813f3f41f8057cf119db34c66fc3747b38968650d5ec15becaa33f89a3b72d81b3bf83814a77a7a1e77b2c025d9b1bf81ce41bf6b2a0ea29929fcad024d12b2a3e03aa9c48fdc574a5b1495aec9b79f85cd4f85d2642b883b25e804ff711a5e3297e281ff3c3ffef0a45ff03377ea0a59f807345887c3f50b464ebed579a4f32cea990314ff27180443ad38d14b0fdfff280f852b95fb8444d2ec94e28896be52986d58f35f8e9f3a069bf56ac87b572f52c77c06873d68f0c4b7eff658d8a1af068ca22dd6e217940be43682112b9af5771954adf961304995c0a53986c28404e300a127b5617a83408f60882813ed62392470b6e50d03d2d63da3e3c4df09b95282d6c7a481319f597fdbf74754d34b3c38f99d6e5a2be41c4c72d6f39fcec807b84f4ee22732d7ae17bfb1a8b7917af0c18ab53e68023de93b3814c9ebf69b5d0739dcf7b1a5be4c5021603dfb9ce762cb72884322e21d98a09f96c2662d4dcbd95ae4b921a3d13d870abb0734f386f216fda2761a8e66f82f5fd87d0d9ef3e745b157d8a995025f1e754588c24cc0c6d8a0a2cb3dbfb1a933c10ce59fd2ab386e1d0217358d3d43486de0d169ed8537469218e86d172cf873b85abfb73e7c93a60a379c7004430815079bb8c6f45aa8559e2c80595c459300fbb66cb29ceecc8fb251eb49cbaf3d1a3f194da20932aa2d87b60bef64f5eaba88872de740d94963ab41888b7c42003da95b5fe0fd480bd7da7a49051951016303db64a915ddc5e3a54662551cac37539eb7356aade441b09e501b6237a8829c468fc8816f92494f7523e2f8bb16eeefb668c94d960518d508849a97ce07ff56fb2fab9194b0db56eaf2df123480d0e5069bcd0a19b6b630e6b8a6150e4e043521452ddf4f2e7e2b2ba51df0380618b95539893c8e6c34a7b1db667b43befe0c21c3573a662cfa6f9c307f23871bc53fe28ac485249ffabe40812d9f71b2254747dffb309c8568b945cf58e65dbc8be9a63045ca103683c8fe91fb917b4b91c6ea8040acf2def3ab6a9e54985ea0f3ccd147c64cb1c4fe51bb484c6f8e9d9cd2fcc8b00cf4a1a00320e744ab2a6a90df245002841792a0c56a337ff17b40faef330133019003d4ad04b15d609a243637e51506ff9e8df719909fa7929eb26cdc8c2579ba6f91", 0x1000}], 0x7, &(0x7f0000000280)=[@pktinfo={{0x24, 0x29, 0x32, {@private1={0xfc, 0x1, '\x00', 0x1}, r4}}}], 0x28}}, {{&(0x7f0000000540)={0xa, 0x4e24, 0x29, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7fffffff}, 0x1c, &(0x7f0000002700)=[{&(0x7f0000000580)="2a0e2a4553db7b17bf5dd3fe19b5e6e8d7d2d8b967de3e4e6ab965c610ce58204864323a8b68a80cf440f81bd7a98a0dbf", 0x31}, {&(0x7f00000005c0)="f0db50f88dd7bc2562720ff88b465fe7272920c8b9cf7f603137951150632466a6a2c66973c334", 0x27}, {&(0x7f0000002640)="11100d6356b6faa56ea088fc0efc715b6fb46a5b4198580864974ff93690824425edfbd7565a800aeacb492d6438e8b23ccdb9b957b67f9e8d84991782b2ef38e03b59854efc34c7df4096dc7cf78f1d673bb1af7a49b6f163bbf4c8e28052713854e6bf93b23861c54be45f55dbcf62a4f7da2eff4b40e31ce33bd6fadb86e5142c29929ed11cbcbf0aa4cb51b5e89a4ea6e02c71021d22e08ca311b1c16ef538368bf22c893dced3cca61bd716f4f01d904c3dae02d56b66a4bf", 0xbb}], 0x3, &(0x7f0000002780)=[@pktinfo={{0x24, 0x29, 0x32, {@mcast2, r5}}}, @hopopts_2292={{0x50, 0x29, 0x36, {0x512dc0b224cd880, 0x6, '\x00', [@hao={0xc9, 0x10, @mcast1}, @hao={0xc9, 0x10, @private0}, @pad1, @jumbo={0xc2, 0x4, 0xd7}, @ra={0x5, 0x2, 0x800}]}}}, @hopopts_2292={{0x1020, 0x29, 0x36, {0x5e, 0x201, '\x00', [@pad1, @enc_lim={0x4, 0x1, 0x6}, @generic={0x9, 0x1000, "5e1912a07c0bdf3e3848b46e937e91265d3a99e09992215e42a432fc9a9a142e4c8f79d10299a0721795de5f84b93f7c67a777374dedce52d9097c2e2a629b6ebe22290bd10d75454c68de53fb70c02f4aea488a886a68750052c5bc41354b62256b9e81d5378e3522bbec2e1650aaee1e39e8bc7a22b60094f731307eaee1865103ef945764ac72b0b1901712f1a6dba3a069e5a31aa2f22c7430be5e7523f9afb0b1287dd8672d3eea9a57135530be99a9d1c96a7c791cbfb90f1bfffa3cf2ee3ccee1ae404fbd0b7a3e98abf590c8ef8de1c903e565b1aefc6d057eb6eab4f60129198470d34c5e1cd776ac8a9fd25a20df5c3dc070528ccf466c4ed6d438230d8f352d9a208535017c59e07fd3df4030f2cc075b492ea9f1ad7a7f61d6b26ec26cd46b023b2e53839c4ed3432521ed3e03a1c1dee998ffee5103c2f7c83708ae065e5f770d970ca889dd6061f8adbe224690b274d4dfb8109d4f0ab681d13dad40fe842dd909fefc61c12d9ca500cc80ad37d9dd9c25841bf27db05b7698eaf58f433c840d814ac15c691831eaae3f0b5aa514f6f2300bc83342074ad1e23428ef65196bfae38908f1274d7bdd5fab5f2bfbdf6e3c232107cc1aaa848d85a4593c8301cb42c5001e0eebea629e33cc1c3c1922915c33f8e1751a1f900abcf2822cb3e5c0a56f55794e22ee1805909423722c36a75060ef6fcd99e4a2c3d65e4d4c689a0c943cf8a7a75d603ef3658561bc920a9801c544d4ae74a893348d691ef9bf389cbf43c4cf3b8985bcb44260e183fa2d75316ed00d57df97c83a5f82e66036ed5e65fdec846431b7c9f0c79df887c603cdedb13f676f53ca57ca56c6d1c2c39b92b20c276d7e30cd9bdddf0cd78dd991a68b1bad30f8fb5c42cbf28f4651b0d0794fb3bb637b7736f0d8dd3f612ddd300bd7e68ac6f087ccb49fa9d168162bb3893b3e99ea1c2eb3c77a1bcc7db277cf82e1fa364ec5325c99dd02ca49e001336da45edf0e35e36b5573acbe8d16b7a6b7ccd6bd324e8d99cbe8f036bcb1947ece040de489f9870bc56bad5d5b67cfcd88b3d1e48538ac981112b441464cef059dd58f4a89c7e1ee14605c802f16b7e5132853f608c2a7579d31e2a253426ad25a550d3f826d596a395c241b4be8fca49e4d6d4032d5ba406f70ab4389fa086b00c1908aa8830469379b957f61429ef65db0f2cd33f0b3078b0213d52d2db461245222b3bcc050d29d370b86b99dca1fe5c05bfdd5e7fd92a44d4ca278abf9dcccd4df9e4a7ecc3f8164b93093e8138eb9124fa10c673d6fff27e08c46c08c543ea2e38f13a451e8c4615ecc18f8c8a08768f44e363926e53498b8c90d7b37a4a88cdff69710f3cf0199aa837880badecf93297ad18be63fe1ed5da24ed0523bb33916981a9c67bf847a27fb9062c68a71ff0fd617cb00d2dda8a0d54cc0813bc76c3cdad5ac86287670bd146d412b5e41c1f69617a471667c9a05b6bdb3188327d9297205f3ad09f6d0fdfede6d64fc2f8d4eefb59d8ce974f64fa647fecebc490da3e78f54c3d2450005cfb6b630afbb60b1ff574167a72d0ef9e2ccc9ddaa8b9aa899749051f2faf0877592bf384d62e996f6623068e4072ba1298078d666df28842b395e6dba47e7ae2d2573d86f0d3aa4ecf629169479e1e69f91c9d571f4b7fed3063d1e065fc6c5d9140cc45941f0e24afe676ea9b31a282f8fdc945b53949061cd6607c1c314a48f56e70cdd30c43910ef936d359bf329f0d52851342e824e8cf549c1d617bf2dbfcf2b005e139ac3dd88a1681b5e2e4c9011bc154fc6af98f9f2467ec84df9751d88c390041cc1a38ba007091f06783b07f56e7498029fa004cbfb10c6d9285992cc7459d04ffd965bc0928d79f2e607bab073ec33003c72d7e83ca952552253aa0e17cb576f1bf1281f3cedd5e5fa424c1ba6bbce844bab3ac6392f7c088a8e29f984aef0d2df90b05c1be7ee23dc92dab7fc9293a370291964bb9aa1412b46ec117d1c74b34d69b600f39fdc2bf22a37282eded9319dc44c6ffb934e300e6147e22fc03221e68431c4ba45aa08739cf206c96de8ab63a39e0b4f390ce0bea1e1cd59fc791baf916549cbf8ab0f0fb71d3b50c3d9b10f62848fbbd2ee995424bcd8e8b70a467d245bf332b8c0fdf84b737f5b803f00f629d781d9892d7cbcfa6489da5d9db8bafecf33182cb36105c28399bf683891fbb83a9c93d70bb9b0fcb388b04c442c2b1a7190b13af1b437caa7631fb00d096595b0f8275212f41ae1971c76fd5d3210128aa3e90e86fbf6f8a06b8f5393c3acf6c7d5a5646345a20eaf8e4604fc8f7be1c2df389fab160d404cdc1107d5c9fb5195a40a25ddbf21db71471cf9c121f25fdeb6f1a50f9890d28eebdf3966825634f80bc3c6e4dd31c1e1ee58dd9a39e29d1c8dd7a2c15c2af02e10bfd94bccca80f9c116ac409b90e82eb23f16d0d2415a06cf7434413881e72259a4bfdba2a0dacbc4b6854092bd3ddc9114bfd11356fc59ada5504bd07ff4b586ad5aabc245512b9912391887c3d15f7f43b4c12fe341283ef0823d48a4ec8a411d36b031491bcb353adaefc80694196aa59d99fcca0ba7ce09c872ffe2a1d1dbd9e47bc67ab80fbb518851b1e1f699d3647dc3a7cc431d526142b04140aaf35432c6c30dcb0a05d022b15c8070148164fb946f54663796cfdfc56bdc81aa041d03df079c2f80adbdeffe78d46fa00cc135e156d360571228328317c3c6db8ce4334ff9fe93ca481a5f43fb31eb3ae0a5b737a981747f5435f998abde1f7ddd87a92662e5e51d6456bd53aa4beb53e9b2beb0ac2b5c7bdd15a905cf1c2e6aa02b45d2b940fb5bbfc16915756d7e6ef99f761972280b56dabe6393b032bdf5650b70edf06ed8a26c5441f4815a31c6d7e446e07b92467615e5debc428c24b6d828ec2c6025d3814d7778fd63fbea86bae33d96515fc3ae64972ee6eaff7f24cf692e7f4fa95f4e9a62a0f862c7239f79b992e42bf9ebd5ab4174128549fd5575f553a37ebad0a4c5f7db8ebf6d3ca534ceb1cf7f7d0b9a3e1efdd5136142f3ad40cd34256b0da1d329a6ea7e1cd83433b46a470b33b6a1105ff8e1b3af9e17032b7242eabc68114f397a457731a55ef702e291820a111d6d3129e63ef22a8ba570f84afa55773b55f9995cde4eedcf0b238ca6b6dec7a7fc9cf5686ab88c3730fbb9947aa77cf21fe73a86c4f0f89fb2bd2407f4ac9fda11b06778ad053f0d59d9d9dc9bc95d04629e854870e1f49ee4bee80b27d20cf53043f70250ab4b60d797be92ac451340382b911e58d2755268173fbdfea180d950c1abba35e5e30ce05ea21939f1398f731b1c6e78a83c5bb5e429ff92a5a5b9fc40b3ecc8e1bbd92627133ea6704a166ebe7b8d9a491b5dd5b9a915d361fcf8e3b67a19d6645ac6e651046201c899d7cf78f8ec9d19f65c5e53de6631f077b470dcf219ea61bdaa100c98e60e86ebc65c62e7499394a638ea68a835eab7ff8663b07c2b86b7dc99b329c9a69e4d1516ee8fe38567af06abf0a104689f618d0e0b34bf05395ff9f1ed0f039443e55e7565ec9b6e3dda5998f865dc0f67dbfe8f1a526b524a8bcc8483e60d1e058776e7f571f463aa993f1fb21010825d1048b1395b363127905fd1268de54bf10cef704bed97a24d3bff351295486abd09c1f155e131603b863c157eaeeaf9fdfafd409bbad72027b453ddab577715414448144ed7aecda1359ea16726d11a6e6b48120e3d343447faa893be6c078fd1ede660fc4d7abd19befff386c2e5093ba6e349705cb4dd14c0eb14a923e855c1c577fe6efe5fe3ec1c3dc6c68cd22d10903f121710d555e00d013764a3f1c3dff95c9708d1746d9390ea1c2d3e0b26f0ba5bc57e3f3f3c99c25c106765f94824aae75334eb65f6e7a9a2b4ecbdd52ad3ac036037b11f3d2112942ca657560fc7fa866fd45dce4e1edcf15dc46aa8c7ccd0ec4ec99597e384f0e9c38766778f2816a5e3191f583255d425e58fab5a0bd8d54c9eabd3b8157f145f6bf5b3349b29b8b4ec0d4156015bda732f30cb2ac2123afbe1d99068f5513325efd2a2b5dfa59dd40ff00333852667c1adb6843313de9f49aab2d31f1eae96d4825f4f31f9ed7a617956053f85df925a7f2a7cffb4d5e42d1f8c8e6bd38f8e11680bc57fe4abbc80330a1c16e9c2f8cdcb734c3c2147fb54ea198b6dd78b2878f3aaf08c65d3b6493b53cafd9e369be6275f77e297332a10cb55835e0eb6afeebfd5d753de88edb33f7bf85816a0f38843626cc7fb11bd81b7cb2dd80210dd060107ca23061a4b60733d2aca099fdfbca4383e3d6495b3c0e3d1bca761e3c414dcc56da0927ecc564ffe45c11d9a60899ded500c16dc3d2d9473fda4bfe15c7f15869414f96c66e357d36ad8f17578064c7af8477780882d19d9a8af93dcb4736c950ddb919e10c9163344e3b3801db8a9d5dfc1bb671b85c980e467dd1e668674bdc707912327518206e90446af0e68fb0f449b2205ddebac67eda88dc1dfc86d1572e7bdbd96d68300bdefa759cca48f17f6bf7cdea8fc1ceee13d3e9e16d57823ea617e668f0fa3c2c7580f0d29cadf1a7b0afad11bc8587987fe4498df2ea4936607b3851a8a0d18d04077cdb6a27481bbe18f856b36239c2fd66cd78b0832664ac289c088bbf0b62b10c41f4ea3cc8ddaf83397595d7784127fab17a01620472a021d5ef24bc8b446293bf2cde0421ad194914dda91d48e3d815adff770f102e79930c0c491617fd8f48c6984116bd25cbee8a670c61b09f2a8fa0309a5aca4d1080f7107f80277a7f7ce70ce1237d73dd4a8628a5f92acca2767a36ae1400f4c6fead20cff9ee8d917bcb2444b162018d2e06770c6fc56befe845b0f795daf43e0c5dbb9c9f8eebdef0368340ef8394035f9f7b977af1469b340da7ebb7732ccd56419b3b7ec1f216663a560c38cfc56fe401eaf3ac276e1e607a5e2ab292f4c74f77532951e5db90dded7f35f5921921bdc98b239179b84a3d006de1eae39009f8d4b069f413fb2199865a4577b7ea36c09841573d57b23029cec97424dbd1a40cbe9e195b04281b0b646fec775982ac136476fbda14b1355e0eae08cb61a6eb01c7e001a0dcde754224d683ad25dc9e2aaee427b5d8e58db046970851936f662d83306e30446d4fc47d9c0aeddebe2369ec331ebcabe1e09da9284aad7a578d05374b8da5dd86de8c2c72d08cf911c634c28ffa0739b8d99f919325ad2aa34123f464ac799672eb073fd615cf456f6bb604e09d3a3a19e51cbb8dba1a30615d2d30ac1d0abf4f71c345e93289057f3883c809e7c38d186ff85c92cd4815304e821686f3241ab7b2795150ddebb6ecb6e7ad460defc0b0647cebd9f6175cb0850d8736e363ad58a2bfd9cab6e35a4f87c7e3547228d237cf1b8af3a1c7a65df22d29994b8359cd33310c6b7775cc9c71511e7b2390f3841c5499675a35adc9fdd4650d27cd6718c8b22968c550d71fbfd3687b523b63da3542bad569aa11d1f53a233aa3332889f1cfa520d3d13f32e2afa32917e6716c57f13e7f0e0f608eeff94900efaa010e859fca873c7c5a9390a1d2d068d699b5ac7c8ba381e0ab62a4c2310b961204b8f1a027e2a9d2c2f681cb8af0d66d08b1029b47da20e01c55e062c68460c4a4b986cc199ca1278e1dabd345e69547d761b5ec09f40d438ddc6dd5a49803d6512e843b1c91542f59a26e450922e6c8800aa0082a58f6b8dff4e904a349e59cdb9fb09af03cc989a"}]}}}], 0x1098}}, {{&(0x7f0000003840)={0xa, 0x4e24, 0x0, @mcast2, 0x2}, 0x1c, &(0x7f0000003980)=[{&(0x7f0000003880)="42af89e0971872c619d1641f4082d4562f1783dbd9f272e0a6a83ebe8a437cd097c8451f9c3df5cfc4edf77c75f98ae9175b155c", 0x34}, {&(0x7f00000038c0)="3b8f0d1188483c27f76369573cb9cf05d118458a28d8b8a67fae568a3b0991955bfa2e33f914dbc841c0e9c77cc612ae657820c92447044eaf46b366c843dd3429e1335956881d48135a50ef7d1530f50b7bd498d53b658c16ef78269483720343d323924150bf9311aca4885702742b80fae3fbfcc95e5410ca685473fe4644a2b8f1b12e31ec38c72dea5ede26eea70f65554013065ae9f3d8f3abe15de323e8ec2aad652a9b59c7d4b7b01efee40184c184baaf", 0xb5}], 0x2, &(0x7f00000039c0)=[@rthdr_2292={{0x38, 0x29, 0x39, {0x0, 0x4, 0x0, 0x1, 0x0, [@empty, @mcast2]}}}, @rthdr_2292={{0x38, 0x29, 0x39, {0x16, 0x4, 0x1, 0x3, 0x0, [@mcast2, @loopback]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x4}}], 0x88}}, {{&(0x7f0000003a80)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, 0x1}, 0x1c, &(0x7f0000004000)=[{&(0x7f0000003ac0)="14dd3c9e6a9bcd3ed0f0e430c4bea1", 0xf}, {&(0x7f0000003b00)="3d6febdf888a8fbe905eb41ae05a0febf3eb7f37f7675dc26c71dc1b82899a02c008f124c14345e1c614d77a01ae11123bb5094218fd107519802521d23f885fd032429bdc318fde3e41fe51fea41b2b6ccb97289a273b08e598be9e8f9521e791af1737024d8c74e13efb2872249b3ff3542188e8e3908dd859f421b3c2511b720d094cf1fbce5c377aa16388b227995f0cb1c58fa26323bfbb0a3f680dae5f878150175547661538012a53e4e0649ba0f20249208ae7182560528c92d7cd608d9d1d51796cbb32755ee00c2da1815b696eddc54172e6ff5e711339ed0c60d9be06e28e40010a18b51c3d15acacc1bd80525e2c9e0262ed", 0xf8}, {&(0x7f0000003c00)="33d7a7be17aad4391f9ccf8663db027b68476c8d8e4f6010ee59e520c0acc4a163a4c0f2275eba05509b17a8df96c3a1f39e5d628d74a1af9a6380ce885e96ab9fc0214b4e080b7af73a94730a00039880372ed18a150bc250ac657acb0535a467a83a5dea303de3dcb2c3fff3af64471429ca9eb27cecaa456bfc62673c23fee4f0eeeaaeee58cd41520d2a95dc889fa8877c052f509cef3da54784eba44bd5f25305c7588e6a88865d64ddc9afd5ab8266fd902163cb5574a9969725a84aadcfdb3ce3d8c621ece6451c54466c362abae105d613a530550e02a79ea86b3d8cca6b0cc86f0378d33205547840e952", 0xef}, {&(0x7f0000003d00)="cf6944fda6f30c3ba62ca5727df0f4c6caaaa6bf0413e2e74de1b6f4723e5a3e9e6949bb1a72e8a770db90c67114bd280496273337dba5790fc4546ed2c96a12b369b61552d4220a219f5894abc54d32b74e495ea1f121b21c13b9abd77249afd4ff87ec73a648350a84573ac4c23a074a270efa00ea4ada3c230a2aba4f85c2b72651d6af75db430f856c658c80ca9dc4cc5fbb6e116b89b0dd287c139d009301012563f89be53f6383431601a971e710dcd6629237cc6f3526c22ca29cd3976e303323269322ae996dc2626e743a1787e422d17b0357c2350b7863a4721ff3777bd62d", 0xe4}, {&(0x7f0000003e00)="c9d6aa2c9f6157de7d32214821ae7c460ad003d6220ca0157d93a6277bb43e63d4697837fcf392b313932ef1c54ebe4953a1bb65a69dd0d5d42a664b98c14e336ccf66061646fed1320bfff7e6d96beb5562a351efa77e425fa960ff9510fc1c175f0e22c6810bb676738d28bcf7e1152414395575d1c172f9f475cf9bbcce8f23140945fe9a0a4af06eeba95c26934217bc6e605ab62c09a794d9776f0bef442ffafdcfcecb1ef345b4df840cdb0010f3ecef1b2f06801e28005241016b0874eb57393bbf28b35d22de4f0a31def0d57ab26d8346", 0xd5}, {&(0x7f0000003f00)="a0b89af1e224e3e431e9012bf8d109450ef4586171070246e6ae8d1c26aa829d05b63a600e7bc06e53249d479b6288630edd256a2ffa29fce2f46b86b43e09df5a836271e410ec228e8ebba721f8fff41a45eb3591033b9cc8b133270da876f9b0a4b492bd1bc267e0ebc764af546dab11b8032c6d85a79450c015d23d4101e0d7081fa4273be76d93f30b0e8f7b72ea4e27196378694202708fa0f7751088f086e0b78acfb0041cbb50b9acd266c6873ca49a34d3af9fb6dd04cafdb73df548e85ab7a7c3ce0e3ab3f34c34d16e74550d3dbb0caf4ab06853f44f6ba2983630a7", 0xe1}], 0x6}}], 0x5, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x2, @remote, 0x1000}, 0x1c) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={@private2, 0x5a, r1}) 16:04:48 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$inet(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000880)=[{0x0}, {0x0}, {&(0x7f0000000740)="bd", 0x1}], 0x3}, 0x0) [ 1068.312516] IPVS: ftp: loaded support on port[0] = 21 16:04:49 executing program 5: r0 = socket(0x1e, 0x2, 0x0) bind$netlink(r0, 0x0, 0x0) 16:04:49 executing program 3: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000880), 0x8, 0x0) read$rfkill(r0, 0x0, 0x0) 16:04:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) pipe(&(0x7f0000001380)={0xffffffffffffffff}) dup2(r1, r0) 16:04:49 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000280)={'syztnl1\x00', 0x0}) 16:04:49 executing program 0: r0 = socket(0xa, 0x1, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x14}, 0x14}}, 0x44044085) 16:04:49 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000001180)=@deltclass={0x24}, 0x205fa0d3a853d7d5}}, 0x0) 16:04:49 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000d00)={0x6, 0x7, &(0x7f0000000b80)=@raw=[@map_idx_val, @map_idx, @func, @exit, @generic], &(0x7f0000000bc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:04:49 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) flock(r0, 0x1) 16:04:49 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) 16:04:49 executing program 4: r0 = socket(0x18, 0x800, 0x1) sendmsg$NL80211_CMD_SET_CQM(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 16:04:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x0, 0x0, 0x0) 16:04:49 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x81) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000000600)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@pktinfo={{0x24, 0x29, 0x32, {@mcast1}}}], 0x28}}], 0x1, 0x0) 16:04:49 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x81) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={@private0, @remote, @private0, 0x0, 0x62d6}) 16:04:49 executing program 1: r0 = socket(0xa, 0x2, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) 16:04:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x5}}, @int]}}, &(0x7f00000000c0)=""/243, 0x42, 0xf3, 0x1}, 0x20) 16:04:49 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000001180)=@deltclass={0x24}, 0x24}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000100)={0x10}, 0x10}], 0x1}, 0x0) 16:04:49 executing program 5: r0 = socket(0x1e, 0x2, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, 0x0, 0x0) 16:04:49 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@multicast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x2}, {{@in6=@mcast2, 0x0, 0x2b}, 0x0, @in=@multicast1}}, 0xe8) 16:04:49 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, 0x0, 0x0) 16:04:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x5}}, @array={0x6c000000}]}}, &(0x7f00000000c0)=""/243, 0x4a, 0xf3, 0x1}, 0x20) 16:04:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002e40)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x1050, 0x0, 0x0, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_DEBUG_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xfb0, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}, @ETHTOOL_A_BITSET_MASK={0xfa4, 0x5, "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"}, @ETHTOOL_A_BITSET_BITS={0x4}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x4}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x6e, 0x5, "f9ff7c3868428379213875416df7e9cf248f5d63e67b097ebbf99d361bf31f62b8e042f9040a01014ec10dcc262f4792c2e7ccdeb8ab413561e7b840c8ca7d6a696e295cdd6744b4b00be3b351411fb1664d24b66c9c508753b759037c1bd26f2d13beadfe73f3611392"}]}]}, 0x1050}, 0x1, 0x0, 0x0, 0x20008804}, 0x4080) 16:04:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x8, [@func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {0xf}, {0x7}, {0xe}, {}, {}, {0x0, 0x4}]}, @int={0x10}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f00000001c0)=""/207, 0x74, 0xcf, 0x1}, 0x20) 16:04:49 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0xb, &(0x7f0000000000)=@framed={{}, [@call, @ldst, @map_idx_val, @initr0, @cb_func]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:04:49 executing program 3: socket$inet6(0xa, 0x5, 0x3) 16:04:49 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_mreq(r0, 0x29, 0x0, 0x0, &(0x7f0000000080)) 16:04:49 executing program 2: r0 = epoll_create1(0x0) fcntl$getflags(r0, 0x409) 16:04:49 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000002e40)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x13e4, 0x0, 0x0, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}]}, @ETHTOOL_A_DEBUG_HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xd4, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0xbf, 0x4, "e6d2713a5fb961b77157ec306f752049e3fa1eda4c1bdd51e96be66f9c807520d4ffd9e7baa6910637903019183b74d3f660b1964411f2005b6e0d6ea75610c3eddb66bfdd9e3955f35d3e238c922e5e79534c76ff55bb8c3335840e3bed4f94ff92d701338846e290dccf5514bf89b548f38685caf32a82f087f3caf478040339ee216d0a3ad792852f9ab46accfcc80725ee5b8de876c89e720795ac02595464a11ae186eaa6df48a62600eb2dadcf89b2fa22bc8e0b137d5c64"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x1260, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xc2, 0x4, "2110d0bbc36bb3ea4a2aefd77429552cdefcffa9b3f4c3422ca9fbc833d2807c63713bd37d8f01c1a9a1bc6a3d6872cbb7037ce4cbeda4a9544d0f598b7e20322b0c09a21bdc5a457106239ffc52be1a92850f79d3c642e4a4e3b985858842fa1dbc801997eb15a1cfbc542146037c8c109d519c21e4a64984115a3495838e7253654961fabbf9e32560523d3c88cd2800dcfcdc6729dac207e07ce0ef5e6d1a4e7ba7d656573769419c3fadc4f360eae4951e916db2c934179ef783f126"}, @ETHTOOL_A_BITSET_VALUE={0xec, 0x4, "592d89d841577d09c20cf70f6c1fccb32e1b546686c2db691341a0b07df349e4526c546d368c9f86db92430651bf1fe9b2744c83b88ba6d40c9f09ac9d04ae899212889ade85b784fa997c42d19320aacb13e4f4a42cdbe69f9106bca404f2a614809e4380a9b4bc93841674e4476a2f7118c47b48b30c27ed6cf5b88aeaf40c58352e986f1522695156065c7483543d048c25ad2487bd39a36527d5a86ea797c755ed31b71faa035d68ea15b26b681069ac0340f82da5d0e247d30bd7a14e2b2a6e036e434c5c16d4e90651c667c3d7c65b3727b47bbad71813ac55b23807706f73dd15929f5e5b"}, @ETHTOOL_A_BITSET_BITS={0xa8, 0x3, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '*/]\'@\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '@(\xdd-+!{/}\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ')\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x17, 0x2, '\x18+@.&\xfe%(\\#$!\x13{])}-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, ':.k&-}(\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x1004, 0x5, "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"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x4}, @ETHTOOL_A_DEBUG_MSGMASK={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x6e, 0x5, "f9ff7c3868428379213875416df7e9cf248f5d63e67b097ebbf99d361bf31f62b8e042f9040a01014ec10dcc262f4792c2e7ccdeb8ab413561e7b840c8ca7d6a696e295cdd6744b4b00be3b351411fb1664d24b66c9c508753b759037c1bd26f2d13beadfe73f3611392"}]}]}, 0x13e4}}, 0x0) 16:04:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x60, 0x0, 0x0) 16:04:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x0, 0x4}]}]}}, &(0x7f0000000280)=""/243, 0x36, 0xf3, 0x1}, 0x20) 16:04:49 executing program 4: capset(&(0x7f0000000400)={0x20071026, 0xffffffffffffffff}, 0x0) 16:04:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x0, [], 0x2}}, &(0x7f00000000c0)=""/243, 0x1a, 0xf3, 0x1}, 0x20) 16:04:49 executing program 5: pselect6(0x40, &(0x7f0000000040), 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0}) 16:04:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x6) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=@deltclass={0x24}, 0x24}}, 0x0) 16:04:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x11, 0x0, 0x0) 16:04:49 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0xb, 0x0, 0x0) 16:04:49 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{}, {}]}) 16:04:49 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001600)={'sit0\x00', &(0x7f0000001500)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @multicast2}}}}) 16:04:50 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x81) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}, 0x1c) sendmsg$inet6(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000000040)="99c8e9361195a1bd26c196b94165d5641e1aecea7db9f87aac4f85a4292f8532ac", 0x21}, {&(0x7f0000000080)="9efe1e4840f2822d9396fcc43ada7c560a1f52c2a1deba870487f436a0775a97b50912fb439c543aa4198de2334c9a38413fe1e873a87775461248195d449b2875782da3968999e3a37761b99b6882326a554c390c35acb9ee666118609087961287996a04b9b643634c8445515ed641", 0x70}, {&(0x7f0000000100)="f0075ac130b3e6cf9a24bede5863b4649597f3ce83848e3cab416a5ac4b9a953b0fb7edb5e3c01356c507a656c0b12dcbf55d0481e366ae0d2b704901b63ba9dec1cec152f386f2c5446d19649586c03d76b346a617f7969aab4577a9de098", 0x5f}, {&(0x7f0000000180)="f5ddef8485b91b8904fe56bf930c33ba5974be73aa731a31c8b4b1e033253566ceaad5796597c9bf01ef089b09a814219946654dee69c2e1999ab3f1aaeacda4c107ff482e36cdcae5d3a9fa427c2dfe95467748924fb10ea3a4d4895e87277cedd59087484f96716433b6579ed93fbcb1b33ee413c39d881cbfe28dc6b8e52cdb0440e512c92037ea69a2774094a08ff83f", 0x92}, {&(0x7f0000000240)="7cb4ded969c4170f7434662edb79011ea7e8efe12a7b33b01db3da59f4b49ae7a0ae03076e802d92289878da7053d52b4fe4017286521120cb50e47569", 0x3d}, {&(0x7f0000000340)="3fd7f4df0a975a31aa581c9c1d3eb0d817306a6790a1f78044ee214dd627ffef05ce8d6ac888cee6a5b43b2000afc108f6346381f05b0513e61c955a6f9a39e22292eaf2ab075277fea9709f945563ada5deb78e6d762f8ed1ac18a2bc3a35baa6341362f498843d0ebdac0cc97ee5b884b63863ebd61f74526ac50f1f048fcbaadbfec4e7024b98a26c", 0x8a}, {&(0x7f0000000640)="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", 0x36c}], 0x7}, 0x8040) 16:04:50 executing program 0: signalfd4(0xffffffffffffffff, &(0x7f0000000080), 0x8, 0x0) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x9}, 0x0, 0x0, 0x0) 16:04:50 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x4, &(0x7f0000000080)=@raw=[@map_val, @kfunc, @kfunc], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:04:50 executing program 2: inotify_init1(0x0) select(0x40, &(0x7f0000000000)={0x9}, &(0x7f0000000040)={0x4}, 0x0, &(0x7f00000000c0)={0x77359400}) 16:04:50 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) poll(&(0x7f0000000080)=[{r0}, {r0, 0x2043}], 0x2, 0x8000) 16:04:50 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x2, &(0x7f0000000000)=@raw=[@exit, @alu], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:04:50 executing program 5: pselect6(0xffffffffffffff86, &(0x7f0000000000), 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) 16:04:50 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x81) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000040)={@mcast1}, 0x14) 16:04:50 executing program 2: socketpair(0xb, 0x0, 0x0, &(0x7f0000002a40)) 16:04:50 executing program 0: r0 = epoll_create(0x9) fremovexattr(r0, &(0x7f0000000000)=@random={'osx.', '\x1d!\x00'}) 16:04:50 executing program 4: bpf$BPF_MAP_GET_NEXT_ID(0x2, &(0x7f0000000040)={0x80000001}, 0x8) 16:04:50 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0xc, &(0x7f0000000000)=@framed={{}, [@call, @ldst, @map_idx_val, @initr0, @cb_func, @ldst]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:04:50 executing program 0: r0 = timerfd_create(0x9, 0x0) timerfd_gettime(r0, &(0x7f0000000040)) 16:04:50 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x81) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}, 0x1c) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000240)=0x3, 0x4) sendmsg$inet6(r0, &(0x7f0000001700)={0x0, 0x0, 0x0}, 0x0) 16:04:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB='s'], 0x5c8}}, 0x0) 16:04:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0xe}]}]}}, &(0x7f0000000340)=""/173, 0x32, 0xad, 0x1}, 0x20) 16:04:50 executing program 3: openat$binderfs(0xffffffffffffff9c, &(0x7f0000000080)='./binderfs/binder1\x00', 0x27382f1b86aef933, 0x0) 16:04:51 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x20801, 0x0) pwrite64(r0, &(0x7f00000000c0)="82ac", 0x2, 0x3) 16:04:51 executing program 2: pipe(&(0x7f0000001380)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000040)=[{0x0}, {&(0x7f0000002600)="98", 0x1}], 0x2, 0x0) vmsplice(r1, &(0x7f00000024c0)=[{&(0x7f0000002540)="8f4806", 0x3}, {0x0}, {0x0}], 0x3, 0x0) 16:04:51 executing program 3: r0 = socket(0xa, 0x1, 0x0) connect$bt_sco(r0, &(0x7f0000000080)={0xa}, 0x8) 16:04:51 executing program 0: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x2}, &(0x7f00000000c0), 0x0) 16:04:51 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/uevent_seqnum', 0x402, 0x0) 16:04:51 executing program 5: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000300)={0x0, &(0x7f0000000200)=""/199, 0x0, 0xc7}, 0x20) 16:04:51 executing program 4: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/rcu_expedited', 0x4500, 0x0) 16:04:51 executing program 3: inotify_init1(0x0) select(0x40, &(0x7f0000000000)={0x9}, &(0x7f0000000040)={0x4}, 0x0, 0x0) 16:04:51 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x81) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}, 0x1c) sendmsg$inet6(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000000040)="99c8e9361195a1bd26c196b94165d5641e1aecea7db9f87aac4f85a4292f8532ac", 0x21}, {&(0x7f0000000080)="9efe1e4840f2822d9396fcc43ada7c560a1f52c2a1deba870487f436a0775a97b50912fb439c543aa4198de2334c9a38413fe1e873a87775461248195d449b2875782da3968999e3a37761b99b6882326a554c390c35acb9ee666118609087961287996a04b9b643634c8445515ed641", 0x70}, {&(0x7f0000000100)="f0075ac130b3e6cf9a24bede5863b4649597f3ce83848e3cab416a5ac4b9a953b0fb7edb5e3c01356c507a656c0b12dcbf55d0481e366ae0d2b704901b63ba9dec1cec152f386f2c5446d19649586c03d76b346a617f7969aab4577a9de098", 0x5f}, {&(0x7f0000000180)="f5ddef8485b91b8904fe56bf930c33ba5974be73aa731a31c8b4b1e033253566ceaad5796597c9bf01ef089b09a814219946654dee69c2e1999ab3f1aaeacda4c107ff482e36cdcae5d3a9fa427c2dfe95467748924fb10ea3a4d4895e87277cedd59087484f96716433b6579ed93fbcb1b33ee413c39d881cbfe28dc6b8e52cdb0440e512c92037ea69a2774094a08ff83f", 0x92}, {&(0x7f0000000340)="3fd7f4df0a975a31aa581c9c1d3eb0d817306a6790a1f78044ee214dd627ffef05ce8d6ac888cee6a5b43b2000afc108f6346381f05b0513e61c955a6f9a39e22292eaf2ab075277fea9709f945563ada5deb78e6d762f8ed1ac18a2bc3a35baa6341362f498843d0ebdac0cc97ee5b884b63863ebd61f74526ac50f1f048fcbaadbfec4e7024b98a26c9e57", 0x8c}, {&(0x7f0000000640)="40b3e97af7d9b6692a1caee812a617f65cad6eb15d4eb1705018868e4256dc6e69456faed98d5de0ac0ff8d8ae0997d6e1d703fab44074c2c902357e497f44d4a6731c2b39711ecd2a0bb8d0ba6980938e01da3589196bba1498905b52ce3bc7e300fef29e30e4f95a35bf2112bd13ca36e4ea4d84a4f1a75d59d786902e57c155a59f687b761d1ef49cae11d2e0818a341e698e41a9a89757704b48e27e8a0dce8a298c6bc22c3c337c3ca70aa4853efdb4379fbe46a90458c4e29a70b8ab9c6e4e730d505fb6192e37537ab8bdcbbf44805ce348aad130cc7bee982ed2f4aa610fed05a9ab4c0488157af1166e49f84e63390db201cc6f5b2fe460a2ffa38949e633dffd1ba79557cb5cc5121679c1555ae5b12fa9bae98f60827d93e8207c8d256c70a166e9ba19643a20d5a7a3cad72b2609488d7e07cb7ab3badfae51c50dafa2e9ce5e3bb63ef701cac5c0c8d7245882bfd00dfa7d555287a5a64bf1c9e325723f69407109935455420f90b24e8b80891bb180bdaab140619a2552a22693571cd4b7271c313cfde9cfc6dee1953d0a8379d1408e2c922802dded4ce1a0321d0d4ab9bcdc58b50a4ba43c971971ae7c8d30fbecf0be64cbf516185d7ab18de2b6a9261057cad0a9a85804caac38db46425317e7b9e8c48753f098f66ea4d774eac473e9a15175ba9c3c6e55d1e4af309c57ce317a33a93c519bf2c62f52ee83c6bbfd0e07df5577c43fd03c3885abdbd1268a056d1e94013cfb5a677927673312741fa5d849bb3c782539ce1ddb22c139ce6439eb27c9d61146e9548d5c4f8d648af51fadf35a353fc2d9e33e1c6fe8ae66d1d0aad359aa9559d1dda2088b0ed2799886772599033b9a4bbd414d7651d7d08e1ab1c12219e29799ebfe1c93fb2f63a80f616ab9aa1810a3bd2984fd9751d1152be9e534727c324f0ab288095935bdeaf00db9374bf8bd476ee070a10c5397642576f1f046669e73775ffc71ac6f2c61e0e54af423ec07d42c27b19677303a4e18b8b424a72f39875b8c02de7baebec93505ae84739926d11981a3c240032c6d1b80f9c1c0037fbbf8629f6ed9bd081afb6eadafe5e45c3f77042d0626228401a7135fa4381135f87cd8a7d41fe82185411f9c56e87bf4b92527bda7c3175a1ef0d6a5c4aad4a7f72e787fea10c6e279b03e733d43c727b5324cdbc0889a168bc18e08223f96e2c17c6c8703a3c7ab827866019fb570a86f4b9ef76370bf0122537007851c80ce826c3ace73e2c2783677d5ca265c39b83f3cb6d647b90478f027172ce56d64f7bef5823733a0811f3050e2", 0x3a7}], 0x6}, 0x0) 16:04:51 executing program 1: r0 = socket(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) sendmmsg$inet6(r0, &(0x7f0000001840)=[{{&(0x7f00000001c0)={0xa, 0x4e20, 0x0, @private2}, 0x1c, &(0x7f00000002c0)=[{&(0x7f0000000200)="9d", 0x1}], 0x1}}], 0x1, 0x5051) 16:04:51 executing program 2: r0 = creat(&(0x7f0000000840)='./file0\x00', 0x0) ioctl$EXT4_IOC_GETSTATE(r0, 0x40046629, 0x0) 16:04:51 executing program 4: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0xffffffff00000000}, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000180)={&(0x7f0000000140)={[0x7]}, 0x8}) 16:04:51 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @hyper}, 0xd) 16:04:51 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_PROTOCOLS(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80801e04}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[], 0x5c}}, 0x0) 16:04:51 executing program 0: r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r0, 0x0, &(0x7f0000000480)) 16:04:51 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x5, 0x0, 0x0) 16:04:51 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x81) ioctl$sock_inet6_SIOCDELRT(r0, 0x890b, &(0x7f0000000040)={@private0, @remote, @private0, 0x0, 0x62d6}) 16:04:51 executing program 4: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000040)={0x80000001}, 0x8) 16:04:51 executing program 2: r0 = getpid() pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r0, r1, 0x0, 0x0, 0x0}, 0x30) 16:04:51 executing program 3: bpf$BPF_MAP_GET_NEXT_ID(0xa, &(0x7f0000000040)={0x80000001}, 0x8) 16:04:51 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x81) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}, 0x1c) sendmsg$inet6(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000000040)="99c8e9361195a1bd26c196b94165d5641e1aecea7db9f87aac4f85a4292f8532ac", 0x21}, {&(0x7f0000000080)="9efe1e4840f2822d9396fcc43ada7c560a1f52c2a1deba870487f436a0775a97b50912fb439c543aa4198de2334c9a38413fe1e873a87775461248195d449b2875782da3968999e3a37761b99b6882326a554c390c35acb9ee666118609087961287996a04b9b643634c8445515ed641", 0x70}, {&(0x7f0000000100)="f0075ac130b3e6cf9a24bede5863b4649597f3ce83848e3cab416a5ac4b9a953b0fb7edb5e3c01356c507a656c0b12dcbf55d0481e366ae0d2b704901b63ba9dec1cec152f386f2c5446d19649586c03d76b346a617f7969aab4577a9de098", 0x5f}, {&(0x7f0000000180)="f5ddef8485b91b8904fe56bf930c33ba5974be73aa731a31c8b4b1e033253566ceaad5796597c9bf01ef089b09a814219946654dee69c2e1999ab3f1aaeacda4c107ff482e36cdcae5d3a9fa427c2dfe95467748924fb10ea3a4d4895e87277cedd59087484f96716433b6579ed93fbcb1b33ee413c39d881cbfe28dc6b8e52cdb0440e512c92037ea69a2774094a08ff83f", 0x92}, {&(0x7f0000000240)="7cb4ded969c4170f7434662edb79011ea7e8efe12a7b33b01db3da59f4b49ae7a0ae03076e802d92289878da7053d52b4fe4017286521120cb50e47569", 0x3d}, {&(0x7f0000000340)="3fd7f4df0a975a31aa581c9c1d3eb0d817306a6790a1f78044ee214dd627ffef05ce8d6ac888cee6a5b43b2000afc108f6346381f05b0513e61c955a6f9a39e22292eaf2ab075277fea9709f945563ada5deb78e6d762f8ed1ac18a2bc3a35baa6341362f498843d0ebdac0cc97ee5b884b63863ebd61f74526ac50f1f048fcbaadbfec4e7024b98a26c", 0x8a}, {&(0x7f0000000640)="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", 0x394}], 0x7}, 0x8040) 16:04:51 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x81) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000000600)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@hoplimit={{0x18, 0x29, 0x3b}}, @hoplimit_2292={{0x14}}, @hoplimit={{0x14}}], 0x48}}], 0x1, 0x0) 16:04:51 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000037c0)=@base={0x17, 0x0, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4}, 0x48) 16:04:51 executing program 3: pipe(&(0x7f0000001380)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="d2d738b726e53e9609481ab9f7dcceb32981ba713c5a", 0x16}, {&(0x7f0000002600)="98b3ab79a44ebda4333dc7418bc503d5521c0a336b9fb1bf73f8a4a11a8a519f184aa4fd506b1c10452da61b2befc502b5593020d19d52d0e80ff8e485a964aabb6a89ca85a0d48cb729b4df81520e61102ad415e808c066b7095d07983d6a297e9b0e920a9186", 0x67}, {&(0x7f0000002680)="ab02218da4f2bb414da4e0a7ea3a56acef0788c9f005e013a60240c841c4aaa0eb2499d74c47ec45d15769e9de3a6c8a0486cfab33a280722b43788f81bda915faa6a45bd589c1c0ee8b3599ca91e1d337e804a7f020711009e617", 0x5b}], 0x3, 0x0) vmsplice(r1, &(0x7f00000024c0)=[{&(0x7f0000002540)="8f48062bf74dc43400f54b80a5943d8c773469b681965c66312062f36638f375c9d596550a65bc1297d57c510af28fdb878141273f2cc2a15cf22f6b4faed49460c63a48600142d37143cd856af0b3e0d9369578d5eb8c98855ce94e1b7f175830c5f93d2fd9fd0d8641b9acf486ead918e25844340b9a0874d5bac31b3bb603158bbbcfac2c7fe31596fa3c805bd1e75c8f18de3b36642b3f4a1bb49fd06341e6de33", 0xa3}, {&(0x7f0000000080)="ae1a5a648c29a28c10fce1c4c8755e66b2fd49b3e1f32faa03e65045cfb4dd6070deee175b80ff3a7937bb786a8940b72491dcb880", 0x35}], 0x2, 0x0) 16:04:51 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000540)={&(0x7f0000000040)={0xa, 0x4e23, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@hopopts_2292={{0x18}}], 0x18}, 0x0) 16:04:51 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x6, 0xc, &(0x7f0000000000)=@framed={{}, [@func, @ldst, @exit, @exit, @func, @exit, @map_idx, @func]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:04:51 executing program 2: pipe(&(0x7f0000001380)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="d2d738b726e53e9609481ab9f7dcceb32981ba713c5aa3", 0x17}, {&(0x7f0000002600)="98b3ab79a44ebda4333dc7418bc503d5521c0a336b9fb1bf73f8a4a11a8a519f184aa4fd506b1c10452da61b2befc502b5593020d19d52d0e80ff8e485a964aabb6a89ca85a0d48cb729b4df8152", 0x4e}, {&(0x7f0000002680)="ab02218da4f2bb414da4e0a7ea3a56acef0788c9f005e013a60240c841c4aaa0eb2499d74c47ec45d15769e9de3a6c8a0486cfab33a280722b43788f81bda9", 0x3f}], 0x3, 0x0) vmsplice(r1, &(0x7f00000024c0)=[{&(0x7f0000002540)="8f48062bf74dc43400f54b80a5943d8c773469b681965c66312062f36638f375c9d596550a65bc1297d57c510af28fdb878141273f2cc2a15cf22f6b4faed49460c63a48600142d37143cd856af0b3e0d9369578d5eb8c98855ce94e1b7f175830c5f93d2fd9fd0d8641b9acf486ead918e25844340b9a0874d5bac31b3bb603158bbbcfac2c7fe31596fa3c805bd1e75c8f18de3b36642b3f4a1bb49fd06341e6de33", 0xa3}, {&(0x7f0000000080)="ae1a", 0x2}], 0x2, 0x0) 16:04:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000000100)=""/173, 0x32, 0xad, 0x1}, 0x20) 16:04:51 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) bind$xdp(r0, &(0x7f0000000bc0), 0x10) 16:04:51 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000080)) 16:04:51 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000340)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @mcast1, @remote}) 16:04:51 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x7, &(0x7f0000000000)=@framed={{}, [@call, @ldst, @map_idx_val]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:04:51 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x31, 0x0, 0x0) 16:04:51 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x32, 0x0, 0x0) 16:04:51 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x81) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000000b00)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @private2}, 0x1c, 0x0}}], 0x1, 0x0) 16:04:51 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000100)) ioctl$PPPIOCGNPMODE(r0, 0x4010744d, &(0x7f0000000240)) 16:04:51 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x81) ioctl$sock_inet6_SIOCDELRT(r0, 0x4020940d, &(0x7f0000000040)={@private0, @remote, @private0}) 16:04:51 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f00000004c0), 0x24, 0x0) 16:04:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x8, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x3}, {0x7}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f00000001c0)=""/207, 0x44, 0xcf, 0x1}, 0x20) 16:04:51 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x81) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}, 0x1c) sendmsg$inet6(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000000080)="9efe1e4840f2822d9396fcc43ada7c560a1f52c2a1deba870487f436a0775a97b50912fb439c543aa4198de2334c9a38413fe1e873a87775461248195d449b2875782da3968999e3a37761b99b6882326a554c390c35acb9ee666118609087961287996a04b9b643634c8445515ed641", 0x70}, {&(0x7f0000000100)="f0075ac130b3e6cf9a24bede5863b4649597f3ce83848e3cab416a5ac4b9a953b0fb7edb5e3c01356c507a656c0b12dcbf55d0481e366ae0d2b704901b63ba9dec1cec152f386f2c5446d19649586c03d76b346a617f7969aab4577a9de098", 0x5f}, {&(0x7f0000000180)="f5ddef8485b91b8904fe56bf930c33ba5974be73aa731a31c8b4b1e033253566ceaad5796597c9bf01ef089b09a814219946654dee69c2e1999ab3f1aaeacda4c107ff482e36cdcae5d3a9fa427c2dfe95467748924fb10ea3a4d4895e87277cedd59087484f96716433b6579ed93fbcb1b33ee413c39d881cbfe28dc6b8e52cdb0440e512c92037ea69a2774094a08ff83f", 0x92}, {&(0x7f0000000240)="7cb4ded969c4170f7434662edb79011ea7e8efe12a7b33b01db3da59f4b49ae7a0ae03076e802d92289878da7053d52b4fe4017286521120cb50e47569", 0x3d}, {&(0x7f0000000340)="3fd7f4df0a975a31aa581c9c1d3eb0d817306a6790a1f78044ee214dd627ffef05ce8d6ac888cee6a5b43b2000afc108f6346381f05b0513e61c955a6f9a39e22292eaf2ab075277fea9709f945563ada5deb78e6d762f8ed1ac18a2bc3a35baa6341362f498843d0ebdac0c", 0x6c}, {&(0x7f0000000640)="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", 0x3ae}], 0x6}, 0x0) 16:04:51 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000200)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @private1}}) 16:04:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x30, 0x0, 0x0) 16:04:51 executing program 5: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x11, 0x2, 0x10001, &(0x7f0000000180)) 16:04:51 executing program 1: syz_open_dev$loop(&(0x7f0000000280), 0x0, 0x0) pselect6(0x40, &(0x7f0000000000)={0x9}, &(0x7f0000000040)={0x2}, 0x0, 0x0, 0x0) 16:04:52 executing program 4: r0 = socket(0x1e, 0x2, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, 0x0) 16:04:52 executing program 2: bpf$BPF_BTF_LOAD(0x4, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 16:04:52 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x81) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000380)="a9", 0x1}], 0x1}}], 0x1, 0x0) 16:04:52 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_elf64(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 16:04:52 executing program 3: r0 = inotify_init1(0x0) inotify_add_watch(r0, 0x0, 0x500) 16:04:52 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000040)={'TPROXY\x00'}, &(0x7f0000000140)=0x1e) 16:04:52 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x81) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}, 0x1c) sendmsg$inet6(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000000040)="99c8e9361195a1bd26c196b94165d5641e1aecea7db9f87aac4f85a4292f8532ac", 0x21}, {&(0x7f0000000080)="9efe1e4840f2822d9396fcc43ada7c560a1f52c2a1deba870487f436a0775a97b50912fb439c543aa4198de2334c9a38413fe1e873a87775461248195d449b2875782da3968999e3a37761b99b6882326a554c390c35acb9ee666118609087961287996a04b9b643634c8445515ed641", 0x70}, {&(0x7f0000000100)="f0075ac130b3e6cf9a24bede5863b4649597f3ce83848e3cab416a5ac4b9a953b0fb7edb5e3c01356c507a656c0b12dcbf55d0481e366ae0d2b704901b63ba9dec1cec152f386f2c5446d19649586c03d76b346a617f7969aab4577a9de098", 0x5f}, {&(0x7f0000000180)="f5ddef8485b91b8904fe56bf930c33ba5974be73aa731a31c8b4b1e033253566ceaad5796597c9bf01ef089b09a814219946654dee69c2e1999ab3f1aaeacda4c107ff482e36cdcae5d3a9fa427c2dfe95467748924fb10ea3a4d4895e87277cedd59087484f96716433b6579ed93fbcb1b33ee413c39d881cbfe28dc6b8e52cdb0440e512c92037ea69a2774094a08ff83f", 0x92}, {&(0x7f0000000240)="7cb4ded969c4170f7434662edb79011ea7e8efe12a7b33b01db3da59f4b49ae7a0ae03076e802d92289878da7053d52b4fe4017286521120cb50e47569", 0x3d}, {&(0x7f0000000340)="3fd7f4df0a975a31aa581c9c1d3eb0d817306a6790a1f78044ee214dd627ffef05ce8d6ac888cee6a5b43b2000afc108f6346381f05b0513e61c955a6f9a39e22292eaf2ab075277fea9709f945563ada5deb78e6d762f8ed1ac18a2bc3a35baa6341362f498843d0ebdac0cc97ee5b884b63863ebd61f74526ac50f1f048fcbaadbfec4e7024b98a26c9e57", 0x8c}, {&(0x7f0000000640)="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", 0x906}], 0x7}, 0x8040) 16:04:52 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x21, 0x0, 0x0) 16:04:52 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}]}}, &(0x7f0000000340)=""/173, 0x32, 0xad, 0x1}, 0x20) 16:04:52 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x541b, &(0x7f00000004c0)={'sit0\x00', 0x0}) 16:04:52 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = dup2(r0, r0) preadv2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)=""/113, 0x71}], 0x1, 0xa40f0000, 0x0, 0x0) 16:04:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x4}]}]}}, &(0x7f00000001c0)=""/207, 0x2e, 0xcf, 0x1}, 0x20) 16:04:52 executing program 5: pipe(&(0x7f0000001380)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000001700)=[{&(0x7f00000011c0)="d9", 0x7ffff000}, {&(0x7f0000001240)="9e", 0x1}], 0x2, 0x0) 16:04:52 executing program 4: syz_open_dev$loop(&(0x7f0000000040), 0x8000000000000000, 0x0) 16:04:52 executing program 2: pipe(&(0x7f0000001380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(r0, r0) write$binfmt_elf32(r0, &(0x7f0000000080)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) write$binfmt_elf32(r1, 0x0, 0x1001) 16:04:52 executing program 3: rt_tgsigqueueinfo(0x0, 0x0, 0x14, &(0x7f0000000040)={0x0, 0x0, 0x7}) 16:04:52 executing program 1: bpf$BPF_MAP_GET_NEXT_ID(0x13, &(0x7f0000000040)={0x80000001}, 0x8) 16:04:52 executing program 0: r0 = epoll_create(0x9) fremovexattr(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"]) 16:04:52 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000100)) pselect6(0x40, &(0x7f0000000280)={0x8}, 0x0, 0x0, 0x0, 0x0) 16:04:52 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x81) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[@dstopts={{0x18}}, @rthdr={{0x18}}], 0x30}}], 0x2, 0x0) 16:04:52 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x81) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000240)={'batadv_slave_1\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={@mcast2, 0x0, r1}) 16:04:52 executing program 1: r0 = inotify_init1(0x0) fsetxattr(r0, &(0x7f0000000000)=@known='user.incfs.size\x00', 0x0, 0x4000, 0x0) 16:04:52 executing program 3: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x202000, 0x0) 16:04:52 executing program 2: socket(0x0, 0x800, 0x0) syz_clone(0x60128000, 0x0, 0xfffffffffffffebb, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000001380)={0x0, 0x38, 0x1, @thr={&(0x7f00000012c0)="d7ccb20b1fee588097cadb157ad954f2a5a2bfb8a5", &(0x7f0000001300)}}, &(0x7f00000013c0)) 16:04:52 executing program 0: bpf$BPF_BTF_LOAD(0x9, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 16:04:52 executing program 4: clock_gettime(0x4, &(0x7f0000000380)) 16:04:52 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000040)={0x2, 0x1}) 16:04:52 executing program 3: pipe(&(0x7f0000001380)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="d2d738b726e53e9609481ab9f7dcceb32981ba713c5aa3", 0x17}, {&(0x7f0000002600)="98b3ab79a44ebda4333dc7418bc503d5521c0a336b9fb1bf73f8a4a11a8a519f184aa4fd506b1c10452da61b2befc502b5593020d19d52d0e80ff8e485a964aabb6a89ca85a0d48cb729b4df81520e61102ad415e808c066b7095d07983d6a297e9b0e920a9186", 0x67}, {&(0x7f0000002680)="ab02218da4f2bb414da4e0a7ea3a56acef0788c9f005e013a60240c841c4aaa0eb2499d74c47ec45d15769e9de3a6c8a0486cfab33a280722b43788f81bda915faa6a45bd589c1c0ee8b3599ca91e1d337e804a7f020711009e617", 0x5b}], 0x3, 0x0) vmsplice(r1, &(0x7f00000024c0)=[{&(0x7f0000002540)="8f48062bf74dc43400f54b80a5943d8c773469b681965c66312062f36638f375c9d596550a65bc1297d57c510af28fdb878141273f2cc2a15cf22f6b4faed49460c63a48600142d37143cd856af0b3e0d9369578d5eb8c98855ce94e1b7f175830c5f93d2fd9fd0d8641b9acf486ead918e25844340b9a0874d5bac31b3bb603158bbbcfac2c7fe31596fa3c805bd1e75c8f18de3b36642b3f4a1bb49fd06341e6de33", 0xa3}, {&(0x7f0000000080)="ae1a5a648c29a28c10fce1c4c8755e66b2fd49b3e1f32faa03e65045cfb4dd6070deee175b80ff3a7937bb786a8940b72491dcb880", 0x35}, {&(0x7f00000000c0)="f613", 0x2}], 0x3, 0x0) 16:04:52 executing program 1: r0 = socket(0xa, 0x2, 0x0) connect$bt_sco(r0, &(0x7f0000000080), 0x8) 16:04:52 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x200001, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) dup2(r1, r0) 16:04:52 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$inet(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f00000005c0)='4', 0x1}, {&(0x7f0000000640)="df", 0x1}, {&(0x7f0000000740)="bd", 0x1}], 0x3, &(0x7f0000000980)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @empty}}}, @ip_retopts={{0x10}}], 0x30}, 0x0) 16:04:52 executing program 4: pipe(&(0x7f0000001380)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="d2d738b726e53e9609481ab9f7dcceb32981ba713c5aa3", 0x17}, {&(0x7f0000002600)="98b3ab79a44ebda4333dc7418bc503d5521c0a336b9fb1bf73f8a4a11a8a519f184aa4fd506b1c10452da61b2befc502b5593020d19d52d0e80ff8e485a964aabb6a89ca85a0d48cb729b4df81520e61102ad415e808c066b7095d07983d6a297e9b0e920a9186", 0x67}, {&(0x7f0000002680)="ab02218da4f2bb414da4e0a7ea3a56acef0788c9f005e013a60240c841c4aaa0eb2499d74c47ec45d15769e9de3a6c8a0486cfab33a280722b43788f81bda915faa6a45bd589c1c0ee8b3599ca91e1d337e804a7f020711009e6", 0x5a}], 0x3, 0x0) vmsplice(r1, &(0x7f00000024c0)=[{&(0x7f0000002540)="8f48062bf74dc43400f54b80a5943d8c773469b681965c66312062f36638f375c9d596550a65bc1297d57c510af28fdb878141273f2cc2a15cf22f6b4faed49460c63a48600142d37143cd856af0b3e0d9369578d5eb8c98855ce94e1b7f175830c5f93d2fd9fd0d8641b9acf486ead918e25844340b9a0874d5bac31b3bb603158bbbcfac2c7fe31596fa3c805bd1e75c8f18de3b36642b3f4a1bb49fd06341e6de33", 0xa3}, {&(0x7f0000000080)="ae1a5a648c29a28c10fce1c4c8755e66b2fd49b3e1f32faa03e65045cfb4dd6070deee175b80ff3a7937bb786a8940b72491dcb880", 0x35}], 0x2, 0x0) 16:04:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x5}}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x2}}, @int={0x8}]}}, &(0x7f00000000c0)=""/243, 0x5a, 0xf3, 0x1}, 0x20) [ 1072.445357] IPVS: ftp: loaded support on port[0] = 21 16:04:52 executing program 0: pselect6(0x44, &(0x7f0000000000), &(0x7f0000000040)={0x2}, 0x0, 0x0, 0x0) 16:04:52 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000002380), 0x210302, 0x0) 16:04:52 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000100)) ioctl$PPPIOCGNPMODE(r0, 0x40047440, &(0x7f0000000240)) 16:04:52 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000040)={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2}, 0xc) 16:04:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f00000000c0)=""/243, 0x2a, 0xf3, 0x1}, 0x20) 16:04:52 executing program 1: r0 = creat(&(0x7f0000000840)='./file0\x00', 0x0) ioctl$EXT4_IOC_GETSTATE(r0, 0x40046629, &(0x7f0000000880)) 16:04:52 executing program 0: syz_open_procfs(0x0, &(0x7f0000000100)='comm\x00') 16:04:52 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000180), 0x0, 0x200000) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, 0x0) 16:04:53 executing program 5: r0 = socket(0xa, 0x2, 0x0) connect$bt_sco(r0, &(0x7f0000000080)={0x2}, 0x10) 16:04:53 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/pci_hotplug', 0x0, 0x0) fchmod(r0, 0x0) 16:04:53 executing program 1: pipe(&(0x7f0000001380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(r0, r0) write$binfmt_elf32(r1, &(0x7f0000001680)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}], "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", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xfdef) 16:04:53 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) sendmsg$NL80211_CMD_JOIN_IBSS(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 16:04:53 executing program 0: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000880), 0x8, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x0, 0x2}) 16:04:53 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000100)) ioctl$PPPIOCGNPMODE(r0, 0x40047451, &(0x7f0000000240)={0x57}) 16:04:53 executing program 5: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='gid_map\x00') 16:04:53 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000021c0)=@base={0x5, 0x42, 0xbb7, 0x7, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1}, 0x48) 16:04:53 executing program 3: openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0xee140, 0x0) 16:04:53 executing program 0: r0 = socket(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) 16:04:53 executing program 1: bpf$BPF_PROG_QUERY(0x8, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x14, 0x0, 0x0}, 0x20) 16:04:53 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x81) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @private0}, 0x1c) 16:04:53 executing program 0: signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000880), 0x8, 0x0) r1 = inotify_init1(0x0) dup2(r0, r1) 16:04:53 executing program 1: bpf$BPF_MAP_GET_NEXT_ID(0x9, &(0x7f0000000040)={0x80000001}, 0x8) 16:04:53 executing program 3: mmap$KVM_VCPU(&(0x7f0000ffc000/0x4000)=nil, 0x930, 0x2000001, 0x30, 0xffffffffffffffff, 0x0) 16:04:53 executing program 2: r0 = socket(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private}}, 0x1c, 0x0}, 0x0) 16:04:53 executing program 4: r0 = socket$inet(0x2, 0x3, 0x9b) write$binfmt_elf32(r0, 0x0, 0x0) 16:04:53 executing program 5: syz_clone(0x1a000000, 0x0, 0x0, 0x0, 0x0, 0x0) 16:04:53 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockname$unix(r0, 0x0, 0x0) 16:04:53 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000004140), 0x2, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0xfffffffffffffcdc) 16:04:53 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/class/nfc', 0x0, 0x0) openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) 16:04:53 executing program 2: bpf$BPF_MAP_GET_NEXT_ID(0x10, &(0x7f0000000040)={0x80000001}, 0x8) 16:04:53 executing program 4: pipe(&(0x7f0000001380)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="d2d738b726e53e9609481ab9f7dcceb32981ba713c5aa3", 0x17}, {&(0x7f0000002600)="98b3ab79a44ebda4333dc7418bc503d5521c0a336b9fb1bf73f8a4a11a8a519f184aa4fd506b1c10452da61b2befc502b5593020d19d52d0e80ff8e485a964aabb6a89ca85a0d48cb729b4df8152", 0x4e}, {&(0x7f0000002680)="ab02218da4f2bb414da4e0a7ea3a56acef0788c9f005e013a60240c841c4aaa0eb2499d74c47ec45d15769e9de3a6c8a0486cfab33a280722b43788f", 0x3c}], 0x3, 0x0) vmsplice(r1, &(0x7f00000024c0)=[{&(0x7f0000002540)="8f", 0x1}], 0x1, 0x0) 16:04:53 executing program 5: r0 = socket(0x1e, 0x2, 0x0) connect$bt_sco(r0, &(0x7f0000000080), 0x8) 16:04:53 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x2c, 0x0, 0x0) 16:04:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x4, 0x0, 0x0) 16:04:53 executing program 3: r0 = socket(0xa, 0x1, 0x0) sendmsg$NL80211_CMD_UPDATE_OWE_INFO(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x1c}}, 0x4040) 16:04:53 executing program 2: pipe(&(0x7f0000001380)) r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0x0) 16:04:53 executing program 5: pipe(&(0x7f0000001380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(r0, r0) write$binfmt_elf32(r1, 0x0, 0x1001) write$binfmt_elf64(r0, &(0x7f0000000900)=ANY=[], 0x8d7) 16:04:53 executing program 1: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000300)={0x0, &(0x7f0000000200)=""/199, 0x0, 0xc7}, 0x20) 16:04:53 executing program 4: r0 = socket(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x2, 0x4e23, 0x0, @empty}, 0x1c, 0x0}, 0x0) 16:04:53 executing program 2: r0 = socket(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x890b, &(0x7f0000000000)={'batadv_slave_0\x00'}) 16:04:53 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$NL80211_CMD_TDLS_OPER(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 16:04:53 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 16:04:53 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_CQM(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0, 0xfffffef7}}, 0x0) 16:04:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x3}, {}]}]}}, &(0x7f0000000280)=""/243, 0x36, 0xf3, 0x1}, 0x20) 16:04:53 executing program 2: r0 = socket(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x2, 0x0, 0x0, @empty}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000080)='!', 0x20000081}, {&(0x7f00000000c0)="14", 0x1}, {&(0x7f0000000180)='>', 0x1}], 0x3}, 0x800) 16:04:53 executing program 5: io_setup(0x1, &(0x7f0000000080)) io_setup(0x8, &(0x7f0000000240)) 16:04:53 executing program 0: syz_open_dev$mouse(&(0x7f0000000080), 0x0, 0x12040) 16:04:53 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x66640, 0x0) 16:04:53 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000100)) ioctl$PPPIOCGNPMODE(r0, 0x4008744b, &(0x7f0000000240)={0x57}) 16:04:53 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000540)={&(0x7f0000000040)={0xa, 0x4e23, 0x0, @loopback}, 0x1c, 0x0}, 0x10) 16:04:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r0, 0x0, 0x0) 16:04:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x3}]}]}}, &(0x7f0000000380)=""/185, 0x32, 0xb9, 0x1}, 0x20) 16:04:54 executing program 5: r0 = socket(0x2, 0x2, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x41, 0x0, 0x0) 16:04:54 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000040)={0x2, 0x1, 0x0, 0xff, r1}) 16:04:54 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$TIPC_MCAST_REPLICAST(r0, 0x10f, 0x86) 16:04:54 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000d00)={0x6, 0x6, &(0x7f0000000b80)=@raw=[@map_idx_val, @map_idx, @func, @exit], &(0x7f0000000bc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:04:54 executing program 2: r0 = socket(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8948, &(0x7f0000000000)={'batadv_slave_0\x00'}) 16:04:54 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x2d, 0x0, 0x0) 16:04:54 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000021c0)=@base={0x5, 0x42, 0x0, 0x7}, 0x48) 16:04:54 executing program 0: clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x2}, &(0x7f00000000c0)={0x0, r0+10000000}, 0x0) 16:04:54 executing program 4: r0 = socket(0x2, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c, 0x0}, 0x0) 16:04:54 executing program 3: socketpair(0x18, 0x0, 0x0, &(0x7f0000005500)) 16:04:54 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r0, r1) 16:04:54 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8948, &(0x7f00000004c0)={'sit0\x00', 0x0}) 16:04:54 executing program 5: pipe(&(0x7f0000001380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(r0, r0) write$binfmt_elf32(r1, &(0x7f0000001680)=ANY=[], 0x1001) write$binfmt_elf64(r0, &(0x7f0000000900)=ANY=[], 0x8d7) 16:04:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_COALESCE(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xa, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}, ["", "", "", "", ""]}, 0x1c}}, 0x0) 16:04:54 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x32, &(0x7f0000000280)={0x0, 0x0}, 0x10) 16:04:54 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x10, &(0x7f0000000280)={0x1, &(0x7f0000000240)=[{}]}, 0x10) 16:04:54 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000280)={0x2, &(0x7f0000000240)=[{0x20, 0x0, 0x0, 0xfffff020}, {0x6}]}, 0x10) 16:04:54 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000080)=@add_del={0x2, &(0x7f0000000040)='nicvf0\x00'}) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xffffffffffffffb4, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="01002bbd7000fedbdf2502000000050005000000000005001200030000000500050001000000060003000800000014002000fc000000000000000000000000000000050014000200000008000900000000000c001000050000000000000008001700", @ANYRES32, @ANYBLOB], 0x6c}, 0x1, 0x0, 0x0, 0xc890}, 0x4000000) socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000100)={0xffffffffffffffff}) syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0), r2) 16:04:54 executing program 3: socketpair(0x2, 0xa, 0x300, &(0x7f0000000180)) 16:04:54 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x14}, 0xfffffdef}}, 0x0) 16:04:54 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x2e, &(0x7f0000000280)={0x0, 0x0}, 0x10) 16:04:54 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x3}, 0x48) 16:04:54 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x1c, r1, 0xf3f4827048e97279, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffff8}]}, 0x1c}}, 0x0) 16:04:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000480)) 16:04:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000740)={0x2c, r1, 0x52284b650228e69b, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}]}, 0x2c}}, 0x0) 16:04:54 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) bind$l2tp(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) 16:04:54 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) pipe(&(0x7f0000000e40)) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x2, &(0x7f0000000000)) 16:04:54 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000040), &(0x7f0000000100)=0x4) 16:04:54 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000280)={0x2, &(0x7f0000000240)=[{0x20, 0x0, 0x0, 0xfffff008}, {0x6}]}, 0x10) 16:04:54 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000280)={0x2, &(0x7f0000000240)=[{0x20, 0x0, 0x0, 0xfffff014}, {0x6}]}, 0x10) 16:04:54 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000080)={'batadv_slave_1\x00', 0xffffffb8}) 16:04:54 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x8912, &(0x7f0000000000)) 16:04:54 executing program 4: r0 = socket$igmp(0x2, 0x3, 0x2) getsockopt$MRT(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)) 16:04:54 executing program 1: sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x8901, &(0x7f0000000000)) 16:04:54 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x35, &(0x7f0000000280)={0x0, 0x0}, 0x10) [ 1074.637115] batadv_slave_1: mtu less than device minimum 16:04:54 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000001c0)={0xffffffffffffffff}) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x0, 0x4) 16:04:55 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x14, r1, 0xf3f4827048e97279, 0x0, 0x0, {0x8}}, 0x14}}, 0x0) 16:04:55 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x24, &(0x7f0000000280)={0x1, &(0x7f0000000240)=[{}]}, 0x10) 16:04:55 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x6000}, 0x0) 16:04:55 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) sendmsg$inet(r0, &(0x7f0000002600)={0x0, 0x0, &(0x7f00000024c0)=[{&(0x7f0000000180)="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", 0x219}], 0x1}, 0x0) 16:04:55 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000280)={0x2, &(0x7f0000000240)=[{0x20, 0x0, 0x0, 0xfffff038}, {0x6}]}, 0x10) 16:04:55 executing program 3: sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x44}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="03000c009900ff7f0000e6"], 0x28}}, 0x0) 16:04:55 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="354b55fc7097fa1b0dde8705ffe6a98d", 0x10) 16:04:55 executing program 1: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_MFC(r0, 0x0, 0xcc, &(0x7f0000000040)={@empty, @rand_addr, 0xffffffffffffffff, "cfbdc5854e1b1704b884b51fda82de75b24496153b857f2f9aabf91b7e9881d4"}, 0x3c) 16:04:55 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000280)={0x2, &(0x7f0000000240)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x6}]}, 0x10) 16:04:55 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x6}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x14}, 0x14}}, 0x0) 16:04:55 executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_DEL_MFC(r0, 0x0, 0xcd, &(0x7f0000000000)={@local, @dev, 0x0, "291339eeb4b16bafaba2502e608c31696120a13279ca148ad835f07a1789ef99"}, 0x3c) 16:04:55 executing program 3: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) sendmsg$inet(r0, &(0x7f0000002600)={0x0, 0x0, 0x0}, 0x20040041) 16:04:55 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 16:04:55 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000280)={0x3, &(0x7f0000000240)=[{0x4}, {0x1, 0x0, 0x0, 0xbf}, {0x6}]}, 0x10) 16:04:55 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000003900), 0xffffffffffffffff) 16:04:55 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0xd, &(0x7f0000000280)={0x0, 0x0}, 0x10) 16:04:55 executing program 2: syz_emit_ethernet(0x3a, &(0x7f0000000100)={@broadcast, @remote, @val, {@ipv4}}, 0x0) 16:04:55 executing program 3: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x46, &(0x7f0000000280)={0x1, &(0x7f0000000240)=[{}]}, 0x10) 16:04:55 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) shutdown(r0, 0xa38211c1f1efcbfc) 16:04:55 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000280)={0x2, &(0x7f0000000240)=[{0x20, 0x0, 0x0, 0x1000000}, {0x6}]}, 0x10) 16:04:55 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_TESTMODE(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000280)={0xec4, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@NL80211_ATTR_TESTDATA={0x9, 0x45, "ceea44343a"}, @NL80211_ATTR_TESTDATA={0xe95, 0x45, "f3ede89eca5447dd9e34b2a8e98be6e85751804ffc8cf861a286d40be8ec02c8b06de0b50a04edf68e36652c20356f15c0a869ea8318560fc75de9bd0c8dec7a62b690ca950d7ad58295100d79dc98df7c0e1f9de1e622e400a05d1544e2d431cd602a5c60d05e80148320622bf5c95fd46a12d305af614bce795ec280bc80955eeafca02ca470e0054250ba49c38fdf8d4c2d26e4404963f7941e8ac967b0286a05a8162d1057ca15e56672aaedaf5110738e712d39f9012a116b35531ad539cd2e0cd1cbe49437c4f6d211c846091e9bda337151032a08211365131b9bb25a0c81d8fa55c44070c36803710e88c03dc173c9a2a781968961e23d605c8d6a4840280fcf19762c9d6acdf9507e2f5355856d031667d1764e7f9d9685dfcce36e31b20f9c3182d7a3933f0701a08a64323a042e2a97d6c04d687928bace0f324bf140fa2bd767bd3a6886f358169ac39ce2f4b7e3e9fd6705d3603cc5bfbe811a917dae9704d72c769bb35b214dc10995d18780d98be9c6dba5b5c2ed12ce4141bd4c8c475ebcee54ee6a5e4907d4e559cf03a4fba056ee936fca3cbf45057aba535eb2c6eaa903a34b604caecd582f67abbdea3f1d2ebb80f98db39cc1e4f29a399f423c9733d4bd3e9472d97f318feaf3a6c6af0296c275908702448e442460512d55f46f7c6f2bf55185b9d23df4c75be9c88e50e4a1fa3d6772899448241839907d48e48604e6e7f73d84d552f40627ec935ceb5af4dc919248ed32883eeb3f341dc703948aa66a2c52639e66343c98adfd78d82fb513597f445692a4c40f0bbfd4d97abf66f9df9706cb1bbb09001f0947c9151b9cf78edc78d0fbe872b789ca92813831da063a85082651a6a6d96c12ccab23fd38cffd6fbe440d4f89b903b13d8ade79e055120be2e32282e402ea27371060b5cbb6b2d7286ad7f44f48105fcd39081b2b702880d7b69cdee4f6c873fb94ad0c8d0344a8769190a289fdc8d6194a107cafd00319efde918a43c7054b7247ebf87ea3369c57f39500c6eed5f046f2537376c8b7e1414b081e23b2ad7e533934b8e067c013dc4f2082665fcd03fff69ea7aeb6e0a4d91c76449a348bc702ab81de872ff7522c919faa8bc13433be5e407f91b8d263a411333ca6d9c672a66eca2e9dacbad03f6eff50c140be71a8533d189f797b5df153de52e18583d4617b5b1148c8dc1df8635986044a282ed8604041b906c5882df6ff4e3ef8248de1f953af805aa3d10be8f33415d78c7baffe2dfba0cb0f04715fce7281c4be32dbd4619ec648ce3bc5b0f355cdd542e4520e781def343ca52f3f049a90323cc743b7377020fed1654697741ef87674770a006bda8329b6a0cac3529a375a8548b0a534d7585485c60602add3cb01139292d104da4d6d0e94e65fc77b5996f179ebe7484106e692f4a0865182d977105f443ee3375c2bc80dc2a9a750ea121cb7431d255a27a74494419a0069ded3d4ce0399de569bc5c3692babc22e957f67fae3c1f403f52140d5a83355579cf8071b6715eb3a5a92fd3f8912acf3181c2a87fff837de13dde0ede6859b026b1b16011c46015ff72fbf1aa1ceb54d8c2b36bb8ac4ba341e4a990d75607e3e3a7e2d4154e58edd55eb86f634a94e2771ae8589f4872ee30ef94b545a030492818d83920b5693c798a6e0d506e16cfc55ecdf89ae682a14157e10b4752a2877511afccf487ce911765b84da8c973e1bf7658941222efda4a9809875e4d812dc533a0bc2d38e1f142c6a6067a9298492d5b6284aa3f386cf90ff4436ffbd5317c36af5bfb3f40274b22f666aaa3d653679a2ea0cf3f24b713ba0d43e9e534b304db2e93601549ad42a2bc03373d3244330e41e4616ef925df9d2621b5dc0ab891d6a70aeed36356bcbac038220b051790a4a765b559bcecca11aa6da8faa941353e5202a7e9ea0e695f482b90a5cca3636f6e218ac9e24898eef81ebab4178410fc05ff51acb444bedf0ad3d1fa89c251800f1d3b01f132b8a10bbc66533fa1068301f2ddd32a0cd5c8a563ca73956e6180562e50e6667dc8f75c4d8385f6770467e1bb8e9eeaae31bda063eab7579667076a8dec99c2b696c1a2c90c27fcc53f384e1394050299e70b98509d4b34a94a0126de797342de55dfaa525189d7e5267179a7b591b117604cda573750358e44900313976ea6423738495ac021f5b5eadee19f50d5fccce9af2419e01f0ee838bd2fb99db352bf229b0f2c73620a6f0444476b1181ac9e0ca0866487a253c051f0ee35c9636783b515ea1a30972332bf11baabb9939d32af76a27698336fa7e256f9c6447a3f8c88dd988c4540bc6a8090ac5e6b18af4c04f5259ad966d700ec176bb42b60ece396d2dc556717500391d1f1c58e99c5a6dbe875044d81227122c92b81e261511b4ab3d783dc2433bc1012e067f2b10c65f0b4f8f66a7edadf49c7d39a57ca322c82db5e87b9e29b3b4e59db7fdc3577a8154f211603911a73e01780ed5c06e333898bb0ddf0dd945cc2123a5783d2bfcc58c3dcfac078499d43f47a048e3833026f515821a9e9d7ba9ff45d07ab55ffcdb7ff85e2144413a53c336303b230b03764f3367267614cd42be9795ce27fa4a575d89189cf0bbb27ba66d8f19a59fea5adf0e3e6505ce3c006f15cd975199aa2b6bb8c94be16ea9adcddc289eade4aa0ecbcca8c5bdcf6747310fa59eb8e17822f44e0dfb97784ff68c2851dbd643e7ee92b16db66e42f78d783225a879ec799ae670afe606c3ef0b83947a72f4b768fc876562dfee6d257af74dbd36bcc6fca6a82ef7829a8c7972b7e446b31d509a544e8d3a3aa71f2fbcb5fb725371c0ef10b9dbf207243b4eccb5d670671cd682049110b9769434210f6e20a5eb08613c8fc2eff8b41863bf5ed28308b3dfa5078c3b5016070c6ff4e0525aff8a378d664b01fb532d901804eb1fa7249916e1c968f5ab8820a111942dd7a46f708b4da9732fd43d3cd9c1a86d542b7e2d0355e0a75103af30396e0d1a9241e8e835b616ee278582b4695db28501a04f4481b6bc1daf0064cc6b3dcc569ce6d135fd7ab345000d6aaab6ab52f21a2ca880d4e4d4a1d3e615431c3d69943a03da6af59f24b1f6f9fae8dbaa47169b5c8ebbdff227cbf88714b95939eee0262d4f14abc7e25f66afcee516e8ec4bea93b105d9b48f8a8030f24b8d6035827d7ccaf83d1211eaa6a73bd1a8172ef132703e29623ffa5d3e7e31647d24746cebd22f59037744418ce1549189bc464ea2273fcb011915e8cd3a2cbaf75424c08cd90334c4a50412dbcab6bdf5b964905d8c007c2e5a559401e977f15644cde988d7a4e7f090621e5b060cc231484f96a6e57a30debf85422f3cb44a151f8dc991f9a4bc58ff1a6ce421afb7b5d2424c62338acb6b65dc0b03aa9f2052e407b1cbd11a05a37e913c150d22a90da6908f8ccc22f44101f002786733e1be84ed118ab0fbd07b1e3c312beb8206feceb91001c91c7f09e0fa03c0355f00b617aab62c68f3df54891e9383c2d3f52702e7bbbc4eccfdf855d6ae2c0e748bb57d301d5a8f316ae751d783d88d2c8ac4dc56c2aacf58a03c2500a49c145da9139fa4a6235819b815dcdae0cdee6538276c2ff800664423116b73cca6eec143ffaf373d9b605dfb92fdc0bd16c4bdc74770c7dba4d38c21855ff953a016055ddd2475198cd0df713d1e6a0e70f4f19c2da51082c0f83ec1be7394f42e147da1f65358beb74bd182911b4f483127f0cdadd47d5f4d99ad83615f8c55bcfb28bb26aab295a761bec159d2b1dd0757d7303957cf2759ef6a31e66de786e79e2ec4baa1d36833fc3cae42ea751fd7b5a40da267f1413c08ddfe255bc58e34da1cbc740ce94c52e9b151351fce228942eac85e699cab577bac759611a7cd94e78e3e32f35883a18e84c977ac9ad6bb96b92b3708704b4a0310064ebbf3aa6aeed148c72d7190c584394d4060d7f79d96fc39545bb64002b214f9aa3da7d267e2a7be71154c5626507befeaf3cbd97b74d4d72cebfb21d14c6537b0218740ee090f4b277cf344586fccca339649a0fadbe7ad750b15a88acbfa42b1377ba88da1586ec0a112fb55ef52423803b420d683a6065d3ca1fbe5f617d39ca6031c835de1e821d1950a3851ce71286672672073b91d748a3b1021a8deed1baf67b2c77f492e74064058fffdd75bc1498c428df460600c09387a4ead2c1b6dc72ca45b8b00b92c3031823ae0c435fe40c7aaafe491d28fb7594b80dcb51db7122ad2cc29633dad651b687d728050f3274dbddbb6919be4c382e44fc482c5ca67af133eef7877af2419fafb45d38c248bed1f96edf4d017813e725ae204422e3b64972dfc96b250ff12e2a8f6916883c9d12a953ad8cec159d109a5f24d7445c0a2f7e8f00089555c0856b102b74c8987a560ce1a93d3287e3e9e13b01008ef343ae5b45885fa4d19b23900a483101e8b184996f3d97fdaf0991262991264aeaccf5b0f97c6a5b695793c5b42f2a9d05c6419e040242959e9ad3adec57253d022b9127d25d09642eaa4c8e101191b0b86bed7a6b91b76d4848901513ebf96cf563dbb570b9656b365c8efc51f30be36bc105ecb4c59ad8eaa907e1ce76426948a9684a6d79fb87c414c00ad3e9e0ff068f0322aa4599c947c8d7457e7a367bedbae355b097a4b3db82bb6e18c72c4b03f8686c8e2fc1bdea1665503d843f9e7ea1922f9b3a969dc00cd905c0c333962fc5dedda17c5f41cedaa695e556b277a2a96651223790bc119dc73972abbc420e0975d8ea11b3791c5a75359c20806077c32104f9f625a01990f04234dfe5169c72cd87cb091d9560359b4eb149d2e4ec55e7f2c3eb24b952747c062dd89fd577a854acfe36ef291b1b64a89c07aa2ca589d5222f08c4ca54c2d06a9aa8fa6ea19c2b4ee65d345a258922e93db43cb53872f4c79fe28dc18e680def0a480f8998477133efd11f4935461ade6dcf2cc6439d993bbad357a7f23b5c8d0eb598c8d06f1b6f75ff51443b7526ea88b2cbabe581ab7b173d2cda3d5d58c722e4365b04a1d3c2abc6a875575327a640da8e08cdde4e212c89b294b0f24a036c80e4239af94c9068b853821354c4d6d1229eb4b8dcf2a163d54725a375528dcdfa65f4fc7e8721ca3be5dce44fe2c371aef862ccff3d54d0719cb5caac0a3982d4e2d91f59bc9fd447079dc400b69e627902d8ccd5f59d41263e1d868e602aa7d7d20f71feff3ba040c73a56630ecb2b051"}]}, 0xec4}}, 0x0) 16:04:55 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000280)={0x2, &(0x7f0000000240)=[{0x20, 0x0, 0x0, 0xfffff028}, {0x6}]}, 0x10) 16:04:55 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5452, &(0x7f0000000000)) 16:04:55 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0xb, &(0x7f0000000280)={0x0, 0x0}, 0x10) 16:04:55 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x5, 0x0, &(0x7f0000000180)) 16:04:55 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000800)={0x6, 0x1, &(0x7f0000000180)=@raw=[@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xf000}], &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:04:55 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000280)={0x2, &(0x7f0000000240)=[{0x20, 0x0, 0x0, 0xfffff01c}, {0x6}]}, 0x10) 16:04:55 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000280)={0x2, &(0x7f0000000240)=[{0x20, 0x0, 0x0, 0xe000000}, {0x6}]}, 0x10) 16:04:55 executing program 3: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1b, &(0x7f0000000280)={0x0, 0x0}, 0x10) 16:04:55 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000280)={0x2, &(0x7f0000000240)=[{0x20, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) 16:04:55 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, 0x0, 0x0) 16:04:55 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x46, &(0x7f0000000280)={0x0, 0x0}, 0x10) 16:04:55 executing program 5: syz_init_net_socket$rose(0xb, 0x5, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000800)={0x6, 0x3, &(0x7f0000000040)=ANY=[@ANYRESOCT], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:04:55 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000280)={0x1, &(0x7f0000000240)=[{0x1d}]}, 0x10) 16:04:55 executing program 3: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x44, &(0x7f0000000280)={0x0, 0x0}, 0x10) 16:04:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x14}, 0x14}, 0x300}, 0x0) 16:04:55 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x300}, 0x0) 16:04:55 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x2c, &(0x7f0000000280)={0x0, 0x0}, 0x10) 16:04:55 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x8, 0x0, &(0x7f0000000200)) 16:04:55 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8912, &(0x7f0000000080)={'batadv_slave_1\x00'}) 16:04:55 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, 0x0, &(0x7f0000000040)) 16:04:55 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xc}, 0x0) 16:04:56 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x19, 0x0, &(0x7f0000000080)) 16:04:56 executing program 3: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000280)={0x1, &(0x7f0000000240)=[{0x6}]}, 0x10) 16:04:56 executing program 1: socket$packet(0x11, 0x3, 0x300) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000080), 0x4) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0xfffffdef}, 0x1, 0x10}, 0xffffff7f00000000) 16:04:56 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000800)={0x6, 0x1, &(0x7f0000000180)=@raw=[@generic], &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x3}, 0x80) 16:04:56 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0xa, 0x0, &(0x7f0000000080)) 16:04:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'authencesn(sha3-384,cbc(camellia))\x00'}, 0x58) 16:04:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}]}, 0x1c}}, 0x0) 16:04:56 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x2b70}, 0x0) 16:04:56 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x19, 0x0, 0x0) 16:04:56 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000080)={'vxcan1\x00'}) 16:04:56 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x23, &(0x7f0000000280)={0x0, 0x0}, 0x10) 16:04:56 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8931, &(0x7f0000000480)) 16:04:56 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000480)={'team0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000c80)={0x20, r3, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}]}, 0x20}}, 0x0) 16:04:56 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000800)={0x6, 0x1, &(0x7f0000000180)=@raw=[@generic], &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2}, 0x80) 16:04:57 executing program 1: pipe(&(0x7f0000000e40)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(r0, 0x0, 0x0) 16:04:57 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)=[{0x0}, {0x0}], 0x2}, 0x0) 16:04:57 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5421, &(0x7f0000000000)) 16:04:57 executing program 3: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000280)={0x2, &(0x7f0000000240)=[{0x9c}, {0x6}]}, 0x10) 16:04:57 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:04:57 executing program 5: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) sendmsg$802154_dgram(r0, &(0x7f0000000100)={&(0x7f0000000040), 0x14, &(0x7f00000000c0)={0x0, 0x40030000000000}}, 0x0) 16:04:57 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x7, 0x0, &(0x7f0000000140)) 16:04:57 executing program 5: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) sendmsg$802154_dgram(r0, &(0x7f0000000100)={&(0x7f0000000040), 0x14, &(0x7f00000000c0)={0x0, 0x2}}, 0x0) 16:04:57 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) sendto$l2tp(r0, &(0x7f0000000040)="84", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) 16:04:57 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x30, r1, 0xf3f4827048e97279, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'lc\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x5}]}, 0x30}}, 0x0) 16:04:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000b4000000b400000009"], &(0x7f0000000100)=""/225, 0xd5, 0xe1, 0x1}, 0x20) 16:04:57 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8932, &(0x7f0000000480)) 16:04:57 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0), r0) [ 1077.099694] netlink: 'syz-executor.4': attribute type 6 has an invalid length. 16:04:58 executing program 2: bpf$PROG_LOAD_XDP(0xa, &(0x7f0000000800)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:04:58 executing program 0: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000002c0)={'bridge_slave_0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="440000001300290a000000000000002007000000", @ANYRES32=r3, @ANYBLOB="00000010020000001c001a800800028009002d0008000200f5642d", @ANYRES8=r1], 0x44}}, 0x0) 16:04:58 executing program 1: r0 = socket$caif_seqpacket(0x25, 0x5, 0x3) setsockopt$CAIFSO_REQ_PARAM(r0, 0x116, 0x80, &(0x7f0000000140)="ac", 0x1) 16:04:58 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000280)={0x2, &(0x7f0000000240)=[{0x5}, {0x6}]}, 0x10) 16:04:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8932, &(0x7f0000000480)) 16:04:58 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000280)={0x2, &(0x7f0000000240)=[{0x64}, {0x6}]}, 0x10) 16:04:58 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000080)="d8c3f59ddf1195af4e54b28db7835133", 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) 16:04:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-ssse3\x00'}, 0x58) 16:04:58 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) 16:04:58 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000800)={0x14, 0x1, &(0x7f0000000180)=@raw=[@generic], &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:04:58 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000000)=0x52, 0x4) r2 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r3, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000c40)={&(0x7f0000000c00)={0x14, r4, 0x1e3fdc83199bcf27, 0x0, 0x0, {0x2f}}, 0x14}}, 0x0) sendmsg$DEVLINK_CMD_RATE_GET(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000580)={0x14, r4, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x24000040) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), r2) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan0\x00', 0x0}) r7 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r7, 0x10e, 0xc, &(0x7f0000000280)={0x4000}, 0x10) sendmsg$nl_generic(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x20, 0x16, 0xa01, 0x0, 0x0, {0xa}, [@nested={0x4}, @typed={0x8, 0x8, 0x0, 0x0, @fd}]}, 0x20}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@bridge_delneigh={0x40, 0x1d, 0x200, 0x70bd2d, 0x25dfdbfb, {0x909a7681f79f7635, 0x0, 0x0, r1, 0x8, 0x2, 0x6}, [@NDA_MASTER={0x8, 0x9, 0x2}, @NDA_LINK_NETNSID={0x8, 0xa, 0x4}, @NDA_DST_MAC={0xa, 0x1, @multicast}, @NDA_VLAN={0x6, 0x5, 0x1}]}, 0x40}, 0x1, 0x0, 0x0, 0x41}, 0x8050) sendmsg$NL80211_CMD_EXTERNAL_AUTH(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="20002abd7000ffdbdf257f00000008000300", @ANYRES32=r6, @ANYBLOB="060048d6d3ee67305ddcaceb363272d36202e4060a003400000400000202000014005500c738c2791769cc0f5300dd00"/60], 0x58}, 0x1, 0x0, 0x0, 0x20004004}, 0x2000c080) r8 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2190d04}, 0xc, &(0x7f0000000500)={&(0x7f0000000440)=@RTM_NEWNSID={0x24, 0x58, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x40010}, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r8, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f00000000c0)={'pimreg1\x00'}) sendmsg$nl_route(r10, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@newlink={0xa4, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4104}, [@IFLA_LINKINFO={0x74, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x64, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x4c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x40, 0x22}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x81, 0x7}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xfff, 0x49d0}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x10001, 0x1}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r9}, @IFLA_MASTER={0x8}]}, 0xa4}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 16:04:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8932, &(0x7f0000000480)) 16:04:58 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$MRT(r0, 0x11e, 0x0, 0x0, 0x0) 16:04:58 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={0xffffffffffffffff}) getsockopt$PNPIPE_IFINDEX(r1, 0x113, 0x2, 0x0, 0x0) 16:04:58 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000280)={0x1, &(0x7f0000000240)=[{0x5}]}, 0x10) 16:04:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'essiv(rfc4106(gcm(aes)),blake2s-128-x86)\x00'}, 0x58) 16:04:58 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, 0x0) 16:04:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8932, &(0x7f0000000480)) 16:04:58 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, 0x0) 16:04:58 executing program 3: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) 16:04:58 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) 16:04:58 executing program 1: ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'sit0\x00', 0x0}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000740)) 16:04:58 executing program 2: pipe2$watch_queue(&(0x7f0000000000), 0x80) pipe2$watch_queue(&(0x7f0000000100), 0x80) 16:04:58 executing program 0: syz_emit_vhci(&(0x7f0000000000)=@HCI_ACLDATA_PKT={0x2, {0x0, 0x0, 0x0, 0xa}, @l2cap_cid_le_signaling={{0x6}, @l2cap_cmd_rej_unk={{0x1, 0x0, 0x2}}}}, 0xf) 16:04:59 executing program 5: r0 = getpgrp(0x0) wait4(r0, 0x0, 0x20000000, 0x0) 16:04:59 executing program 3: prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0xa) 16:04:59 executing program 2: socket$kcm(0x29, 0xf, 0x0) 16:04:59 executing program 4: add_key(&(0x7f0000000180)='asymmetric\x00', 0x0, &(0x7f0000000100)="ee26", 0x2, 0xffffffffffffffff) 16:04:59 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000240)=@multiplanar_userptr={0x0, 0x2, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "dca709df"}, 0x0, 0x2, {0x0}}) 16:04:59 executing program 0: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001a80), 0x323e81, 0x0) [ 1078.804060] Bluetooth: hci1: ACL packet for unknown connection handle 0 16:04:59 executing program 5: sched_rr_get_interval(0x0, &(0x7f0000000900)) 16:04:59 executing program 2: pipe2$watch_queue(&(0x7f0000000000), 0x80) socket$nl_route(0x10, 0x3, 0x0) pipe2$watch_queue(&(0x7f0000000100), 0x80) socket$inet_sctp(0x2, 0x5, 0x84) 16:04:59 executing program 3: r0 = socket(0x18, 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 16:04:59 executing program 4: add_key(&(0x7f0000000080)='rxrpc\x00', 0x0, &(0x7f0000000100)="92b880dff6", 0x5, 0xfffffffffffffffe) 16:04:59 executing program 1: socket(0x3, 0x0, 0x10001) 16:04:59 executing program 0: socket(0x2, 0x805, 0x0) 16:04:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000640)={0x0, 0x0, 0x0}, 0x0) 16:04:59 executing program 1: sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, 0x0, 0xa316a9dc9e7504e6) 16:04:59 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x5}]}) 16:04:59 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000002ac0)={0x2, &(0x7f0000002a80)=[{}, {}]}) 16:04:59 executing program 3: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x7}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 16:04:59 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000003180)=@base={0x0, 0x0, 0x0, 0x0, 0x20c}, 0x48) 16:04:59 executing program 5: process_vm_readv(0x0, &(0x7f0000001640)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0, 0xf0ff7f00000000}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0x0, 0x0) 16:04:59 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f0000000740)) 16:04:59 executing program 0: add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xffffffffffffffff) 16:04:59 executing program 3: keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001240), &(0x7f0000001280)={'enc=', 'pkcs1', ' hash=', {'rmd128\x00'}}, 0x0, 0x0) 16:04:59 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000002ac0)={0x2, &(0x7f0000002a80)=[{0x3ff}, {}]}) 16:04:59 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005840)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0xe}}], 0x20}], 0x1, 0x0) 16:04:59 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001a80), 0x0, 0x0) read$sequencer(r0, &(0x7f0000001ac0)=""/157, 0x9d) 16:04:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, 0x0, 0x0) 16:04:59 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000002ac0)={0x0, 0x0}) 16:04:59 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001040), 0x0, 0x0) ioctl$SNDCTL_MIDI_PRETIME(r0, 0xc0046d00, 0x0) 16:04:59 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) 16:04:59 executing program 4: bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000001c40), 0x10) 16:04:59 executing program 1: socket$inet(0x2, 0x0, 0x4aa) 16:04:59 executing program 5: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) socketpair(0x18, 0x0, 0x3, &(0x7f0000000740)) 16:04:59 executing program 0: setrlimit(0x9, &(0x7f00000004c0)) 16:04:59 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, 0x0, 0x0) socketpair(0x0, 0xa, 0x9, &(0x7f0000000240)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000280)=[@in={0x2, 0x4e21, @local}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x1, @dev={0xfe, 0x80, '\x00', 0x11}, 0x8}, @in6={0xa, 0x4e24, 0x3, @private2={0xfc, 0x2, '\x00', 0x1}, 0x1c4}], 0x58) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x80}, &(0x7f0000000040)=0x8) syz_clone(0x1042080, &(0x7f0000000080)="2ce76681d209cfc0c8e6a95eea29bb7c1360daa93932748c4a9b002e3391beda5bcdf179de1acf15e81f7885707b051ae842bb726b6a7e908cb51edbe4cff80ff1429643336eb04d5035eae0d2029aa28f25f7d103ed00375aa7b70bae78ce8a8fd78fc7a68c3e650250681f0549af42579008f86a072fc896d957d988088fce0a95a4513e14dc728f81b97ffb4d71d7b8c88140e370c0125024", 0x9a, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="ff") 16:04:59 executing program 3: ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'sit0\x00', 0x0}) socketpair(0x18, 0x0, 0x3, &(0x7f0000000740)) 16:04:59 executing program 4: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000e00), 0x68200, 0x0) 16:05:00 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_KEY_FLUSH(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 16:05:00 executing program 1: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) 16:05:00 executing program 5: syz_emit_ethernet(0x52, &(0x7f00000000c0)={@local, @random="39b045a0d784", @val, {@ipv6}}, 0x0) 16:05:00 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000b00)={'ip6gre0\x00', 0x0}) 16:05:00 executing program 2: syz_clone(0x1042080, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 16:05:00 executing program 4: r0 = getpgrp(0x0) sched_setscheduler(r0, 0x6, &(0x7f00000001c0)) 16:05:00 executing program 0: socket(0x2, 0x805, 0x6) 16:05:00 executing program 1: creat(&(0x7f0000000180)='./file1\x00', 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:05:00 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = dup(r1) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = userfaultfd(0x80001) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) r5 = fcntl$dupfd(r4, 0x0, r4) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000685000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$UFFDIO_ZEROPAGE(r5, 0xc020aa04, &(0x7f0000000240)={{&(0x7f00003ea000/0x400000)=nil, 0x400000}}) 16:05:00 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000e00)={0x18, 0x2, &(0x7f0000000b40)=@framed, &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xd2, &(0x7f0000000bc0)=""/210, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:05:00 executing program 4: openat$binderfs(0xffffffffffffff9c, &(0x7f0000000080)='./binderfs2/binder1\x00', 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs2/custom1\x00', 0x0, 0x0) 16:05:00 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000e00)={0x18, 0x3, &(0x7f0000000b40)=@framed={{}, [], {0x95, 0x0, 0x0, 0xb}}, &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xd2, &(0x7f0000000bc0)=""/210, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:05:00 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="61df712bc884fed5722880b6c2a7", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) write$FUSE_STATFS(0xffffffffffffffff, 0x0, 0x0) 16:05:00 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, &(0x7f0000000100), 0x0) 16:05:00 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="8500000011000000350000000000ba0085000000a000000095000000000000004cf12aa58bd56806f81f06a9cf4ef5e0a141d524581835d8050864d2a51f447f454698165b61a3cf5fc6dd8442230e7901000000aa1f703517513523c901638f09494997cbe593f90a847687a1ef1f83dd6c1023158a1081000000dce415554bc34e6bde80000000000000000887c697acd9647e6969c9e34f0a9c13ecee6156c599c7b29f879c8267ac4490d4a60186e03c51f135affb9cf13d21fe31869683e72090b4444cb0f8cb5acc73aae89abfa8d898ee6eb51e5f3011fa82e44fd0b149dd520acfa155253f1d72378de6c8ea45599c8ff4e19578cc37a1d041cf903bacedd3c050b7cf5c85ed372e9a9477305a84b0ad43de090000009d7f753d4e92d8b040d19002e4464f77af0c4d196ee373d554b0dbce7e8cc5055a3d230bb2a96a4d8b4f803044f481c5563e7a372570d4280f6e07a2e2318842c0f4ffa2b5a76be9b850dad35bcdca25f6d2437effb5b2b19a88fd2def2a921c185202ea3f885fa2f80d36f122836f9f1972e66b6c1c3679e47a6556fabae7b7aba641a7e4d0c753221332d96810af58269dd6fc4c55fdbcef74d9433c7006c1879e85b5f5289b5d82268a3beac4bc33d1aaf54f9481e28abb674b26f136d67587f9ade5c202d66f191dbf2f3495a8337c17ed8e51228e8e2da93db0cf391caed010c824921d65b1a64dcfa8f7298c97bdaacbfc41534a460ae843402b46ba10a77598f0fbf630ef365c98b4702980a610f3bfd05b8101029ca8dbd18b21bc5bb8ed345d720f77f886524f88f613d77d3654e40728a7e5df818b8e652f6ae89c6eb3846691a08082e25a3d99756a8e96e04226e5c652e99dab7d418705e2a20df59341fdd7c0dcaeaf60a271434603ca23591e23bdccd71dd4b6768ac5fc6de66cfd913512d384256ec4426238174ec3140be06da9b0757c69f8768a4b0dd37624a2f081d84fdc1fdcd85908586ee164c119d1b01229edc7f51ee6e32db80b5c2f665069af9598783a2528abae3b7ad76b606866215c602d7f8ba3ca15aedfb420acaab61c243d4c44fe7b748a4da58ed6f4a1833531eda5dc"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="61df712bc884fed5722880b6c2a7", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) 16:05:00 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000000180)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:05:00 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f0000001100)="94b94cb69ad9033bafcf3d522d9be630", 0x10) 16:05:00 executing program 4: r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x8b, &(0x7f00000000c0)={[0x8]}, 0x8) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 16:05:00 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x0, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:05:00 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b5b0707310031000000000000000000000000000000000000000000000000004c"], 0x78) 16:05:00 executing program 3: pselect6(0x0, 0x0, &(0x7f0000000f80), &(0x7f0000000fc0), &(0x7f0000001000), &(0x7f0000001080)={&(0x7f0000001040)={[0x8cc]}, 0x8}) 16:05:00 executing program 5: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={r0, r1+60000000}, 0x0) 16:05:00 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x6, 0x598, 0x118, 0x118, 0x2e0, 0x2e0, 0x1e8, 0x4c8, 0x4c8, 0x4c8, 0x4c8, 0x4c8, 0x6, 0x0, {[{{@ipv6={@empty, @private1, [], [], 'macsec0\x00', 'team_slave_0\x00'}, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@broadcast, @ipv6=@private1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', [], [], 'veth1_to_hsr\x00', 'macvlan1\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@common=@mh={{0x28}, {"1803"}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@local, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@ipv6={@remote, @mcast1, [], [], 'tunl0\x00', 'wg1\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) 16:05:00 executing program 4: pselect6(0x40, &(0x7f0000000f40), &(0x7f0000000f80)={0x763d}, 0x0, 0x0, 0x0) 16:05:00 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) bind$packet(r0, &(0x7f0000003380)={0x11, 0xf6, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) 16:05:00 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000006500)='/sys/block/loop0', 0x0, 0x0) mmap$xdp(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) 16:05:00 executing program 0: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x5}, &(0x7f0000000100)={0x0, r0+60000000}, 0x0) [ 1080.630457] x_tables: duplicate underflow at hook 1 16:05:00 executing program 2: setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, 0x0, 0x0) 16:05:01 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fgetxattr(r0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', 0x0, 0x0) 16:05:01 executing program 1: unlinkat$binderfs_device(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/custom1\x00') 16:05:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETTABLE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="20000000070a0307"], 0x20}}, 0x0) 16:05:01 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x1274, &(0x7f0000000000)={'\x00', 0x0, 0x9, 0x1a8266, 0x0, 0x0, 0xffffffffffffffff}) 16:05:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) write$binfmt_misc(r1, 0x0, 0x4) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@ipv4_delroute={0x24, 0x1a, 0x1, 0x0, 0x0, {0xa}, [@RTA_IIF={0x8, 0x3, r2}]}, 0x24}}, 0x0) [ 1080.872816] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 16:05:01 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x806, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, 0x48) 16:05:01 executing program 1: fanotify_mark(0xffffffffffffffff, 0x93, 0x0, 0xffffffffffffffff, 0x0) 16:05:01 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x2000000000f, &(0x7f0000f10000)=0x80000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) 16:05:01 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x3, 0x0, 0x98, &(0x7f0000000000)={0xf22, 0x0, 0x14}}) 16:05:01 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000006500)='/sys/block/loop0', 0x0, 0x0) connect$packet(r0, 0x0, 0x0) 16:05:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x2b, 0x0, 0x0) 16:05:01 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x1, &(0x7f0000000040)=@raw=[@alu={0x0, 0x0, 0x4}], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:05:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4$inet6(r0, 0x0, 0x0, 0xc84b45389f7eeb09) 16:05:01 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000006500)='/sys/block/loop0', 0x0, 0x0) mmap$xdp(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x100010, r0, 0x0) 16:05:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000080000000000000a28000000000a01010000000000000000020000000900010073797a300000000008000240000000032c000000030a01030000000000000000020000000900010073797a30000000000900030073797a3214"], 0x7c}}, 0x0) 16:05:01 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@random="eada3e18657f", @local, @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @empty, @rand_addr, @dev, @local}}}}, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x0) 16:05:01 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x3, 0x0, 0x98, &(0x7f0000000000)={0xf22, 0x0, 0x14}}) 16:05:01 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) sendto$packet(r0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0) 16:05:01 executing program 0: syz_emit_ethernet(0x22, &(0x7f0000000000)={@link_local, @empty, @void, {@ipv4={0x800, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x20, 0x0, 0x0, 0x0, @remote, @local}}}}}, 0x0) 16:05:01 executing program 2: syz_emit_ethernet(0x22, &(0x7f0000000080)={@link_local, @link_local, @void, {@ipv4={0x800, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x11, 0x0, @remote, @local}}}}}, 0x0) 16:05:01 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 16:05:01 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, 0x0, 0x0) 16:05:02 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x3, 0x0, 0x98, &(0x7f0000000000)={0xf22, 0x0, 0x14}}) 16:05:02 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000040), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x401c5820, &(0x7f0000000000)=0x8000) close(r0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 16:05:02 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x424001, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4004662b, &(0x7f00000005c0)=0x1) openat$cgroup_ro(r0, &(0x7f0000000240)='cgroup.freeze\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000080)=0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) 16:05:02 executing program 0: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4004662b, &(0x7f00000005c0)=0x1) openat$cgroup_ro(r0, &(0x7f0000000240)='cgroup.freeze\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000080)=0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) 16:05:02 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4004662b, &(0x7f00000005c0)=0x1) openat$cgroup_ro(r0, &(0x7f0000000240)='cgroup.freeze\x00', 0x0, 0x0) 16:05:02 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x3, 0x0, 0x98, &(0x7f0000000000)={0xf22, 0x0, 0x14}}) 16:05:02 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0xa, 0x9, 0x8, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x6, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@map_fd={0x18, 0x3, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2b}]}, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xd0, &(0x7f00000003c0)=""/208, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:05:02 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000040), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x401c5820, &(0x7f0000000000)=0x8000) close(r0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 16:05:02 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0xb, 0x0, &(0x7f0000000040)) 16:05:02 executing program 5: setreuid(0xee00, 0xee01) socket$inet(0x2, 0x3, 0x0) 16:05:02 executing program 1: setreuid(0xee00, 0xee01) r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x0) 16:05:02 executing program 2: setreuid(0xee00, 0xee01) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000000)={0x1}, 0x8, 0x0) 16:05:02 executing program 2: setreuid(0xee00, 0xee01) r0 = msgget$private(0x0, 0x0) msgctl$MSG_STAT(r0, 0xb, 0x0) 16:05:02 executing program 3: setreuid(0xee00, 0xee01) mq_unlink(&(0x7f00000001c0)='8\x00') 16:05:02 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)={0x20, 0x4, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) 16:05:02 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000f80)={&(0x7f0000000f40)='./file0\x00'}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001680)={&(0x7f0000001640)='./file0\x00'}, 0x10) 16:05:02 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1072c0, 0x0) 16:05:02 executing program 4: perf_event_open(&(0x7f0000000080)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:05:02 executing program 3: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x24}, 0x10) 16:05:02 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000240)=0x7) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='blkio.bfq.sectors\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x7bc03) 16:05:02 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)={0x20, 0x4, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) 16:05:02 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001600)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000380)={&(0x7f0000002440)=@ieee802154, 0x80, &(0x7f00000002c0)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/236, 0xec}, {&(0x7f0000000100)=""/84, 0x70}, {&(0x7f0000000340)=""/2}, {&(0x7f00000001c0)=""/209, 0xd1}], 0x9}, 0x0) 16:05:03 executing program 0: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000280)='ns/pid_for_children\x00') close(r0) 16:05:03 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001940)={0x6, 0xf4240, &(0x7f00000019c0)=ANY=[], &(0x7f0000000700)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:05:03 executing program 3: bpf$PROG_LOAD(0x3, &(0x7f00000002c0)={0x17, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1b, 0x10, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x172, 0x0, 0x0, 0x0, 0x3}, [@cb_func={0x18, 0xa, 0x4, 0x0, 0x7}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x1}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffff9}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xcf39}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x20, &(0x7f0000000100)=""/32, 0x41100, 0x10, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0x3, 0x8, 0x3ff}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x58, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000005c0)={0x0, 0x0, 0x18}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000600)={0x0, r2}, 0x10) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000005c0)={0x0, 0x0, 0x18}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000600)={0x0, r3}, 0x10) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000540), 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0x4, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x99}, [@generic={0x0, 0x7, 0x3, 0x800, 0x9}]}, &(0x7f0000000380)='GPL\x00', 0x3f, 0x27, &(0x7f00000003c0)=""/39, 0x21680, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000500)={0x5, 0x2, 0x3, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r2, 0x1, r3, 0xffffffffffffffff, 0x1, r4, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f00000006c0)={'xfrm0\x00'}) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000005c0)={0x0, 0x0, 0x18}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000600)={0x0, r5}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000280)={r0, r5}, 0xc) 16:05:03 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)={0x20, 0x4, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) 16:05:03 executing program 0: perf_event_open$cgroup(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:05:03 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:05:03 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x19, &(0x7f00000001c0), &(0x7f0000000200)=0x8) 16:05:03 executing program 0: perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:05:03 executing program 3: syz_clone(0x1102000, 0x0, 0x0, 0x0, 0x0, 0x0) 16:05:03 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)={0x20, 0x4, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) 16:05:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12025}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:05:03 executing program 1: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) 16:05:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x16, 0x0, 0x0, 0x5}, 0x48) 16:05:03 executing program 0: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0xffffff80}, 0x8) 16:05:03 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYRESDEC, @ANYBLOB], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) ioctl$KVM_CAP_SPLIT_IRQCHIP(r1, 0x4068aea3, &(0x7f0000000280)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000001980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:05:03 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3, 0x1c) 16:05:03 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000900), 0x0, 0x0) read$sequencer(r0, &(0x7f0000000040)=""/180, 0xb4) 16:05:03 executing program 0: semtimedop(0xffffffffffffffff, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:05:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f00000003c0)) 16:05:04 executing program 4: bpf$PROG_LOAD_XDP(0x1e, &(0x7f0000000400)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:05:04 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000001140)={'batadv0\x00', 0x0}) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000040)={@private, @remote, r2}, 0xc) 16:05:04 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xa, &(0x7f0000000000)=0x40, 0x4) 16:05:04 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001540)={0x6, 0x6, &(0x7f0000001400)=@framed={{}, [@ldst={0x1}, @call, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}]}, &(0x7f0000001440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:05:04 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0), 0xffffffffffffffff) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r1, 0x1, 0x0, 0x0, {0x16}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}]}, 0x20}}, 0x0) 16:05:04 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0xb, &(0x7f0000000000)=0x66f9b9ee, 0x4) 16:05:04 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_int(r0, 0x0, 0x15, 0x0, &(0x7f0000000d00)) 16:05:04 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000057c0)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @empty, 0x2}, 0x1c, 0x0}}, {{&(0x7f0000003dc0)={0xa, 0x4e22, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x1c, 0x0, 0x0, &(0x7f0000008d40)=ANY=[@ANYBLOB="14000000000000002900000043000000040000000000000048000000000000002900000039000000160601ff00000000000000000000005c15b29a00000000a4000000000000000170000000000006002900000037000000870a0000000000000502"], 0xd0}}], 0x2, 0x0) 16:05:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000006340)={0x0, 0x0, &(0x7f0000006300)={&(0x7f00000001c0)=@newchain={0xd04, 0x64, 0x0, 0x0, 0x0, {}, [@TCA_CHAIN={0x8}, @TCA_CHAIN={0x8}, @TCA_CHAIN={0x8}, @filter_kind_options=@f_basic={{0xa}, {0xcbc, 0x2, [@TCA_BASIC_EMATCHES={0x2b4, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8}, @TCA_EMATCH_TREE_HDR={0x8}, @TCA_EMATCH_TREE_LIST={0x2a0, 0x2, 0x0, 0x1, [@TCF_EM_CMP={0x18}, @TCF_EM_CANID={0x14}, @TCF_EM_IPT={0x28, 0x3, 0x0, 0x0, {{}, [@TCA_EM_IPT_HOOK={0x8}, @TCA_EM_IPT_MATCH_NAME={0xb}, @TCA_EM_IPT_NFPROTO={0x5}]}}, @TCF_EM_IPT={0x1f4, 0x0, 0x0, 0x0, {{}, [@TCA_EM_IPT_MATCH_DATA={0xae, 0x5, "ced5d65076a25223abd408efb3e29dc87c45eb4c90ab8f2f9816034836ffc7f24c7eaa4735e21bc1907d8bd03f30a61b7e9f136a869b510c49a6c1a65a6fae31832e22eb792c0a9bd13edd490cda2233499483d8a6eaab5bd09016e3350f64e3377bb223c4fb1eec00d07d8065185e2cb3bab490fd142548c2d8b9cddcf81595de08c73cbc13b65943e40e5f515a8a188b7d394a2f793c3a41c89c89115244e53db4fc0c64f95ca40c77"}, @TCA_EM_IPT_MATCH_DATA={0x101, 0x5, "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"}, @TCA_EM_IPT_MATCH_DATA={0x31, 0x5, "efc27b50825706900226b471d952821e74927ae411a043d60ccd77036fbe0760039e205ab49ef4f59af8afef0e"}]}}, @TCF_EM_META={0xc}, @TCF_EM_U32={0x1c}, @TCF_EM_CMP={0x18}, @TCF_EM_CANID={0x14}]}]}, @TCA_BASIC_POLICE={0x410, 0x4, [@TCA_POLICE_RESULT={0x8}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0xe5b, 0x0, 0xad]}]}, @TCA_BASIC_ACT={0x5f4, 0x3, [@m_gact={0x60, 0x11, 0x0, 0x0, {{0x9}, {0x34, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18}, @TCA_GACT_PARMS={0x18, 0x2, {0x7, 0x5}}]}, {0x4}, {0xc}, {0xc}}}, @m_tunnel_key={0x60, 0x0, 0x0, 0x0, {{0xf}, {0x1c, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_DST_PORT={0x6, 0x9, 0x4e22}, @TCA_TUNNEL_KEY_ENC_DST_PORT={0x6, 0x9, 0x4e22}, @TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}]}, {0x18, 0x6, "45c163d35cb06edb1bee541c78d9af4ac1cbbf4c"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1}}}}, @m_police={0x530, 0x0, 0x0, 0x0, {{0xb}, {0x408, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404}]]}, {0xfd, 0x6, "d55b3e13e1d68dba8bee50548827085007bf75a98c6b7d3d0707538e03478fb1033d333899fb702554ca9c150353c1b8ce39c5684ef316985b460b87c626fdd3e1f274f4d5e20d6e7d3e6f6d52f22239e9d38c86a5fffbc3fb92689da640abf9cbf45345acd7f8a82af208820e07c11fee982ffc9c41cc8f80272bf54ab98864fc03427516800a6faf38722f0a5ebdccfc582a55bfd19e7828165fbc9245a594faf165a5903298bad55b6999192c1adf3ee7acaa5ee177316012fe2d075abee0de60140b97e8b0b67e4bafa42de8421201ab0cbd68f2239cd2671bbf31b8627eb29ba394dc1b09ec5f691e509d736c2f32323acd7d582fed45"}, {0xc}, {0xc}}}]}]}}]}, 0xd04}}, 0x0) 16:05:04 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @remote, @val={@void}, {@ipv4={0x800, @generic={{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @remote, {[@cipso={0x86, 0x37, 0x0, [{0x0, 0xe, "785b3bf9800d06377376f1c7"}, {0x0, 0xb, "166e52757709b5e885"}, {0x0, 0xc, "ec2c23f742d3f177b6e2"}, {0x0, 0x4, "03a3"}, {0x0, 0x8, "1f2693e4864a"}]}, @cipso={0x86, 0x6}]}}}}}}, 0x0) 16:05:04 executing program 0: r0 = socket$igmp6(0xa, 0x3, 0x2) getsockname(r0, 0x0, &(0x7f0000000440)) 16:05:04 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x5, &(0x7f0000000180)=@framed={{}, [@map_idx_val]}, &(0x7f0000000200)='GPL\x00', 0x2, 0xd0, &(0x7f0000000000)=""/208, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:05:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0xb, 0x6, 0x101}, 0x14}}, 0x0) 16:05:04 executing program 1: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={0x0}, 0x10) pipe(&(0x7f0000001900)) 16:05:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000040)=""/165, 0x1a, 0xa5, 0x1}, 0x20) 16:05:04 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_int(r0, 0x0, 0xc, 0x0, &(0x7f0000000d00)) 16:05:04 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$sock_SIOCGSKNS(r0, 0x894c, 0x0) 16:05:04 executing program 0: bpf$BPF_BTF_LOAD(0x9, 0x0, 0x0) 16:05:04 executing program 4: r0 = socket$igmp(0x2, 0x3, 0x2) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000280)) 16:05:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0xa, [{0x0, 0x5}]}]}}, &(0x7f00000002c0)=""/206, 0x32, 0xce, 0x1}, 0x20) 16:05:04 executing program 5: r0 = socket$igmp(0x2, 0x3, 0x2) ioctl$INCFS_IOC_CREATE_FILE(r0, 0xc058671e, 0x0) 16:05:04 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0x1600bd78, 0x0, 0x20) 16:05:04 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000d00)) 16:05:04 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000040)=0x40, 0xffe4) 16:05:04 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x5, 0x80000001, 0x0, 0x210000}, 0x48) 16:05:04 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x25, 0x0, 0x0) 16:05:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000040)=""/165, 0x32, 0xa5, 0x1}, 0x20) 16:05:04 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$inet(r0, &(0x7f0000004b80)=[{{0x0, 0x0, &(0x7f0000001240)=[{0x0}, {&(0x7f0000000240)='u', 0x1}], 0x2}}], 0x1, 0x0) 16:05:04 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0x5452, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000140)={'syztnl1\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x40, 0x40, 0xfff, 0x0, {{0x2f, 0x4, 0x3, 0x5, 0xbc, 0x67, 0x0, 0xb6, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4, 0x8}, @lsrr={0x83, 0xb, 0x80, [@loopback, @multicast2]}, @generic={0x83, 0xf, "c8c0ebd0ca5710ce1b51c81cb3"}, @lsrr={0x83, 0x23, 0x2b, [@initdev={0xac, 0x1e, 0x1, 0x0}, @local, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @remote, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x17, 0x37, [@empty, @empty, @empty, @multicast2, @loopback]}, @lsrr={0x83, 0x23, 0x4d, [@rand_addr=0x64010102, @remote, @private=0xa010100, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @multicast1, @loopback]}, @lsrr={0x83, 0x23, 0x54, [@broadcast, @empty, @rand_addr=0x64010101, @remote, @local, @dev={0xac, 0x14, 0x14, 0x2f}, @remote, @multicast2]}, @rr={0x7, 0x7, 0xb6, [@rand_addr=0x64010101]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000200)={'syztnl0\x00', &(0x7f0000000180)={'syztnl0\x00', r2, 0x4, 0xa, 0x1, 0x2, 0x4, @loopback, @private2={0xfc, 0x2, '\x00', 0x1}, 0x700, 0x7c7, 0x3, 0x59}}) 16:05:04 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) accept(r0, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x10, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x4}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x4044000}, 0x20000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000540), r2) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'team0\x00', 0x0}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000ac0)={0x6, 0x4, &(0x7f0000000880)=@raw=[@generic={0x3, 0x5, 0x8, 0x8}, @alu={0x7, 0x0, 0x7, 0xa, 0x7, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1}], &(0x7f00000008c0)='syzkaller\x00', 0x4, 0xc2, &(0x7f0000000900)=""/194, 0x41100, 0x1, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000a00)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000a40)={0x3, 0x3, 0x9, 0x7}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0x1]}, 0x80) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000c80)={'syztnl0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="6772653000000000d014b70e00000000729277a93bd3a722", @ANYRES32=r3, @ANYBLOB="000707000000000700002f6b4418009000670000fe299078ffffffffac1e0001831310ac1414bb64010102ac1414aa00000000071f61ffffffff0a010101640101027f0000010a010101ac1414bbac14141294040000861300000000050dc66f5812a58c7ad9eb7f27830709e000000194040100440a27c15cc92f72d0eb01441c8f51e000000100000820ffffffff00008001ac1414aa0000000500"]}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'team0\x00', 0x0}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000ac0)={0x6, 0x4, &(0x7f0000000880)=@raw=[@generic={0x3, 0x5, 0x8, 0x8}, @alu={0x7, 0x0, 0x7, 0xa, 0x7, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1}], &(0x7f00000008c0)='syzkaller\x00', 0x4, 0xc2, &(0x7f0000000900)=""/194, 0x41100, 0x1, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000a00)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000a40)={0x3, 0x3, 0x9, 0x7}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0x1]}, 0x80) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000c80)={'syztnl0\x00', &(0x7f0000000bc0)={'gre0\x00', r4, 0x7, 0x700, 0x7, 0x2f6b, {{0x24, 0x4, 0x0, 0x6, 0x90, 0x67, 0x0, 0xfe, 0x29, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@lsrr={0x83, 0x13, 0x10, [@remote, @rand_addr=0x64010102, @local, @empty]}, @rr={0x7, 0x1f, 0x61, [@broadcast, @private=0xa010101, @rand_addr=0x64010102, @loopback, @private=0xa010101, @remote, @dev={0xac, 0x14, 0x14, 0x12}]}, @ra={0x94, 0x4}, @cipso={0x86, 0x13, 0x0, [{0x5, 0xd, "c66f5812a58c7ad9eb7f27"}]}, @lsrr={0x83, 0x7, 0x9, [@multicast1]}, @ra={0x94, 0x4, 0x1}, @generic={0x44, 0xa, "27c15cc92f72d0eb"}, @noop, @timestamp_addr={0x44, 0x1c, 0x8f, 0x1, 0x5, [{@multicast1, 0x820}, {@broadcast, 0x8001}, {@local, 0x5}]}]}}}}}) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8983, &(0x7f0000005040)) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r5, 0x8983, &(0x7f00000001c0)={0x0, 'gretap0\x00', {}, 0x9}) sendmsg$ETHTOOL_MSG_DEBUG_SET(r1, &(0x7f0000000500)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000004c0)={&(0x7f00000016c0)={0x6ac, 0x0, 0x2, 0x70bd2d, 0x25dfdbfb, {}, [@ETHTOOL_A_DEBUG_HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x3c}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x188, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xe9, 0x4, "b530895fa6349f4ac05716ee860828af1d255c536f6827ec5b97ba763b11d86cf83cd1149346663580818151e466ca3cd3ff130e572fcdfd438c27b121c58cffddddf06ab37c257fe803393744ac6638220a8d76c15925f505d148701d23afc4794110ed822eeb5f90eb7986e92c79c8cc754c3994afdb995ec76f6f1e3c83a87266db45a8a5fb07ea986ec5ab39f670fdc05ed5c89136c1baf1a75fd7ca5f7fb8a9295bc6253fd2c77b20e5edf630eb656e9753b110675804c08ace7a6716ded8265ef049fc3b8f7e9c37715abd9ddb5512dca232eae5d4c847bb16bcf48c9ed064de8ba1"}, @ETHTOOL_A_BITSET_MASK={0x8c, 0x5, "7b542ffa5a35a9a3210f2d587c8b930afb3dfd0b7f989891ca2c553bcdcefceea85ccd34e8ff0930cafdd1ccecf24aea3ec1e450627502e5a07579cd2da5ec4db40ca9867e87c7e121c217ba7c5358c67d12d754e820f69adda0b7ce8d212bd7effac9cfc1de817233fd320bb17fc5ad14e1dbc0c579143fc168c456e6fb542925d79c9b24856487"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xec, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xe6, 0x5, "48c6dedb0d1e97d72c68270f729c825a080c08ee5992475251d7d2c23920b4c611a1c6f502c78ea3607ced70613dc5e98cb1ac3c425a83bc679ee71a9cfd18f11f7b985fbc7c95354a61f86e02c0891cd453e099a09b9511082774297ea256e5cb6439830a85919577b5da679d667bdbca67622cbee0f3c0f166e10010c58258dbf4713da73a39b1b26a93b95af47a1035f8933c98ff57821bc7e907378c7c5d4195bda5f63a7d0f3591428aabaf84f268e118689d7ccc0895b3331c0a8bdeead568ae298fb1b17eb5ca6537af09936056781beea7d2c01705bd8748015657d1d3bb"}]}, @ETHTOOL_A_DEBUG_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x90ac988910ec6409}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x64, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x81}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x50, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '@(\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '\\*O^\'\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_DEBUG_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x2cc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x11c, 0x3, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, ']\\&@{\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fff}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '].\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'syztnl0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5b9c}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '\xf0.-,\x00'}]}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xa493}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\x11\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '$\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, 'team0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x461}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '@(\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffcf}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x3}, @ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8000}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, 'vlan0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, 'vlan0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3f}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, 'vlan0\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, 'vlan0\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '!!\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf5}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x75, 0x5, "d3a9717f4a1b49b7f1fbe822165105778f01ae95bef7e0fceb00bee854c62cfc856d472f54b1a814b6742e5cd5a22ce68f34eb1f071805aff8341cf25fc1d48161e73d565e734fd9351986cf76a2e6bea05372f0e5cfdacdb4c74a830dc155b867e110d95eadcbe812e9d3a05f8114cd72"}, @ETHTOOL_A_BITSET_VALUE={0x6b, 0x4, "f8f9d64ec3dc6ddf4f58de4e7bb0b4be0195aa9dbc9d2007a56a16beb088231b1bc842a4d809e5768901da9ec1afd41b151a72a3c7bec4bba5b0f654fdd62178874aa077e948e1b61b2d808ff7a0d1aee34c6785c9726c5f0294090ff38d1bc081f558631126c3"}, @ETHTOOL_A_BITSET_MASK={0x37, 0x5, "5d8840263a076f8f5ade5a6e9c06942338d7fa103b504a3e51500efea4f2f5cfbab311184b3aec3cafd2bca1d7704997e88a8c"}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0x6ac}, 0x1, 0x0, 0x0, 0x40}, 0x20004001) 16:05:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x5}}]}}, &(0x7f0000000140)=""/143, 0x32, 0x8f, 0x1}, 0x20) 16:05:04 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet(r0, &(0x7f0000000540)={0x2, 0x0, @empty}, 0x10) 16:05:04 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0x4, 0x0, 0x7) 16:05:04 executing program 0: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 16:05:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000002600)={&(0x7f0000000000)={0x2, 0x4e21}, 0x10, 0x0}, 0x800) 16:05:04 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x2, 0x4e20, @local}, 0x10) 16:05:04 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x1600bd7d, &(0x7f0000000000)=0x40, 0x4) 16:05:04 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000580)={'ip6gre0\x00', &(0x7f0000000500)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}) 16:05:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000940)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 16:05:04 executing program 5: pipe(&(0x7f0000001b40)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000003380)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9) 16:05:04 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0xdd8}, 0x4) 16:05:04 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000057c0)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000008d40)=ANY=[], 0xd0}}], 0x2, 0x0) 16:05:04 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r0, 0x0, 0x5, &(0x7f00000003c0)="e1", 0x1) 16:05:04 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x0, 0x0, 0x0, 0x0, 0x818, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x48) 16:05:04 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x17, 0x0, 0x1, 0x10000}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 16:05:04 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003300)={0x0, 0x0, &(0x7f00000032c0)={&(0x7f00000010c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a2c000000000a03000000000000000000030000010c00044000000000000000040c0004400000000000000001140000000c0a01"], 0x21e8}}, 0x0) 16:05:04 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x18, 0x0, 0x0, 0x0, 0x488, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2}, 0x48) 16:05:04 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_int(r0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0xfffffffffffffeca) 16:05:04 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:05:04 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x1600bd80, &(0x7f0000000000), 0x4) 16:05:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000031c0)) 16:05:04 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000080)={'gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}}}}) 16:05:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003300)={0x0, 0x0, &(0x7f00000032c0)={&(0x7f00000010c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a2c000000000a03000000000000000000030000010c00044000000000000000040c0004400000000000000001140000000c0a010200000000000000000c0000085c010000050a03"], 0x21e8}}, 0x0) 16:05:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}]}}, &(0x7f0000000000)=""/185, 0x3e, 0xb9, 0x1}, 0x20) 16:05:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x20, 0x0, 0x8, 0x301, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) 16:05:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x9, &(0x7f0000000000)=ANY=[@ANYRES32=0x1], &(0x7f0000000080)='GPL\x00', 0x3, 0xb0, &(0x7f00000000c0)=""/176, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:05:05 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000d80)={0x0, 0x0, &(0x7f0000000d40)={&(0x7f000000b140)={{0x14}, [@NFT_MSG_DELSETELEM={0x14}], {0x14}}, 0x3c}}, 0x0) 16:05:05 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000001380)={0xd04, 0x0, 0x1, 0x101, 0x0, 0x0, {}, [@typed={0x8, 0x2c, 0x0, 0x0, @fd}, @generic="de60717ac68bc80c8cd20e94f577306f357db00edaf041134579c1f2a6a956cd08e06720994946790d1caf1137139c2abc75dd2667bdbf8d1f58bf", @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x0, 0x0, 0x0, @pid}, @typed={0x8, 0x0, 0x0, 0x0, @u32}, @generic="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"]}, 0xd04}}, 0x0) 16:05:05 executing program 5: bpf$BPF_BTF_LOAD(0x15, 0x0, 0x0) 16:05:05 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_int(r0, 0x0, 0x21, 0x0, &(0x7f0000000d00)) [ 1084.751218] netlink: 328 bytes leftover after parsing attributes in process `syz-executor.3'. 16:05:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003300)={0x0, 0x0, &(0x7f00000032c0)={&(0x7f00000010c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a2c000000000a03"], 0x21e8}}, 0x0) 16:05:05 executing program 1: bpf$BPF_BTF_LOAD(0xe, 0x0, 0x0) 16:05:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x2c, r1, 0x25, 0x0, 0x0, {}, [@FOU_ATTR_LOCAL_V4={0x8, 0x6, @local}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e23}, @FOU_ATTR_PEER_PORT={0x6}]}, 0x2c}}, 0x0) 16:05:05 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r0, 0x1, 0xa, 0x0, &(0x7f0000000040)) [ 1084.817208] netlink: 3304 bytes leftover after parsing attributes in process `syz-executor.4'. 16:05:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000006340)={0x0, 0x0, &(0x7f0000006300)={&(0x7f00000001c0)=@newchain={0xd04, 0x64, 0x0, 0x0, 0x0, {}, [@TCA_CHAIN={0x8}, @TCA_CHAIN={0x8}, @TCA_CHAIN={0x8}, @filter_kind_options=@f_basic={{0xa}, {0xcbc, 0x2, [@TCA_BASIC_EMATCHES={0x2b4, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8}, @TCA_EMATCH_TREE_HDR={0x8}, @TCA_EMATCH_TREE_LIST={0x2a0, 0x2, 0x0, 0x1, [@TCF_EM_CMP={0x18}, @TCF_EM_CANID={0x14}, @TCF_EM_IPT={0x28, 0x0, 0x0, 0x0, {{}, [@TCA_EM_IPT_HOOK={0x8}, @TCA_EM_IPT_MATCH_NAME={0xb}, @TCA_EM_IPT_NFPROTO={0x5}]}}, @TCF_EM_IPT={0x1f4, 0x0, 0x0, 0x0, {{}, [@TCA_EM_IPT_MATCH_DATA={0xad, 0x5, "ced5d65076a25223abd408efb3e29dc87c45eb4c90ab8f2f9816034836ffc7f24c7eaa4735e21bc1907d8bd03f30a61b7e9f136a869b510c49a6c1a65a6fae31832e22eb792c0a9bd13edd490cda2233499483d8a6eaab5bd09016e3350f64e3377bb223c4fb1eec00d07d8065185e2cb3bab490fd142548c2d8b9cddcf81595de08c73cbc13b65943e40e5f515a8a188b7d394a2f793c3a41c89c89115244e53db4fc0c64f95ca40c"}, @TCA_EM_IPT_MATCH_DATA={0x101, 0x5, "cfb6587ff5b28d500bda2f652477f2b189cad8822ee2f20c651ac5e758d334a23640a53d5530f89243f52f6b911160a1802067a86e8ff76c8667060b3514d8a21ec7173fee8a202669059e55345f9af5ceb6955e4d660f97b7202bfcdd59d4396a922cde2d820c8b6073f4ea0b1c295836c6fb8be0bc40fcf92f2913921eea9fd16de705ea8d78b8d4456ba3cceab53e6b083584584ad5666743b58a83a79f4f84130b2fa03297b15f94123ef6d3841cce56b07ad98417a47c4175565f20978e5926771bf4c72b7b914e0c26d84e64e384d51b1d683e56fc74fc1281b50d333f48bcd6d9a225c27c3b40b0d73a97f0990bb043b9783b037f862ddeb966"}, @TCA_EM_IPT_MATCH_DATA={0x31, 0x5, "efc27b50825706900226b471d952821e74927ae411a043d60ccd77036fbe0760039e205ab49ef4f59af8afef0e"}]}}, @TCF_EM_META={0xc}, @TCF_EM_U32={0x1c, 0x0, 0x0, 0x0, {{0x3}}}, @TCF_EM_CMP={0x18}, @TCF_EM_CANID={0x14}]}]}, @TCA_BASIC_POLICE={0x410, 0x4, [@TCA_POLICE_RESULT={0x8}, @TCA_POLICE_PEAKRATE={0x404}]}, @TCA_BASIC_ACT={0x5f4, 0x3, [@m_gact={0x60, 0x0, 0x0, 0x0, {{0x9}, {0x34, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18}, @TCA_GACT_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}, @m_tunnel_key={0x60, 0x0, 0x0, 0x0, {{0xf}, {0x1c, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_DST_PORT={0x6}, @TCA_TUNNEL_KEY_ENC_DST_PORT={0x6}, @TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}]}, {0x15, 0x6, "45c163d35cb06edb1bee541c78d9af4ac1"}, {0xc}, {0xc}}}, @m_police={0x530, 0x0, 0x0, 0x0, {{0xb}, {0x408, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404}]]}, {0xfd, 0x6, "d55b3e13e1d68dba8bee50548827085007bf75a98c6b7d3d0707538e03478fb1033d333899fb702554ca9c150353c1b8ce39c5684ef316985b460b87c626fdd3e1f274f4d5e20d6e7d3e6f6d52f22239e9d38c86a5fffbc3fb92689da640abf9cbf45345acd7f8a82af208820e07c11fee982ffc9c41cc8f80272bf54ab98864fc03427516800a6faf38722f0a5ebdccfc582a55bfd19e7828165fbc9245a594faf165a5903298bad55b6999192c1adf3ee7acaa5ee177316012fe2d075abee0de60140b97e8b0b67e4bafa42de8421201ab0cbd68f2239cd2671bbf31b8627eb29ba394dc1b09ec5f691e509d736c2f32323acd7d582fed45"}, {0xc}, {0xc}}}]}]}}]}, 0xd04}}, 0x0) 16:05:05 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0), 0xffffffffffffffff) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r1, 0x1, 0x0, 0x0, {0x6}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}]}, 0x20}}, 0x0) 16:05:05 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000057c0)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0xd0}}], 0x2, 0x0) [ 1084.909858] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 16:05:05 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCSIFBR(r0, 0x8941, 0x0) 16:05:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(r0, 0x0, 0x0) 16:05:05 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000040), &(0x7f0000000080)=0x4) 16:05:05 executing program 4: pipe(&(0x7f0000001a40)) 16:05:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x1c, 0x1, 0x1, 0x301, 0x0, 0x0, {}, [@CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x4}]}, 0x1c}}, 0x0) 16:05:05 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000040)=0xc00) 16:05:05 executing program 0: socket$inet6(0xa, 0x3, 0x5) 16:05:05 executing program 1: getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003680)) 16:05:05 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x1c, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:05:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000005d40)=[{{&(0x7f0000000000)={0x2, 0x4e21, @remote}, 0x10, &(0x7f0000000300)=[{&(0x7f0000000040)="11465dc3596d96bcb3d61ff98440d3a395b2ae56d28754597c9cbf36719cc623fe24d195eea76da0e11236defc3b5886d27961e479b33ab5330c7daea3a869e1e55e55bebdea93e26dffaf3dc88b9779e56a3c22d374dcb8d3ab514c473a4014c0a69041eb88815bfbd224d4829e09f7206d5094a8541b06aebb80c9e7a168273ff660326b824d", 0x87}, {0x0}, {&(0x7f00000002c0)="98", 0x1}], 0x3}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 16:05:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x1, 0x1, 0x201, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) 16:05:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000000)=""/185, 0x26, 0xb9, 0x1}, 0x20) 16:05:05 executing program 3: socket$inet(0x2, 0x0, 0x4f03) 16:05:05 executing program 2: bpf$BPF_BTF_LOAD(0xc, 0x0, 0x0) 16:05:05 executing program 4: unshare(0xc040400) unshare(0x42000400) 16:05:05 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000001380)={0x0, {{0x2, 0x0, @loopback}}}, 0x90) 16:05:05 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @private2}}) 16:05:05 executing program 1: syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), 0xffffffffffffffff) 16:05:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x5450, 0x0) 16:05:05 executing program 2: syz_emit_ethernet(0x52, &(0x7f0000000000)={@link_local, @remote, @val={@void, {0x8100, 0x1}}, {@ipv4={0x800, @generic={{0x10, 0x4, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @remote, {[@cipso={0x86, 0x9, 0x0, [{0x0, 0x3, "b6"}]}, @timestamp_prespec={0x44, 0xc, 0x0, 0x3, 0x0, [{@local}]}, @timestamp={0x44, 0x14, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0]}]}}}}}}, 0x0) 16:05:05 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r0, 0x1, 0x1c, 0x0, &(0x7f0000000040)) [ 1085.362815] IPVS: ftp: loaded support on port[0] = 21 16:05:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array]}}, &(0x7f0000000040)=""/165, 0x32, 0xa5, 0x1}, 0x20) 16:05:05 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r0, 0x1, 0x29, 0x0, &(0x7f0000000040)) 16:05:05 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x8, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x28}}, 0x0) 16:05:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x1, 0x0, 0x0, {0x5c}}, 0x14}}, 0x0) 16:05:05 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000080)={'filter\x00', 0x4, [{}, {}, {}, {}]}, 0x68) 16:05:05 executing program 4: open$dir(&(0x7f0000001c40)='./file0\x00', 0x2340, 0x0) mount$9p_unix(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x101080, 0x0) mount$9p_unix(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100480, &(0x7f0000000340)) 16:05:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000a00)={0x20, 0xd, 0xa, 0x101, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) 16:05:05 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000026c0)={&(0x7f0000006380)={0x14, 0x2, 0x2, 0x5}, 0x14}}, 0x0) 16:05:05 executing program 0: pipe(&(0x7f0000000000)) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) 16:05:05 executing program 1: open$dir(&(0x7f0000001c40)='./file0\x00', 0x2340, 0x0) mount$9p_unix(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1080, 0x0) 16:05:05 executing program 3: pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$cgroup_devices(r0, 0x0, 0x0) 16:05:05 executing program 5: open$dir(&(0x7f0000001c40)='./file0\x00', 0x2340, 0x0) mount$fuse(0x0, &(0x7f0000000600)='./file0/file0\x00', 0x0, 0x100010, 0x0) 16:05:05 executing program 0: open$dir(&(0x7f0000001c40)='./file0\x00', 0x2340, 0x0) mount$9p_unix(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1010, &(0x7f0000000500)=ANY=[]) 16:05:05 executing program 2: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 16:05:06 executing program 5: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xee01, 0xee01, 0x0) 16:05:06 executing program 1: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.impure\x00') 16:05:06 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, 0x0, 0x0) 16:05:06 executing program 4: open$dir(&(0x7f0000001c40)='./file0\x00', 0x2340, 0x0) mount$9p_unix(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x101080, 0x0) mount$9p_xen(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x100011, 0x0) 16:05:06 executing program 2: open$dir(&(0x7f0000001c40)='./file0\x00', 0x2340, 0x0) mount$9p_unix(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x101080, 0x0) mount$9p_xen(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x100011, &(0x7f00000000c0)) 16:05:06 executing program 0: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 16:05:06 executing program 3: bpf$MAP_UPDATE_ELEM(0x12, &(0x7f0000000400)={0xffffffffffffffff, 0x0, &(0x7f00000003c0)=@udp6}, 0x20) 16:05:06 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000021c0)=@base={0x5, 0x0, 0x0, 0x7}, 0x48) 16:05:06 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$TCSETSF2(r0, 0x5416, 0x0) 16:05:06 executing program 2: move_pages(0x0, 0x1, &(0x7f0000000080)=[&(0x7f0000ffb000/0x2000)=nil], &(0x7f0000000180)=[0x5], 0x0, 0x0) 16:05:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x80200e, 0x0, 0x0, 0x0, &(0x7f0000000000)) sync() sync() syz_mount_image$btrfs(&(0x7f0000005100), &(0x7f0000000000)='./bus\x00', 0x80, &(0x7f00000000c0)=ANY=[@ANYBLOB="757365725f737562766f6c5f726d5f616c6c6f7765642c6e6f696e6f64655f63616368652c696e6f64655f63616368652c636f6d6d69743d3078303030303030303032353133393062362c636f6d70726573732d666f7263652c6e6f61636c2c747265656c6f672c00a05a4926bbcd3204c710a23cf01a1fc178d0b3478aea8720314f940f80786138b6e30addbddbdc6dd5826709125621f95ba5f64f7085b9642cca4487c650c6fead084fd50644388b7323f5b44d13efc811aed7ad"], 0x1, 0x50ef, &(0x7f000000a2c0)="$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") openat(0xffffffffffffff9c, &(0x7f0000000380)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) r0 = open(&(0x7f0000000180)='./bus\x00', 0x14d27e, 0x0) sync() fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r2, &(0x7f0000003780)=ANY=[], 0x5) sendfile(r2, r1, 0x0, 0x1ffff) 16:05:06 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r1, 0x3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r1}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r2}, 0x80) r3 = syz_open_dev$ttys(0xc, 0x2, 0x1) r4 = dup2(r3, r3) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) 16:05:06 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x0, 0x100, 0x0, 0x2, 0x4, 0xfffffe00, 0x0, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r2, 0x3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0x0, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x0, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r2}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r3}, 0x80) r4 = syz_open_dev$ttys(0xc, 0x2, 0x1) r5 = dup2(r4, r4) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r0, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r3, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[r0, r5, 0xffffffffffffffff, r0]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) 16:05:06 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r1, 0x3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r1}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r2}, 0x80) r3 = syz_open_dev$ttys(0xc, 0x2, 0x1) r4 = dup2(r3, r3) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r0, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[r0, r4, 0xffffffffffffffff, r0]}, 0x80) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) 16:05:06 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(0x0, 0x0, 0xb, r2, 0x3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x0, 0x6}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = syz_open_dev$ttys(0xc, 0x2, 0x1) r5 = dup2(r4, r4) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r0, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r3, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[r0, r5, 0xffffffffffffffff, r0]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) 16:05:06 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) r3 = dup2(r2, r2) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x0, 0x6, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x29, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x0, 0x5, &(0x7f0000000040)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x8, 0x7, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000900)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff]}, 0x80) 16:05:06 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x0, 0x100, 0x0, 0x2, 0x4, 0xfffffe00, 0x0, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r2, 0x3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0x0, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x0, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r2}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r3}, 0x80) r4 = syz_open_dev$ttys(0xc, 0x2, 0x1) r5 = dup2(r4, r4) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r0, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r3, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[r0, r5, 0xffffffffffffffff, r0]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) 16:05:06 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(0x0, 0x0, 0xb, r2, 0x3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x0, 0x6}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = syz_open_dev$ttys(0xc, 0x2, 0x1) r5 = dup2(r4, r4) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r0, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r3, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[r0, r5, 0xffffffffffffffff, r0]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) 16:05:06 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) r3 = dup2(r2, r2) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x0, 0x6, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x29, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x0, 0x5, &(0x7f0000000040)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x8, 0x7, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000900)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff]}, 0x80) 16:05:06 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(0x0, 0x0, 0xb, r2, 0x3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x0, 0x6}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = syz_open_dev$ttys(0xc, 0x2, 0x1) r5 = dup2(r4, r4) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r0, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r3, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[r0, r5, 0xffffffffffffffff, r0]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) 16:05:06 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) r3 = dup2(r2, r2) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x0, 0x6, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x29, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x0, 0x5, &(0x7f0000000040)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x8, 0x7, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000900)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff]}, 0x80) 16:05:06 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x0, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff}, 0x42040, 0x0, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r3, 0x3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r3}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r4}, 0x80) r5 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000040)=0x2) r6 = dup2(r5, r5) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r0, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r2, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[r0, r6, 0xffffffffffffffff, r0]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) r8 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000090000000000000009000000950000000000002172020000ffffffff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f0000000600)=""/190, 0x0, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x8, 0x7, 0x8}, 0x10, 0x0, r7, 0x0, &(0x7f0000000900)=[r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r8, 0xffffffffffffffff]}, 0x80) [ 1087.174416] audit: type=1800 audit(1671552307.440:212): pid=15026 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=13894 res=0 16:05:07 executing program 1: sendmmsg$alg(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)="cecb966d319324687fa4823866dd88ecb8101b41d13f8cd1dd5bfad4e5e3262f97f6a538419905e9c0567f94b9d28227947f7966a2adca8c12b0887ecd9c02316898beb2790aec11ecca1032a9fad8e4e48cc2c60286d5340b2e0ae10645b72160f7a4bbfa9fd1529f46fc8829a08000c2f0b19bcd87f9b8466c55365f14504efa2ccbd9e59c93b4b5", 0x89}, {&(0x7f0000000100)="8fbbd9554c158eeecfbe748ef759bbbe13cc679d77ce4530aee29fd0c5cd09bd31f88b518e0270cacc8d9e001d90de37f8d683bded46a53bb408686d16849a87083ef7539a358fe3b9b93aae6470fa6d10e54f8b30133ad34a179939ef8c0f73b5c0f19bc2262a", 0x67}], 0x2, 0x0, 0x0, 0x1}], 0x1, 0x40080) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000), 0x1, 0x1cf, &(0x7f00000002c0)="$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") r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f0000000a00)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c, &(0x7f0000000540)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x0) ftruncate(r1, 0x4000000000000000) perf_event_open$cgroup(&(0x7f00000004c0)={0x5, 0x80, 0x7, 0xff, 0x8, 0xe4, 0x0, 0x8, 0x8, 0xc, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x952, 0x7, @perf_bp={&(0x7f0000000280), 0x1e}, 0x82048, 0x400, 0x9, 0x3, 0x6, 0x100, 0x40, 0x0, 0x6, 0x0, 0x100000001}, 0xffffffffffffffff, 0x7, r0, 0x9) [ 1087.229592] audit: type=1804 audit(1671552307.470:213): pid=15026 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir3836584224/syzkaller.Oleqoy/2161/bus" dev="sda1" ino=13894 res=1 16:05:07 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x0, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff}, 0x42040, 0x0, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r3, 0x3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r3}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r4}, 0x80) r5 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000040)=0x2) r6 = dup2(r5, r5) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r0, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r2, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[r0, r6, 0xffffffffffffffff, r0]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) r8 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000090000000000000009000000950000000000002172020000ffffffff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f0000000600)=""/190, 0x0, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x8, 0x7, 0x8}, 0x10, 0x0, r7, 0x0, &(0x7f0000000900)=[r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r8, 0xffffffffffffffff]}, 0x80) 16:05:07 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) r3 = dup2(r2, r2) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x0, 0x6, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x29, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x0, 0x5, &(0x7f0000000040)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x8, 0x7, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000900)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff]}, 0x80) 16:05:07 executing program 4: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x0, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff}, 0x42040, 0x0, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r3, 0x3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r3}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r4}, 0x80) r5 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000040)=0x2) r6 = dup2(r5, r5) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r0, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r2, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[r0, r6, 0xffffffffffffffff, r0]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) r8 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000090000000000000009000000950000000000002172020000ffffffff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f0000000600)=""/190, 0x0, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x8, 0x7, 0x8}, 0x10, 0x0, r7, 0x0, &(0x7f0000000900)=[r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r8, 0xffffffffffffffff]}, 0x80) 16:05:07 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x1, 0x59, 0x5, 0x1b, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x137c, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0xc200, 0x3c6, 0x10000, 0x8, 0x1f, 0x0, 0x3ff, 0x0, 0x7, 0x0, 0x1b}, 0x0, 0xd, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'], 0x1, 0x1cf, &(0x7f00000002c0)="$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") 16:05:07 executing program 5: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1, 0x1cf, &(0x7f00000002c0)="$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") r0 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x2) r1 = dup2(r0, r0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x15) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x2) r3 = dup2(r2, r2) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x15) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r3, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0xffffffff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x3) 16:05:07 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xee00, 0xee01}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000080)=0xfffffffffffffffa) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000), 0x1, 0x1cf, &(0x7f00000002c0)="$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") 16:05:07 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r3, 0x3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r3}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r4}, 0x80) r5 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000040)=0x2) r6 = dup2(r5, r5) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r2, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r4, r0, 0x0, &(0x7f0000000b00)=[0xffffffffffffffff, r6, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) r8 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000090000000000000009000000950000000000002172020000ffffffff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f0000000600)=""/190, 0x0, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x8, 0x7, 0x8}, 0x10, 0x0, r7, 0x0, &(0x7f0000000900)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r8, 0xffffffffffffffff]}, 0x80) [ 1087.379632] audit: type=1804 audit(1671552307.500:214): pid=15026 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir3836584224/syzkaller.Oleqoy/2161/bus" dev="sda1" ino=13894 res=1 16:05:07 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x0, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff}, 0x42040, 0x0, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r3, 0x3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r3}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r4}, 0x80) r5 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000040)=0x2) r6 = dup2(r5, r5) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r0, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r2, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[r0, r6, 0xffffffffffffffff, r0]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) r8 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000090000000000000009000000950000000000002172020000ffffffff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f0000000600)=""/190, 0x0, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x8, 0x7, 0x8}, 0x10, 0x0, r7, 0x0, &(0x7f0000000900)=[r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r8, 0xffffffffffffffff]}, 0x80) 16:05:07 executing program 1: sendmmsg$alg(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)="cecb966d319324687fa4823866dd88ecb8101b41d13f8cd1dd5bfad4e5e3262f97f6a538419905e9c0567f94b9d28227947f7966a2adca8c12b0887ecd9c02316898beb2790aec11ecca1032a9fad8e4e48cc2c60286d5340b2e0ae10645b72160f7a4bbfa9fd1529f46fc8829a08000c2f0b19bcd87f9b8466c55365f14504efa2ccbd9e59c93b4b5", 0x89}, {&(0x7f0000000100)="8fbbd9554c158eeecfbe748ef759bbbe13cc679d77ce4530aee29fd0c5cd09bd31f88b518e0270cacc8d9e001d90de37f8d683bded46a53bb408686d16849a87083ef7539a358fe3b9b93aae6470fa6d10e54f8b30133ad34a179939ef8c0f73b5c0f19bc2262a", 0x67}], 0x2, 0x0, 0x0, 0x1}], 0x1, 0x40080) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000), 0x1, 0x1cf, &(0x7f00000002c0)="$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") r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f0000000a00)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c, &(0x7f0000000540)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x0) ftruncate(r1, 0x4000000000000000) perf_event_open$cgroup(&(0x7f00000004c0)={0x5, 0x80, 0x7, 0xff, 0x8, 0xe4, 0x0, 0x8, 0x8, 0xc, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x952, 0x7, @perf_bp={&(0x7f0000000280), 0x1e}, 0x82048, 0x400, 0x9, 0x3, 0x6, 0x100, 0x40, 0x0, 0x6, 0x0, 0x100000001}, 0xffffffffffffffff, 0x7, r0, 0x9) 16:05:07 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r3, 0x3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r3}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r4}, 0x80) r5 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000040)=0x2) r6 = dup2(r5, r5) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r2, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r4, r0, 0x0, &(0x7f0000000b00)=[0xffffffffffffffff, r6, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) r8 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000090000000000000009000000950000000000002172020000ffffffff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f0000000600)=""/190, 0x0, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x8, 0x7, 0x8}, 0x10, 0x0, r7, 0x0, &(0x7f0000000900)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r8, 0xffffffffffffffff]}, 0x80) 16:05:07 executing program 0: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) r2 = dup2(r1, r1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x15) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) 16:05:07 executing program 1: sendmmsg$alg(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)="cecb966d319324687fa4823866dd88ecb8101b41d13f8cd1dd5bfad4e5e3262f97f6a538419905e9c0567f94b9d28227947f7966a2adca8c12b0887ecd9c02316898beb2790aec11ecca1032a9fad8e4e48cc2c60286d5340b2e0ae10645b72160f7a4bbfa9fd1529f46fc8829a08000c2f0b19bcd87f9b8466c55365f14504efa2ccbd9e59c93b4b5", 0x89}, {&(0x7f0000000100)="8fbbd9554c158eeecfbe748ef759bbbe13cc679d77ce4530aee29fd0c5cd09bd31f88b518e0270cacc8d9e001d90de37f8d683bded46a53bb408686d16849a87083ef7539a358fe3b9b93aae6470fa6d10e54f8b30133ad34a179939ef8c0f73b5c0f19bc2262a", 0x67}], 0x2, 0x0, 0x0, 0x1}], 0x1, 0x40080) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000), 0x1, 0x1cf, &(0x7f00000002c0)="$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") r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f0000000a00)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c, &(0x7f0000000540)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x0) ftruncate(r1, 0x4000000000000000) perf_event_open$cgroup(&(0x7f00000004c0)={0x5, 0x80, 0x7, 0xff, 0x8, 0xe4, 0x0, 0x8, 0x8, 0xc, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x952, 0x7, @perf_bp={&(0x7f0000000280), 0x1e}, 0x82048, 0x400, 0x9, 0x3, 0x6, 0x100, 0x40, 0x0, 0x6, 0x0, 0x100000001}, 0xffffffffffffffff, 0x7, r0, 0x9) 16:05:07 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000880)) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r1}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r2}, 0x80) r3 = syz_open_dev$ttys(0xc, 0x2, 0x1) r4 = dup2(r3, r3) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x1, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a40)=@bpf_ext={0x1c, 0xc, 0x0, 0x0, 0x1000, 0x72, &(0x7f0000000480)=""/114, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x0, 0xb, 0x5, 0x200}, 0x10, 0x24f66}, 0x80) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000090000000000000009000000950000000000002172020000ffffffff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f0000000600)=""/190, 0x0, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x8, 0x7, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000900)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, 0xffffffffffffffff]}, 0x80) 16:05:07 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r3, 0x3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r3}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r4}, 0x80) r5 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000040)=0x2) r6 = dup2(r5, r5) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r2, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r4, r0, 0x0, &(0x7f0000000b00)=[0xffffffffffffffff, r6, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) r8 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000090000000000000009000000950000000000002172020000ffffffff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f0000000600)=""/190, 0x0, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x8, 0x7, 0x8}, 0x10, 0x0, r7, 0x0, &(0x7f0000000900)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r8, 0xffffffffffffffff]}, 0x80) 16:05:08 executing program 4: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000040)=ANY=[@ANYBLOB="0ef8da2cc4ee0101231f4a927010"], 0x1, 0x1cf, &(0x7f00000002c0)="$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") 16:05:08 executing program 0: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) r2 = dup2(r1, r1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x15) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) 16:05:09 executing program 5: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1, 0x1cf, &(0x7f00000002c0)="$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") r0 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x2) r1 = dup2(r0, r0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x15) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x2) r3 = dup2(r2, r2) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x15) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r3, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0xffffffff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x3) 16:05:09 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r3, 0x3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r3}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r4}, 0x80) r5 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000040)=0x2) r6 = dup2(r5, r5) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r2, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r4, r0, 0x0, &(0x7f0000000b00)=[0xffffffffffffffff, r6, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) r8 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000090000000000000009000000950000000000002172020000ffffffff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f0000000600)=""/190, 0x0, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x8, 0x7, 0x8}, 0x10, 0x0, r7, 0x0, &(0x7f0000000900)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r8, 0xffffffffffffffff]}, 0x80) 16:05:09 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x6, 0x9, 0x4, 0x0, 0x0, 0x401, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9b05, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x200, 0x2, 0x10000, 0x0, 0x81, 0x3, 0x9, 0x0, 0x0, 0x0, 0x217}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0x0) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000), 0x1, 0x1cf, &(0x7f00000002c0)="$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") 16:05:09 executing program 0: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) r2 = dup2(r1, r1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x15) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) 16:05:09 executing program 4: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000), 0x1, 0x1cf, &(0x7f00000002c0)="$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") r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5533, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0xc7, 0x0, 0x0, 0x0, 0x0, 0xd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3f, 0x0, @perf_bp={&(0x7f0000000040), 0x3}, 0x0, 0x3, 0x0, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8001, 0x0, 0x3}, r2, 0x0, r1, 0x8) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x3, 0x5, 0x0, 0x1, 0x0, 0x7, 0x40, 0xe, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x140000, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0xc40, 0x2, 0x2442, 0x6, 0x5, 0x5, 0x6, 0x0, 0x7, 0x0, 0x7}, r2, 0x4, r0, 0x9) 16:05:09 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000), 0x1, 0x1cf, &(0x7f00000002c0)="$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") fcntl$setstatus(r1, 0x4, 0x46800) fcntl$dupfd(r1, 0x406, r0) 16:05:09 executing program 0: socket$kcm(0xa, 0x2, 0x11) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) r2 = dup2(r1, r1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x15) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) 16:05:09 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x6, 0x9, 0x4, 0x0, 0x0, 0x401, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9b05, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x200, 0x2, 0x10000, 0x0, 0x81, 0x3, 0x9, 0x0, 0x0, 0x0, 0x217}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0x0) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000), 0x1, 0x1cf, &(0x7f00000002c0)="$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") 16:05:09 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r3, 0x3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r3}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r4}, 0x80) r5 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000040)=0x2) r6 = dup2(r5, r5) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r2, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r4, r0, 0x0, &(0x7f0000000b00)=[0xffffffffffffffff, r6, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) r8 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000090000000000000009000000950000000000002172020000ffffffff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f0000000600)=""/190, 0x0, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x8, 0x7, 0x8}, 0x10, 0x0, r7, 0x0, &(0x7f0000000900)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r8, 0xffffffffffffffff]}, 0x80) 16:05:09 executing program 4: r0 = syz_open_dev$vcsu(&(0x7f0000000100), 0x8, 0x200080) ioctl$FIONCLEX(r0, 0x5450) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000), 0x244040, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x7f, 0x16, 0xf0, 0x9, 0x0, 0xcf440c800000, 0x185, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffd, 0x2, @perf_config_ext={0x5, 0x8}, 0x440, 0xba0, 0x3, 0x2, 0x9, 0x3f, 0xfff7, 0x0, 0x3, 0x0, 0x10001}, r2, 0x8, r1, 0x8) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000140)=ANY=[@ANYBLOB="c868a9aa59cfe32fb772632259d14400"], 0x1, 0x1cf, &(0x7f00000002c0)="$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") 16:05:09 executing program 2: socket$kcm(0xa, 0x2, 0x11) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r1, 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) r3 = dup2(r2, r2) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x15) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) 16:05:09 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x6, 0x9, 0x4, 0x0, 0x0, 0x401, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9b05, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x200, 0x2, 0x10000, 0x0, 0x81, 0x3, 0x9, 0x0, 0x0, 0x0, 0x217}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0x0) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000), 0x1, 0x1cf, &(0x7f00000002c0)="$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") 16:05:10 executing program 5: socket$kcm(0xa, 0x2, 0x11) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r1, 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) r3 = dup2(r2, r2) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x15) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) 16:05:10 executing program 0: socket$kcm(0xa, 0x2, 0x11) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) r2 = dup2(r1, r1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x15) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) 16:05:10 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r3, 0x3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r3}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r4}, 0x80) r5 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000040)=0x2) r6 = dup2(r5, r5) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r2, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r4, r0, 0x0, &(0x7f0000000b00)=[0xffffffffffffffff, r6, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) r8 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000090000000000000009000000950000000000002172020000ffffffff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f0000000600)=""/190, 0x0, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x8, 0x7, 0x8}, 0x10, 0x0, r7, 0x0, &(0x7f0000000900)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r8, 0xffffffffffffffff]}, 0x80) 16:05:10 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x4500, 0x0, 0x0, 0x0, 0x0, 0xfffffffa}, 0x0, 0x0, 0xffffffffffffffff, 0x9) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f00000004c0)=ANY=[@ANYBLOB="00f29008d0b970bd0736ee6ae4b06f263f9453e18edff28c363166dda22e1eca9bd98ce380baf4e63a8624ead822cfc06b492b83f6c85bd886e3441abbba8dbd854bfab19de3dc951c7361709ee4e167ae12349d771cd155234a40b9d85c780d732941c1d9f1d18d567ae6ba7e09f8bfc599dce7f4c65356015dd14943ae936dc4cf1f3848ee29ead7d9c53fa55ce8626688371aa0b0055aac4d42d391fb5aacefa5a2c6e907c9c4c4cf2bea0a5c0e5df4a854555377f9ca87593c3d8400b2bf4a3fad074624cd44a810827644c1e7e600bdd9585430"], 0x1, 0x1cf, &(0x7f00000002c0)="$eJzKKC4sZmdgYPj7sSaZQYABDBgZeBguMDAysDAwMKgzQsQYmCDUeij/BZSeCZW2gfKbofRCKF1xS3vdmlN+Z0566motk2VmaPXUlkcWk0vtMXKTXMwjwcwQmnpkUXFlVXZiTk5qUfFChopbyUkVp08wsFy3v6bSLMHp8EeewyFJ00GH6YiPR9aMxhLOSVKaYmxsmQpnz3yQX8emcYTh0QrmjXWeeY11halT89LykqqyqrLmTZy4cWZjZ2Pjyol1UWl+qxhbUlw2NXUyMjlsURPYzGyoPslGe8K79lUPkxxYezz8mk8ZK71OZb5kvLBI6tSKqpkTvijNZjT8znCHp2yFhIaGk8QVCYsGE4YjdbYNriAnpjQwpCmEMSapsYm1bTkzJ4SZn81tgUJL8gmm0KMcS2dKWBwQqjr501LzrUOi24xtTx3YzvAcPs6zpqBP0Oi4BIPTQsH/MiBjEhoayjTWMi21XfClSOOvhNdqY6cMBnd7pmWwAGVpAJEroTxZsJ6E5BUeOpqaRinJCQ2bJBKS3AoMlRm27uFcLdDAgBRtKgwMDNsZYXELAddgjFEwCkbBKBgFo2AUjIJRMApGwSgYBSMCAAIAAP//QJCYyw==") mount$9p_virtio(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x20000, &(0x7f0000000100)={'trans=virtio,', {[{@version_u}, {@dfltuid={'dfltuid', 0x3d, 0xffffffffffffffff}}], [{@obj_user={'obj_user', 0x3d, 'squashfs\x00'}}]}}) 16:05:10 executing program 4: r0 = syz_open_dev$vcsu(&(0x7f0000000100), 0x8, 0x200080) ioctl$FIONCLEX(r0, 0x5450) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000), 0x244040, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x7f, 0x16, 0xf0, 0x9, 0x0, 0xcf440c800000, 0x185, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffd, 0x2, @perf_config_ext={0x5, 0x8}, 0x440, 0xba0, 0x3, 0x2, 0x9, 0x3f, 0xfff7, 0x0, 0x3, 0x0, 0x10001}, r2, 0x8, r1, 0x8) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000140)=ANY=[@ANYBLOB="c868a9aa59cfe32fb772632259d14400"], 0x1, 0x1cf, &(0x7f00000002c0)="$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") 16:05:10 executing program 0: socket$kcm(0xa, 0x2, 0x11) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) r2 = dup2(r1, r1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x15) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) 16:05:10 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f0000000a00)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c, &(0x7f0000000540)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x0) sendfile(r1, r0, 0x0, 0x8) fcntl$setpipe(r1, 0x407, 0x401) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000080)=0x4) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000040)=ANY=[@ANYBLOB="212aeb"], 0xfd, 0x1cf, &(0x7f00000002c0)="$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") 16:05:10 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r3}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r4}, 0x80) r5 = syz_open_dev$ttys(0xc, 0x2, 0x1) r6 = dup2(r5, r5) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r2, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r4, r0, 0x0, &(0x7f0000000b00)=[0xffffffffffffffff, r6, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x1, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a40)=@bpf_ext={0x1c, 0xc, 0x0, 0x0, 0x1000, 0x72, &(0x7f0000000480)=""/114, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x0, 0xb, 0x5, 0x200}, 0x10, 0x24f66}, 0x80) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000090000000000000009000000950000000000002172020000ffffffff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f0000000600)=""/190, 0x0, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x8, 0x7, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000900)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r7, 0xffffffffffffffff]}, 0x80) 16:05:10 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r4, 0x3) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r5, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) r7 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x2) r8 = dup2(r7, r7) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r6, r0, 0x0, &(0x7f0000000b00)=[r1, r8, 0xffffffffffffffff, r1]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000090000000000000009000000950000000000002172020000ffffffff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f0000000600)=""/190, 0x0, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x8, 0x7, 0x8}, 0x10, 0x0, r9, 0x0, &(0x7f0000000900)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff]}, 0x80) 16:05:10 executing program 2: socket$kcm(0xa, 0x2, 0x11) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r1, 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) r3 = dup2(r2, r2) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x15) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) 16:05:10 executing program 0: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000), 0x1, 0x1cf, &(0x7f00000002c0)="$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") 16:05:10 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f0000000a00)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c, &(0x7f0000000540)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x0) sendfile(r1, r0, 0x0, 0x8) fcntl$setpipe(r1, 0x407, 0x401) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000080)=0x4) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000040)=ANY=[@ANYBLOB="212aeb"], 0xfd, 0x1cf, &(0x7f00000002c0)="$eJzKKC4sZmdgYPj7sSaZQYABDBgZeBguMDAysDAwMKgzQsQYmCDUeij/BZSeCZW2gfKbofRCKF1xS3vdmlN+Z0566motk2VmaPXUlkcWk0vtMXKTXMwjwcwQmnpkUXFlVXZiTk5qUfFChopbyUkVp08wsFy3v6bSLMHp8EeewyFJ00GH6YiPR9aMxhLOSVKaYmxsmQpnz3yQX8emcYTh0QrmjXWeeY11halT89LykqqyqrLmTZy4cWZjZ2Pjyol1UWl+qxhbUlw2NXUyMjlsURPYzGyoPslGe8K79lUPkxxYezz8mk8ZK71OZb5kvLBI6tSKqpkTvijNZjT8znCHp2yFhIaGk8QVCYsGE4YjdbYNriAnpjQwpCmEMSapsYm1bTkzJ4SZn81tgUJL8gmm0KMcS2dKWBwQqjr501LzrUOi24xtTx3YzvAcPs6zpqBP0Oi4BIPTQsH/MiBjEhoayjTWMi21XfClSOOvhNdqY6cMBnd7pmWwAGVpAJEroTxZsJ6E5BUeOpqaRinJCQ2bJBKS3AoMlRm27uFcLdDAgBRtKgwMDNsZYXELAddgjFEwCkbBKBgFo2AUjIJRMApGwSgYBSMCAAIAAP//QJCYyw==") 16:05:11 executing program 5: socket$kcm(0xa, 0x2, 0x11) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r1, 0x3) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r2, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r1}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r3}, 0x80) r4 = syz_open_dev$ttys(0xc, 0x2, 0x1) r5 = dup2(r4, r4) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000080)=0x15) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) 16:05:11 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r4, 0x3) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r5, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) r7 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x2) r8 = dup2(r7, r7) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r6, r0, 0x0, &(0x7f0000000b00)=[r1, r8, 0xffffffffffffffff, r1]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000090000000000000009000000950000000000002172020000ffffffff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f0000000600)=""/190, 0x0, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x8, 0x7, 0x8}, 0x10, 0x0, r9, 0x0, &(0x7f0000000900)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff]}, 0x80) 16:05:11 executing program 0: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000), 0x1, 0x1cf, &(0x7f00000002c0)="$eJzKKC4sZmdgYPj7sSaZQYABDBgZeBguMDAysDAwMKgzQsQYmCDUeij/BZSeCZW2gfKbofRCKF1xS3vdmlN+Z0566motk2VmaPXUlkcWk0vtMXKTXMwjwcwQmnpkUXFlVXZiTk5qUfFChopbyUkVp08wsFy3v6bSLMHp8EeewyFJ00GH6YiPR9aMxhLOSVKaYmxsmQpnz3yQX8emcYTh0QrmjXWeeY11halT89LykqqyqrLmTZy4cWZjZ2Pjyol1UWl+qxhbUlw2NXUyMjlsURPYzGyoPslGe8K79lUPkxxYezz8mk8ZK71OZb5kvLBI6tSKqpkTvijNZjT8znCHp2yFhIaGk8QVCYsGE4YjdbYNriAnpjQwpCmEMSapsYm1bTkzJ4SZn81tgUJL8gmm0KMcS2dKWBwQqjr501LzrUOi24xtTx3YzvAcPs6zpqBP0Oi4BIPTQsH/MiBjEhoayjTWMi21XfClSOOvhNdqY6cMBnd7pmWwAGVpAJEroTxZsJ6E5BUeOpqaRinJCQ2bJBKS3AoMlRm27uFcLdDAgBRtKgwMDNsZYXELAddgjFEwCkbBKBgFo2AUjIJRMApGwSgYBSMCAAIAAP//QJCYyw==") 16:05:11 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f0000000a00)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c, &(0x7f0000000540)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x0) sendfile(r1, r0, 0x0, 0x8) fcntl$setpipe(r1, 0x407, 0x401) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000080)=0x4) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000040)=ANY=[@ANYBLOB="212aeb"], 0xfd, 0x1cf, &(0x7f00000002c0)="$eJzKKC4sZmdgYPj7sSaZQYABDBgZeBguMDAysDAwMKgzQsQYmCDUeij/BZSeCZW2gfKbofRCKF1xS3vdmlN+Z0566motk2VmaPXUlkcWk0vtMXKTXMwjwcwQmnpkUXFlVXZiTk5qUfFChopbyUkVp08wsFy3v6bSLMHp8EeewyFJ00GH6YiPR9aMxhLOSVKaYmxsmQpnz3yQX8emcYTh0QrmjXWeeY11halT89LykqqyqrLmTZy4cWZjZ2Pjyol1UWl+qxhbUlw2NXUyMjlsURPYzGyoPslGe8K79lUPkxxYezz8mk8ZK71OZb5kvLBI6tSKqpkTvijNZjT8znCHp2yFhIaGk8QVCYsGE4YjdbYNriAnpjQwpCmEMSapsYm1bTkzJ4SZn81tgUJL8gmm0KMcS2dKWBwQqjr501LzrUOi24xtTx3YzvAcPs6zpqBP0Oi4BIPTQsH/MiBjEhoayjTWMi21XfClSOOvhNdqY6cMBnd7pmWwAGVpAJEroTxZsJ6E5BUeOpqaRinJCQ2bJBKS3AoMlRm27uFcLdDAgBRtKgwMDNsZYXELAddgjFEwCkbBKBgFo2AUjIJRMApGwSgYBSMCAAIAAP//QJCYyw==") 16:05:11 executing program 2: socket$kcm(0xa, 0x2, 0x11) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r1, 0x3) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r2, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r1}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r3}, 0x80) r4 = syz_open_dev$ttys(0xc, 0x2, 0x1) r5 = dup2(r4, r4) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000080)=0x15) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) 16:05:11 executing program 4: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'], 0x1, 0x1cf, &(0x7f00000002c0)="$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") r1 = getpgrp(0x0) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x2) r3 = dup2(r2, r2) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x15) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x20, 0x9, 0x6, 0x0, 0xffffffffffff7fff, 0x80000, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000040), 0x9}, 0x8000, 0xd0d, 0xff, 0x8, 0x6, 0x9, 0x7e, 0x0, 0x3f, 0x0, 0x7ff}, r1, 0x1, r3, 0x3) 16:05:11 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r4, 0x3) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r5, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) r7 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x2) r8 = dup2(r7, r7) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r6, r0, 0x0, &(0x7f0000000b00)=[r1, r8, 0xffffffffffffffff, r1]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000090000000000000009000000950000000000002172020000ffffffff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f0000000600)=""/190, 0x0, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x8, 0x7, 0x8}, 0x10, 0x0, r9, 0x0, &(0x7f0000000900)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff]}, 0x80) 16:05:11 executing program 0: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000), 0x1, 0x1cf, &(0x7f00000002c0)="$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") 16:05:11 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'], 0x1, 0x1cf, &(0x7f00000002c0)="$eJzKKC4sZmdgYPj7sSaZQYABDBgZeBguMDAysDAwMKgzQsQYmCDUeij/BZSeCZW2gfKbofRCKF1xS3vdmlN+Z0566motk2VmaPXUlkcWk0vtMXKTXMwjwcwQmnpkUXFlVXZiTk5qUfFChopbyUkVp08wsFy3v6bSLMHp8EeewyFJ00GH6YiPR9aMxhLOSVKaYmxsmQpnz3yQX8emcYTh0QrmjXWeeY11halT89LykqqyqrLmTZy4cWZjZ2Pjyol1UWl+qxhbUlw2NXUyMjlsURPYzGyoPslGe8K79lUPkxxYezz8mk8ZK71OZb5kvLBI6tSKqpkTvijNZjT8znCHp2yFhIaGk8QVCYsGE4YjdbYNriAnpjQwpCmEMSapsYm1bTkzJ4SZn81tgUJL8gmm0KMcS2dKWBwQqjr501LzrUOi24xtTx3YzvAcPs6zpqBP0Oi4BIPTQsH/MiBjEhoayjTWMi21XfClSOOvhNdqY6cMBnd7pmWwAGVpAJEroTxZsJ6E5BUeOpqaRinJCQ2bJBKS3AoMlRm27uFcLdDAgBRtKgwMDNsZYXELAddgjFEwCkbBKBgFo2AUjIJRMApGwSgYBSMCAAIAAP//QJCYyw==") r1 = getpgrp(0x0) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x2) r3 = dup2(r2, r2) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x15) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x20, 0x9, 0x6, 0x0, 0xffffffffffff7fff, 0x80000, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000040), 0x9}, 0x8000, 0xd0d, 0xff, 0x8, 0x6, 0x9, 0x7e, 0x0, 0x3f, 0x0, 0x7ff}, r1, 0x1, r3, 0x3) 16:05:11 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r4}, 0x80) r5 = syz_open_dev$ttys(0xc, 0x2, 0x1) r6 = dup2(r5, r5) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r4, r0, 0x0, &(0x7f0000000b00)=[r1, r6, 0xffffffffffffffff, r1]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x1, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a40)=@bpf_ext={0x1c, 0xc, 0x0, 0x0, 0x1000, 0x72, &(0x7f0000000480)=""/114, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x0, 0xb, 0x5, 0x200}, 0x10, 0x24f66}, 0x80) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000090000000000000009000000950000000000002172020000ffffffff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f0000000600)=""/190, 0x0, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x8, 0x7, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000900)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r7, 0xffffffffffffffff]}, 0x80) 16:05:11 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r4}, 0x80) r5 = syz_open_dev$ttys(0xc, 0x2, 0x1) r6 = dup2(r5, r5) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r4, r0, 0x0, &(0x7f0000000b00)=[r1, r6, 0xffffffffffffffff, r1]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x1, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a40)=@bpf_ext={0x1c, 0xc, 0x0, 0x0, 0x1000, 0x72, &(0x7f0000000480)=""/114, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x0, 0xb, 0x5, 0x200}, 0x10, 0x24f66}, 0x80) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000090000000000000009000000950000000000002172020000ffffffff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f0000000600)=""/190, 0x0, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x8, 0x7, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000900)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r7, 0xffffffffffffffff]}, 0x80) 16:05:11 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'], 0x1, 0x1cf, &(0x7f00000002c0)="$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") r1 = getpgrp(0x0) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x2) r3 = dup2(r2, r2) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x15) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x20, 0x9, 0x6, 0x0, 0xffffffffffff7fff, 0x80000, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000040), 0x9}, 0x8000, 0xd0d, 0xff, 0x8, 0x6, 0x9, 0x7e, 0x0, 0x3f, 0x0, 0x7ff}, r1, 0x1, r3, 0x3) 16:05:12 executing program 5: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r4, 0x3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r5}, 0x80) r6 = syz_open_dev$ttys(0xc, 0x2, 0x1) r7 = dup2(r6, r6) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r5, r0, 0x0, &(0x7f0000000b00)=[r1, r7, 0xffffffffffffffff, r1]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x1, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a40)=@bpf_ext={0x1c, 0xc, 0x0, 0x0, 0x1000, 0x72, &(0x7f0000000480)=""/114, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x0, 0xb, 0x5, 0x200}, 0x10, 0x24f66}, 0x80) r8 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000090000000000000009000000950000000000002172020000ffffffff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f0000000600)=""/190, 0x0, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x8, 0x7, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000900)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r8, 0xffffffffffffffff]}, 0x80) 16:05:12 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r4}, 0x80) r5 = syz_open_dev$ttys(0xc, 0x2, 0x1) r6 = dup2(r5, r5) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r4, r0, 0x0, &(0x7f0000000b00)=[r1, r6, 0xffffffffffffffff, r1]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x1, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a40)=@bpf_ext={0x1c, 0xc, 0x0, 0x0, 0x1000, 0x72, &(0x7f0000000480)=""/114, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x0, 0xb, 0x5, 0x200}, 0x10, 0x24f66}, 0x80) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000090000000000000009000000950000000000002172020000ffffffff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f0000000600)=""/190, 0x0, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x8, 0x7, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000900)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r7, 0xffffffffffffffff]}, 0x80) 16:05:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x0, 0x3, 0x0, 0x81, 0x0, 0x41c1, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000040000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x2) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000), 0x1, 0x1cf, &(0x7f00000002c0)="$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") 16:05:12 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'], 0x1, 0x1cf, &(0x7f00000002c0)="$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") r1 = getpgrp(0x0) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x2) r3 = dup2(r2, r2) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x15) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x20, 0x9, 0x6, 0x0, 0xffffffffffff7fff, 0x80000, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000040), 0x9}, 0x8000, 0xd0d, 0xff, 0x8, 0x6, 0x9, 0x7e, 0x0, 0x3f, 0x0, 0x7ff}, r1, 0x1, r3, 0x3) 16:05:12 executing program 2: socket$kcm(0xa, 0x2, 0x11) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r1, 0x3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x2) r3 = dup2(r2, r2) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x15) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) socket$kcm(0x2, 0x3, 0x2) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) 16:05:12 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r4, 0x3) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r5, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r6}, 0x80) r7 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x2) r8 = dup2(r7, r7) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r6, r0, 0x0, &(0x7f0000000b00)=[r1, r8, 0xffffffffffffffff, r1]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) 16:05:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x0, 0x3, 0x0, 0x81, 0x0, 0x41c1, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000040000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x2) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000), 0x1, 0x1cf, &(0x7f00000002c0)="$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") 16:05:12 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380), 0x4000000044882, 0x0) io_setup(0x1, &(0x7f0000000240)=0x0) io_submit(r1, 0x73, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r0, &(0x7f0000000000)="98", 0x3e80000000, 0x4000}]) io_cancel(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x3, 0x4, 0xffffffffffffffff, &(0x7f0000000100)="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", 0xff, 0x200, 0x0, 0x2}, &(0x7f00000004c0)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000041c1, 0x120400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, r2, 0x0) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000040)=ANY=[@ANYBLOB="478ad104f8ec4e29f789a2e045292afd22ba56f466ca013d210231df77841d6f23a9f2487b7dde27f18b9bd402c326426f544aa0111e684690b9959cf6fb447a4accf3aa01931e73a34243e4f1ac5742a6b4614f4b52f6385389dc59a4cf0bd23499ced8c8e08be48ec43694decb962f5fc004b471ca45c5f22c9400c1be4a63cb71f6d95bec558fb07881abf48a45ab6134544b0f414c44426a755fe520f9a7f78db3f6cfc2ec49c70fea"], 0x1, 0x1cf, &(0x7f00000002c0)="$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") r3 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x2) r4 = dup2(r3, r3) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0x15) ioctl$KVM_IRQFD(r4, 0x4020ae76, &(0x7f0000000000)={0xffffffffffffffff, 0xfffffffa, 0x2}) 16:05:12 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r3, 0x3) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r4, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r3}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r5}, 0x80) r6 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000040)=0x2) r7 = dup2(r6, r6) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r2, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r5, r0, 0x0, &(0x7f0000000b00)=[r1, r7, 0xffffffffffffffff, r1]}, 0x80) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000090000000000000009000000950000000000002172020000ffffffff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f0000000600)=""/190, 0x0, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x8, 0x7, 0x8}, 0x10, 0x0, r8, 0x0, &(0x7f0000000900)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r9, 0xffffffffffffffff]}, 0x80) 16:05:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x0, 0x3, 0x0, 0x81, 0x0, 0x41c1, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000040000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x2) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000), 0x1, 0x1cf, &(0x7f00000002c0)="$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") 16:05:12 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380), 0x4000000044882, 0x0) io_setup(0x1, &(0x7f0000000240)=0x0) io_submit(r1, 0x73, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r0, &(0x7f0000000000)="98", 0x3e80000000, 0x4000}]) io_cancel(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x3, 0x4, 0xffffffffffffffff, &(0x7f0000000100)="edfd5ac98b4aea3c129207a6ae2b966adbcaf6c67222eccc7876c9e9fe3f988290bc299c7e873645e40db2b656182f8c63b3b7a8d3fcf410b10ffffdb3b73e91aa75d097732e71a673c37c979705adb17c74ce7d1c91a565cb068d73a2b504c2bd41ee1ef531bba64663f797a441fcddc2aeaf005d52e24494e978b5a482681027b2e1deb01d73ef9c40c44ab459431c9351345c8cbab1df4c257ae038dc6ce1a21a2ee14fb27ada96e19b0be673d1e2400607b1f773abdf6a8689c62f539cacbdaea4364a8e40601c8ec4cf391bbaa4df19b83c31440521ac4e74046d045f753052657864c1ee5c7f0237de2d9214285efd5f55826ba38bb6409f38e28750", 0xff, 0x200, 0x0, 0x2}, &(0x7f00000004c0)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000041c1, 0x120400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, r2, 0x0) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000040)=ANY=[@ANYBLOB="478ad104f8ec4e29f789a2e045292afd22ba56f466ca013d210231df77841d6f23a9f2487b7dde27f18b9bd402c326426f544aa0111e684690b9959cf6fb447a4accf3aa01931e73a34243e4f1ac5742a6b4614f4b52f6385389dc59a4cf0bd23499ced8c8e08be48ec43694decb962f5fc004b471ca45c5f22c9400c1be4a63cb71f6d95bec558fb07881abf48a45ab6134544b0f414c44426a755fe520f9a7f78db3f6cfc2ec49c70fea"], 0x1, 0x1cf, &(0x7f00000002c0)="$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") r3 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x2) r4 = dup2(r3, r3) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0x15) ioctl$KVM_IRQFD(r4, 0x4020ae76, &(0x7f0000000000)={0xffffffffffffffff, 0xfffffffa, 0x2}) 16:05:12 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r3, 0x3) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r4, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r3}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r5}, 0x80) r6 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000040)=0x2) r7 = dup2(r6, r6) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r2, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r5, r0, 0x0, &(0x7f0000000b00)=[r1, r7, 0xffffffffffffffff, r1]}, 0x80) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000090000000000000009000000950000000000002172020000ffffffff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f0000000600)=""/190, 0x0, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x8, 0x7, 0x8}, 0x10, 0x0, r8, 0x0, &(0x7f0000000900)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r9, 0xffffffffffffffff]}, 0x80) 16:05:13 executing program 5: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r4, 0x3) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r5, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r6}, 0x80) r7 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x2) r8 = dup2(r7, r7) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r6, r0, 0x0, &(0x7f0000000b00)=[r1, r8, 0xffffffffffffffff, r1]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000090000000000000009000000950000000000002172020000ffffffff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f0000000600)=""/190, 0x0, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x8, 0x7, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000900)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r9, 0xffffffffffffffff]}, 0x80) 16:05:13 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r4, 0x3) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r5, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r6}, 0x80) r7 = syz_open_dev$ttys(0xc, 0x2, 0x1) r8 = dup2(r7, r7) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r6, r0, 0x0, &(0x7f0000000b00)=[r1, r8, 0xffffffffffffffff, r1]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x1, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a40)=@bpf_ext={0x1c, 0xc, 0x0, 0x0, 0x1000, 0x72, &(0x7f0000000480)=""/114, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x0, 0xb, 0x5, 0x200}, 0x10, 0x24f66}, 0x80) r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000090000000000000009000000950000000000002172020000ffffffff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f0000000600)=""/190, 0x0, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x8, 0x7, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000900)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r9, 0xffffffffffffffff]}, 0x80) 16:05:13 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r4, 0x3) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r5, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r6}, 0x80) r7 = syz_open_dev$ttys(0xc, 0x2, 0x1) r8 = dup2(r7, r7) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r6, r0, 0x0, &(0x7f0000000b00)=[r1, r8, 0xffffffffffffffff, r1]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x1, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a40)=@bpf_ext={0x1c, 0xc, 0x0, 0x0, 0x1000, 0x72, &(0x7f0000000480)=""/114, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x0, 0xb, 0x5, 0x200}, 0x10, 0x24f66}, 0x80) r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000090000000000000009000000950000000000002172020000ffffffff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f0000000600)=""/190, 0x0, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x8, 0x7, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000900)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r9, 0xffffffffffffffff]}, 0x80) 16:05:13 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380), 0x4000000044882, 0x0) io_setup(0x1, &(0x7f0000000240)=0x0) io_submit(r1, 0x73, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r0, &(0x7f0000000000)="98", 0x3e80000000, 0x4000}]) io_cancel(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x3, 0x4, 0xffffffffffffffff, &(0x7f0000000100)="edfd5ac98b4aea3c129207a6ae2b966adbcaf6c67222eccc7876c9e9fe3f988290bc299c7e873645e40db2b656182f8c63b3b7a8d3fcf410b10ffffdb3b73e91aa75d097732e71a673c37c979705adb17c74ce7d1c91a565cb068d73a2b504c2bd41ee1ef531bba64663f797a441fcddc2aeaf005d52e24494e978b5a482681027b2e1deb01d73ef9c40c44ab459431c9351345c8cbab1df4c257ae038dc6ce1a21a2ee14fb27ada96e19b0be673d1e2400607b1f773abdf6a8689c62f539cacbdaea4364a8e40601c8ec4cf391bbaa4df19b83c31440521ac4e74046d045f753052657864c1ee5c7f0237de2d9214285efd5f55826ba38bb6409f38e28750", 0xff, 0x200, 0x0, 0x2}, &(0x7f00000004c0)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000041c1, 0x120400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, r2, 0x0) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000040)=ANY=[@ANYBLOB="478ad104f8ec4e29f789a2e045292afd22ba56f466ca013d210231df77841d6f23a9f2487b7dde27f18b9bd402c326426f544aa0111e684690b9959cf6fb447a4accf3aa01931e73a34243e4f1ac5742a6b4614f4b52f6385389dc59a4cf0bd23499ced8c8e08be48ec43694decb962f5fc004b471ca45c5f22c9400c1be4a63cb71f6d95bec558fb07881abf48a45ab6134544b0f414c44426a755fe520f9a7f78db3f6cfc2ec49c70fea"], 0x1, 0x1cf, &(0x7f00000002c0)="$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") r3 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x2) r4 = dup2(r3, r3) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0x15) ioctl$KVM_IRQFD(r4, 0x4020ae76, &(0x7f0000000000)={0xffffffffffffffff, 0xfffffffa, 0x2}) 16:05:13 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r4, 0x3) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r5, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r6}, 0x80) r7 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x2) r8 = dup2(r7, r7) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r6, r0, 0x0, &(0x7f0000000b00)=[r1, r8, 0xffffffffffffffff, r1]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x1, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) 16:05:13 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r3, 0x3) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r4, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r3}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r5}, 0x80) r6 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000040)=0x2) r7 = dup2(r6, r6) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r2, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r5, r0, 0x0, &(0x7f0000000b00)=[r1, r7, 0xffffffffffffffff, r1]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) socket$kcm(0x2, 0x3, 0x2) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) 16:05:13 executing program 3: socket$kcm(0xa, 0x2, 0x11) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r1, 0x3) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r2, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r1}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r3}, 0x80) r4 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000040)=0x2) r5 = dup2(r4, r4) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000080)=0x15) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) socket$kcm(0x2, 0x3, 0x2) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) 16:05:13 executing program 1: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x35, 0x3, 0x0, 0xff, 0x0, 0xd3a4, 0x20000, 0x4, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7f, 0x1, @perf_bp={&(0x7f0000000040), 0x2}, 0x1000, 0x2, 0x3, 0x9, 0x3, 0x4, 0x9, 0x0, 0x1, 0x0, 0xb7c}, 0xffffffffffffffff, 0xc, r1, 0xb) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000), 0x1, 0x1cf, &(0x7f00000002c0)="$eJzKKC4sZmdgYPj7sSaZQYABDBgZeBguMDAysDAwMKgzQsQYmCDUeij/BZSeCZW2gfKbofRCKF1xS3vdmlN+Z0566motk2VmaPXUlkcWk0vtMXKTXMwjwcwQmnpkUXFlVXZiTk5qUfFChopbyUkVp08wsFy3v6bSLMHp8EeewyFJ00GH6YiPR9aMxhLOSVKaYmxsmQpnz3yQX8emcYTh0QrmjXWeeY11halT89LykqqyqrLmTZy4cWZjZ2Pjyol1UWl+qxhbUlw2NXUyMjlsURPYzGyoPslGe8K79lUPkxxYezz8mk8ZK71OZb5kvLBI6tSKqpkTvijNZjT8znCHp2yFhIaGk8QVCYsGE4YjdbYNriAnpjQwpCmEMSapsYm1bTkzJ4SZn81tgUJL8gmm0KMcS2dKWBwQqjr501LzrUOi24xtTx3YzvAcPs6zpqBP0Oi4BIPTQsH/MiBjEhoayjTWMi21XfClSOOvhNdqY6cMBnd7pmWwAGVpAJEroTxZsJ6E5BUeOpqaRinJCQ2bJBKS3AoMlRm27uFcLdDAgBRtKgwMDNsZYXELAddgjFEwCkbBKBgFo2AUjIJRMApGwSgYBSMCAAIAAP//QJCYyw==") 16:05:13 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r4, 0x3) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r5, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r6}, 0x80) r7 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x2) r8 = dup2(r7, r7) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r6, r0, 0x0, &(0x7f0000000b00)=[r1, r8, 0xffffffffffffffff, r1]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x1, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) 16:05:13 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r4, 0x3) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r5, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r6}, 0x80) r7 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x2) r8 = dup2(r7, r7) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r6, r0, 0x0, &(0x7f0000000b00)=[r1, r8, 0xffffffffffffffff, r1]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x1, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) 16:05:13 executing program 1: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x35, 0x3, 0x0, 0xff, 0x0, 0xd3a4, 0x20000, 0x4, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7f, 0x1, @perf_bp={&(0x7f0000000040), 0x2}, 0x1000, 0x2, 0x3, 0x9, 0x3, 0x4, 0x9, 0x0, 0x1, 0x0, 0xb7c}, 0xffffffffffffffff, 0xc, r1, 0xb) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000), 0x1, 0x1cf, &(0x7f00000002c0)="$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") 16:05:13 executing program 3: socket$kcm(0xa, 0x2, 0x11) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r1, 0x3) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r2, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r1}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r3}, 0x80) r4 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000040)=0x2) r5 = dup2(r4, r4) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000080)=0x15) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) socket$kcm(0x2, 0x3, 0x2) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) 16:05:14 executing program 5: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r4, 0x3) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r5, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r6}, 0x80) r7 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x2) r8 = dup2(r7, r7) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r6, r0, 0x0, &(0x7f0000000b00)=[r1, r8, 0xffffffffffffffff, r1]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000090000000000000009000000950000000000002172020000ffffffff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f0000000600)=""/190, 0x0, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x8, 0x7, 0x8}, 0x10, 0x0, r9, 0x0, &(0x7f0000000900)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff]}, 0x80) 16:05:14 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r4, 0x3) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r5, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r6}, 0x80) r7 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x2) r8 = dup2(r7, r7) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r6, r0, 0x0, &(0x7f0000000b00)=[r1, r8, 0xffffffffffffffff, r1]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x1, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) 16:05:14 executing program 3: socket$kcm(0xa, 0x2, 0x11) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r1, 0x3) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r2, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r1}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r3}, 0x80) r4 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000040)=0x2) r5 = dup2(r4, r4) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000080)=0x15) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) socket$kcm(0x2, 0x3, 0x2) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) 16:05:14 executing program 1: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x35, 0x3, 0x0, 0xff, 0x0, 0xd3a4, 0x20000, 0x4, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7f, 0x1, @perf_bp={&(0x7f0000000040), 0x2}, 0x1000, 0x2, 0x3, 0x9, 0x3, 0x4, 0x9, 0x0, 0x1, 0x0, 0xb7c}, 0xffffffffffffffff, 0xc, r1, 0xb) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000), 0x1, 0x1cf, &(0x7f00000002c0)="$eJzKKC4sZmdgYPj7sSaZQYABDBgZeBguMDAysDAwMKgzQsQYmCDUeij/BZSeCZW2gfKbofRCKF1xS3vdmlN+Z0566motk2VmaPXUlkcWk0vtMXKTXMwjwcwQmnpkUXFlVXZiTk5qUfFChopbyUkVp08wsFy3v6bSLMHp8EeewyFJ00GH6YiPR9aMxhLOSVKaYmxsmQpnz3yQX8emcYTh0QrmjXWeeY11halT89LykqqyqrLmTZy4cWZjZ2Pjyol1UWl+qxhbUlw2NXUyMjlsURPYzGyoPslGe8K79lUPkxxYezz8mk8ZK71OZb5kvLBI6tSKqpkTvijNZjT8znCHp2yFhIaGk8QVCYsGE4YjdbYNriAnpjQwpCmEMSapsYm1bTkzJ4SZn81tgUJL8gmm0KMcS2dKWBwQqjr501LzrUOi24xtTx3YzvAcPs6zpqBP0Oi4BIPTQsH/MiBjEhoayjTWMi21XfClSOOvhNdqY6cMBnd7pmWwAGVpAJEroTxZsJ6E5BUeOpqaRinJCQ2bJBKS3AoMlRm27uFcLdDAgBRtKgwMDNsZYXELAddgjFEwCkbBKBgFo2AUjIJRMApGwSgYBSMCAAIAAP//QJCYyw==") 16:05:14 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r4, 0x3) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r5, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r6}, 0x80) r7 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x2) r8 = dup2(r7, r7) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r6, r0, 0x0, &(0x7f0000000b00)=[r1, r8, 0xffffffffffffffff, r1]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a40)=@bpf_ext={0x1c, 0xc, 0x0, 0x0, 0x1000, 0x72, &(0x7f0000000480)=""/114, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x0, 0xb, 0x5, 0x200}, 0x10, 0x24f66}, 0x80) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) 16:05:14 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r4, 0x3) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r5, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r6}, 0x80) r7 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x2) r8 = dup2(r7, r7) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r6, r0, 0x0, &(0x7f0000000b00)=[r1, r8, 0xffffffffffffffff, r1]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) socket$kcm(0x2, 0x3, 0x2) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) 16:05:14 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r4, 0x3) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r5, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r6}, 0x80) r7 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x2) r8 = dup2(r7, r7) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r6, r0, 0x0, &(0x7f0000000b00)=[r1, r8, 0xffffffffffffffff, r1]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) socket$kcm(0x2, 0x3, 0x2) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) 16:05:14 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r4, 0x3) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r5, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r6}, 0x80) r7 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x2) r8 = dup2(r7, r7) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r6, r0, 0x0, &(0x7f0000000b00)=[r1, r8, 0xffffffffffffffff, r1]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x1, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r9 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) 16:05:14 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r4, 0x3) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r5, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r6}, 0x80) r7 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x2) r8 = dup2(r7, r7) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r6, r0, 0x0, &(0x7f0000000b00)=[r1, r8, 0xffffffffffffffff, r1]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a40)=@bpf_ext={0x1c, 0xc, 0x0, 0x0, 0x1000, 0x72, &(0x7f0000000480)=""/114, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x0, 0xb, 0x5, 0x200}, 0x10, 0x24f66}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000090000000000000009000000950000000000002172020000ffffffff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f0000000600)=""/190, 0x0, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x8, 0x7, 0x8}, 0x10, 0x0, r9, 0x0, &(0x7f0000000900)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 16:05:14 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r4, 0x3) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r5, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r6}, 0x80) r7 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x2) r8 = dup2(r7, r7) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r6, r0, 0x0, &(0x7f0000000b00)=[r1, r8, 0xffffffffffffffff, r1]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) socket$kcm(0x2, 0x3, 0x2) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) 16:05:14 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r4, 0x3) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r5, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r6}, 0x80) r7 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x2) r8 = dup2(r7, r7) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r6, r0, 0x0, &(0x7f0000000b00)=[r1, r8, 0xffffffffffffffff, r1]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a40)=@bpf_ext={0x1c, 0xc, 0x0, 0x0, 0x1000, 0x72, &(0x7f0000000480)=""/114, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x0, 0xb, 0x5, 0x200}, 0x10, 0x24f66}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000090000000000000009000000950000000000002172020000ffffffff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f0000000600)=""/190, 0x0, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x8, 0x7, 0x8}, 0x10, 0x0, r9, 0x0, &(0x7f0000000900)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 16:05:14 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r4, 0x3) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r5, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r6}, 0x80) r7 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x2) r8 = dup2(r7, r7) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r6, r0, 0x0, &(0x7f0000000b00)=[r1, r8, 0xffffffffffffffff, r1]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) socket$kcm(0x2, 0x3, 0x2) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) 16:05:15 executing program 5: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r4, 0x3) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r5, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r6}, 0x80) r7 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x2) r8 = dup2(r7, r7) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r6, r0, 0x0, &(0x7f0000000b00)=[r1, r8, 0xffffffffffffffff, r1]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x1, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) 16:05:15 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r4, 0x3) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r5, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r6}, 0x80) r7 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x2) r8 = dup2(r7, r7) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r6, r0, 0x0, &(0x7f0000000b00)=[r1, r8, 0xffffffffffffffff, r1]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x1, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r9 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) 16:05:15 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r4, 0x3) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r5, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r6}, 0x80) r7 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x2) r8 = dup2(r7, r7) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r6, r0, 0x0, &(0x7f0000000b00)=[r1, r8, 0xffffffffffffffff, r1]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a40)=@bpf_ext={0x1c, 0xc, 0x0, 0x0, 0x1000, 0x72, &(0x7f0000000480)=""/114, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x0, 0xb, 0x5, 0x200}, 0x10, 0x24f66}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000090000000000000009000000950000000000002172020000ffffffff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f0000000600)=""/190, 0x0, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x8, 0x7, 0x8}, 0x10, 0x0, r9, 0x0, &(0x7f0000000900)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 16:05:15 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r4, 0x3) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r5, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r6}, 0x80) r7 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x2) r8 = dup2(r7, r7) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r6, r0, 0x0, &(0x7f0000000b00)=[r1, r8, 0xffffffffffffffff, r1]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x1, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) 16:05:15 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r4, 0x3) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r5, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r6}, 0x80) r7 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x2) r8 = dup2(r7, r7) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r6, r0, 0x0, &(0x7f0000000b00)=[r1, r8, 0xffffffffffffffff, r1]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a40)=@bpf_ext={0x1c, 0xc, 0x0, 0x0, 0x1000, 0x72, &(0x7f0000000480)=""/114, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x0, 0xb, 0x5, 0x200}, 0x10, 0x24f66}, 0x80) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) 16:05:15 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r4, 0x3) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r5, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r6}, 0x80) r7 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x2) r8 = dup2(r7, r7) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r6, r0, 0x0, &(0x7f0000000b00)=[r1, r8, 0xffffffffffffffff, r1]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x1, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r9 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) 16:05:15 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r4, 0x3) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r5, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r6}, 0x80) r7 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x2) r8 = dup2(r7, r7) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r6, r0, 0x0, &(0x7f0000000b00)=[r1, r8, 0xffffffffffffffff, r1]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x1, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a40)=@bpf_ext={0x1c, 0xc, 0x0, 0x0, 0x1000, 0x72, &(0x7f0000000480)=""/114, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x0, 0xb, 0x5, 0x200}, 0x10, 0x24f66}, 0x80) r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000090000000000000009000000950000000000002172020000ffffffff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f0000000600)=""/190, 0x0, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x8, 0x7, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000900)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r9, 0xffffffffffffffff]}, 0x80) 16:05:15 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r4, 0x3) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r5, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r6}, 0x80) r7 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x2) r8 = dup2(r7, r7) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r6, r0, 0x0, &(0x7f0000000b00)=[r1, r8, 0xffffffffffffffff, r1]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a40)=@bpf_ext={0x1c, 0xc, 0x0, 0x0, 0x1000, 0x72, &(0x7f0000000480)=""/114, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x0, 0xb, 0x5, 0x200}, 0x10, 0x24f66}, 0x80) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) 16:05:15 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r4, 0x3) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r5, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r6}, 0x80) r7 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x2) r8 = dup2(r7, r7) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r6, r0, 0x0, &(0x7f0000000b00)=[r1, r8, 0xffffffffffffffff, r1]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x1, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) 16:05:15 executing program 1: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000), 0x11, 0x1cf, &(0x7f00000002c0)="$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") 16:05:15 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r4, 0x3) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r5, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r6}, 0x80) r7 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x2) r8 = dup2(r7, r7) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r6, r0, 0x0, &(0x7f0000000b00)=[r1, r8, 0xffffffffffffffff, r1]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x1, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) 16:05:15 executing program 1: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000), 0x11, 0x1cf, &(0x7f00000002c0)="$eJzKKC4sZmdgYPj7sSaZQYABDBgZeBguMDAysDAwMKgzQsQYmCDUeij/BZSeCZW2gfKbofRCKF1xS3vdmlN+Z0566motk2VmaPXUlkcWk0vtMXKTXMwjwcwQmnpkUXFlVXZiTk5qUfFChopbyUkVp08wsFy3v6bSLMHp8EeewyFJ00GH6YiPR9aMxhLOSVKaYmxsmQpnz3yQX8emcYTh0QrmjXWeeY11halT89LykqqyqrLmTZy4cWZjZ2Pjyol1UWl+qxhbUlw2NXUyMjlsURPYzGyoPslGe8K79lUPkxxYezz8mk8ZK71OZb5kvLBI6tSKqpkTvijNZjT8znCHp2yFhIaGk8QVCYsGE4YjdbYNriAnpjQwpCmEMSapsYm1bTkzJ4SZn81tgUJL8gmm0KMcS2dKWBwQqjr501LzrUOi24xtTx3YzvAcPs6zpqBP0Oi4BIPTQsH/MiBjEhoayjTWMi21XfClSOOvhNdqY6cMBnd7pmWwAGVpAJEroTxZsJ6E5BUeOpqaRinJCQ2bJBKS3AoMlRm27uFcLdDAgBRtKgwMDNsZYXELAddgjFEwCkbBKBgFo2AUjIJRMApGwSgYBSMCAAIAAP//QJCYyw==") 16:05:16 executing program 5: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000), 0x10, 0x1cf, &(0x7f00000002c0)="$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") 16:05:16 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r4, 0x3) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r5, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r6}, 0x80) r7 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x2) r8 = dup2(r7, r7) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r6, r0, 0x0, &(0x7f0000000b00)=[r1, r8, 0xffffffffffffffff, r1]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a40)=@bpf_ext={0x1c, 0xc, 0x0, 0x0, 0x1000, 0x72, &(0x7f0000000480)=""/114, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x0, 0xb, 0x5, 0x200}, 0x10, 0x24f66}, 0x80) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) 16:05:16 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r4, 0x3) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r5, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r6}, 0x80) r7 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x2) r8 = dup2(r7, r7) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r6, r0, 0x0, &(0x7f0000000b00)=[r1, r8, 0xffffffffffffffff, r1]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x1, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) 16:05:16 executing program 1: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000), 0x11, 0x1cf, &(0x7f00000002c0)="$eJzKKC4sZmdgYPj7sSaZQYABDBgZeBguMDAysDAwMKgzQsQYmCDUeij/BZSeCZW2gfKbofRCKF1xS3vdmlN+Z0566motk2VmaPXUlkcWk0vtMXKTXMwjwcwQmnpkUXFlVXZiTk5qUfFChopbyUkVp08wsFy3v6bSLMHp8EeewyFJ00GH6YiPR9aMxhLOSVKaYmxsmQpnz3yQX8emcYTh0QrmjXWeeY11halT89LykqqyqrLmTZy4cWZjZ2Pjyol1UWl+qxhbUlw2NXUyMjlsURPYzGyoPslGe8K79lUPkxxYezz8mk8ZK71OZb5kvLBI6tSKqpkTvijNZjT8znCHp2yFhIaGk8QVCYsGE4YjdbYNriAnpjQwpCmEMSapsYm1bTkzJ4SZn81tgUJL8gmm0KMcS2dKWBwQqjr501LzrUOi24xtTx3YzvAcPs6zpqBP0Oi4BIPTQsH/MiBjEhoayjTWMi21XfClSOOvhNdqY6cMBnd7pmWwAGVpAJEroTxZsJ6E5BUeOpqaRinJCQ2bJBKS3AoMlRm27uFcLdDAgBRtKgwMDNsZYXELAddgjFEwCkbBKBgFo2AUjIJRMApGwSgYBSMCAAIAAP//QJCYyw==") 16:05:16 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r4, 0x3) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r5, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r6}, 0x80) r7 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x2) r8 = dup2(r7, r7) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r6, r0, 0x0, &(0x7f0000000b00)=[r1, r8, 0xffffffffffffffff, r1]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x1, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r9 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) 16:05:16 executing program 0: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000), 0xc1, 0x1cf, &(0x7f00000002c0)="$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") 16:05:16 executing program 4: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000), 0x13, 0x1cf, &(0x7f00000002c0)="$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") 16:05:16 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r4, 0x3) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r5, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r6}, 0x80) r7 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x2) r8 = dup2(r7, r7) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r6, r0, 0x0, &(0x7f0000000b00)=[r1, r8, 0xffffffffffffffff, r1]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x1, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a40)=@bpf_ext={0x1c, 0xc, 0x0, 0x0, 0x1000, 0x72, &(0x7f0000000480)=""/114, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x0, 0xb, 0x5, 0x200}, 0x10, 0x24f66}, 0x80) r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000090000000000000009000000950000000000002172020000ffffffff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f0000000600)=""/190, 0x0, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x8, 0x7, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000900)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r9, 0xffffffffffffffff]}, 0x80) 16:05:16 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r4, 0x3) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r5, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r6}, 0x80) r7 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x2) r8 = dup2(r7, r7) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r6, r0, 0x0, &(0x7f0000000b00)=[r1, r8, 0xffffffffffffffff, r1]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a40)=@bpf_ext={0x1c, 0xc, 0x0, 0x0, 0x1000, 0x72, &(0x7f0000000480)=""/114, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x0, 0xb, 0x5, 0x200}, 0x10, 0x24f66}, 0x80) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) 16:05:16 executing program 5: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000), 0x44, 0x1cf, &(0x7f00000002c0)="$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") 16:05:16 executing program 0: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000), 0xc1, 0x1cf, &(0x7f00000002c0)="$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") 16:05:16 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r4, 0x3) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r5, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r6}, 0x80) r7 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x2) r8 = dup2(r7, r7) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r6, r0, 0x0, &(0x7f0000000b00)=[r1, r8, 0xffffffffffffffff, r1]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x1, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a40)=@bpf_ext={0x1c, 0xc, 0x0, 0x0, 0x1000, 0x72, &(0x7f0000000480)=""/114, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x0, 0xb, 0x5, 0x200}, 0x10, 0x24f66}, 0x80) r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000090000000000000009000000950000000000002172020000ffffffff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f0000000600)=""/190, 0x0, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x8, 0x7, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000900)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r9, 0xffffffffffffffff]}, 0x80) 16:05:16 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000), 0x4, 0x1cf, &(0x7f00000002c0)="$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") 16:05:16 executing program 5: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000), 0x3, 0x1cf, &(0x7f00000002c0)="$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") 16:05:16 executing program 0: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000), 0xc1, 0x1cf, &(0x7f00000002c0)="$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") 16:05:16 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r4, 0x3) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r5, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r6}, 0x80) r7 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x2) r8 = dup2(r7, r7) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r6, r0, 0x0, &(0x7f0000000b00)=[r1, r8, 0xffffffffffffffff, r1]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x1, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a40)=@bpf_ext={0x1c, 0xc, 0x0, 0x0, 0x1000, 0x72, &(0x7f0000000480)=""/114, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x0, 0xb, 0x5, 0x200}, 0x10, 0x24f66}, 0x80) r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000090000000000000009000000950000000000002172020000ffffffff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f0000000600)=""/190, 0x0, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x8, 0x7, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000900)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r9, 0xffffffffffffffff]}, 0x80) 16:05:17 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r4, 0x3) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r5, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r6}, 0x80) r7 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x2) r8 = dup2(r7, r7) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r6, r0, 0x0, &(0x7f0000000b00)=[r1, r8, 0xffffffffffffffff, r1]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x1, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a40)=@bpf_ext={0x1c, 0xc, 0x0, 0x0, 0x1000, 0x72, &(0x7f0000000480)=""/114, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x0, 0xb, 0x5, 0x200}, 0x10, 0x24f66}, 0x80) r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000090000000000000009000000950000000000002172020000ffffffff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f0000000600)=""/190, 0x0, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x8, 0x7, 0x8}, 0x10, 0x0, r9, 0x0, &(0x7f0000000900)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff]}, 0x80) 16:05:17 executing program 0: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000), 0xe, 0x1cf, &(0x7f00000002c0)="$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") 16:05:17 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000), 0x4, 0x1cf, &(0x7f00000002c0)="$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") 16:05:17 executing program 5: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000), 0x0, 0x1cf, &(0x7f00000002c0)="$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") 16:05:17 executing program 1: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000)={[], [], 0x60}, 0x1, 0x1cf, &(0x7f00000002c0)="$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") 16:05:17 executing program 4: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000)={[], [], 0x16}, 0x1, 0x1cf, &(0x7f00000002c0)="$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") 16:05:17 executing program 0: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000), 0xe, 0x1cf, &(0x7f00000002c0)="$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") 16:05:17 executing program 1: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000)={[], [], 0x60}, 0x1, 0x1cf, &(0x7f00000002c0)="$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") 16:05:17 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000), 0x4, 0x1cf, &(0x7f00000002c0)="$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") 16:05:17 executing program 0: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000), 0xe, 0x1cf, &(0x7f00000002c0)="$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") 16:05:17 executing program 5: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000), 0x0, 0x1cf, &(0x7f00000002c0)="$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") 16:05:17 executing program 1: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000)={[], [], 0x60}, 0x1, 0x1cf, &(0x7f00000002c0)="$eJzKKC4sZmdgYPj7sSaZQYABDBgZeBguMDAysDAwMKgzQsQYmCDUeij/BZSeCZW2gfKbofRCKF1xS3vdmlN+Z0566motk2VmaPXUlkcWk0vtMXKTXMwjwcwQmnpkUXFlVXZiTk5qUfFChopbyUkVp08wsFy3v6bSLMHp8EeewyFJ00GH6YiPR9aMxhLOSVKaYmxsmQpnz3yQX8emcYTh0QrmjXWeeY11halT89LykqqyqrLmTZy4cWZjZ2Pjyol1UWl+qxhbUlw2NXUyMjlsURPYzGyoPslGe8K79lUPkxxYezz8mk8ZK71OZb5kvLBI6tSKqpkTvijNZjT8znCHp2yFhIaGk8QVCYsGE4YjdbYNriAnpjQwpCmEMSapsYm1bTkzJ4SZn81tgUJL8gmm0KMcS2dKWBwQqjr501LzrUOi24xtTx3YzvAcPs6zpqBP0Oi4BIPTQsH/MiBjEhoayjTWMi21XfClSOOvhNdqY6cMBnd7pmWwAGVpAJEroTxZsJ6E5BUeOpqaRinJCQ2bJBKS3AoMlRm27uFcLdDAgBRtKgwMDNsZYXELAddgjFEwCkbBKBgFo2AUjIJRMApGwSgYBSMCAAIAAP//QJCYyw==") 16:05:17 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x11) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r4, 0x3) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f6b04a7660c2e56eb01001800000006000000000000000000000a9d5460a43f440000d31e1d30"], &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r5, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x5, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1, 0x1}, 0x10, r6}, 0x80) r7 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x2) r8 = dup2(r7, r7) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', r3, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r6, r0, 0x0, &(0x7f0000000b00)=[r1, r8, 0xffffffffffffffff, r1]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x1, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a40)=@bpf_ext={0x1c, 0xc, 0x0, 0x0, 0x1000, 0x72, &(0x7f0000000480)=""/114, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x0, 0xb, 0x5, 0x200}, 0x10, 0x24f66}, 0x80) r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000090000000000000009000000950000000000002172020000ffffffff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f0000000600)=""/190, 0x0, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x8, 0x7, 0x8}, 0x10, 0x0, r9, 0x0, &(0x7f0000000900)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff]}, 0x80) 16:05:17 executing program 4: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000)={[], [], 0x15}, 0x1, 0x1cf, &(0x7f00000002c0)="$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") 16:05:17 executing program 1: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000)={[], [], 0x23}, 0x1, 0x1cf, &(0x7f00000002c0)="$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") 16:05:17 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000)={[], [], 0x12}, 0x1, 0x1cf, &(0x7f00000002c0)="$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") 16:05:17 executing program 0: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000)={[], [], 0x1c}, 0x1, 0x1cf, &(0x7f00000002c0)="$eJzKKC4sZmdgYPj7sSaZQYABDBgZeBguMDAysDAwMKgzQsQYmCDUeij/BZSeCZW2gfKbofRCKF1xS3vdmlN+Z0566motk2VmaPXUlkcWk0vtMXKTXMwjwcwQmnpkUXFlVXZiTk5qUfFChopbyUkVp08wsFy3v6bSLMHp8EeewyFJ00GH6YiPR9aMxhLOSVKaYmxsmQpnz3yQX8emcYTh0QrmjXWeeY11halT89LykqqyqrLmTZy4cWZjZ2Pjyol1UWl+qxhbUlw2NXUyMjlsURPYzGyoPslGe8K79lUPkxxYezz8mk8ZK71OZb5kvLBI6tSKqpkTvijNZjT8znCHp2yFhIaGk8QVCYsGE4YjdbYNriAnpjQwpCmEMSapsYm1bTkzJ4SZn81tgUJL8gmm0KMcS2dKWBwQqjr501LzrUOi24xtTx3YzvAcPs6zpqBP0Oi4BIPTQsH/MiBjEhoayjTWMi21XfClSOOvhNdqY6cMBnd7pmWwAGVpAJEroTxZsJ6E5BUeOpqaRinJCQ2bJBKS3AoMlRm27uFcLdDAgBRtKgwMDNsZYXELAddgjFEwCkbBKBgFo2AUjIJRMApGwSgYBSMCAAIAAP//QJCYyw==") 16:05:17 executing program 5: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000), 0x0, 0x1cf, &(0x7f00000002c0)="$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") 16:05:17 executing program 4: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000)={[], [], 0x11}, 0x1, 0x1cf, &(0x7f00000002c0)="$eJzKKC4sZmdgYPj7sSaZQYABDBgZeBguMDAysDAwMKgzQsQYmCDUeij/BZSeCZW2gfKbofRCKF1xS3vdmlN+Z0566motk2VmaPXUlkcWk0vtMXKTXMwjwcwQmnpkUXFlVXZiTk5qUfFChopbyUkVp08wsFy3v6bSLMHp8EeewyFJ00GH6YiPR9aMxhLOSVKaYmxsmQpnz3yQX8emcYTh0QrmjXWeeY11halT89LykqqyqrLmTZy4cWZjZ2Pjyol1UWl+qxhbUlw2NXUyMjlsURPYzGyoPslGe8K79lUPkxxYezz8mk8ZK71OZb5kvLBI6tSKqpkTvijNZjT8znCHp2yFhIaGk8QVCYsGE4YjdbYNriAnpjQwpCmEMSapsYm1bTkzJ4SZn81tgUJL8gmm0KMcS2dKWBwQqjr501LzrUOi24xtTx3YzvAcPs6zpqBP0Oi4BIPTQsH/MiBjEhoayjTWMi21XfClSOOvhNdqY6cMBnd7pmWwAGVpAJEroTxZsJ6E5BUeOpqaRinJCQ2bJBKS3AoMlRm27uFcLdDAgBRtKgwMDNsZYXELAddgjFEwCkbBKBgFo2AUjIJRMApGwSgYBSMCAAIAAP//QJCYyw==") 16:05:17 executing program 0: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000)={[], [], 0x1c}, 0x1, 0x1cf, &(0x7f00000002c0)="$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") 16:05:17 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000)={[], [], 0x12}, 0x1, 0x1cf, &(0x7f00000002c0)="$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") 16:05:17 executing program 1: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000)={[], [], 0x23}, 0x1, 0x1cf, &(0x7f00000002c0)="$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") 16:05:17 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000)={[], [], 0x12}, 0x1, 0x1cf, &(0x7f00000002c0)="$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") 16:05:17 executing program 1: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000)={[], [], 0x23}, 0x1, 0x1cf, &(0x7f00000002c0)="$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") 16:05:18 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) r2 = dup2(r1, r1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x15) (fail_nth: 1) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x1, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a40)=@bpf_ext={0x1c, 0xc, 0x0, 0x0, 0x1000, 0x72, &(0x7f0000000480)=""/114, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x0, 0x0, 0x5}, 0x10, 0x24f66}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000090000000000000009000000950000000000002172020000ffffffff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f0000000600)=""/190, 0x0, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x4, 0x0, 0x7, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000900)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 16:05:18 executing program 0: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000)={[], [], 0x1c}, 0x1, 0x1cf, &(0x7f00000002c0)="$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") 16:05:18 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000)={[], [], 0x1a}, 0x1, 0x1cf, &(0x7f00000002c0)="$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") 16:05:18 executing program 4: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x0, 0x100, 0x0, 0x2, 0x4, 0xfffffe00, 0x0, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r2, 0x3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0x0, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xe, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x0, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r2}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1}, 0x10, r3}, 0x80) r4 = syz_open_dev$ttys(0xc, 0x2, 0x1) r5 = dup2(r4, r4) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000080)=0x15) (fail_nth: 1) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r0, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x5, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r3, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[r5, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) 16:05:18 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x0, 0x1, 0x2, 0x0, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0x0, r1, 0x3) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0x0, 0x0, 0x1}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) r3 = dup2(r2, r2) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x15) (fail_nth: 1) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5}, 0x8, 0x10, &(0x7f0000000ac0)={0x0, 0x4, 0x3, 0xa49}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) openat$zero(0xffffffffffffff9c, 0x0, 0x80000, 0x0) 16:05:18 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x0, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x0, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r3, 0x3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0x0, 0xfffffffa, 0x0, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xa, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x0, 0x1, 0x1}, 0x10, r4}, 0x80) r5 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r5, 0x5423, 0x0) r6 = dup2(r5, r5) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000080)=0x15) (fail_nth: 1) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r0, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0x0, 0xca, &(0x7f00000006c0)=""/202, 0x0, 0x0, '\x00', r2, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[r0, r6, 0xffffffffffffffff, r0]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 1098.061884] FAULT_INJECTION: forcing a failure. [ 1098.061884] name failslab, interval 1, probability 0, space 0, times 0 [ 1098.087683] FAULT_INJECTION: forcing a failure. [ 1098.087683] name failslab, interval 1, probability 0, space 0, times 0 16:05:18 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(0x0, 0x0, 0xb, r2, 0x3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x0, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x0, 0xa, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x0, 0x0, 0x0, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xc}, @map_fd={0x18, 0x0, 0x1, 0x0, r2}], 0x0, 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, r3}, 0x80) r4 = syz_open_dev$ttys(0xc, 0x2, 0x1) r5 = dup2(r4, r4) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000080)=0x15) (fail_nth: 1) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYBLOB], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r3, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[r0, r5, 0xffffffffffffffff, r0]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) 16:05:18 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000)={[], [], 0x1a}, 0x1, 0x1cf, &(0x7f00000002c0)="$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") 16:05:18 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x0, 0x1, 0x2, 0x0, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0x0, r1, 0x3) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0x0, 0x0, 0x1}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) r3 = dup2(r2, r2) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5}, 0x8, 0x10, &(0x7f0000000ac0)={0x0, 0x4, 0x3, 0xa49}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) openat$zero(0xffffffffffffff9c, 0x0, 0x80000, 0x0) [ 1098.184614] CPU: 1 PID: 19203 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 1098.192523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1098.201884] Call Trace: [ 1098.204488] dump_stack+0x1fc/0x2ef [ 1098.208135] should_fail.cold+0xa/0xf [ 1098.211948] ? setup_fault_attr+0x200/0x200 [ 1098.216278] ? lock_acquire+0x1ec/0x3c0 [ 1098.220267] __should_failslab+0x115/0x180 [ 1098.224508] should_failslab+0x5/0x10 [ 1098.228310] kmem_cache_alloc_trace+0x284/0x380 [ 1098.232988] ? lock_acquire+0x170/0x3c0 [ 1098.236973] gsmld_open+0x9e/0x7e0 [ 1098.240515] ? gsmld_close+0x1f0/0x1f0 [ 1098.244408] tty_ldisc_open+0x81/0xc0 [ 1098.248207] tty_set_ldisc+0x2d2/0x650 [ 1098.252104] tty_ioctl+0xb4b/0x1630 [ 1098.255735] ? tty_fasync+0x300/0x300 [ 1098.259544] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1098.264301] ? rcu_nmi_exit+0xb3/0x180 [ 1098.268195] ? retint_kernel+0x2d/0x2d [ 1098.272088] ? do_vfs_ioctl+0xbd/0x12e0 [ 1098.276067] ? __sanitizer_cov_trace_pc+0x50/0x50 [ 1098.280909] ? tty_fasync+0x300/0x300 [ 1098.284724] do_vfs_ioctl+0xcdb/0x12e0 [ 1098.288623] ? lock_downgrade+0x720/0x720 [ 1098.292769] ? check_preemption_disabled+0x41/0x280 [ 1098.297785] ? ioctl_preallocate+0x200/0x200 [ 1098.302199] ? __fget+0x356/0x510 [ 1098.305654] ? do_dup2+0x450/0x450 [ 1098.309187] ? vfs_write+0x393/0x540 [ 1098.312894] ? fput+0x2b/0x190 [ 1098.316081] ksys_ioctl+0x9b/0xc0 [ 1098.319535] __x64_sys_ioctl+0x6f/0xb0 [ 1098.323458] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1098.328056] do_syscall_64+0xf9/0x620 [ 1098.331862] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1098.337043] RIP: 0033:0x7f09d873e0d9 [ 1098.340750] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1098.359743] RSP: 002b:00007f09d6cb0168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1098.367451] RAX: ffffffffffffffda RBX: 00007f09d885df80 RCX: 00007f09d873e0d9 [ 1098.374715] RDX: 0000000020000080 RSI: 0000000000005423 RDI: 0000000000000004 [ 1098.381982] RBP: 00007f09d6cb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1098.389257] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1098.396521] R13: 00007ffddee966ff R14: 00007f09d6cb0300 R15: 0000000000022000 [ 1098.403806] CPU: 0 PID: 19208 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 1098.411871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1098.421227] Call Trace: [ 1098.423824] dump_stack+0x1fc/0x2ef [ 1098.427473] should_fail.cold+0xa/0xf [ 1098.431289] ? setup_fault_attr+0x200/0x200 [ 1098.435619] ? lock_acquire+0x170/0x3c0 [ 1098.439621] __should_failslab+0x115/0x180 [ 1098.443869] should_failslab+0x5/0x10 [ 1098.447681] kmem_cache_alloc_trace+0x284/0x380 [ 1098.452364] ? lock_acquire+0x170/0x3c0 [ 1098.456352] gsmld_open+0x9e/0x7e0 [ 1098.459899] ? gsmld_close+0x1f0/0x1f0 [ 1098.463789] tty_ldisc_open+0x81/0xc0 [ 1098.467603] tty_set_ldisc+0x2d2/0x650 [ 1098.471592] tty_ioctl+0xb4b/0x1630 [ 1098.475240] ? tty_fasync+0x300/0x300 [ 1098.479048] ? get_pid_task+0xf4/0x190 [ 1098.482943] ? mark_held_locks+0xf0/0xf0 [ 1098.487012] ? proc_fail_nth_write+0x95/0x1d0 [ 1098.491517] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 1098.496473] ? __fdget_pos+0x26f/0x310 [ 1098.500379] ? ksys_write+0x241/0x2a0 [ 1098.504192] ? tty_fasync+0x300/0x300 [ 1098.508003] do_vfs_ioctl+0xcdb/0x12e0 [ 1098.511897] ? lock_downgrade+0x720/0x720 [ 1098.516058] ? check_preemption_disabled+0x41/0x280 [ 1098.521082] ? ioctl_preallocate+0x200/0x200 [ 1098.525507] ? __fget+0x356/0x510 [ 1098.528971] ? do_dup2+0x450/0x450 [ 1098.532517] ? vfs_write+0x393/0x540 [ 1098.536241] ? fput+0x2b/0x190 [ 1098.539454] ksys_ioctl+0x9b/0xc0 [ 1098.542922] __x64_sys_ioctl+0x6f/0xb0 [ 1098.546821] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1098.551416] do_syscall_64+0xf9/0x620 [ 1098.555242] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1098.560439] RIP: 0033:0x7f1d8f2e10d9 [ 1098.564156] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 16:05:18 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xf, &(0x7f0000000000)={[], [], 0x1a}, 0x1, 0x1cf, &(0x7f00000002c0)="$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") 16:05:18 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x0, 0x1, 0x2, 0x0, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0x0, r1, 0x3) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0x0, 0x0, 0x1}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) r3 = dup2(r2, r2) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="9b430a1e733b133350bb778be454e517e9"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5}, 0x8, 0x10, &(0x7f0000000ac0)={0x0, 0x4, 0x3, 0xa49}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) openat$zero(0xffffffffffffff9c, 0x0, 0x414380, 0x0) 16:05:18 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) r2 = dup2(r1, r1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x15) (fail_nth: 1) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 16:05:18 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) r2 = dup2(r1, r1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x15) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x1, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a40)=@bpf_ext={0x1c, 0xc, 0x0, 0x0, 0x1000, 0x72, &(0x7f0000000480)=""/114, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x0, 0x0, 0x5}, 0x10, 0x24f66}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000090000000000000009000000950000000000002172020000ffffffff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f0000000600)=""/190, 0x0, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x4, 0x0, 0x7, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000900)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 16:05:18 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x0, 0x1, 0x2, 0x0, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0x0, r1, 0x3) (async) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0x0, 0x0, 0x1}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) r3 = dup2(r2, r2) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="9b430a1e733b133350bb778be454e517e9"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5}, 0x8, 0x10, &(0x7f0000000ac0)={0x0, 0x4, 0x3, 0xa49}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) (async) openat$zero(0xffffffffffffff9c, 0x0, 0x414380, 0x0) 16:05:18 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(0x0, 0x0, 0xb, r2, 0x3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x0, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x0, 0xa, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x0, 0x0, 0x0, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xc}, @map_fd={0x18, 0x0, 0x1, 0x0, r2}], 0x0, 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, r3}, 0x80) r4 = syz_open_dev$ttys(0xc, 0x2, 0x1) r5 = dup2(r4, r4) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYBLOB], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r3, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[r0, r5, 0xffffffffffffffff, r0]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) [ 1098.583502] RSP: 002b:00007f1d8d853168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1098.591220] RAX: ffffffffffffffda RBX: 00007f1d8f400f80 RCX: 00007f1d8f2e10d9 [ 1098.598499] RDX: 0000000020000080 RSI: 0000000000005423 RDI: 0000000000000004 [ 1098.605775] RBP: 00007f1d8d8531d0 R08: 0000000000000000 R09: 0000000000000000 [ 1098.613048] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1098.620324] R13: 00007fffd989cd2f R14: 00007f1d8d853300 R15: 0000000000022000 16:05:18 executing program 4: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x0, 0x100, 0x0, 0x2, 0x4, 0xfffffe00, 0x0, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r2, 0x3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0x0, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xe, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x0, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r2}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1}, 0x10, r3}, 0x80) r4 = syz_open_dev$ttys(0xc, 0x2, 0x1) r5 = dup2(r4, r4) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000080)=0x15) (fail_nth: 2) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r0, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x5, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r3, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[r5, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) 16:05:18 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x0, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x0, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r3, 0x3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0x0, 0xfffffffa, 0x0, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xa, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x0, 0x1, 0x1}, 0x10, r4}, 0x80) r5 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r5, 0x5423, 0x0) r6 = dup2(r5, r5) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000080)=0x15) (fail_nth: 2) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r0, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0x0, 0xca, &(0x7f00000006c0)=""/202, 0x0, 0x0, '\x00', r2, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[r0, r6, 0xffffffffffffffff, r0]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 16:05:19 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x0, 0x1, 0x2, 0x0, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0x0, r1, 0x3) (async) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) (async) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0x0, 0x0, 0x1}) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) r3 = dup2(r2, r2) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="9b430a1e733b133350bb778be454e517e9"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5}, 0x8, 0x10, &(0x7f0000000ac0)={0x0, 0x4, 0x3, 0xa49}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) openat$zero(0xffffffffffffff9c, 0x0, 0x414380, 0x0) 16:05:19 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) r2 = dup2(r1, r1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x15) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 1098.798454] FAULT_INJECTION: forcing a failure. [ 1098.798454] name failslab, interval 1, probability 0, space 0, times 0 [ 1098.838783] FAULT_INJECTION: forcing a failure. [ 1098.838783] name failslab, interval 1, probability 0, space 0, times 0 [ 1098.919525] CPU: 0 PID: 19240 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 1098.927641] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1098.937003] Call Trace: [ 1098.939608] dump_stack+0x1fc/0x2ef [ 1098.943335] should_fail.cold+0xa/0xf [ 1098.947149] ? setup_fault_attr+0x200/0x200 [ 1098.951484] ? lock_acquire+0x170/0x3c0 [ 1098.955474] __should_failslab+0x115/0x180 [ 1098.959721] should_failslab+0x5/0x10 [ 1098.963527] kmem_cache_alloc_trace+0x284/0x380 [ 1098.968203] gsmld_open+0xe5/0x7e0 [ 1098.971746] ? gsmld_close+0x1f0/0x1f0 [ 1098.976073] tty_ldisc_open+0x81/0xc0 [ 1098.979878] tty_set_ldisc+0x2d2/0x650 [ 1098.983777] tty_ioctl+0xb4b/0x1630 [ 1098.987501] ? tty_fasync+0x300/0x300 [ 1098.991407] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1098.995996] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1099.000796] ? rcu_nmi_exit+0xb3/0x180 [ 1099.004693] ? retint_kernel+0x2d/0x2d [ 1099.008586] ? tty_fasync+0x300/0x300 [ 1099.012410] ? tty_fasync+0x300/0x300 [ 1099.016230] do_vfs_ioctl+0xcdb/0x12e0 [ 1099.020133] ? lock_downgrade+0x720/0x720 [ 1099.024291] ? check_preemption_disabled+0x41/0x280 [ 1099.029379] ? ioctl_preallocate+0x200/0x200 [ 1099.033804] ? __fget+0x356/0x510 [ 1099.037270] ? do_dup2+0x450/0x450 [ 1099.040820] ? retint_kernel+0x2d/0x2d [ 1099.044809] ksys_ioctl+0x9b/0xc0 [ 1099.048273] __x64_sys_ioctl+0x6f/0xb0 [ 1099.052172] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1099.056770] do_syscall_64+0xf9/0x620 [ 1099.060586] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1099.065789] RIP: 0033:0x7f1d8f2e10d9 [ 1099.069509] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1099.088423] RSP: 002b:00007f1d8d853168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1099.096135] RAX: ffffffffffffffda RBX: 00007f1d8f400f80 RCX: 00007f1d8f2e10d9 [ 1099.103416] RDX: 0000000020000080 RSI: 0000000000005423 RDI: 0000000000000004 [ 1099.110690] RBP: 00007f1d8d8531d0 R08: 0000000000000000 R09: 0000000000000000 16:05:19 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) r2 = dup2(r1, r1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x15) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x0, 0xfd, 0x0, 0x1, 0x0, 0x3, 0x280, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 16:05:19 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) (async) bpf$ITER_CREATE(0x21, 0x0, 0x0) (async, rerun: 32) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) (rerun: 32) r2 = dup2(r1, r1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x15) (async, rerun: 32) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) (async, rerun: 32) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x0, 0xfd, 0x0, 0x1, 0x0, 0x3, 0x280, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 1099.117965] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1099.125240] R13: 00007fffd989cd2f R14: 00007f1d8d853300 R15: 0000000000022000 [ 1099.157293] CPU: 0 PID: 19238 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 16:05:19 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x0, 0x1, 0x2, 0x0, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0x0, r1, 0x3) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x5, 0x20, 0x4, 0x4d, 0x0, 0x0, 0x20080, 0xc, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000000), 0xb}, 0x200, 0xd9bf, 0x6ab77b38, 0x2, 0xffffffff, 0x4cd, 0x8, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x1, r0, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) r3 = dup2(r2, r2) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5}, 0x8, 0x10, &(0x7f0000000ac0)={0x0, 0x4, 0x3, 0xa49}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) openat$zero(0xffffffffffffff9c, 0x0, 0x80000, 0x0) [ 1099.165195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1099.174556] Call Trace: [ 1099.177157] dump_stack+0x1fc/0x2ef [ 1099.180799] should_fail.cold+0xa/0xf [ 1099.184620] ? setup_fault_attr+0x200/0x200 [ 1099.189106] ? lock_acquire+0x170/0x3c0 [ 1099.193098] __should_failslab+0x115/0x180 [ 1099.197352] should_failslab+0x5/0x10 [ 1099.201159] kmem_cache_alloc_trace+0x284/0x380 [ 1099.205835] gsmld_open+0xe5/0x7e0 [ 1099.209401] ? gsmld_open+0x2/0x7e0 [ 1099.213033] ? gsmld_close+0x1f0/0x1f0 [ 1099.216932] tty_ldisc_open+0x81/0xc0 [ 1099.220738] tty_set_ldisc+0x2d2/0x650 [ 1099.224640] tty_ioctl+0xb4b/0x1630 [ 1099.228275] ? tty_fasync+0x300/0x300 [ 1099.232085] ? get_pid_task+0xf4/0x190 [ 1099.235978] ? mark_held_locks+0xf0/0xf0 [ 1099.240041] ? proc_fail_nth_write+0x95/0x1d0 [ 1099.244543] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 1099.249487] ? ksys_write+0x241/0x2a0 [ 1099.253295] ? tty_fasync+0x300/0x300 [ 1099.257214] do_vfs_ioctl+0xcdb/0x12e0 [ 1099.261108] ? lock_downgrade+0x720/0x720 [ 1099.265264] ? check_preemption_disabled+0x41/0x280 16:05:19 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x0, 0x1, 0x2, 0x0, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0x0, r1, 0x3) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x5, 0x20, 0x4, 0x4d, 0x0, 0x0, 0x20080, 0xc, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000000), 0xb}, 0x200, 0xd9bf, 0x6ab77b38, 0x2, 0xffffffff, 0x4cd, 0x8, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x1, r0, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) r3 = dup2(r2, r2) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5}, 0x8, 0x10, &(0x7f0000000ac0)={0x0, 0x4, 0x3, 0xa49}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) openat$zero(0xffffffffffffff9c, 0x0, 0x80000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x0, 0x1, 0x2, 0x0, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0x0, r1, 0x3) (async) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) (async) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0x0, 0x0, 0x1}) (async) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x5, 0x20, 0x4, 0x4d, 0x0, 0x0, 0x20080, 0xc, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000000), 0xb}, 0x200, 0xd9bf, 0x6ab77b38, 0x2, 0xffffffff, 0x4cd, 0x8, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x1, r0, 0x1) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) syz_open_dev$ttys(0xc, 0x2, 0x1) (async) dup2(r2, r2) (async) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x15) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5}, 0x8, 0x10, &(0x7f0000000ac0)={0x0, 0x4, 0x3, 0xa49}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) (async) openat$zero(0xffffffffffffff9c, 0x0, 0x80000, 0x0) (async) [ 1099.270282] ? ioctl_preallocate+0x200/0x200 [ 1099.274706] ? __fget+0x356/0x510 [ 1099.278175] ? do_dup2+0x450/0x450 [ 1099.281734] ? retint_kernel+0x2d/0x2d [ 1099.285647] ksys_ioctl+0x9b/0xc0 [ 1099.289111] __x64_sys_ioctl+0x6f/0xb0 [ 1099.293002] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1099.297589] do_syscall_64+0xf9/0x620 [ 1099.301405] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1099.306596] RIP: 0033:0x7f09d873e0d9 [ 1099.310311] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1099.329216] RSP: 002b:00007f09d6cb0168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1099.336932] RAX: ffffffffffffffda RBX: 00007f09d885df80 RCX: 00007f09d873e0d9 [ 1099.344324] RDX: 0000000020000080 RSI: 0000000000005423 RDI: 0000000000000004 [ 1099.351607] RBP: 00007f09d6cb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1099.358881] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 16:05:19 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x0, 0x1, 0x2, 0x0, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0x0, r1, 0x3) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x5, 0x20, 0x4, 0x4d, 0x0, 0x0, 0x20080, 0xc, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000000), 0xb}, 0x200, 0xd9bf, 0x6ab77b38, 0x2, 0xffffffff, 0x4cd, 0x8, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x1, r0, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) r3 = dup2(r2, r2) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5}, 0x8, 0x10, &(0x7f0000000ac0)={0x0, 0x4, 0x3, 0xa49}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) openat$zero(0xffffffffffffff9c, 0x0, 0x80000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x0, 0x1, 0x2, 0x0, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0x0, r1, 0x3) (async) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) (async) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0x0, 0x0, 0x1}) (async) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x5, 0x20, 0x4, 0x4d, 0x0, 0x0, 0x20080, 0xc, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000000), 0xb}, 0x200, 0xd9bf, 0x6ab77b38, 0x2, 0xffffffff, 0x4cd, 0x8, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x1, r0, 0x1) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) syz_open_dev$ttys(0xc, 0x2, 0x1) (async) dup2(r2, r2) (async) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x15) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5}, 0x8, 0x10, &(0x7f0000000ac0)={0x0, 0x4, 0x3, 0xa49}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) (async) openat$zero(0xffffffffffffff9c, 0x0, 0x80000, 0x0) (async) [ 1099.366152] R13: 00007ffddee966ff R14: 00007f09d6cb0300 R15: 0000000000022000 16:05:20 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) r2 = dup2(r1, r1) ioctl$TIOCSETD(r2, 0x2, &(0x7f0000000080)=0x15) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x1, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a40)=@bpf_ext={0x1c, 0xc, 0x0, 0x0, 0x1000, 0x72, &(0x7f0000000480)=""/114, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x0, 0x0, 0x5}, 0x10, 0x24f66}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000090000000000000009000000950000000000002172020000ffffffff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f0000000600)=""/190, 0x0, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x4, 0x0, 0x7, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000900)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 16:05:20 executing program 4: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x0, 0x100, 0x0, 0x2, 0x4, 0xfffffe00, 0x0, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r2, 0x3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0x0, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xe, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x0, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r2}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1}, 0x10, r3}, 0x80) r4 = syz_open_dev$ttys(0xc, 0x2, 0x1) r5 = dup2(r4, r4) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000080)=0x15) (fail_nth: 3) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r0, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x5, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r3, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[r5, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) 16:05:20 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x0, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x0, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r3, 0x3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0x0, 0xfffffffa, 0x0, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xa, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x0, 0x1, 0x1}, 0x10, r4}, 0x80) r5 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r5, 0x5423, 0x0) r6 = dup2(r5, r5) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000080)=0x15) (fail_nth: 3) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r0, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0x0, 0xca, &(0x7f00000006c0)=""/202, 0x0, 0x0, '\x00', r2, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[r0, r6, 0xffffffffffffffff, r0]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 16:05:20 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) r2 = dup2(r1, r1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x15) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) (async) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x0, 0xfd, 0x0, 0x1, 0x0, 0x3, 0x280, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) 16:05:20 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x2) r3 = dup2(r2, r2) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x15) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x1f, 0x8, 0x2, 0x0, 0x0, 0x1, 0x40, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7fffffff, 0x0, @perf_config_ext={0xfffffffffffffffe, 0x5}, 0x2, 0xffffffff00000001, 0x6, 0x9, 0x0, 0xffff56df, 0x9, 0x0, 0x2}, 0xffffffffffffffff, 0xd, r3, 0x1) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x0, 0x1, 0x2, 0x0, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0x0, r1, 0x3) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0x0, 0x0, 0x1}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = syz_open_dev$ttys(0xc, 0x2, 0x1) r5 = dup2(r4, r4) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5}, 0x8, 0x10, &(0x7f0000000ac0)={0x0, 0x4, 0x3, 0xa49}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[0xffffffffffffffff, r5, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) openat$zero(0xffffffffffffff9c, 0x0, 0x80000, 0x0) 16:05:20 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(0x0, 0x0, 0xb, r2, 0x3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x0, 0x6}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x0, 0xa, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x0, 0x0, 0x0, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xc}, @map_fd={0x18, 0x0, 0x1, 0x0, r2}], 0x0, 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, r3}, 0x80) r5 = syz_open_dev$ttys(0xc, 0x2, 0x1) r6 = dup2(r5, r5) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYBLOB], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r3, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[r0, r6, 0xffffffffffffffff, r0]}, 0x80) r7 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x2) r8 = dup2(r7, r7) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x15) r9 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r9, 0x5423, &(0x7f0000000040)=0x2) r10 = dup2(r9, r9) ioctl$TIOCSETD(r10, 0x5423, &(0x7f0000000080)=0x15) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r11, 0x3) r12 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000800)={"9c836ee5056f91b43d696d9f2133cff5", 0x0, 0x0, {0x7, 0x5}, {0xe148, 0xd1}, 0x6, [0x5, 0x81, 0x6, 0x1ff, 0x7, 0x3d4, 0x0, 0x1, 0x3e, 0x1f7, 0x5, 0xfffffffffffffe00, 0xc86, 0x3, 0x40, 0x8000000000000001]}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r12, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x2}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @alu={0x4, 0x0, 0xa, 0x7, 0x6, 0x0, 0x4}, @map_fd={0x18, 0x0, 0x1, 0x0, r11}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1001, 0x1}, 0x10, r13}, 0x80) r14 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') r15 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/asound/seq/clients\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x3, &(0x7f0000000000)=@raw=[@map_fd={0x18, 0x8, 0x1, 0x0, r8}, @jmp={0x5, 0x0, 0xf, 0x9, 0x5, 0x30, 0x10}], &(0x7f0000000040)='GPL\x00', 0x9, 0x0, &(0x7f0000000100), 0x41000, 0xb, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000140)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000200)={0x2, 0x0, 0x3ff}, 0x10, r13, r4, 0x0, &(0x7f00000002c0)=[r2, r2, r14, r2, r6, r15]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) [ 1099.814849] FAULT_INJECTION: forcing a failure. [ 1099.814849] name failslab, interval 1, probability 0, space 0, times 0 [ 1099.816362] FAULT_INJECTION: forcing a failure. [ 1099.816362] name failslab, interval 1, probability 0, space 0, times 0 [ 1099.835444] CPU: 1 PID: 19443 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 1099.845881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1099.855238] Call Trace: [ 1099.857841] dump_stack+0x1fc/0x2ef [ 1099.861486] should_fail.cold+0xa/0xf [ 1099.865310] ? setup_fault_attr+0x200/0x200 [ 1099.869729] ? lock_acquire+0x170/0x3c0 [ 1099.873718] __should_failslab+0x115/0x180 [ 1099.877967] should_failslab+0x5/0x10 [ 1099.881777] kmem_cache_alloc_trace+0x284/0x380 [ 1099.886463] gsmld_open+0x151/0x7e0 [ 1099.890105] ? gsmld_close+0x1f0/0x1f0 [ 1099.893996] tty_ldisc_open+0x81/0xc0 [ 1099.897802] tty_set_ldisc+0x2d2/0x650 [ 1099.901698] tty_ioctl+0xb4b/0x1630 [ 1099.905342] ? tty_fasync+0x300/0x300 [ 1099.909154] ? get_pid_task+0xf4/0x190 [ 1099.913060] ? mark_held_locks+0xf0/0xf0 [ 1099.917127] ? proc_fail_nth_write+0x95/0x1d0 [ 1099.921626] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 1099.926561] ? __fdget_pos+0x26f/0x310 [ 1099.930462] ? ksys_write+0x241/0x2a0 [ 1099.934272] ? tty_fasync+0x300/0x300 [ 1099.938079] do_vfs_ioctl+0xcdb/0x12e0 [ 1099.941982] ? lock_downgrade+0x720/0x720 [ 1099.946146] ? check_preemption_disabled+0x41/0x280 [ 1099.951170] ? ioctl_preallocate+0x200/0x200 [ 1099.955590] ? __fget+0x356/0x510 [ 1099.959052] ? do_dup2+0x450/0x450 [ 1099.962593] ? vfs_write+0x393/0x540 [ 1099.966321] ? fput+0x2b/0x190 [ 1099.969528] ksys_ioctl+0x9b/0xc0 [ 1099.972986] __x64_sys_ioctl+0x6f/0xb0 [ 1099.976878] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1099.981463] do_syscall_64+0xf9/0x620 [ 1099.985277] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1099.990468] RIP: 0033:0x7f1d8f2e10d9 [ 1099.994190] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 16:05:20 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) (async) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(0x0, 0x0, 0xb, r2, 0x3) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x0, 0x6}) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x0, 0xa, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x0, 0x0, 0x0, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xc}, @map_fd={0x18, 0x0, 0x1, 0x0, r2}], 0x0, 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, r3}, 0x80) r5 = syz_open_dev$ttys(0xc, 0x2, 0x1) r6 = dup2(r5, r5) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYBLOB], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r3, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[r0, r6, 0xffffffffffffffff, r0]}, 0x80) r7 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x2) r8 = dup2(r7, r7) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x15) (async) r9 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r9, 0x5423, &(0x7f0000000040)=0x2) r10 = dup2(r9, r9) ioctl$TIOCSETD(r10, 0x5423, &(0x7f0000000080)=0x15) (async) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r11, 0x3) (async) r12 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000800)={"9c836ee5056f91b43d696d9f2133cff5", 0x0, 0x0, {0x7, 0x5}, {0xe148, 0xd1}, 0x6, [0x5, 0x81, 0x6, 0x1ff, 0x7, 0x3d4, 0x0, 0x1, 0x3e, 0x1f7, 0x5, 0xfffffffffffffe00, 0xc86, 0x3, 0x40, 0x8000000000000001]}) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r12, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x2}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @alu={0x4, 0x0, 0xa, 0x7, 0x6, 0x0, 0x4}, @map_fd={0x18, 0x0, 0x1, 0x0, r11}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1001, 0x1}, 0x10, r13}, 0x80) (async) r14 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') (async) r15 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/asound/seq/clients\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x3, &(0x7f0000000000)=@raw=[@map_fd={0x18, 0x8, 0x1, 0x0, r8}, @jmp={0x5, 0x0, 0xf, 0x9, 0x5, 0x30, 0x10}], &(0x7f0000000040)='GPL\x00', 0x9, 0x0, &(0x7f0000000100), 0x41000, 0xb, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000140)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000200)={0x2, 0x0, 0x3ff}, 0x10, r13, r4, 0x0, &(0x7f00000002c0)=[r2, r2, r14, r2, r6, r15]}, 0x80) (async) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) [ 1100.013090] RSP: 002b:00007f1d8d853168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1100.020806] RAX: ffffffffffffffda RBX: 00007f1d8f400f80 RCX: 00007f1d8f2e10d9 [ 1100.028076] RDX: 0000000020000080 RSI: 0000000000005423 RDI: 0000000000000004 [ 1100.035348] RBP: 00007f1d8d8531d0 R08: 0000000000000000 R09: 0000000000000000 [ 1100.042618] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1100.049887] R13: 00007fffd989cd2f R14: 00007f1d8d853300 R15: 0000000000022000 16:05:20 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x2) r3 = dup2(r2, r2) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x15) (async) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x1f, 0x8, 0x2, 0x0, 0x0, 0x1, 0x40, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7fffffff, 0x0, @perf_config_ext={0xfffffffffffffffe, 0x5}, 0x2, 0xffffffff00000001, 0x6, 0x9, 0x0, 0xffff56df, 0x9, 0x0, 0x2}, 0xffffffffffffffff, 0xd, r3, 0x1) (async) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x0, 0x1, 0x2, 0x0, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0x0, r1, 0x3) (async) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) (async) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0x0, 0x0, 0x1}) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = syz_open_dev$ttys(0xc, 0x2, 0x1) r5 = dup2(r4, r4) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000080)=0x15) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5}, 0x8, 0x10, &(0x7f0000000ac0)={0x0, 0x4, 0x3, 0xa49}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[0xffffffffffffffff, r5, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) openat$zero(0xffffffffffffff9c, 0x0, 0x80000, 0x0) [ 1100.067923] CPU: 0 PID: 19441 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 1100.075829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1100.085179] Call Trace: [ 1100.087779] dump_stack+0x1fc/0x2ef [ 1100.091415] should_fail.cold+0xa/0xf [ 1100.095223] ? setup_fault_attr+0x200/0x200 [ 1100.099563] ? lock_acquire+0x170/0x3c0 [ 1100.103556] __should_failslab+0x115/0x180 [ 1100.107799] should_failslab+0x5/0x10 [ 1100.111608] kmem_cache_alloc_trace+0x284/0x380 [ 1100.116281] gsmld_open+0x151/0x7e0 [ 1100.119913] ? gsmld_close+0x1f0/0x1f0 [ 1100.123804] tty_ldisc_open+0x81/0xc0 [ 1100.127608] tty_set_ldisc+0x2d2/0x650 [ 1100.131505] tty_ioctl+0xb4b/0x1630 [ 1100.135144] ? tty_fasync+0x300/0x300 [ 1100.138950] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1100.143544] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1100.148333] ? rcu_nmi_exit+0xb3/0x180 [ 1100.152231] ? retint_kernel+0x2d/0x2d [ 1100.156134] ? tty_fasync+0x300/0x300 [ 1100.159942] do_vfs_ioctl+0xcdb/0x12e0 [ 1100.163845] ? lock_downgrade+0x720/0x720 [ 1100.168001] ? check_preemption_disabled+0x41/0x280 [ 1100.173023] ? ioctl_preallocate+0x200/0x200 [ 1100.177435] ? __fget+0x356/0x510 [ 1100.180895] ? do_dup2+0x450/0x450 [ 1100.184435] ? vfs_write+0x393/0x540 [ 1100.188151] ? fput+0x2b/0x190 [ 1100.191353] ksys_ioctl+0x9b/0xc0 [ 1100.194809] __x64_sys_ioctl+0x6f/0xb0 [ 1100.198697] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1100.203281] do_syscall_64+0xf9/0x620 [ 1100.207087] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1100.212276] RIP: 0033:0x7f09d873e0d9 [ 1100.215991] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1100.234890] RSP: 002b:00007f09d6cb0168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1100.242599] RAX: ffffffffffffffda RBX: 00007f09d885df80 RCX: 00007f09d873e0d9 [ 1100.249872] RDX: 0000000020000080 RSI: 0000000000005423 RDI: 0000000000000004 [ 1100.257145] RBP: 00007f09d6cb01d0 R08: 0000000000000000 R09: 0000000000000000 16:05:20 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(0x0, 0x0, 0xb, r2, 0x3) (async, rerun: 32) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) (async, rerun: 32) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x0, 0x6}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x0, 0xa, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x0, 0x0, 0x0, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xc}, @map_fd={0x18, 0x0, 0x1, 0x0, r2}], 0x0, 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, r3}, 0x80) r5 = syz_open_dev$ttys(0xc, 0x2, 0x1) r6 = dup2(r5, r5) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYBLOB], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r3, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[r0, r6, 0xffffffffffffffff, r0]}, 0x80) (async) r7 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0x2) (async) r8 = dup2(r7, r7) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x15) (async) r9 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r9, 0x5423, &(0x7f0000000040)=0x2) (async) r10 = dup2(r9, r9) ioctl$TIOCSETD(r10, 0x5423, &(0x7f0000000080)=0x15) (async, rerun: 32) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) (rerun: 32) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x7, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r11, 0x3) r12 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, &(0x7f00000001c0)=""/153, 0x26, 0x99, 0x1}, 0x20) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000800)={"9c836ee5056f91b43d696d9f2133cff5", 0x0, 0x0, {0x7, 0x5}, {0xe148, 0xd1}, 0x6, [0x5, 0x81, 0x6, 0x1ff, 0x7, 0x3d4, 0x0, 0x1, 0x3e, 0x1f7, 0x5, 0xfffffffffffffe00, 0xc86, 0x3, 0x40, 0x8000000000000001]}) (async, rerun: 32) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r12, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x1d, 0xf, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x2}, @generic={0x6, 0x0, 0x4, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @alu={0x4, 0x0, 0xa, 0x7, 0x6, 0x0, 0x4}, @map_fd={0x18, 0x0, 0x1, 0x0, r11}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1001, 0x1}, 0x10, r13}, 0x80) (async) r14 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') (async) r15 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/asound/seq/clients\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x3, &(0x7f0000000000)=@raw=[@map_fd={0x18, 0x8, 0x1, 0x0, r8}, @jmp={0x5, 0x0, 0xf, 0x9, 0x5, 0x30, 0x10}], &(0x7f0000000040)='GPL\x00', 0x9, 0x0, &(0x7f0000000100), 0x41000, 0xb, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000140)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000200)={0x2, 0x0, 0x3ff}, 0x10, r13, r4, 0x0, &(0x7f00000002c0)=[r2, r2, r14, r2, r6, r15]}, 0x80) (async) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) (async, rerun: 64) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) (rerun: 64) 16:05:20 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000100)=0x3f) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x15) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xffffffff, 0x0, @perf_bp={0x0}, 0x8502, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r2 = openat$incfs(r0, &(0x7f00000000c0)='.pending_reads\x00', 0x105002, 0x80) openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x10800, 0x0) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0xc1, 0x1, 0xd7, 0x64, 0x0, 0x4026, 0x28006, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1000, 0x1, @perf_config_ext={0x6}, 0x9010, 0x3, 0x40, 0x6, 0x5, 0x401, 0x5, 0x0, 0x6, 0x0, 0xc9}, 0xffffffffffffffff, 0x5, r2, 0xa) bpf$PROG_LOAD(0x5, 0x0, 0x0) 16:05:20 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x0, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x0, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r3, 0x3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0x0, 0xfffffffa, 0x0, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xa, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x0, 0x1, 0x1}, 0x10, r4}, 0x80) r5 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r5, 0x5423, 0x0) r6 = dup2(r5, r5) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000080)=0x15) (fail_nth: 4) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r0, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0x0, 0xca, &(0x7f00000006c0)=""/202, 0x0, 0x0, '\x00', r2, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[r0, r6, 0xffffffffffffffff, r0]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 1100.264415] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1100.271684] R13: 00007ffddee966ff R14: 00007f09d6cb0300 R15: 0000000000022000 16:05:20 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) r2 = dup2(r1, r1) ioctl$TIOCSETD(r2, 0x5409, &(0x7f0000000080)=0x15) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x1, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a40)=@bpf_ext={0x1c, 0xc, 0x0, 0x0, 0x1000, 0x72, &(0x7f0000000480)=""/114, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x0, 0x0, 0x5}, 0x10, 0x24f66}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000090000000000000009000000950000000000002172020000ffffffff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f0000000600)=""/190, 0x0, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x4, 0x0, 0x7, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000900)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 16:05:20 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x2) (async) r3 = dup2(r2, r2) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x15) (async) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x1f, 0x8, 0x2, 0x0, 0x0, 0x1, 0x40, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7fffffff, 0x0, @perf_config_ext={0xfffffffffffffffe, 0x5}, 0x2, 0xffffffff00000001, 0x6, 0x9, 0x0, 0xffff56df, 0x9, 0x0, 0x2}, 0xffffffffffffffff, 0xd, r3, 0x1) (async) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x0, 0x1, 0x2, 0x0, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0x0, r1, 0x3) (async) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) (async) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0x0, 0x0, 0x1}) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r4 = syz_open_dev$ttys(0xc, 0x2, 0x1) r5 = dup2(r4, r4) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000080)=0x15) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5}, 0x8, 0x10, &(0x7f0000000ac0)={0x0, 0x4, 0x3, 0xa49}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[0xffffffffffffffff, r5, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) (async) openat$zero(0xffffffffffffff9c, 0x0, 0x80000, 0x0) [ 1100.414462] FAULT_INJECTION: forcing a failure. [ 1100.414462] name failslab, interval 1, probability 0, space 0, times 0 [ 1100.432597] CPU: 0 PID: 19484 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 1100.440494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1100.449846] Call Trace: [ 1100.452439] dump_stack+0x1fc/0x2ef [ 1100.456086] should_fail.cold+0xa/0xf [ 1100.459893] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1100.465002] ? setup_fault_attr+0x200/0x200 [ 1100.469336] ? gsm_activate_mux+0x1ea/0x290 [ 1100.473666] __should_failslab+0x115/0x180 [ 1100.477913] should_failslab+0x5/0x10 [ 1100.481730] kmem_cache_alloc_trace+0x46/0x380 [ 1100.486328] gsm_dlci_alloc+0x46/0x410 [ 1100.490226] gsm_activate_mux+0x1f4/0x290 [ 1100.494379] gsmld_open+0x4fa/0x7e0 [ 1100.498007] ? gsmld_close+0x1f0/0x1f0 [ 1100.501901] tty_ldisc_open+0x81/0xc0 [ 1100.505706] tty_set_ldisc+0x2d2/0x650 [ 1100.509607] tty_ioctl+0xb4b/0x1630 [ 1100.513244] ? tty_fasync+0x300/0x300 [ 1100.517051] ? mark_held_locks+0xa6/0xf0 [ 1100.521122] ? mark_held_locks+0xf0/0xf0 [ 1100.525190] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1100.529776] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1100.534623] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1100.539392] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1100.543978] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1100.548744] ? tty_fasync+0x300/0x300 [ 1100.552553] do_vfs_ioctl+0xcdb/0x12e0 [ 1100.556446] ? lock_downgrade+0x720/0x720 [ 1100.560599] ? ioctl_preallocate+0x200/0x200 [ 1100.565014] ? __fget+0x356/0x510 [ 1100.568472] ? do_dup2+0x450/0x450 [ 1100.572014] ? vfs_write+0x393/0x540 [ 1100.575732] ? fput+0x2b/0x190 [ 1100.578932] ksys_ioctl+0x9b/0xc0 [ 1100.582401] __x64_sys_ioctl+0x6f/0xb0 [ 1100.586298] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1100.590883] do_syscall_64+0xf9/0x620 [ 1100.594693] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1100.599891] RIP: 0033:0x7f1d8f2e10d9 [ 1100.603605] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1100.622517] RSP: 002b:00007f1d8d853168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1100.631013] RAX: ffffffffffffffda RBX: 00007f1d8f400f80 RCX: 00007f1d8f2e10d9 [ 1100.638287] RDX: 0000000020000080 RSI: 0000000000005423 RDI: 0000000000000004 [ 1100.645559] RBP: 00007f1d8d8531d0 R08: 0000000000000000 R09: 0000000000000000 [ 1100.652833] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1100.660110] R13: 00007fffd989cd2f R14: 00007f1d8d853300 R15: 0000000000022000 16:05:20 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(0x0, 0x0, 0xb, r2, 0x3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x0, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x0, 0xa, &(0x7f0000000000)=ANY=[@ANYBLOB="1861000007000000000000000100000018580000040000000000000000000000000009003f006ac84dbe886f91bd00008510000002000000185000000c000000000000000000000018100000", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x0, 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, r3}, 0x80) r4 = syz_open_dev$ttys(0xc, 0x2, 0x1) r5 = dup2(r4, r4) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYBLOB], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r3, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[r0, r5, 0xffffffffffffffff, r0]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) 16:05:20 executing program 4: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x0, 0x100, 0x0, 0x2, 0x4, 0xfffffe00, 0x0, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r2, 0x3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0x0, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xe, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x0, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r2}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1}, 0x10, r3}, 0x80) r4 = syz_open_dev$ttys(0xc, 0x2, 0x1) r5 = dup2(r4, r4) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r0, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x5, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r3, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[r5, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) 16:05:20 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000100)=0x3f) (async) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x15) (async) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) (async) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xffffffff, 0x0, @perf_bp={0x0}, 0x8502, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) r2 = openat$incfs(r0, &(0x7f00000000c0)='.pending_reads\x00', 0x105002, 0x80) openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x10800, 0x0) (async, rerun: 32) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0xc1, 0x1, 0xd7, 0x64, 0x0, 0x4026, 0x28006, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1000, 0x1, @perf_config_ext={0x6}, 0x9010, 0x3, 0x40, 0x6, 0x5, 0x401, 0x5, 0x0, 0x6, 0x0, 0xc9}, 0xffffffffffffffff, 0x5, r2, 0xa) (async, rerun: 32) bpf$PROG_LOAD(0x5, 0x0, 0x0) 16:05:20 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) r2 = dup2(r1, r1) ioctl$TIOCSETD(r2, 0x540b, &(0x7f0000000080)=0x15) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x1, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a40)=@bpf_ext={0x1c, 0xc, 0x0, 0x0, 0x1000, 0x72, &(0x7f0000000480)=""/114, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x0, 0x0, 0x5}, 0x10, 0x24f66}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000090000000000000009000000950000000000002172020000ffffffff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f0000000600)=""/190, 0x0, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x4, 0x0, 0x7, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000900)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 16:05:20 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000480)='{\x00') perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x0, 0x1, 0x2, 0x0, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0x0, r1, 0x3) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0x0, 0x0, 0x1}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000380)=0x9eaa) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x13, 0x5, &(0x7f00000004c0)=@raw=[@map_fd={0x18, 0x8, 0x1, 0x0, r1}, @jmp={0x5, 0x1, 0x2, 0x0, 0xa, 0xfffffffffffffff4, 0x8}, @alu={0x4, 0x1, 0x0, 0x1, 0x7, 0xfffffffffffffffc, 0x8}, @generic={0x3, 0x7, 0x9, 0x200, 0x1f}], &(0x7f0000000540)='syzkaller\x00', 0xfffffff7, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0xf, r1, 0x8, &(0x7f00000000c0)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0xc, 0x80, 0x24f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000140)=[r1, r1, r1]}, 0x80) r4 = syz_open_dev$ttys(0xc, 0x2, 0x1) r5 = dup2(r4, r4) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000080)=0x15) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000300), 0x88401, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x25}, 0x8, 0x10, &(0x7f0000000ac0)={0x0, 0x4, 0x3, 0xa49}, 0x10, 0x0, r6, 0x0, &(0x7f0000000b00)=[0xffffffffffffffff, r5, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) socket$inet6_udp(0xa, 0x2, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) r9 = dup2(r1, r3) syz_genetlink_get_family_id$devlink(&(0x7f0000000500), r9) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r10, @ANYBLOB="9f8c23cf0080000f140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r10, @ANYBLOB="06002100", @ANYRES32=r10, @ANYBLOB="00000000ac1414aa00"/24], 0x38}}, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000580), 0x800, 0x0) r11 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r11, &(0x7f0000000a00)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c, &(0x7f0000000540)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r11, 0x89f1, &(0x7f00000001c0)={'ip6_vti0\x00', &(0x7f0000000140)={'syztnl0\x00', r10, 0x4, 0x1, 0x5, 0x7, 0x6a, @remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x8000, 0x21, 0xfffffe00, 0x7f}}) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x2, 0x8a, 0x8001, 0x70, 0x1340, r5, 0x20000000, '\x00', r10, r6, 0x2, 0x1, 0x2}, 0x48) openat$zero(0xffffffffffffff9c, 0x0, 0x80000, 0x0) 16:05:21 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x0, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x0, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r3, 0x3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0x0, 0xfffffffa, 0x0, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xa, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x0, 0x1, 0x1}, 0x10, r4}, 0x80) r5 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r5, 0x5423, 0x0) r6 = dup2(r5, r5) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000080)=0x15) (fail_nth: 5) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r0, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0x0, 0xca, &(0x7f00000006c0)=""/202, 0x0, 0x0, '\x00', r2, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[r0, r6, 0xffffffffffffffff, r0]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 1100.788177] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 16:05:21 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) (async) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(0x0, 0x0, 0xb, r2, 0x3) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x0, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x0, 0xa, &(0x7f0000000000)=ANY=[@ANYBLOB="1861000007000000000000000100000018580000040000000000000000000000000009003f006ac84dbe886f91bd00008510000002000000185000000c000000000000000000000018100000", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x0, 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, r3}, 0x80) (async) r4 = syz_open_dev$ttys(0xc, 0x2, 0x1) r5 = dup2(r4, r4) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000080)=0x15) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYBLOB], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r3, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[r0, r5, 0xffffffffffffffff, r0]}, 0x80) (async, rerun: 32) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) (rerun: 32) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) 16:05:21 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000100)=0x3f) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) (async) bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x15) (async) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) (async) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xffffffff, 0x0, @perf_bp={0x0}, 0x8502, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) r2 = openat$incfs(r0, &(0x7f00000000c0)='.pending_reads\x00', 0x105002, 0x80) openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x10800, 0x0) (async) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0xc1, 0x1, 0xd7, 0x64, 0x0, 0x4026, 0x28006, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1000, 0x1, @perf_config_ext={0x6}, 0x9010, 0x3, 0x40, 0x6, 0x5, 0x401, 0x5, 0x0, 0x6, 0x0, 0xc9}, 0xffffffffffffffff, 0x5, r2, 0xa) bpf$PROG_LOAD(0x5, 0x0, 0x0) 16:05:21 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) r2 = dup2(r1, r1) ioctl$TIOCSETD(r2, 0x540c, &(0x7f0000000080)=0x15) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x1, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a40)=@bpf_ext={0x1c, 0xc, 0x0, 0x0, 0x1000, 0x72, &(0x7f0000000480)=""/114, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x0, 0x0, 0x5}, 0x10, 0x24f66}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000090000000000000009000000950000000000002172020000ffffffff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f0000000600)=""/190, 0x0, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x4, 0x0, 0x7, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000900)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) [ 1100.883194] FAULT_INJECTION: forcing a failure. [ 1100.883194] name failslab, interval 1, probability 0, space 0, times 0 [ 1100.943849] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1100.973927] PF_BRIDGE: br_mdb_parse() with invalid attr [ 1100.982105] CPU: 1 PID: 19506 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 1100.990007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1100.999365] Call Trace: [ 1101.001960] dump_stack+0x1fc/0x2ef [ 1101.005598] should_fail.cold+0xa/0xf [ 1101.009408] ? setup_fault_attr+0x200/0x200 [ 1101.015038] ? lock_acquire+0x170/0x3c0 [ 1101.019032] __should_failslab+0x115/0x180 [ 1101.023280] should_failslab+0x5/0x10 [ 1101.027082] __kmalloc+0x2ab/0x3c0 [ 1101.030628] ? __kfifo_alloc+0x174/0x290 [ 1101.034703] __kfifo_alloc+0x174/0x290 [ 1101.038628] gsm_dlci_alloc+0xd4/0x410 [ 1101.042528] gsm_activate_mux+0x1f4/0x290 [ 1101.046685] gsmld_open+0x4fa/0x7e0 [ 1101.050314] ? gsmld_close+0x1f0/0x1f0 [ 1101.054217] tty_ldisc_open+0x81/0xc0 [ 1101.058027] tty_set_ldisc+0x2d2/0x650 [ 1101.061921] tty_ioctl+0xb4b/0x1630 [ 1101.065554] ? tty_fasync+0x300/0x300 [ 1101.069367] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1101.073951] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1101.078722] ? rcu_nmi_exit+0xb3/0x180 [ 1101.082615] ? retint_kernel+0x2d/0x2d [ 1101.086527] ? do_vfs_ioctl+0xbd/0x12e0 [ 1101.090677] ? tty_fasync+0x300/0x300 [ 1101.094489] do_vfs_ioctl+0xcdb/0x12e0 [ 1101.098383] ? lock_downgrade+0x720/0x720 [ 1101.102535] ? check_preemption_disabled+0x41/0x280 [ 1101.107555] ? ioctl_preallocate+0x200/0x200 [ 1101.111969] ? __fget+0x356/0x510 [ 1101.115429] ? do_dup2+0x450/0x450 [ 1101.118973] ? vfs_write+0x393/0x540 [ 1101.122700] ? fput+0x2b/0x190 [ 1101.125901] ksys_ioctl+0x9b/0xc0 [ 1101.129363] __x64_sys_ioctl+0x6f/0xb0 [ 1101.133253] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1101.137836] do_syscall_64+0xf9/0x620 [ 1101.141647] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1101.146845] RIP: 0033:0x7f1d8f2e10d9 [ 1101.150560] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1101.169461] RSP: 002b:00007f1d8d853168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1101.177176] RAX: ffffffffffffffda RBX: 00007f1d8f400f80 RCX: 00007f1d8f2e10d9 [ 1101.184449] RDX: 0000000020000080 RSI: 0000000000005423 RDI: 0000000000000004 16:05:21 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) (async) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(0x0, 0x0, 0xb, r2, 0x3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x0, 0x6}) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x0, 0xa, &(0x7f0000000000)=ANY=[@ANYBLOB="1861000007000000000000000100000018580000040000000000000000000000000009003f006ac84dbe886f91bd00008510000002000000185000000c000000000000000000000018100000", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x0, 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, r3}, 0x80) (async, rerun: 32) r4 = syz_open_dev$ttys(0xc, 0x2, 0x1) r5 = dup2(r4, r4) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000080)=0x15) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYBLOB], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r3, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[r0, r5, 0xffffffffffffffff, r0]}, 0x80) (async, rerun: 32) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) (rerun: 32) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) 16:05:21 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000480)='{\x00') (async) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x0, 0x1, 0x2, 0x0, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0x0, r1, 0x3) (async) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) (async) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0x0, 0x0, 0x1}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000380)=0x9eaa) (async) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x13, 0x5, &(0x7f00000004c0)=@raw=[@map_fd={0x18, 0x8, 0x1, 0x0, r1}, @jmp={0x5, 0x1, 0x2, 0x0, 0xa, 0xfffffffffffffff4, 0x8}, @alu={0x4, 0x1, 0x0, 0x1, 0x7, 0xfffffffffffffffc, 0x8}, @generic={0x3, 0x7, 0x9, 0x200, 0x1f}], &(0x7f0000000540)='syzkaller\x00', 0xfffffff7, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0xf, r1, 0x8, &(0x7f00000000c0)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0xc, 0x80, 0x24f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000140)=[r1, r1, r1]}, 0x80) r4 = syz_open_dev$ttys(0xc, 0x2, 0x1) r5 = dup2(r4, r4) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000080)=0x15) (async, rerun: 32) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000300), 0x88401, 0x0) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x25}, 0x8, 0x10, &(0x7f0000000ac0)={0x0, 0x4, 0x3, 0xa49}, 0x10, 0x0, r6, 0x0, &(0x7f0000000b00)=[0xffffffffffffffff, r5, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) socket$inet6_udp(0xa, 0x2, 0x0) (async) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) r9 = dup2(r1, r3) syz_genetlink_get_family_id$devlink(&(0x7f0000000500), r9) (async, rerun: 32) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) (rerun: 32) sendmsg$nl_route(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r10, @ANYBLOB="9f8c23cf0080000f140012000c000100627269646765"], 0x34}}, 0x0) (async) sendmsg$nl_route(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r10, @ANYBLOB="06002100", @ANYRES32=r10, @ANYBLOB="00000000ac1414aa00"/24], 0x38}}, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000580), 0x800, 0x0) r11 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r11, &(0x7f0000000a00)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c, &(0x7f0000000540)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r11, 0x89f1, &(0x7f00000001c0)={'ip6_vti0\x00', &(0x7f0000000140)={'syztnl0\x00', r10, 0x4, 0x1, 0x5, 0x7, 0x6a, @remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x8000, 0x21, 0xfffffe00, 0x7f}}) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x2, 0x8a, 0x8001, 0x70, 0x1340, r5, 0x20000000, '\x00', r10, r6, 0x2, 0x1, 0x2}, 0x48) (async) openat$zero(0xffffffffffffff9c, 0x0, 0x80000, 0x0) 16:05:21 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) r2 = dup2(r1, r1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x15) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 1101.191721] RBP: 00007f1d8d8531d0 R08: 0000000000000000 R09: 0000000000000000 [ 1101.198989] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1101.206258] R13: 00007fffd989cd2f R14: 00007f1d8d853300 R15: 0000000000022000 [ 1101.380315] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1101.442855] PF_BRIDGE: br_mdb_parse() with unknown ifindex [ 1101.474066] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 16:05:21 executing program 4: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x0, 0x100, 0x0, 0x2, 0x4, 0xfffffe00, 0x0, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r2, 0x3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0x0, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xe, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x0, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r2}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1}, 0x10, r3}, 0x80) r4 = syz_open_dev$ttys(0xc, 0x2, 0x1) r5 = dup2(r4, r4) ioctl$TIOCSETD(r5, 0x2, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r0, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x5, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r3, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[r5, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) 16:05:21 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) r2 = dup2(r1, r1) ioctl$TIOCSETD(r2, 0x540d, &(0x7f0000000080)=0x15) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x1, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a40)=@bpf_ext={0x1c, 0xc, 0x0, 0x0, 0x1000, 0x72, &(0x7f0000000480)=""/114, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x0, 0x0, 0x5}, 0x10, 0x24f66}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000090000000000000009000000950000000000002172020000ffffffff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f0000000600)=""/190, 0x0, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x4, 0x0, 0x7, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000900)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 16:05:21 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) r2 = dup2(r1, r1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x15) (async) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) (async) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) 16:05:21 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x80, 0x40, 0x0, 0x0, 0x8008, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff}, 0x42040, 0x100, 0x1, 0x2, 0x4, 0xfffffe00, 0x0, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r3, 0x3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0x0, 0xfffffffa, 0x0, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xa, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x6, 0x0, 0x4, 0x9}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5d}, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x0, 0x1, 0x1}, 0x10, r4}, 0x80) r5 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r5, 0x5423, 0x0) r6 = dup2(r5, r5) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000080)=0x15) (fail_nth: 6) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r0, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01000000"], &(0x7f00000003c0)='GPL\x00', 0x0, 0xca, &(0x7f00000006c0)=""/202, 0x0, 0x0, '\x00', r2, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[r0, r6, 0xffffffffffffffff, r0]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3}, 0x10}, 0x80) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 16:05:21 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000480)='{\x00') (async) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x42040, 0x0, 0x1, 0x2, 0x0, 0xfffffe00, 0x5, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0x0, r1, 0x3) (async) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) (async) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0x0, 0x0, 0x1}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000380)=0x9eaa) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x13, 0x5, &(0x7f00000004c0)=@raw=[@map_fd={0x18, 0x8, 0x1, 0x0, r1}, @jmp={0x5, 0x1, 0x2, 0x0, 0xa, 0xfffffffffffffff4, 0x8}, @alu={0x4, 0x1, 0x0, 0x1, 0x7, 0xfffffffffffffffc, 0x8}, @generic={0x3, 0x7, 0x9, 0x200, 0x1f}], &(0x7f0000000540)='syzkaller\x00', 0xfffffff7, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0xf, r1, 0x8, &(0x7f00000000c0)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0xc, 0x80, 0x24f}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000140)=[r1, r1, r1]}, 0x80) (async) r4 = syz_open_dev$ttys(0xc, 0x2, 0x1) r5 = dup2(r4, r4) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000080)=0x15) (async) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000300), 0x88401, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x25}, 0x8, 0x10, &(0x7f0000000ac0)={0x0, 0x4, 0x3, 0xa49}, 0x10, 0x0, r6, 0x0, &(0x7f0000000b00)=[0xffffffffffffffff, r5, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) socket$inet6_udp(0xa, 0x2, 0x0) (async) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) (async) r9 = dup2(r1, r3) syz_genetlink_get_family_id$devlink(&(0x7f0000000500), r9) (async) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r10, @ANYBLOB="9f8c23cf0080000f140012000c000100627269646765"], 0x34}}, 0x0) (async) sendmsg$nl_route(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000054000100000000000000000007000000", @ANYRES32=r10, @ANYBLOB="06002100", @ANYRES32=r10, @ANYBLOB="00000000ac1414aa00"/24], 0x38}}, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000580), 0x800, 0x0) r11 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r11, &(0x7f0000000a00)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c, &(0x7f0000000540)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r11, 0x89f1, &(0x7f00000001c0)={'ip6_vti0\x00', &(0x7f0000000140)={'syztnl0\x00', r10, 0x4, 0x1, 0x5, 0x7, 0x6a, @remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x8000, 0x21, 0xfffffe00, 0x7f}}) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x2, 0x8a, 0x8001, 0x70, 0x1340, r5, 0x20000000, '\x00', r10, r6, 0x2, 0x1, 0x2}, 0x48) openat$zero(0xffffffffffffff9c, 0x0, 0x80000, 0x0) 16:05:21 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(0x0, 0x0, 0xb, r2, 0x3) r3 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x2) r4 = dup2(r3, r3) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0x15) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5533, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpid() perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0xc7, 0x0, 0x0, 0x0, 0x0, 0xd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3f, 0x0, @perf_bp={&(0x7f0000000040), 0x3}, 0x0, 0x3, 0x0, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8001, 0x0, 0x3}, r6, 0x0, r5, 0x8) sendmmsg$unix(r4, &(0x7f0000000200)=[{{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000100), 0x0, &(0x7f0000000140)=[@cred={{0x1c, 0x1, 0x2, {r6, 0xee00}}}], 0x20, 0x11}}], 0x1, 0x40000) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x0, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x0, 0xa, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x0, 0x0, 0x0, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xc}, @map_fd={0x18, 0x0, 0x1, 0x0, r2}], 0x0, 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, r7}, 0x80) r8 = syz_open_dev$ttys(0xc, 0x2, 0x1) r9 = dup2(r8, r8) ioctl$TIOCSETD(r9, 0x5423, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYBLOB], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r7, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[r0, r9, 0xffffffffffffffff, r0]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) 16:05:22 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) r2 = dup2(r1, r1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x15) (async) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) (async) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 1101.738287] FAULT_INJECTION: forcing a failure. [ 1101.738287] name failslab, interval 1, probability 0, space 0, times 0 16:05:22 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) (async) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(0x0, 0x0, 0xb, r2, 0x3) r3 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x2) r4 = dup2(r3, r3) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0x15) (async) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5533, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpid() perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0xc7, 0x0, 0x0, 0x0, 0x0, 0xd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3f, 0x0, @perf_bp={&(0x7f0000000040), 0x3}, 0x0, 0x3, 0x0, 0x0, 0x6, 0x0, 0x9, 0x0, 0x8001, 0x0, 0x3}, r6, 0x0, r5, 0x8) sendmmsg$unix(r4, &(0x7f0000000200)=[{{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000100), 0x0, &(0x7f0000000140)=[@cred={{0x1c, 0x1, 0x2, {r6, 0xee00}}}], 0x20, 0x11}}], 0x1, 0x40000) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0xfffffffa, 0xbe, 0x0, 0x6}) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x0, 0xa, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @generic={0x0, 0x0, 0x0, 0x9, 0x3f}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xc}, @map_fd={0x18, 0x0, 0x1, 0x0, r2}], 0x0, 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, r7}, 0x80) r8 = syz_open_dev$ttys(0xc, 0x2, 0x1) r9 = dup2(r8, r8) ioctl$TIOCSETD(r9, 0x5423, &(0x7f0000000080)=0x15) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYBLOB], &(0x7f00000003c0)='GPL\x00', 0xfffffffb, 0xca, &(0x7f00000006c0)=""/202, 0x41100, 0x5, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r7, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[r0, r9, 0xffffffffffffffff, r0]}, 0x80) (async) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) 16:05:22 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) r2 = dup2(r1, r1) ioctl$TIOCSETD(r2, 0x5412, &(0x7f0000000080)=0x15) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x1, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a40)=@bpf_ext={0x1c, 0xc, 0x0, 0x0, 0x1000, 0x72, &(0x7f0000000480)=""/114, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x0, 0x0, 0x5}, 0x10, 0x24f66}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000090000000000000009000000950000000000002172020000ffffffff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f0000000600)=""/190, 0x0, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x4, 0x0, 0x7, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000900)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 16:05:22 executing program 4: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x0, 0x100, 0x0, 0x2, 0x4, 0xfffffe00, 0x0, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r2, 0x3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0x0, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xe, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x0, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r2}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1}, 0x10, r3}, 0x80) r4 = syz_open_dev$ttys(0xc, 0x2, 0x1) r5 = dup2(r4, r4) ioctl$TIOCSETD(r5, 0x5409, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r0, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x5, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r3, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[r5, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) [ 1101.803172] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1101.853311] CPU: 0 PID: 19678 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 1101.861220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1101.870571] Call Trace: [ 1101.873153] dump_stack+0x1fc/0x2ef [ 1101.876770] should_fail.cold+0xa/0xf [ 1101.880558] ? setup_fault_attr+0x200/0x200 [ 1101.884869] ? lock_acquire+0x170/0x3c0 [ 1101.888834] __should_failslab+0x115/0x180 [ 1101.893058] should_failslab+0x5/0x10 [ 1101.896851] kmem_cache_alloc_trace+0x284/0x380 [ 1101.901512] tty_register_device_attr+0x21c/0x7a0 [ 1101.906346] ? redirected_tty_write+0xb0/0xb0 [ 1101.910826] ? __lockdep_init_map+0x100/0x5a0 [ 1101.915310] ? __raw_spin_lock_init+0x28/0x100 [ 1101.919876] ? tty_port_init+0x14d/0x1b0 [ 1101.924012] ? gsm_dlci_alloc+0x353/0x410 [ 1101.928152] gsmld_open+0x55f/0x7e0 [ 1101.931766] ? gsmld_close+0x1f0/0x1f0 [ 1101.935637] tty_ldisc_open+0x81/0xc0 [ 1101.939425] tty_set_ldisc+0x2d2/0x650 [ 1101.943302] tty_ioctl+0xb4b/0x1630 [ 1101.946917] ? tty_fasync+0x300/0x300 [ 1101.950706] ? get_pid_task+0xf4/0x190 [ 1101.954590] ? mark_held_locks+0xf0/0xf0 [ 1101.958636] ? proc_fail_nth_write+0x95/0x1d0 [ 1101.963115] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 1101.968031] ? __fdget_pos+0x26f/0x310 [ 1101.971911] ? ksys_write+0x241/0x2a0 [ 1101.975699] ? tty_fasync+0x300/0x300 [ 1101.979487] do_vfs_ioctl+0xcdb/0x12e0 [ 1101.983361] ? lock_downgrade+0x720/0x720 [ 1101.987500] ? check_preemption_disabled+0x41/0x280 [ 1101.992501] ? ioctl_preallocate+0x200/0x200 [ 1101.996901] ? __fget+0x356/0x510 [ 1102.000345] ? do_dup2+0x450/0x450 [ 1102.003869] ? vfs_write+0x393/0x540 [ 1102.007569] ? fput+0x2b/0x190 [ 1102.010752] ksys_ioctl+0x9b/0xc0 [ 1102.014196] __x64_sys_ioctl+0x6f/0xb0 [ 1102.018072] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1102.022640] do_syscall_64+0xf9/0x620 [ 1102.026435] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1102.031613] RIP: 0033:0x7f1d8f2e10d9 [ 1102.035311] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1102.054202] RSP: 002b:00007f1d8d853168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1102.061908] RAX: ffffffffffffffda RBX: 00007f1d8f400f80 RCX: 00007f1d8f2e10d9 [ 1102.069167] RDX: 0000000020000080 RSI: 0000000000005423 RDI: 0000000000000004 [ 1102.076427] RBP: 00007f1d8d8531d0 R08: 0000000000000000 R09: 0000000000000000 [ 1102.083684] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1102.090942] R13: 00007fffd989cd2f R14: 00007f1d8d853300 R15: 0000000000022000 16:05:22 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) r2 = dup2(r1, r1) ioctl$TIOCSETD(r2, 0x5413, &(0x7f0000000080)=0x15) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x1, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a40)=@bpf_ext={0x1c, 0xc, 0x0, 0x0, 0x1000, 0x72, &(0x7f0000000480)=""/114, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x0, 0x0, 0x5}, 0x10, 0x24f66}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000090000000000000009000000950000000000002172020000ffffffff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f0000000600)=""/190, 0x0, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x4, 0x0, 0x7, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000900)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 16:05:22 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) r3 = dup2(r2, r2) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) r5 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) splice(r4, &(0x7f0000000040)=0x40, r5, &(0x7f0000000100)=0x8e3, 0x2, 0xf) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x15) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 16:05:22 executing program 4: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x0, 0x100, 0x0, 0x2, 0x4, 0xfffffe00, 0x0, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r2, 0x3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0x0, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xe, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x0, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r2}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1}, 0x10, r3}, 0x80) r4 = syz_open_dev$ttys(0xc, 0x2, 0x1) r5 = dup2(r4, r4) ioctl$TIOCSETD(r5, 0x540b, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r0, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x5, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r3, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[r5, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) [ 1102.120165] PF_BRIDGE: br_mdb_parse() with unknown ifindex [ 1102.170817] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 16:05:22 executing program 4: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x0, 0x100, 0x0, 0x2, 0x4, 0xfffffe00, 0x0, 0x0, 0x40, 0x0, 0x4e}, 0x0, 0xb, r2, 0x3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000c40)={0xe0d0, 0x0, 0xbe, 0x1, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1d, 0xe, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @jmp={0x5, 0x0, 0x0, 0x2, 0x0, 0x18}, @map_fd={0x18, 0x0, 0x1, 0x0, r2}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x6, 0x90, &(0x7f00000005c0)=""/144, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x7, 0x1}, 0x10, r3}, 0x80) r4 = syz_open_dev$ttys(0xc, 0x2, 0x1) r5 = dup2(r4, r4) ioctl$TIOCSETD(r5, 0x540c, &(0x7f0000000080)=0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0x6, &(0x7f0000000c80)=ANY=[@ANYBLOB="18160000", @ANYRES32=r0, @ANYBLOB="005b000000000000188a1cd5f125151d64a4ab29013d5dd96300000900002000000000080000001829f4ff10000000a795f0ff01"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x5, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x4, 0x3, 0xa49}, 0x10, r3, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[r5, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) 16:05:22 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) r2 = dup2(r1, r1) ioctl$TIOCSETD(r2, 0x5414, &(0x7f0000000080)=0x15) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x1, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a40)=@bpf_ext={0x1c, 0xc, 0x0, 0x0, 0x1000, 0x72, &(0x7f0000000480)=""/114, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x0, 0x0, 0x5}, 0x10, 0x24f66}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000090000000000000009000000950000000000002172020000ffffffff9500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f0000000600)=""/190, 0x0, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x4, 0x0, 0x7, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000900)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) [ 1102.412429] kasan: CONFIG_KASAN_INLINE enabled [ 1102.417411] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 1102.446490] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 1102.452749] CPU: 0 PID: 19674 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 1102.460643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1102.470104] RIP: 0010:cdev_del+0x22/0x90 [ 1102.474168] Code: cf 0f 1f 80 00 00 00 00 55 48 89 fd 48 83 ec 08 e8 b3 dc be ff 48 8d 7d 64 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 04 84 d2 75 4f 48 [ 1102.493069] RSP: 0018:ffff88802d687cd8 EFLAGS: 00010207 [ 1102.498434] RAX: dffffc0000000000 RBX: ffff8880af2adc00 RCX: ffffffff83b8674f [ 1102.505706] RDX: 000000000000000c RSI: ffffffff81a3a8bd RDI: 0000000000000064 [ 1102.512977] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1102.520336] R10: 0000000000000007 R11: 0000000000000000 R12: ffff8880af2adc08 [ 1102.527692] R13: ffff8880af312308 R14: ffff88809b10a640 R15: ffff88804bc51138 [ 1102.534963] FS: 000055555731f400(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 [ 1102.543187] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1102.549073] CR2: 00007fff37105cd8 CR3: 000000009db77000 CR4: 00000000003406f0 [ 1102.556342] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1102.563614] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1102.570876] Call Trace: [ 1102.573465] tty_unregister_device+0x112/0x1b0 [ 1102.578047] gsmld_close+0xaa/0x1f0 [ 1102.581680] ? gsm_cleanup_mux+0x3e0/0x3e0 [ 1102.585918] tty_ldisc_close+0xa2/0xd0 [ 1102.589807] tty_ldisc_release+0xf5/0x440 [ 1102.593966] tty_release_struct+0x20/0xe0 [ 1102.598138] tty_release+0xc70/0x1210 [ 1102.601943] ? do_tty_hangup+0x30/0x30 [ 1102.605828] __fput+0x2ce/0x890 [ 1102.609111] task_work_run+0x148/0x1c0 [ 1102.613003] exit_to_usermode_loop+0x251/0x2a0 [ 1102.617587] do_syscall_64+0x538/0x620 [ 1102.621479] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1102.626668] RIP: 0033:0x7f1d8f292f8b [ 1102.630377] Code: 0f 05 48 3d 00 f0 ff ff 77 45 c3 0f 1f 40 00 48 83 ec 18 89 7c 24 0c e8 63 fc ff ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 a1 fc ff ff 8b 44 [ 1102.649276] RSP: 002b:00007fffd989cd90 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 1102.656986] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 00007f1d8f292f8b [ 1102.664259] RDX: 0000000000000000 RSI: 0000001b2f8226ac RDI: 0000000000000004 [ 1102.671536] RBP: 00007f1d8f402980 R08: 0000000000000000 R09: 000000003253460c [ 1102.678807] R10: 0000000000000000 R11: 0000000000000293 R12: 000000000010d314 [ 1102.686078] R13: 00007fffd989ce90 R14: 00007f1d8f401050 R15: 0000000000000032 [ 1102.693345] Modules linked in: [ 1102.700022] ---[ end trace 22d0256d72da9661 ]--- [ 1102.704785] RIP: 0010:cdev_del+0x22/0x90 [ 1102.711812] Code: cf 0f 1f 80 00 00 00 00 55 48 89 fd 48 83 ec 08 e8 b3 dc be ff 48 8d 7d 64 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 04 84 d2 75 4f 48 [ 1102.733568] RSP: 0018:ffff88802d687cd8 EFLAGS: 00010207 [ 1102.739693] RAX: dffffc0000000000 RBX: ffff8880af2adc00 RCX: ffffffff83b8674f [ 1102.747885] RDX: 000000000000000c RSI: ffffffff81a3a8bd RDI: 0000000000000064 [ 1102.755720] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1102.764867] R10: 0000000000000007 R11: 0000000000000000 R12: ffff8880af2adc08 [ 1102.774059] R13: ffff8880af312308 R14: ffff88809b10a640 R15: ffff88804bc51138 [ 1102.783404] FS: 000055555731f400(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 [ 1102.793611] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1102.806116] CR2: 00007fff37105cd8 CR3: 000000009db77000 CR4: 00000000003406f0 [ 1102.815840] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1102.830398] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1102.843385] Kernel panic - not syncing: Fatal exception [ 1102.848933] Kernel Offset: disabled [ 1102.852551] Rebooting in 86400 seconds..